31st week of 2019 patent applcation highlights part 78 |
Patent application number | Title | Published |
20190238562 | MALWARE-INFECTED DEVICE IDENTIFICATIONS - In some examples, for a device that transmitted domain names, a system determines a dissimilarity between the domain names, compares a value derived from the determined dissimilarity to a threshold, and identifies the device as malware infected in response to the comparing. | 2019-08-01 |
20190238563 | MANAGED SOFTWARE REMEDIATION - There is disclosed in one example a remediation server including: a hardware platform, including a processor, a memory, and a network interface; and instructions encoded within the memory to instruct the processor to: receive an application binary; create an application logic model of the application binary; and create personalization rules for the application binary based on the application logic model. | 2019-08-01 |
20190238564 | METHOD OF CYBERTHREAT DETECTION BY LEARNING FIRST-ORDER RULES ON LARGE-SCALE SOCIAL MEDIA - A cyberthreat detection method and system includes a distributed file system and a commodity cluster configured in data communication via a network, wherein the commodity cluster is defined as a plurality m of servers, each including a computer processor and a non-transitory computer-readable storage medium. The system and method includes receiving a data array characterized by a key and a value in a set of pairs relating to social media posts and users, storing a plurality of predetermined ground predicates, constructing a ground predicate graph for each user reflected in the array, constructing a user centric graph having one or more vertices and one or more edges and wherein each vertex represents the ground predicate graph corresponding to each user. The method includes partitioning the user centric graph into balanced portions P | 2019-08-01 |
20190238565 | CONTEXT FOR MALWARE FORENSICS AND DETECTION - A malware profile is received. The malware profile comprises a set of one or more activities associated with executing a copy of a known malicious application that is associated with the malware profile. A set of one or more log entries is analyzed for a set of entries that matches the malware profile. Based at least in part on identifying the set of entries matching the malware profile, a determination is made that a host was compromised. | 2019-08-01 |
20190238566 | CONTEXT PROFILING FOR MALWARE DETECTION - Analysis of samples for maliciousness is disclosed. A sample is executed and one or more network activities associated with executing the sample are recorded. The recorded network activities are compared to a malware profile. The malware profile comprises a set of network activities taken by a known malicious application during execution of the known malicious application. A verdict of “malicious” is assigned to the sample based at least in part on a determination that the recorded network activities match the malware profile. | 2019-08-01 |
20190238567 | DETECTING ATTACKS ON COMPUTING DEVICES - An example system may comprise a first computing device comprising instructions executable by a hardware processor to: create, responsive to detecting a second computing device initially attempting to connect to a network, an unpopulated baseline profile for the second computing device; populate the baseline profile with initial processes running on the second computing device and initial system calls made by the initial processes during an initial operation time period of the second computing device; monitor, during a subsequent operation time period of the second computing device, subsequent processes running on the second computing device and subsequent system calls made by the subsequent processes; and detect an attack on the second computing device based on a comparison of the subsequent processes and the subsequent system calls to the populated baseline profile. | 2019-08-01 |
20190238568 | Identifying Artificial Artifacts in Input Data to Detect Adversarial Attacks - Mechanisms are provided for training a classifier to identify adversarial input data. A neural network processes original input data representing a plurality of non-adversarial original input data and mean output learning logic determines a mean response for each intermediate layer of the neural network based on results of processing the original input data. The neural network processes adversarial input data and layer-wise comparison logic compares, for each intermediate layer of the neural network, a response generated by the intermediate layer based on processing the adversarial input data, to the mean response associated with the intermediate layer, to thereby generate a distance metric for the intermediate layer. The layer-wise comparison logic generates a vector output based on the distance metrics that is used to train a classifier to identify adversarial input data based on responses generated by intermediate layers of the neural network. | 2019-08-01 |
20190238569 | INDICATING MALICIOUS ENTITIES BASED ON MULTICAST COMMUNICATION PATTERNS - In some examples, a network device includes an interface, and a processor to apply a restriction on multicast communication associated with an entity on the interface. The restriction on multicast communication includes detecting, on the interface, a multicast communication pattern associated with the entity, indicating, based on the multicast communication pattern on the interface violating a threshold, that the entity is malicious, and blocking processing of the multicast communication associated with the entity in response to indicating that the entity is malicious. | 2019-08-01 |
20190238570 | SYSTEM AND METHOD FOR DETECTING COMPUTER NETWORK INTRUSIONS - A method and system for monitoring computer network intrusions, the system comprising at least one security device including a processor and memory. The at least one security device is communicatively coupled to a private network and configured to generate heartbeat pulses comprising operational snapshots of the at least one security device. The system further comprises one or more host systems configured to communicate with the at least one security device from an external network, transmit configuration parameters to the at least one security device, the configuration parameters including instructions for the at least one security device to operate as a given type of network asset, monitor the heartbeat pulse of the at least one security device, determine a change in integrity in the at least one security device based on the monitoring, and send one or more notification messages to a network administrator based on the determination. | 2019-08-01 |
20190238571 | METHOD AND SYSTEM FOR EMAIL PHISHING ATTEMPTS IDENTIFICATION AND NOTIFICATION THROUGH ORGANIZATIONAL COGNITIVE SOLUTIONS - Embodiments of the present invention may detect, identify, and notify of email phishing attacks. For example, a method may comprise constructing at least one behavioral model for an organization based on features extracted from a plurality of email messages and based on information relating to the organization, including analyzing behavioral patterns of emails in the organization, analyzing a plurality of new email messages using the behavioral model to determine non-binary scores representing analysis of features of the messages, including behavioral patterns of the new emails in the organization with regard to the features, determining whether any of the plurality of new email messages are malicious email messages based on the non-binary scores for the new email messages indicating that the new email messages deviate from the behavioral patterns of emails in the organization included in the behavioral model, and transmitting a notification that a message is a malicious email message. | 2019-08-01 |
20190238572 | INDICATING MALWARE GENERATED DOMAIN NAMES USING N-GRAMS - In some examples, a system identifies, in a domain name, n-grams that do not appear in words of a given language, where n is greater than two. The system compares a value based on a number of the identified n-grams to a threshold, and indicates that the domain name is potentially generated by malware in response to the value having a specified relationship with respect to the threshold. | 2019-08-01 |
20190238573 | INDICATING MALWARE GENERATED DOMAIN NAMES USING DIGITS - In some examples, a system counts a number of digits in a domain name. The system compares a value based on the number of digits to a threshold, and indicates that the domain name is potentially generated by malware in response to the value having a specified relationship with respect to the threshold. | 2019-08-01 |
20190238574 | SYSTEMS DATA VALIDATION - A network connection between a server group of a data intake and query system and each of one or more source network nodes is established. The server group includes an indexer server and a model management server. Source data at the server group is received from at least one of the one or more source network nodes via the respective network connections and transformed, by the indexer server, to timestamped entries of machine data. A model management server detects data constraints for a security model. The data constraints include a data element used by the security model and an availability requirement set, the availability requirement set defining when the data element is available. Using the timestamped entries, the data constraints are validated to obtain a validation result, where validating the data constraints includes determining whether the timestamped entries satisfy the availability requirement set for the data element. The model management server determines a data availability assessment of the security model based on the validation result. The data availability assessment of the security model is stored in computer storage. | 2019-08-01 |
20190238575 | Detecting anomalous network behavior - Approaches provide for monitoring attempted network activity such as network port connections and corresponding payloads of network data obtained by a network device and, based on the attempted connections and/or payloads, identifying malicious network activity in real time. For example, network activity obtained from a plurality of network devices in a service provider environment can be monitored to attempt to detect compliance with appropriate standards and/or any of a variety of resource usage guidelines (e.g., network behavioral standards or other such rules, guidelines, or network behavior tests) based at least in part on network port connection activity with respect to at least one network device. If it is determined that network activity is not in compliance with the usage guidelines, or other such network behavior test, the system can take one or more remedial actions, which can include generating a notification identifying the malicious network activity. | 2019-08-01 |
20190238576 | IDENTIFICATION OF MALICIOUS DOMAIN CAMPAIGNS USING UNSUPERVISED CLUSTERING - The technology presented herein enables the use of a clustering algorithm to identify additional malicious domains based on known malicious domains. In a particular embodiment, a method provides identifying a first plurality of domain names associated with a malicious domain campaign and seeding a first clustering algorithm with the first plurality of domain names. After seeding the first clustering algorithm, the method provides using the first clustering algorithm to process passive domain name system (DNS) records to identify and group a second plurality of domain names associated with the malicious domain campaign. | 2019-08-01 |
20190238577 | RULE-BASED NETWORK-THREAT DETECTION - A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination. | 2019-08-01 |
20190238578 | VECTOR-BASED ANOMALY DETECTION - A hybrid-fabric apparatus comprises a black box memory configured to store a plurality of behavior metrics and an anomaly agent coupled to the black box. The anomaly agent determines a baseline vector corresponding to nominal behavior of the fabric, wherein the baseline vector comprises at least two different behavior metrics that are correlated with each other. The anomaly agent disaggregates anomaly detection criteria into a plurality of anomaly criterion to be distributed among network nodes in the fabric. | 2019-08-01 |
20190238579 | AUTHENTICATION DEVICE FOR A VEHICLE (AS AMENDED) - An authentication device for a vehicle, wherein the vehicle has a communications network for conveying communications data. The authentication device includes a communications interface which is connectable to the communications network of the vehicle, wherein the communications interface is configured to receive the communications data, and a processor which is configured to detect a characteristic of the received communications data, wherein the processor is configured to authenticate the communications data based on a comparison of the detected characteristic with a reference characteristic. | 2019-08-01 |
20190238580 | SMART HOME SECURITY SYSTEM - A system includes a network gateway in communication with a plurality of servers, a household behavior model processor which models a household behavior model based at least on expected usage of each of a plurality of network appliances, wherein each one appliance of the plurality of network appliances is associated with one of the plurality of servers, and behavior of users associated with the network gateway, an anomaly detector which determines, on the basis of the household behavior model, if an anomalous control message which has been sent to one of the plurality of network appliances from one of the servers has been received at the network gateway, and a notification server which sends a notification to an application on an administrator's device upon receipt of the anomalous control message at the network gateway. Related systems, apparatus, and methods are also described. | 2019-08-01 |
20190238581 | METHOD, APPARATUS AND SYSTEM FOR DETECTING ABNORMAL BEHAVIOR OF USER - The embodiments of the present invention provide a method, an apparatus and a system for detecting abnormal behavior of an user which belong to the field of computer technologies. The method includes acquiring time series data, wherein the time series data are configured to describe at least one network behavior, and determining that the user corresponding to the at least one network behavior has the abnormal behavior, when the acquired time series data are not stable. The time series data more accurately describe the network behavior of the user, therefore it is of high accuracy that determining the user has the abnormal behavior when the time series data are not stable, and the user experience is improved when surfing the internet. In addition, determining whether the user has the abnormal behavior according to the stationarity of the time series data is highly accurate and highly efficient. | 2019-08-01 |
20190238582 | COMPUTER NETWORK SECURITY ASSESSMENT ENGINE - A network security assessment engine can assess security on a remote computer network. Agent programs on computing devices on the remote network can execute security tests. The network security assessment engine receives security test results produced by the security tests. The network security assessment engine can determine security test scores based, at least in part, on the security test results. The network security assessment engine can determine an overall network security score based, at least in part, on the security test scores and present the overall network security score. As an example, a network services provider can utilize the network security assessment engine to provide an adaptive, expressive scoring mechanism, allowing the network services provided to more efficiently digest, assess, and report network anomalies within a multitenant context. | 2019-08-01 |
20190238583 | METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKS - Methods and systems for generating stateful attacks for simulating and testing security infrastructure readiness. Attack templates descriptive of a plurality of attacks to be executed against one or more targets are defined. The attack templates are processed to compile a decision tree by traversing through a list of attack templates to create a logical tree with tree branches representing different execution paths through which attacks may be executed against the targets. During attack simulations and/or testing, single and/or multi-stage attacks are executed against targets, wherein attack sequences are dynamically determined using the execution paths in the decision tree in view of real-time results. The attacks may be executed against various types of targets, including target in existing security infrastructures and simulated targets. Moreover, the attacks may originate from computer systems within security infrastructures or remotely using computer systems external to the security infrastructures. | 2019-08-01 |
20190238584 | SYSTEM AND METHOD FOR VULNERABILITY MANAGEMENT FOR CONNECTED DEVICES - Embodiments herein provide a system, method and an apparatus for vulnerability management for connected devices on a network. The proposed method includes identifying vulnerability in a device. The method includes determining whether the vulnerability affects the device by applying one or more rules. Further, the method includes calculating vulnerability score by assigning weights to impact metric and exploitability metric. In various embodiments, the method includes predicting security incident for the device based on the computed vulnerability score, security capabilities of the device and various anomalies on the device. | 2019-08-01 |
20190238585 | Anti-Replay Protection For Network Packet Communications - Methods and systems are disclosed for anti-replay protection for network packet communications. A scorecard is stored that includes packet sequence numbers for received packets associated with a network packet flow. For each received packet, an anti-replay unit accesses the scorecard for an initial check to determine if the current packet represents a late packet and/or a replay packet. After further processing, the anti-replay unit accesses the scorecard for a final check to determine if the current packet represents a replay packet. For one embodiment, the initial check uses a first window of packet sequence numbers, and the final check uses a second window of packet sequence numbers that is larger than the first window. For further embodiments, multiple processing units operate in parallel to process received packets and to share the anti-replay unit, and each processing unit requests initial and final checks for received packets it processes. | 2019-08-01 |
20190238586 | CAN CONTROLLER SAFE AGAINST CAN-COMMUNICATION-BASED HACKING ATTACK - A CAN controller safe against a CAN-communication-based hacking attack includes each CAN controller that filters a message to be transmitted to a CAN bus. A corresponding CAN controller filters only a message having a valid transmission ID to be transmitted. The CAN controller safe includes a transmission buffer, a transmission filter unit, a protection memory and a filter value setting unit. The transmission buffer unit temporarily stores transmission data to be transmitted to a CAN bus. The transmission filter unit has message IDs allowed to be transmitted as a transmission filter, configured to search for a message ID of the transmission data in the transmission filter, and filter the transmission data. The protection memory stores one or more filter values of the transmission filter and the filter value setting unit is configured to fetch the filter value stored in the protection memory. | 2019-08-01 |
20190238587 | SYSTEM AND METHOD OF AUTHENTICATING THE SOURCE OF A COMMUNICATION SIGNAL TRANSMITTED ALONG A NETWORK BUS - A communication network authenticates the source of messages transmitted on a flat bus to determine the presence of spoofing events. A programmable intrusion detection device is connected to the bus at a fixed location and compiles templates for various tri-bit signal pulses that form the data transmitted as messages between network nodes. Each tri-bit template compares unique signal characteristics inherent in the signal waveform received by the device from each node, the unique characteristics being directly attributable to the physical topology of the network. In use, the device uses the templates to calculate an inferred source identifier for each message. The inferred source identifier is then compared against the declared source identifier, which is embedded in message metadata, to authenticate the message source. Any lack of reconciliation between the inferred and declared source identifiers causes the device to mark the message as spoofed and initiate a designated response. | 2019-08-01 |
20190238588 | SYSTEMS AND METHODS FOR ARTIFICIAL MODEL BUILDING TECHNIQUES - Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file. In some implementations, the system may adapt an ongoing campaign based on user's responses to messages in the campaign, along with the system's learned awareness. The learning process implemented by the security awareness system can be trained by observing the behavior of other users in the same company, other users in the same industry, other users that share similar attributes, all other users of the system, or users that have user attributes that match criteria set by the system, or that match attributes of a subset of other users in the system. | 2019-08-01 |
20190238589 | HONEYPOT NETWORK SERVICES - In general, in one aspect, a system for providing honeypot network services may monitor network activity, and detect network activity indicative of network service discovery by a first device, for example, port scanning. The system may present a temporarily available network service to the first device in response to detecting the activity indicative of port scanning, for example, by redirecting traffic at an unassigned network address to a honeypot network service. The system may monitor communication between the first device and the presented honeypot network service to determine whether the monitored communication is indicative of a threat, and determine that the first device is compromised based on the monitored communication between the first device and the presented honeypot network service. The system may initiate measures to protect the network from the compromised first device. | 2019-08-01 |
20190238590 | Systems and Methods of Chunking Data for Secure Data Storage across Multiple Cloud Providers - Techniques for chunking data in data storage systems that provide increased data storage security across multiple cloud storage providers. The techniques employ a chunking engine and a policy engine, which evaluates one or more storage policies relating to, for example, cost, security, and/or network conditions in view of services and/or requirements of the multiple cloud storage providers. Having evaluated such storage policies, the policy engine generates and provides operating parameters to the chunking engine, which uses the operating parameters when chunking and/or distributing the data across the multiple cloud storage providers, thereby satisfying the respective storage policies. In this way, users of data storage systems obtain the benefits of cloud storage resources and/or services while reducing their data security concern and optimizing the total cost of data storage. | 2019-08-01 |
20190238591 | MANAGING ADMISSION OF UNRECOGNIZED DEVICES ONTO AN ENTERPRISE NETWORK - A threat management facility detects a device on an enterprise network and determines whether the device is one of a set of managed devices for the enterprise network. When the device is not one of the set of managed devices, the threat management facility may selectively direct the device to a portal that provides support to the user of the device while the device awaits admission to the enterprise network. As the user interacts with the portal, the portal may manage admission of unrecognized devices onto the enterprise network while making efficient use of network administrator resources. | 2019-08-01 |
20190238592 | Secure Execution of Enterprise Applications on Mobile Devices - A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system. | 2019-08-01 |
20190238593 | AUTOMATIC DECOY DERIVATION THROUGH PATCH TRANSFORMATION - A method and system for implementing security patches on a computer system is disclosed. The method includes finding one or more security patches; analyzing one of the one or more security patches to find one or more localized security fixes within the one or more security patches; and transforming a security patch within the one or more security patches into a honey patch that is configured to report security violations. | 2019-08-01 |
20190238594 | OPERATING A NETWORK NODE - Measures, including methods, apparatus and computer programs, for use in operating a network node. A method includes, at the network node: receiving a session initiation protocol (SIP) message directed towards a downstream network element, wherein the received message comprises session description protocol (SDP) data indicating a first SDP preconditions setting; forwarding the received SIP message on to the downstream network element with no modifications; in response to forwarding the received SIP message, receiving a rejection message from the downstream network element; on the basis of the received rejection message, determining that the first SDP preconditions setting is not supported by downstream device; generating a second SIP message comprising SDP data indicating a second SDP preconditions setting different from the first SDP preconditions setting; and transmitting the generated second SIP message comprising SDP data indicating the second SDP preconditions setting to the downstream network element. | 2019-08-01 |
20190238595 | Voice Call Controller - A voice call controller (VCC) polls session border controllers (SBCs) to determine routing of Voice over Internet Protocol (VoIP) calls and filter calls based on call source and originator parameters. The VCC re-routes calls in the event of errors, generates filters based on observed behaviors, and communicates filter rules or statistics to other entities. | 2019-08-01 |
20190238596 | A REAL TIME COMMUNICATION SYSTEM - Disclosed is a method and a real-time communication system ( | 2019-08-01 |
20190238597 | Methods and Apparatus for Facilitating Real Time Multimedia Communications | 2019-08-01 |
20190238598 | DYNAMIC CLIENT REGISTRATION FOR AN IDENTITY CLOUD SERVICE - Dynamic client registration for an Identity Cloud Service (IDCS) is provided. A service instance client, associated with a service instance, is created in a first tenancy. A template client is created, based on a security blueprint, in a second tenancy. A registration client is created in the first tenancy. A request for a registration access token is received from an installed client application over a network; the request includes an ID of the template client. A user of the installed client application is authenticated using the template client. The registration access token is sent to the installed client application over the network. A request for a client assertion token is received from the installed client application over the network; the request includes the registration access token. The registration access token is authenticated using the template client. The client assertion token is sent to the installed client application over the network. | 2019-08-01 |
20190238599 | VIRTUAL COMPUTING SYSTEM PROVIDING LOCAL SCREEN SHARING FROM HOSTED COLLABORATION APPLICATIONS AND RELATED METHODS - A computing system may include first and second client computing devices each configured to generate a respective local graphics surface. A virtualization server may be configured to run a virtual collaboration application for the first client computing device hosted in a virtual computing session, and to generate a virtual graphics surface from the local graphics surface of the first client computing device within the virtual computing session. A collaboration cloud computing service may cooperate with the second client computing device and the virtual collaboration application at the virtualization server to share the virtual graphics surface within the local graphics surface of the second client computing device. | 2019-08-01 |
20190238600 | SYSTEMS AND METHODS FOR OPTIMIZING SIMULCAST STREAMS IN GROUP VIDEO CALLS - Systems, methods, and non-transitory computer-readable media can identify a set of participants in a group video call, wherein each participant is associated with an uplink capacity and a downlink capacity, and the set of participants includes a set of sender participants and a set of subscriber participants. For a first sender participant of the set of sender participants, one or more video stream layers to be uploaded by the first sender participant are determined based on downlink capacities of one or more subscriber participants of the set of subscriber participants. Each subscriber participant of the one or more subscriber participants is assigned to receive one video stream layer of the one or more video stream layers to be uploaded by the first sender participant. | 2019-08-01 |
20190238601 | SYSTEM AND METHOD FOR WORKSPACE SHARING - A system and method of communicating between computing devices including pairing a first computing device with a second computing device. The first computing device and the computing second device are configured to communicate with an application workspace system. The first computing device provides token and application information to a second computing device. The second computing device is authenticated with the application workspace system using the token and launches an application corresponding to the application information. | 2019-08-01 |
20190238602 | Real Time Collaboration And Document Editing By Multiple Participants In A Content Management System - A content management system allows users to collaboratively edit, draft, or otherwise work with the same content item simultaneously by displaying a real-time data stream of a native application displaying a content item on a host device in a screen sharing window of a webpage. The screen sharing window is capable of receiving edit inputs and sending the edit inputs to a client application on the host device. The edit inputs are provided as interpretable code for the native application for the content item and the client application provides the interpretable code to the native application to have the changes corresponding to the edit inputs incorporated into the content item. Further, the cursors of other users participating in the collaborative editing session are displayed in the screen sharing window to allow each participant to view and follow the changes made by the other participants of the session. | 2019-08-01 |
20190238603 | RESPONSE CACHING - A machine receives, from a first client device, a first request for provision of data that is specified by the first request. The machine creates a datastream that contains the data and initiates provision of the datastream to the first client device. The machine creates a marker file that corresponds to the first request, and existence of the marker file indicates that the provision of the datastream to the first client device is incomplete. While the marker file exists, if the machine receives, from a second client device, a second request for provision of the same data, the machine caches the now twice-requested data in a data cache, and the machine may provide the data from the data cache to the second client device. This can avoid one or more retrieval operations or other preparations for providing the data to the second client device. | 2019-08-01 |
20190238604 | TRANSFER OF DATA STREAMING SERVICES TO PROVIDE CONTINUOUS DATA FLOW - Embodiments regard transfer of data streaming services to provide continuous data flow. An embodiment of an apparatus includes a processor to process data for streaming to one or more organizations; and a memory to store data for streaming to the one or more organizations, wherein the apparatus is to provide a centralized work distribution service to track status of each of a plurality of data streams to the one or more organizations, and a plurality of nodes, each node being a virtual machine to stream one or more data streams to the one or more organizations, each node including a first daemon service to monitor connectivity of the node to dependency services for the node and, upon detecting a loss of connection to one or more of the dependency services, the node to discontinue ownership of the one or more data streams of the node and a second daemon service to poll the centralized work distribution service for data streams that are not assigned. | 2019-08-01 |
20190238605 | VERIFICATION OF STREAMING MESSAGE SEQUENCE - Techniques are disclosed relating to verifying the sequence of messages sent via data streaming systems. In some embodiments, a streaming server system may receive a plurality of messages associated with events at a data storage system that is accessible to various groups of users. In some embodiments, each of the plurality of messages may include an event identifier for an associated event and a group-specific sequence number. The streaming server system may detect, based on group-specific sequence numbers included in a set of messages, that a particular message for a particular group has not been received. The streaming server system may send, to the data storage system, a request for the particular message and, in response to the request, may receive the particular message from the data storage system. | 2019-08-01 |
20190238606 | INTERNET PROVIDER SUBSCRIBER COMMUNICATIONS SYSTEM - A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a provider of Internet services, comprising a first device, and a second device communicably coupled to the first device, wherein the first device: accesses only subscriber upstream traffic to a destination web site requested by the subscriber, wherein the first device inter-connects between the at least one subscriber and the destination web site, identifies the at least one subscriber's identification based on the accessed subscriber upstream traffic automatically provided by the subscriber, and provides the unique subscriber identification to the second device located at the provider of Internet services providing data services and management control to the first device, wherein the second device determines the subscriber associated with the unique subscriber identification. | 2019-08-01 |
20190238607 | FAILURE DETECTION MANAGER - A network device is configured to receive information regarding a group of content streams and determine a buffer size for each of the content streams. The network device is further configured to receive the content streams from one or more encoding devices. The network device is further configured to buffer an amount of each of the content streams based on the respective buffer size. The network device is further configured to send a first content stream to a user device. The network device is further configured to determine that the first content stream has a quality of experience issue and send the second content stream to the user device. | 2019-08-01 |
20190238608 | DELIVERY OF HIGH-FIDELITY CONTENT - Content is provided from a content distribution node in either low or high-fidelity form depending upon a state of an end-point node. A nominal variant of high-fidelity content is transmitted to an end-point node while a presentation function remains engaged at the end-point node. When determined that the presentation function is disengaged at the end-point node, the particular frame on which nominal variant is paused is identified. A high-fidelity frame of the high-fidelity content that corresponds to the particular frame on which play is paused at the end-point node is transmitted to the end-point node. The end-point node uses the high-fidelity frame to bring the particular frame on which play is paused at the end-point node to full fidelity. | 2019-08-01 |
20190238609 | SPATIALLY UNEQUAL STREAMING - Various concepts for media content streaming are described. Some allow for streaming spatial scene content in a spatially unequal manner so that the visible quality for the user is increased, or the processing complexity or used bandwidth at the streaming retrieval site is decreased. Others allow for streaming spatial scene content in a manner enlarging the applicability to further application scenarios. | 2019-08-01 |
20190238610 | ARCHITECTURE FOR AUGMENTING VIDEO DATA OBTAINED BY A CLIENT DEVICE WITH ONE OR MORE EFFECTS DURING RENDERING - A video effects application executes on a client device having an image capture device and receives video data captured by the image capture device. The video effects application extracts information from the captured video data and stores the extracted information as metadata associated with the captured video data. For example, the video effects application identifies objects in the captured video data or identifies optical flow of the captured video data and stores the identified objects or identified optical flow as metadata associated with the captured video data. The video effects application stores information describing modifications to the captured video data in association with the captured video data. When the captured video data is presented, the captured video data, associated metadata, and information describing the modifications is communicated to a renderer, which uses the metadata to perform the identified modifications to the captured video data when presenting the captured video data. | 2019-08-01 |
20190238611 | System and Method for Providing a Real-Time Three-Dimensional Digital Impact Virtual Audience - The present disclosure generally provides a system and method for providing a real-time three-dimensional digital impact virtual audience. The system and method may include processing video associated with an event to produce a corresponding data stream, compositing the corresponding data stream with at least one sequence of predictability data stream to create a digital framework, processing the digital framework into at least one full-form representation of at least one object depicted in the video, and transmitting the at least one full-form representation to one or more communication devices associated with one or more virtual audience members, wherein the one or more virtual audience members are viewing the same event using their respective communication devices. | 2019-08-01 |
20190238612 | VIDEO DATA PROCESSING METHOD AND APPARATUS - Example video data processing methods and apparatus are disclosed. One example method includes obtaining viewport information by a server. The server obtains spatial object information based on the viewport information, where the spatial object information is used to describe a specified spatial object in panoramic space. The server obtains a first bitstream that is obtained by encoding image data in the specified spatial object. The server obtains a second bitstream that is obtained by encoding image data in the panoramic space. The server transmits the first bitstream and the second bitstream to a client. | 2019-08-01 |
20190238613 | Self-Organizing Network Communication - A method includes initiating, by an agent application of an access point, a communication connection to a self-organizing network controller via a particular communication path to the self-organizing network controller. The particular communication path is identified in a prioritized set of communication paths to the self-organizing network controller. The method includes receiving, at the access point, control data from the self-organizing network controller via the particular communication path. The control data includes an instruction for a station, the station in communication with the access point via a wireless local area network supported by the access point. The method also includes sending the instruction to the station from the access point via the wireless local area network. The instruction is executable by the station to cause the station to modify a data transmission rate of the station. | 2019-08-01 |
20190238614 | System and Method to Standardize and Improve Implementation Efficiency of User Interface Content - A system and method to improve implementation efficiency of user interface content by using standard content attributes used across all platforms and devices to implement a lowest common denominator programming system. Standardized content attributes are used to produce a universal content framework that is implemented identically across various devices and platforms, resulting in a consistent and standardized user experience. The invention allows programming functionality to be universally applied and usable with any device and platform so that significant computer programming and updating inefficiencies are eliminated. | 2019-08-01 |
20190238615 | SYSTEMS, METHODS, AND MEDIA FOR CORRELATING INFORMATION CORRESPONDING TO MULTIPLE RELATED FRAMES ON A WEB PAGE - Systems, methods, and media for correlating information corresponding to multiple related frames on a web page are provided. In some embodiments, a method for identifying corresponding iframes on a web page to a server is provided, the method comprising: loading a web page including a plurality of iframes; receiving the requested content and identifying information for a first iframe; loading an event listener; determining a location of the first iframe in the structure of the web page; transmitting a message to a second iframe including the first identifying information and location of the first iframe; receiving, using the event listener, a message from the second iframe including second identifying information and location of the second iframe; determining that the second iframe is nested within the first iframe; and transmitting a third message to a server including at least the second identifying information and location of the second iframe. | 2019-08-01 |
20190238616 | MECHANISM FOR SHARING OF INFORMATION ASSOCIATED WITH APPLICATION EVENTS - Techniques are provided that allow users to collaborate in relationship to data views, application displays, applications or events. A user can type in a text view related to a specific view in an application display, and the information is shared with other users that take part in sharing that view. A user that expresses an interest in an event is notified about the event and has the capability to interact, in relation to the event, with other users (e.g. by text). The particular form of interaction (and sharing) can be selectively specified. This interaction is comparable to a dynamic bulletin board where the subject is event driven. In the case of an event interest(s), users specify their interest (e.g. in other user application events or system events) and the system automatically alerts them to the occurrence of the event. | 2019-08-01 |
20190238617 | METHOD FOR ENABLING A COMMUNICATION DEVICE TO RECEIVE A PARTIAL MODIFICATION OF A RESOURCE - A first communication device transmits, to a second communication device, a first indication indicating a configuration enabling the first communication device to receive a partial modification of resources. The first communication device receives, from the second communication device, a second indication indicating a partial update, in time, associated with a resource and a value of a part of the resource. The first communication device further maintains an internal value of the part of the resource based on the second indication. | 2019-08-01 |
20190238618 | MANAGING CLOUD STORAGE OF BLOCK-BASED AND FILE-BASED DATA - A technique for managing cloud storage provides a unified framework that supports both block-type data, such as LUNs (Logical UNits) and volumes, and file-type data, such as files, and expresses both types of data in the form of objects, which form a common base for both types of data. The framework includes a single API (application program interface) for managing storage and retrieval of block-derived objects and file-derived objects from the cloud, e.g., from a cloud-based data store. | 2019-08-01 |
20190238619 | TECHNIQUES FOR COORDINATING THE SHARING OF CONTENT AMONG APPLICATIONS - Techniques for coordinating the sharing of content among applications, provided that said applications and their users are registered to the same sharing coordinator service (SCS), are described. An embodiment of the present invention can enable an application to define, to the SCS it is registered to, the types of content it is able to receive and the application routes where to receive them. Said definition provides the application users with the ability to easily select content of those types from share sources and send it to specific routes on the application, undergoing an overall personalized sharing experience. Content types can be defined on the SCS and made available to other applications to consume, centralizing the parsing of content and the interchange of information into a secure robust strongly typed system. | 2019-08-01 |
20190238620 | Resource Position Planning for Distributed Demand Satisfaction - Methods, systems and computer program products for resource position planning are provided herein. A computer-implemented method includes generating a multi-commodity flow network for locations of a distributed service network over a planning horizon. The method also includes obtaining a set of candidate outage scenarios for the distributed service network, each of the set of candidate outage scenarios being associated with a corresponding probability of occurrence. The method also includes generating a resource positioning configuration for resources in the multi-commodity flow network utilizing an optimization model that reduces unmet demand for each of the set of candidate outage scenarios based at least in part on the probability of occurrence of each of the set of candidate outage scenarios. The method also includes providing the resource positioning configuration to the distributed service network to modify positioning of one or more resources in the distributed service network based on the generated resource positioning configuration. | 2019-08-01 |
20190238621 | METHOD AND SYSTEM FOR SIMULATING SURGICAL PROCEDURES - A system and method for converting static/still medical images of a particular patient into dynamic and interactive images interacting with medical tools models including models of medical devices by coupling a model of tissue dynamics and tool characteristics to the patient specific imagery for simulating a medical procedure in an accurate and dynamic manner, where the simulation can be shared with others even in remote locations. | 2019-08-01 |
20190238622 | EXTENDING MOBILE APPLICATIONS TO THE LOCK SCREEN OF A MOBILE DEVICE - Methods, configured mobile devices, and computer-readable media for displaying content on mobile devices are disclosed. An exemplary method for displaying content on a mobile device includes steps for receiving a first content request provided by a native app executing on one or more processors of a mobile device; computing a priority of the native app to display app content on a lock screen of the mobile device; and in the event that the native app has higher priority than other requesting apps to display app content on the lock screen of the mobile device, transmitting a second content request to a content server; receiving app content from the content server in response to the second content request; and displaying the app content on the lock screen of the mobile device. In an alternative method, in the event that the native app has higher priority than other requesting apps to display app content on the lock screen of the mobile device, a method comprises obtaining app content from the native app; and displaying the app content on the lock screen of the mobile device. | 2019-08-01 |
20190238623 | MECHANISM FOR WEBPAGE COMPOSITION - From a developer, a first request for a webpage for a first business object type is received, the first request comprising a first business object type identifier of the first business object type. Based on a generic template and in response to the first request, the webpage that includes a first user interface (UI) widget for the first business object type is generated. The webpage includes a first instruction for prepopulating the first UI widget with first data from a first data source storing the first business object type. From the developer, a second business object type identifier of a second business object type stored in a second data source is received. A second UI widget is added to the webpage for the second business object type. The webpage is customized with a second instruction to prepopulate the second UI widget using second data from the second data source. | 2019-08-01 |
20190238624 | SYSTEMS AND METHODS OF CAPTURING AND DISTRIBUTING IMAGING CONTENT CAPTURED THROUGH UNMANNED AIRCRAFT SYSTEMS - In some embodiments, systems and methods are provided to capture and distribute imaging content. Some embodiments, provide remote inspection systems, comprising: an unmanned aircraft system (UAS) base station control system that wirelessly communicates with an UAS, and comprises: a wireless transceiver; a control circuit; and a memory wherein the control circuit: receives imaging content, captured by a camera of the UAS; establishes a network connection with a content distribution system and activate a distribution session; and communicates the imaging content to the content distribution system that enables multiple remote authorized rendering systems to access the networked content distribution system over the Internet, join the distribution session, and receive over the Internet in real time the imaging content allowing each of the rendering systems to visually play back the imaging content such that a user at each of the multiple rendering systems can watch the imaging content in real time. | 2019-08-01 |
20190238625 | DISTRIBUTED LOAD PROCESSING USING DRIFT-BASED DYNAMIC CLUSTERS OF INTERNET OF THINGS DEVICES - For distributed processing using drift-based dynamic clustering of Internet of Things (IoT) devices, at a central device, a data source to be used for processing a workload is determined. A set is selected of devices operating within a threshold distance from the data source at a first time. A first subset of the set of devices is selected to form a cluster of devices. Each device in the first subset satisfies a clustering condition. A first device in the first subset is instructed to configure an application at the first device to participate in the cluster and process the workload. From a performance check on the first device, a change is discovered in a performance metric. In response to the change resulting from an increased demand for a computing resource at the first device, the first device is replaced with a second device from the first subset. | 2019-08-01 |
20190238626 | SYSTEM AND METHOD FOR APPLIANCE DETECTION AND APP CONFIGURATION - A system and method is used to provision an app to a smart device for use in connection with an appliance. A presence of the appliance on a wireless network which includes the smart device is detected and data received from the appliance is used to initiate a retrieval of the app. When the retrieved app is installed on the smart device the app is usable with the smart device to provide at least an interface between the smart device and the appliance. In some circumstance, installation of the app on the smart device may also include causing the app to be synchronized with a corresponding app that was prior installed on another smart device capable of communicating with the appliance. | 2019-08-01 |
20190238627 | Multiple Hit Load Balancing - Multiple hit load balancing provides a quasi-persistent request distribution for encrypted requests passing over secure connections as well as for multiple requests passing over the same connection. The multiple hit load balancing involves tracking object demand at each server of a set of servers. The multiple hit load balancing further involves dynamically scaling the servers that cache and directly serve frequently requested objects based on the demand that is tracked by each of the servers. For infrequently requested objects, the servers perform a peer retrieval of the objects so to limit the number of the same object being redundantly cached by multiple servers of the set of servers. | 2019-08-01 |
20190238628 | PRODUCTION SERVER MANAGEMENT USING A STORAGE ARRAY - Systems and methods for managing a production server using a storage array. In an illustrative, non-limiting embodiment, a storage array may include a memory coupled to a processor, the memory having program instructions configured to cause and/or enable the storage array to: receive hardware information from a multipath input/output (MPIO) module of each of a plurality of production servers in communication with the storage array; provide the hardware information to a management server in communication with the storage array; receive a command from the management server targeting a selected production server; and transmit the command to a selected MPIO module of the selected production server. | 2019-08-01 |
20190238629 | INTERACTIVE SYSTEM, TERMINAL APPARATUS, SERVER APPARATUS, CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM - Provided is an interactive system in which program processing which is performed by a server apparatus in response to a request from a terminal apparatus can be preserved in a desired condition. An interactive system includes a terminal apparatus that is connected to a server apparatus via a network, requests the server apparatus to perform program processing, receives a processing result from the server apparatus, and displays the processing result, and the server apparatus that performs program processing in response to a request from the terminal apparatus, and transmits a processing result to the terminal apparatus, in which the terminal apparatus determines a predetermined condition in which execution of a display process of displaying the processing result from the server apparatus is suspended, and transmits a suspension signal to the server apparatus. | 2019-08-01 |
20190238630 | USING READ WEIGHT AFFINITIES TO OPTIMIZE THE READING OF BLOCK CACHE DATA - A system for directing reads includes an input interface and a processor. The input interface is to receive a request to read from a plurality of servers. The processor is to determine a set of weights for a set of healthy servers of the plurality of servers and determine a server to receive the request based at least in part on the set of weights. | 2019-08-01 |
20190238631 | SIGNAL GENERATING METHOD, SIGNAL GENERATING UNIT, AND NON-TRANSITORY RECORDING MEDIUM STORING COMPUTER PROGRAM - A signal generating method for generating a visible light signal is provided. The method includes determining, as a method for transmitting a visible light signal from a transmitter, one of a single-frame transmitting method for transmitting data as one frame and a multiple-frame transmitting method for transmitting the data while dividing the data into a plurality of frames. The method further includes, when the multiple-frame transmitting method is determined, generating partition type information indicating a type of data to be transmitted, and generating combination data by adding the partition type information to the data to be transmitted. Further, the method includes generating the plurality of frames each of which includes each of a plurality of data parts by dividing the combination data into the plurality of data parts, and generating the visible light signal by adding a preamble to a head of each of the plurality of frames. | 2019-08-01 |
20190238632 | WIRELESS NETWORK CLOUD COMPUTING RESOURCE MANAGEMENT - A method, performed by a server device, may include receiving a request to activate an application session, the request being received from a user equipment on behalf of a particular application installed on the user equipment. The method may further include determining one or more application requirements associated with the particular application; determining conditions associated with one or more application servers; selecting a particular one of the one or more application servers based on the determined one or more application requirements and based on the determined conditions; and setting up the application session between the user equipment and between the selected particular one of the one or more application servers. | 2019-08-01 |
20190238633 | LOAD BALANCING CONFIGURATION BASED ON TRAFFIC FLOW TELEMETRY - Aspects of the disclosed technology provide methods for automatically tuning load-balancer configurations in a network environment. In some implementations, a process of the disclosed technology includes steps for collecting flow records of traffic flow segments at a middle box in a network environment, the traffic flow segments corresponding to one or more traffic flows passing through the middle box, analyzing the flow records to identify one or more traffic patterns in the network environment, and automatically updating a load balancer configuration based on the one or more traffic patterns, wherein updating the load balancer configuration improves at least one traffic flow parameter for at least one of the traffic flows passing through the middle box. Systems and machine-readable media are also provided. | 2019-08-01 |
20190238634 | SELECTIONS OF MANAGING NODES IN CLUSTERS OF NODES - Example implementations relate to clusters of nodes. In an example, a method includes computing a score for a first node in a distributed storage system comprising a plurality of nodes. The score is a function of at least one of: a location of the first node, a health status of the first node, and a resource utilization of the first node. A rank of the first node among the plurality of nodes is then determined based on the score and on a plurality of scores associated with the plurality of nodes. An instruction is sent to the first node to instantiate a manager process for managing the distributed storage system on the first node when the rank of the first node is at least equal to a predefined rank. | 2019-08-01 |
20190238635 | METHOD AND SYSTEM FOR SYNCHRONIZING WEBPAGES WITHIN A WEB BROWSER - A computerized method is disclosed. The method comprises detecting a change in a first webpage, constructing a search query based on the changed detected in the first webpage, determining a second webpage is associated with the first webpage, and synchronizing at least a portion of the second webpage with the first webpage based on the search query. The method may comprise updating a display of the first webpage based on the detected change. In certain embodiments of the method, detecting the change includes detecting input indicating one or more search parameters and the search query may be a text string including one or more alphanumeric characters. Additionally, the search query may comprise a pipelined command language. The synchronization of webpages displayed in separate tabs or windows of a web browser may use a browser extension to maintain state, as well as track and coordinate changes between the tabs or windows. | 2019-08-01 |
20190238636 | SYSTEMS AND METHODS FOR SYNCHRONIZING MICROSERVICE DATA STORES - The disclosed computer-implemented method for synchronizing microservice data stores may include (i) establishing, at a first network node, an instance of a first microservice for an application and an instance of a distinct second microservice, (ii) establishing, at a distinct second network node, an additional instance of the first microservice and an additional instance of the distinct second microservice, (iii) establishing a single network channel for synchronizing, between the first network node and the distinct second network node, a first data store for the first microservice and a second data store for the distinct second microservice, and (iv) synchronizing the first data store for the first microservice and the second data store for the distinct second microservice. Various other methods, systems, and computer-readable media are also disclosed. | 2019-08-01 |
20190238637 | DATA REPLICATION IN SCALABLE MESSAGING SYSTEM - A plurality of channels are maintained, wherein each channel comprises a plurality of messages stored in one or more buffers, wherein a first node stores a first copy of a first buffer for a first channel of the plurality of channels, wherein each of a plurality of secondary nodes stores a respective second copy of the first buffer, and wherein at least one subscriber is subscribed to messages of the first channel. A failure of the first node is detected. One of the plurality of secondary nodes are identified as a second node to access a second copy of the first buffer. The at least one subscriber is redirected from the first node to the second node and messages stored in the second copy on the second node are retrieved for the at least one subscriber. | 2019-08-01 |
20190238638 | Autonomous Vehicle Application Programming Interface and Communications Systems and Methods - Systems and methods for facilitating communication with autonomous vehicles are provided. In one example embodiment, a computing system (e.g., of a vehicle) can generate a first communication associated with an autonomous vehicle. The computing system can provide the first communication to an application programming interface gateway that is remote from the autonomous vehicle. Another computing system can obtain, via an application programming interface gateway, the first communication associated with the autonomous vehicle. The other computing system can determine a first frontend interface of the application programming interface gateway based at least in part on the first communication associated with the autonomous vehicle. The computing system can provide, via the first frontend interface, the first communication associated with the autonomous vehicle to a first system client associated with the first frontend interface. | 2019-08-01 |
20190238639 | METHOD AND APPARATUS FOR UTILZING NFC TO ESTABLISH A SECURE CONNECTION - A system includes a processor configured to approve an application vehicular-system-access request based on a temporary key and device ID transmitted with the access request matching a stored temporary key and device ID pair previously stored by the processor. This can assist in ensuring that only validated devices and/or applications are requesting access to a vehicle system. | 2019-08-01 |
20190238640 | EXTENSIBLE AND ELASTIC DATA MANAGEMENT SERVICES ENGINE EXTERNAL TO A STORAGE DOMAIN - A data management services architecture includes architectural components that run in both a storage and compute domains. The architectural components redirect storage requests from the storage domain to the compute domain, manage resources allocated from the compute domain, ensure compliance with a policy that governs resource consumption, deploy program code for data management services, dispatch service requests to deployed services, and monitor deployed services. The architectural components also include a service map to locate program code for data management services, and service instance information for monitoring deployed services and dispatching requests to deployed services. Since deployed services can be stateless or stateful, the services architecture also includes state data for the stateful services, with supporting resources that can expand or contract based on policy and/or service demand. The architectural components also include containers for the deployed services. | 2019-08-01 |
20190238641 | EXTENSIBLE AND ELASTIC DATA MANAGEMENT SERVICES ENGINE EXTERNAL TO A STORAGE DOMAIN - A data management services architecture includes architectural components that run in both a storage and compute domains. The architectural components redirect storage requests from the storage domain to the compute domain, manage resources allocated from the compute domain, ensure compliance with a policy that governs resource consumption, deploy program code for data management services, dispatch service requests to deployed services, and monitor deployed services. The architectural components also include a service map to locate program code for data management services, and service instance information for monitoring deployed services and dispatching requests to deployed services. Since deployed services can be stateless or stateful, the services architecture also includes state data for the stateful services, with supporting resources that can expand or contract based on policy and/or service demand. The architectural components also include containers for the deployed services. | 2019-08-01 |
20190238642 | DYNAMIC SERVICE DISCOVERY AND CONTROL OF LOAD DISTRIBUTION - A method may include identifying a service discovery manager associated with a first data center and registering with the service discovery manager. The method may also include, transmitting, by the service discovery manager, information identifying first services that are available at the first data center and information identifying a second data center in which one or more of the first services are available. The method may further include receiving the information identifying the first services that are available and the information identifying the second data center and updating a database based on the information identifying the first services that are available. | 2019-08-01 |
20190238643 | Real-Time Data Distribution System for Patient Monitoring Devices, Cardiac Defibrillators and Associated Information Delivery Systems - A data distribution system in comprises software application nodes that utilize a publish-subscribe communication mechanism for distribution of data in real-time or near real-time within a personal area network (PAN), local area network (LAN), or wide-area network (WAN) configuration. The distributed system communication software application nodes reside in medical devices, such as monitoring devices and cardiac defibrillators, and associated patient information delivery systems and patient data management systems comprising medical software installed on servers and end-user computing devices, including mobile devices. | 2019-08-01 |
20190238644 | USER IDENTIFICATION FOR DIGITAL EXPERIENCE CONTROLS - An example method of user identity tracking is performed by an application server. The Application server receives first telemetry data and second telemetry data. The first telemetry data indicates at least a first usage of a first user device. The second telemetry data indicates at least a second usage of a second user device. The Application server stores the first telemetry data and the second telemetry data to one or more databases and analyzes the telemetry data. Analyzing the telemetry data includes determining one or more usage patterns clustered by identity of a user. The Application server receives a request to query the one or more usage patterns for an identity of one or more users associated with the one or more usage patterns, where the application server provides the identity of the user in response to the request. | 2019-08-01 |
20190238645 | METHOD AND APPARATUS FOR IDENTIFYING COMMON INTEREST BETWEEN SOCIAL NETWORK USERS - Techniques for identifying mutual interests between users of a social networking system are disclosed herein. In one embodiment, a method includes steps of identifying, in a social networking system, a content object that has been interacted by a first user of the social networking system; associating, in the social networking system, a keyword with the first user, the keyword having been previously associated with the content object; and determining, in the social networking system, a mutual interest for the first user and a second user of the social networking system by identifying a match between the keyword associated with the first user with a keyword associated with the second user. | 2019-08-01 |
20190238646 | SOCIAL MEDIA AND LOCATION-BASED INFORMED ENTERTAINMENT RECOMMENDATIONS - Aspects of the subject disclosure may include, for example, a method comprising: obtaining social media information associated with a user, wherein the social media information comprises historical social media information associated with the user and current social media information associated with the user; selecting, based upon the historical social media information, a selected personality type associated with the use; determining, based upon the selected personality type associated with the user, a candidate entertainment recommendation; determining, based upon the current social media information, whether the candidate entertainment recommendation should be provided to the user; responsive to determining that the candidate entertainment recommendation should not be provided to the user: determining, based upon the selected personality type associated with the user, an alternate entertainment recommendation; and providing to the user the second recommendation. Other embodiments are disclosed. | 2019-08-01 |
20190238647 | User Interface Modification And Usage Tracking - Techniques are provided to facilitate tracking events associated with a user interface display of an application at runtime. In at least one implementation, one or more information structures that associate an event tracking indicator with a view selector are stored, wherein the event tracking indicator indicates an event to be tracked, and the view selector indicates one or more constraints to be matched to select a view of the application. During execution of the application, the view selector is evaluated with views used by the application to determine whether each of the one or more constraints of the view selector matches properties of the views. In response to determining that each of the one or more constraints of the view selector matches the properties of at least one of the views, an occurrence of the event indicated by the event tracking indicator associated with the view selector is tracked. | 2019-08-01 |
20190238648 | Systems and Methods For Content Delivery Acceleration of Virtual Reality and Augmented Reality Web Pages - Among other things, this document describes systems, devices, and methods for improving the delivery and performance of web pages authored to produce virtual reality (VR) or augmented reality (AR) experiences. In some embodiments, such web pages are analyzed. This analysis may be initiated at the request of a content server that receives a client request for the HTML. The analysis may involve, asynchronous to the client request, loading the the page into a non-user-facing browser environment and allowing the VR or AR scene to execute, even including executing animation routines for a predetermined period of time. Certain characteristics of the scene and of objects are thereby captured. Based on this information, an object list ordered by loading priority is prepared. Consulting this information in response to subsequent requests for the page, a content server can implement server push, early hints and/or other delivery enhancements. | 2019-08-01 |
20190238649 | USER SUBSCRIPTION TO CONTENT - One or more computing devices, systems, and/or methods for facilitating user subscription to content from a content provider are provided. For example, a message interface provides access to messages associated with a user message address of a user. A content recommendation to subscribe to content of a content provider is generated and populated within the message interface (e.g., a recommendation to subscribe to a gardening newsletter). Responsive to the user interacting with the content recommendation, a subscribe option is displayed through the message interface. The user can use the subscribe option to quickly and efficiently create a user subscription to the content without transitioning away from the message interface. Information used to create the user subscription can be prefilled in order to reduce the amount of user actions needed for creating the user subscription. | 2019-08-01 |
20190238650 | USER SUBSCRIPTION TO CONTENT - One or more computing devices, systems, and/or methods for facilitating user subscription to content from a content provider are provided. For example, a message interface provides access to messages associated with a user message address of a user. A content recommendation to subscribe to content of a content provider is generated and populated within the message interface (e.g., a recommendation to subscribe to a gardening newsletter). Responsive to the user interacting with the content recommendation, a subscribe option is displayed through the message interface. The user can use the subscribe option to quickly and efficiently create a user subscription to the content without transitioning away from the message interface. Information used to create the user subscription can be prefilled in order to reduce the amount of user actions needed for creating the user subscription. | 2019-08-01 |
20190238651 | USER SUBSCRIPTION TO CONTENT - One or more computing devices, systems, and/or methods for facilitating user subscription to content from a content provider are provided. For example, a message interface provides access to messages associated with a user message address of a user. A content recommendation to subscribe to content of a content provider is generated and populated within the message interface (e.g., a recommendation to subscribe to a gardening newsletter). Responsive to the user interacting with the content recommendation, a subscribe option is displayed through the message interface. The user can use the subscribe option to quickly and efficiently create a user subscription to the content without transitioning away from the message interface. Information used to create the user subscription can be prefilled in order to reduce the amount of user actions needed for creating the user subscription. | 2019-08-01 |
20190238652 | WEB CACHING TECHNIQUES - This disclosure relates to systems and methods for executing a caching procedure for a web cache that is utilized by an electronic platform storing a plurality of clusters. The caching procedure may comprise retrieving a priming cutoff parameter that identifies a timeframe, utilizing the priming cutoff parameter to identify a subset of clusters that have been added or updated within the timeframe, and priming the web cache with content associated with the subset of clusters. The content in the web cache can be transmitted in response to receiving requests for the content. Other embodiments are disclosed herein. | 2019-08-01 |
20190238653 | SYSTEMS, METHODS, AND APPARATUSES FOR CAPTURING DATA CHANGE EVENTS IN A CLOUD BASED COMPUTING ENVIRONMENT - A software application executing on a selected application server in a cluster of application servers stores in a buffer in a memory of the selected application server a payload of data and a corresponding key. The application transfers a copy of the payload of data and the corresponding key to a selected second application server in the cluster, and creates a record in an entry in a transaction log stored in a database to which the cluster of applications servers has access, the record including: the corresponding key, a first value identifying the selected second application server to which the copy of the payload of data and corresponding key were transferred, and a second value identifying the selected first application server in which the payload of data and corresponding key were stored. | 2019-08-01 |
20190238654 | SIGNATURE BASED DISTRIBUTED INVENTORY CACHING - Embodiments of the present invention provide a method, system and computer program product for signature based distributed inventory caching. In an embodiment of the invention, a for signature based distributed inventory caching includes polling from a centralized management solution an endpoint aggregating state information for different monitored resources, and receiving in response to the polling a signature for one or more of the monitored resources aggregated by the endpoint. The method also includes comparing the received signature to a signature stored in the solution in connection with the endpoint. In response to a determination that the compared signatures differ, the method includes updating a cache in the solution with state information for the endpoint, computing a new signature for the state information, and replacing the stored signature with the new signature. Otherwise the method includes bypassing any updating of the cache. | 2019-08-01 |
20190238655 | SYSTEMS AND METHODS FOR DECREASING LATENCY IN DATA PACKET PROVISION - A system and method for decreasing latency in providing a data packet to a user device subsequent to receipt of an electronic signal from the user device are disclosed herein. The system can include memory including: a user profile database; and a content library database. The system can include a user device including: a network interface; and an I/O subsystem. The system can include a content management server. The content management server can: provide a data packet to the user device; request generation of a contingent recommendation; receive the contingent recommendation; receive an electronic signal including a user response; select a next action; and provide the next action to the user device. | 2019-08-01 |
20190238656 | CONSOLIDATED CLOUD SYSTEM FOR VIRTUAL MACHINE - Disclosed herein are related to a method, a system, and a non-transitory computer readable medium for providing a consolidated cloud system. The consolidated cloud system includes a plurality of cloud systems. A user request to access content in the consolidated cloud system is received, where the content is stored by a target cloud system of the plurality of cloud systems. The content from the target cloud system is retrieved, and the content is provided as part of the consolidated cloud system. The device generating the user request may be unaware of which cloud system stores the content. | 2019-08-01 |
20190238657 | PROBLEM SOLVING IN A MESSAGE QUEUING SYSTEM IN A COMPUTER NETWORK - The present invention provides a method and system for debugging and attending to a problem in a message queuing system in a computer network. A critical level of each connection in a matrix is determined. Criticality levels of different combinations of message queuing system configuration data based upon business criteria are determined. Information from the message queuing system is periodically gathered. The information includes current message queuing configuration data, current message queuing usage values, and current server usage values. Suggestions of different configurations for the current message queuing system are provided. The suggested different configurations are prioritized. The current message queuing system configuration are updated from a prioritized list of the suggested different configurations with a highest criticality level at a top of the list. The problem is debugged according to the prioritized list. Attending to the problem requires first attention as identified by the highest criticality level. | 2019-08-01 |
20190238658 | VEHICULAR MILLIMETER WAVE COMMUNICATION FOR NON-LINE OF SIGHT SCENARIOS - The disclosure includes embodiments for performing beam alignment for non-line of sight (NLOS) scenarios. The method includes receiving, at a first vehicle, one or more wireless messages that include vehicle data, wherein the vehicle data describes a second vehicle position, a second vehicle speed, and a second vehicle heading. The method also includes determining sensor data. The method also includes determining an NLOS path based on the vehicle data and the sensor data so that the NLOS path avoids a potential blockage. The method also includes determining whether the NLOS path is predicted to succeed based on a beam transmission percentage satisfying a threshold percentage. The method also includes responsive to the NLOS path being predicted to succeed, performing beam alignment between the first vehicle and the second vehicle based on the NLOS path before the potential blockage is predicted to occur. | 2019-08-01 |
20190238659 | FINANCIAL INFORMATION SYSTEMS, METHODS, INTERFACES, AND SOFTWARE - Within the financial-services industry, there are online centers that allow brokers to match sellers with buyers of financial instruments based on indications of interest. To follow up on these indications of interest, users of such centers are now using proprietary instant-messaging (IM) systems, which allow them to instantaneously exchange text messages over the Internet with other users. The present inventor recognized that these communications are often inconvenient because the IM programs are isolated from the financial information. Accordingly, he devised systems, methods, and software that integrate IM and other communications-related functions into financial-data displays. Ultimately, one of more of these or other embodiments promise improved efficiency and convenience of online interactions not only for financial trading partners and others in the financial-services industry, but also for those in any private, public, and commercial domain where rapid or convenient online communication is desirable. | 2019-08-01 |
20190238660 | SYSTEM AND METHOD FOR PLAYING BACK VIRTUAL REALITY 4D CONTENT - Disclosed are a system and method for playing back virtual reality 4D content. The system for playing back virtual reality 4D content, includes an image server configured to provide content or an effect control signal, a head-mounted display (HMD) device configured to display the content, and a 4D apparatus configured to generate an effect synchronized with the content in response to the effect control signal. | 2019-08-01 |
20190238661 | EVOLVED DATA COMPRESSION SCHEME SIGNALING - Methods, systems, and devices are described for wireless communication at a UE. In aspects, a receiver may receive a transmission requesting information about support for data compression. The receiver may determine parameters related to the types of supported data compression and communicate the information to the transmitting device. In some cases, the receiver may then receive a message from the transmitting entity that requests establishment of a data compression configuration. The receiver may respond with confirmation or rejection of the proposed compression configuration. If the configuration is confirmed, the transmitter and receiver may exchange compressed data packets according to the configuration. The devices may exchange status and control information related to the compression configuration (e.g., in a compression header of a compressed message or a separate status and/or control information message). | 2019-08-01 |