52nd week of 2016 patent applcation highlights part 69 |
Patent application number | Title | Published |
20160381068 | SYSTEM AND METHOD FOR TIME BASED ANOMALY DETECTION IN AN IN-VEHICLE COMMUNICATION NETWORK - A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the processor, based on the model and based on a timing attribute of the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message. | 2016-12-29 |
20160381069 | TECHNIQUES FOR TRAFFIC DIVERSION IN SOFTWARE DEFINED NETWORKS FOR MITIGATING DENIAL OF SERVICE ATTACKS - A method and system for mitigating of cyber-attacks in a software defined network (SDN) are presented. The method comprises operating a central controller and the SDN in a peace mode; monitoring traffic addressed to at least one destination server to detect at least an attack performed against the at least one destination server; switching an operation of the central controller to an attack mode, upon detection of an attack against the at least one destination server; and instructing, by the central controller, network elements of the SDN to divert all suspicious incoming traffic addressed to the at least one destination server to a security server, thereby mitigating the detected attack. | 2016-12-29 |
20160381070 | PROTOCOL BASED DETECTION OF SUSPICIOUS NETWORK TRAFFIC - Embodiments of the present invention relate to identification of suspicious network traffic indicative of a Botnet and/or an Advanced Persistent Threat (APT) based on network protocol of such traffic. According to one embodiment, a traffic file is received at a network security device that is protecting a private network. The traffic file contains therein network traffic associated with the private network that has been captured and stored. The received traffic file is processed by the network security device to determine whether the network traffic relates to a network protocol that is indicative of existence of a network security threat within the private network. When existence of the network security threat is detected, then the network security device reports details regarding the network security threat. | 2016-12-29 |
20160381071 | Cognitive Protection of Critical Industrial Solutions Using IoT Sensor Fusion - A technique for cognitive protection of a system can include digital and analog sensors to measure or calculate operational parameters of a system. Digital sensors may be used to determine measured or primary operational parameters. The analog sensors are used to measure analog sensor information related to operation of the system. Analog sensor information that is measured may be used to calculate secondary operational parameters that includes the same operating parameters as the primary operational parameters. Lockstep analysis may be used to compare the primary operational parameters with the secondary operational parameters so as to determine a discrepancy in the operational parameters in the system. | 2016-12-29 |
20160381072 | TRUST OVERLAYS FOR DISAGGREGATED INFRASTRUCTURES - Trust characteristics attributable to components associated with a disaggregated infrastructure environment are obtained. A trust policy of an application to be hosted in the disaggregated infrastructure environment is obtained. The trust characteristics are compared to the trust policy. One or more of the components associated with the disaggregated infrastructure environment are selected based on the comparison step. A compute node is formed from the selected components. | 2016-12-29 |
20160381073 | CONTROLLING ACCESS TO CATEGORIZED MESSAGES - Controlling access to categorized messages includes categorizing a message into a number of categories according to a message objective. The message objective informing user association, message association, and message access rules for each of the number of categories. Controlling access to categorized messages includes determining, based on the message objective, a number of users allowed access to the message. Controlling access to categorized messages includes allowing the number of users to access the message according to the message objective. | 2016-12-29 |
20160381074 | ACTIVITY-BASED RISK SELECTION OF OPEN WI-FI NETWORKS - For activity-based risk assessment of open Wi-Fi networks, an activity occurring at a consumer application is analyzed to determine that a connection with a first open Wi-Fi network is to be used in conjunction with the activity. From an entry representing the activity in a risk profile, a risk level of the activity is selected. Whether an overall risk value of the first network exceeds the risk level of the activity is determined. When the overall risk value of the first network exceeds the risk level of the activity, the connection with the first network is terminated. A second open Wi-Fi network with a second overall risk value that does not exceed the risk level of the activity is selected. A second connection with the second network is established. The activity is allowed to proceed using the second connection with the second network. | 2016-12-29 |
20160381075 | METHODS AND APPARATUS FOR GENERATING AND USING SECURITY ASSERTIONS ASSOCIATED WITH CONTAINERS IN A COMPUTING ENVIRONMENT - Methods and apparatus are disclosed to generate a security assertion document associated with a container image, and to use the security assertion document to determine whether a container image is suitable for use to assemble a corresponding container for execution in a host environment. In an example method, the generated security assertion document includes a security assertion resulting from an assessed policy rule. In the example method, the security assertion document is separate from the container image such that the generation of the security assertion document does not alter the container image itself. In an example method, the contents of the security assertion document may be analyzed and/or verified in relation to the associated container image in connection with determining whether or not to use the container image to assemble a corresponding container for execution in the example host environment. | 2016-12-29 |
20160381076 | SERVICE LEVEL AGREEMENTS AND APPLICATION DEFINED SECURITY POLICIES FOR APPLICATION AND DATA SECURITY REGISTRATION - According to one embodiment, a method includes determining one or more communication requirements for an application or application instance operating on a server in a network using an ADPL. The method also includes providing, by the ADPL, one or more communication and security policies to at least one security appliance in the network based on the one or more communication requirements of the application or application instance. The method may also include registering, by the ADPL, a new application or application instance and sending details of the new application or application instance to a policy orchestrator. Moreover, the method may include receiving, by the ADPL from the policy orchestrator, feedback pursuant to a service level agreement for an application group to which the new application or application instance belongs. | 2016-12-29 |
20160381077 | METHOD AND APPARATUS FOR IDENTIFYING AND DETECTING THREATS TO AN ENTERPRISE OR E-COMMERCE SYSTEM - Methods and apparatuses for identifying and detecting threats to an enterprise or e-commerce system are disclosed, including grouping log lines belonging to one or more log line parameters from one or more enterprise or e-commerce system data sources and/or from incoming data traffic to the enterprise or e-commerce system; extracting one or more features from the grouped log lines into one or more features tables; using one or more statistical models on the one or more features tables to identify statistical outliers; labeling the statistical outliers to create one or more labeled features tables; using the one or more labeled features tables to create one or more rules for identifying threats to the enterprise or e-commerce system; and using the one or more rules on incoming enterprise or e-commerce system data traffic to detect threats to the enterprise or e-commerce system. Other embodiments are described and claimed. | 2016-12-29 |
20160381078 | AUTHENTICATOR FOR USER STATE MANAGEMENT - Different types of soft-lockout policies can be associated with different organizations (or groups) in an identity management system. Each soft-lockout policy can indicate different parameters such as a number of login attempts allowed and an amount of time that a user account will be locked-out if the maximum allowed attempts are exceeded unsuccessfully. Users can be associated with the different organizations. For each user, the soft-lockout policies for the organization with which that user is associated are applied to that user when that user attempts to log in. Thus, different groups of users can be handled with different security behaviors regarding unsuccessful login attempts. If, for example, a user were to become moved from one organization to another, then the soft-lockout policies associated with the user's new organization would become applicable to that user. | 2016-12-29 |
20160381079 | Peer-to-Peer Group Vigilance - Providing peer-to-peer network security includes collecting, by a local trusted network device, local trust data related to behavior of the local trusted network device, receiving, by one or more remote trusted network devices, additional trust data for the local trusted network device, calculating a combined trust score for the local trusted network device based on the local trust data and additional trust data, and modifying activity of the local trusted network device based on the combined trust score. | 2016-12-29 |
20160381080 | SYSTEMS AND METHODS FOR FLEXIBLE, EXTENSIBLE AUTHENTICATION SUBSYSTEM THAT ENABLED ENHANCE SECURITY FOR APPLICATIONS - The present disclosure is directed towards systems and methods of authenticating a client. A device intermediary to clients servers that provide one or more resources can receive a request from a client to access a resource of the one or more resources. The device can select a login schema associated with the request that includes a definition of a login form. The login schema may correspond to an authentication protocol. The device can generate the login form responsive to the request. The login form can be constructed according to the definition provided by the selected login schema. The device can provide the login form for display via the client. The device can receive information inputted into the login form via the client. The device can establish access to the resource responsive to authentication of the client based on the information and the authentication protocol. | 2016-12-29 |
20160381081 | System, Apparatus And Method For Access Control List Processing In A Constrained Environment - In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant access to the first resource based on a first access control list stored in the system, the first access control list associated with the first device, the first device having a first relevance value, and based on the determination, granting the access to the first resource; and receiving a second request from a second device to access a second resource of the system and forwarding the second request to an access manager service coupled to the system to determine whether to grant access to the second resource based on a second access control list stored in the access manager service associated with the second device, the second device having a second relevance value, receive an access grant from the access manager service and based thereon, granting the access to the second resource. | 2016-12-29 |
20160381082 | ELECTRONIC MESSAGING EXCHANGE - A computer-implemented system and method for secure electronic message exchange including coupling a control platform to a workstation of a plurality of workstations via a communications medium, where the control platform includes one or more apparatuses for monitoring, controlling, conversion, and billing, related to messages exchanged between a plurality of local, users and a plurality of remote users. The system, prevents forwarding or copying of a message sent by a local user of the plurality of local users and received by a remote user of the plurality of remote users, to another party by the control platform. The system and method also provides for authenticating the remote user with the control platform. | 2016-12-29 |
20160381083 | SECURE SOCIAL NETWORK - Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of people who are subject to security or law enforcement limitations or otherwise reside within a controlled or correctional facility. All submitted information requires administrative approval, either by a human administrator or an automated process, before it can be viewed by other members of the social network. | 2016-12-29 |
20160381084 | DELIVERY OF NON-MULTIMEDIA CONTENT VIA A STANDARDIZED NETWORK ARCHITECTURE - Non-multimedia information may be produced from devices such as alarms, appliances, automobiles, building systems, weather stations, home automation systems, and the like. A method and devices communicate non-multimedia content via a standardized network architecture. Non-multimedia data is received from a remote device with a standardized network aliasing device. The standardized network aliasing device is able to communicate on a network that conforms, for example, to a Digital Living Network Alliance (DLNA) protocol. The non-multimedia data is formatted with the standardized network aliasing device into a standardized-format file. The standardized-format file conforms to a selected media class. The standardized-format file is exposed on the network that conforms to the DLNA protocol and communicated to a remote DLNA-enabled device that is also coupled to the network that conforms to the DLNA protocol. | 2016-12-29 |
20160381085 | TAMPER-PROOF COMMUNICATION CHANNEL - A method for preventing tampering with the accessibility of resources specified by Universal Resource Locators (URLs) comprising establishing a tamper-proof channel between a client and a proxy; requesting URL content via the tamper-proof channel; forwarding URL requests from the proxy; and returning responses to the client via the tamper-proof channel. | 2016-12-29 |
20160381086 | Multi-Access Gateway for Direct to Residence Communication Services - Different residences can be communicatively linked to a communication backbone via a multi-access gateway, where each residence comprises an adapter through which a set of IP devices directly connect to the multi-access gateway via IPSec compliant communication channels. The multi-access gateway can connect each of the IP devices to remotely located resources. Telecommunication services can be provided to the IP devices in the residences for fees. The multi-access gateway can controls specifics of the telecommunication services, which can include emergency (e.g., 911) services, home control services, and residential administration services. Any of the telecommunication services can be initiated, modified, or terminated by a carrier maintaining the multi-access gateway on a per residence basis for any of the different residences. | 2016-12-29 |
20160381087 | NETWORK-BASED DYNAMIC DATA MANAGEMENT - In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in the network (e.g., hierarchically lower sensors or routers). The collected data may then be converted to aggregated metadata according to a dynamic schema, and the aggregated metadata is stored at the router. The aggregated metadata may also be transmitted to one or more hierarchically higher routers in the network. Queries may then be served by the router based on the aggregated metadata, accordingly. | 2016-12-29 |
20160381088 | Forward request queuing in a distributed edge processing environment - A server in a distributed environment includes a process that manages incoming client requests and selectively forwards service requests to other servers in the network. The server includes storage in which at least one forwarding queue is established. The server includes code for aggregating service requests in the forwarding queue and then selectively releasing the requests, or some of them, to another server. The queuing mechanism preferably is managed by metadata, which, for example, controls how many service requests may be placed in the queue, how long a given service request may remain in the queue, what action to take in response to a client request if the forwarding queue's capacity is reached, etc. In one embodiment, the server generates an estimate of a current load on an origin server (to which it is sending forwarding requests) and instantiates the forward request queuing when that current load is reached. | 2016-12-29 |
20160381089 | RELATIONSHIP-CENTRIC PORTALS FOR COMMUNICATION SESSIONS - A method for providing relationship-centric resources includes establishing a communication session between a first device and a second device, determining, during the communication session between the first and second devices, an intersection of mutual topics of interest between users of the first and second devices by cross-referencing sets of interests for the users, retrieving content based on a determination that the content meets a content descriptor, and simultaneously displaying the retrieved content. The content descriptor describes a nature of the communication session. The retrieving is further based on a determination that the content is related to a mutual topic of interest from the intersection of mutual topics of interest between the users of the first and second devices. The determination of relatedness is based on a cross-reference between the content and the mutual topic of interest. The cross-reference is stored in a lookup table. | 2016-12-29 |
20160381090 | ANIMATED SNAPSHOTS - Current embodiments relate to generation/sharing of a snapshot of content that the user is viewing. Upon generation of a request for a snapshot of currently viewed content, the snapshot may be generated based at least in part upon one or more parameters and/or criteria included in the request and/or service generating the snapshot. Upon completion of the snapshot, a response that provides the snapshot or a location where the snapshot may be viewed is provided, such that the snapshot may be provided to particular sharing targets, such as social media platforms, electronic devices, email, etc. | 2016-12-29 |
20160381091 | SYSTEM AND METHOD FOR MANAGING MULTI-MODAL COMMUNICATION SESSIONS - A computing system for managing a multi-modal communication session in an enterprise is disclosed. The computing system includes a monitoring module for monitoring activities associated with the multi-modal communication session between a customer and an agent, wherein the customer and the agent communicate over a first communication modality. The system further includes an analysis module for analyzing the activities to initiate communication between the customer and the agent over a second communication modality within the multi-modal communication session, wherein the communication over the second communication modality operates along with the communication over the first communication modality. The system further includes a notification module for generating notifications for notifying information associated with the first communication modality, the second communication modality, or a combination thereof to a supervisor. | 2016-12-29 |
20160381092 | EPHEMERAL INTERACTION SYSTEM - Techniques for enabling members that have interacted physically to interact thereafter via an online social networking service are described. According to various embodiments, it is determined that a first member and a second member of an online social networking service physically interacted at an interaction location at an interaction time, and a specific time interval commencing at the interaction time is calculated. Thereafter, an ephemeral prompt is displayed to the first member, during the specific time interval, indicating that the first member physically interacted with the second member, and inviting the first member to message the second member via the online social networking service. The ephemeral prompt is prevented from being displayed subsequent to expiration of the specific time interval. | 2016-12-29 |
20160381093 | METHOD AND NODES FOR CONFIGURING A COMMUNICATION PATH FOR A MEDIA SERVICE - A network node is operated to configure a communication path for a media service. The communication path is configured in a cloud network that includes at least one media processing unit that handles media processing required by the media service. The node is located along the communication path and discovers at least one media processing unit by obtaining location information for the at least one media processing unit and configuring the communication path between end user communication devices of the media service by interconnecting. | 2016-12-29 |
20160381094 | COMMUNICATION TERMINAL, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND RECORDING MEDIUM - A communication terminal determines whether counterpart information of a candidate counterpart communication terminal obtained from a memory is described in a first format or a second format, and transmits a communication start request to one of a first server and a second server based on a determination. When the determination indicates that the obtained counterpart information is described in the first format, the communication start request is transmitted to the first server on the first network. When the determination indicates that the obtained counterpart information is described in the second format, the communication start request is transmitted to the second server on the second network. | 2016-12-29 |
20160381095 | TECHNOLOGIES FOR AUDIOVISUAL COMMUNICATION USING INTERESTINGNESS ALGORITHMS - Technologies for audiovisual communication include an audiovisual server and a number of audiovisual client devices, including a presenter device and a number of audience devices. Each audience device captures an audiovisual stream and transmits the audiovisual stream to the audiovisual server. Each audience device also captures sensor input data such as eye tracking data or facial expression data and transmits abstracted sensor input data to the audiovisual server. The abstracted sensor input data may be based on the captured audiovisual stream. The audiovisual server determines an interestingness rating associated with each audience device based on the sensor input data, and selects one or more audiovisual streams based on the interestingness ratings. The audiovisual server transmits the selected audiovisual streams to the presenter device. The audiovisual server may update the interestingness rating algorithm based on feedback from the presenter device or the audience devices. Other embodiments are described and claimed. | 2016-12-29 |
20160381096 | Supplementing User Web-Browsing - An apparatus and method of providing a user with a web-browser supplement is disclosed. One method includes providing access to a focal group, wherein the focal group includes at least one member having at least one association with the user. Access is provided to information associated with the at least one member having relevance to the focal group. Web browsing by the user is supplemented by the information of the members of the focal group. | 2016-12-29 |
20160381097 | GUIDING A DESIRED OUTCOME FOR AN ELECTRONICALLY HOSTED CONFERENCE - Arrangements described herein relate to guiding a desired outcome for an electronically hosted conference. During the electronically hosted conference, participant activity related to the electronically hosted conference can be monitored for each of a plurality of participants participating in the electronically hosted conference. Based on the participant activity, a sentiment of each of the plurality of participants with regard to a subject of the electronically hosted conference can be determined. A list of the participants can be presented to a user. The list of the participants can indicate an order in which to poll the participants to achieve the desired outcome for a decision requested of the participants in the electronically hosted conference. | 2016-12-29 |
20160381098 | METHOD AND APPARATUS FOR MULTI-EXPERIENCE METADATA TRANSLATION OF MEDIA CONTENT WITH METADATA - A method or apparatus that incorporates teachings of the present disclosure may include, for example, a method for retrieving a plurality of sensory information from an environment of a device. A digital representation of the environment of the device is identified corresponding to the plurality of sensory information from the environment of the device. A media presentation element of the device associated with media content of the device is identified. A user interface of the media presentation element is adapted to modify a presentation of the media content by the media presentation element of the device according to the digital representation of the environment of the device. Other embodiments are disclosed. | 2016-12-29 |
20160381099 | REAL-TIME DISTRIBUTED COAUTHORING VIA VECTOR CLOCK TRANSLATIONS - Systems and methods for improving real-time coauthoring in a distributed environment without a central document manager are disclosed herein. Due to communication being non-instantaneous, the state of a document on an endpoint may differ from the state of the document on an editor at the time that an edit is made. The different states, however, may be reconcilable via a vector clock translation. Each coauthor may maintain an array of vector clocks to track the state of the document for each coauthor. The vector clocks may be included when transmitting indications of edits so that an endpoint in a modified state can translate the edit to comply with the modified state of the document. Translating edits enables more edits to be implement in real-time than otherwise possible in a distributed environment without a central document manager. | 2016-12-29 |
20160381100 | ACCELERATOR CONTROL METHOD AND ACCELERATOR USING THE SAME - A method of controlling an accelerator for transmitting media content received from a media server to at least one media player, includes receiving from the at least one media player a request for the media content; determining an operational state of the at least one media player; determining a plurality of priorities corresponding to a plurality of pieces of media metadata stored in the accelerator based on the determined operational state, the plurality of pieces of media metadata corresponding to the requested media content; and managing the plurality of pieces of media metadata based on the plurality of priorities. | 2016-12-29 |
20160381101 | METHOD AND APPARATUS FOR STREAMING MEDIA - The present invention relates to a method and apparatus for streaming media content between nodes on a network ( | 2016-12-29 |
20160381102 | MEDIA DEVICE AND METHOD OF ENHANCING USE OF MEDIA DEVICE - A method of enhancing the use of a media device and a media device are provided. The media device receives a broadcast media stream transmitted by a broadcast system, a service transmitted by a telecommunication system, the service being associated with a broadcast media stream and program guide information relating to a broadcast media stream. The media device is configured to detect when the service transmission comprises data corresponding to given search parameters and to record the broadcast media stream in a memory on the basis of the detection. | 2016-12-29 |
20160381103 | Media Content Delivery over Telephone Networks - A media service server provides media content to users over telephone networks. The media content server receives a request for media items, where the request is a call placed by a phone. The media content server identifies a user associated with the request, and establishes an audio communication channel with the phone. The media content server selects a media item for the user based on an identity of the user, and provides the media item to the user by playing content of the media item to the user over the audio communication channel. | 2016-12-29 |
20160381104 | USER ASSEMBLED CONTENT DELIVERED IN A MEDIA STREAM - A system and method for a user to send a message to another user of a streaming media service. The message is directed to a specific recipient and is sponsored by an advertising entity. The shout-out is transmitted to the recipient with a sponsor message when the recipient either accesses or logs into the streaming media service. The recipient is notified that a shout-out or dedication is available for the recipient to listen to. When the user logs into the streaming media service the shout-out is presented to the recipient along with a sponsor advertisement. | 2016-12-29 |
20160381105 | LOCAL STREAMING PROXY SERVER - A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its WiFi/LAN provides QoS guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization. “HTTP demand paging” is also possible. | 2016-12-29 |
20160381106 | METHOD AND AN ELECTRONIC DEVICE FOR PERFORMING PLAYBACK AND SHARING OF STREAMED MEDIA - Described herein are methods and electronic devices for performing playback of streamed media, including uploading an associated second media content item while performing playback of a first media content item. In accordance with an exemplary embodiment, when performing playback of a first media content item, a message is sent to a computer server system, to return information that a service for sharing a related second media content item is selectable. The information is displayed at a user interface as a visual array of tiles, wherein each tile corresponds to a respective service. When a service is requested, a service data is processed, and the second media content item captured and uploaded with the requested service. By enabling a user to obtain media content items associated to the currently playbacked media content item, the user may find associated media content items, which he/she normally should not have been aware of. | 2016-12-29 |
20160381107 | SYSTEM AND METHOD FOR CONTENT STREAMING WITH FEATURE DETECTION - A system and method for content streaming with feature detection, comprising determining a streaming format compatibility criteria of a remote web browser, determining a content selection from a list of one or more content selections, receiving at a content server a streaming request, streaming the content selection, the streaming including dividing a source content into a plurality of segment files, encrypting the plurality of segment files, sending a manifest file from the content server to the remote web browser, receiving requests at the content server for each of the plurality of segment files and a decryption key, sending from the content server each one of the requested plurality of segment files and the decryption key, and selecting the next content selection in the list until the last content selection is selected and streamed. | 2016-12-29 |
20160381108 | Co-device to a Mobile Device for Integrated Use and Experience of Mobile Applications on Another Device and Display - Systems and methods are provided for employing a co-device with a mobile/second device for sharing a user experience of mobile applications on both the mobile/second device and another display/first device. | 2016-12-29 |
20160381109 | STREAMING MEDIA PRESENTATION SYSTEM - One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media presentation generally includes a one or more media streams provided by one or more capturing users of the media presentation system. In one or more embodiments, a user of the media presentation system may share a media presentation with a viewing user. The media presentation system can provide a number of features to produce a media stream within a media presentation. | 2016-12-29 |
20160381110 | STREAMING MEDIA PRESENTATION SYSTEM - One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media presentation generally includes a one or more media streams provided by one or more capturing users of the media presentation system. In one or more embodiments, a user of the media presentation system may share a media presentation with a viewing user. The media presentation system can provide a number of features to produce a media stream within a media presentation. | 2016-12-29 |
20160381111 | STREAMING MEDIA PRESENTATION SYSTEM - One or more embodiments of the disclosure provide systems and methods for providing media presentations to users of a media presentation system. A media presentation generally includes a one or more media streams provided by one or more capturing users of the media presentation system. In one or more embodiments, a user of the media presentation system may share a media presentation with a viewing user. The media presentation system can provide a number of features to produce a media stream within a media presentation. | 2016-12-29 |
20160381112 | METHODS AND DEVICES FOR EFFICIENT ADAPTIVE BITRATE STREAMING - Methods and systems for a content server to select sets of video streams having different encoding parameters for transmitting the sets of video streams to a media device are disclosed herein. In some embodiments, a method for transmitting video streams for a media program from a server to a media device includes: selecting, by the server, first encoding parameters including a first bitrate for a first set of video streams for the media program based on a first estimated bandwidth capacity for a network linking the server and the media device, transmitting the first set of video streams from the server to the media device, determining, by the server, second encoding parameters including a second bitrate for a second set of video streams for the media program, and transmitting the second set of video streams from the server to the media device. | 2016-12-29 |
20160381113 | ADAPTIVE VIDEO WHITE SPOT LEARNING AND USER BANDWIDTH DELIVERY CONTROL SYSTEM - A system and method that utilize a learning system to maintain a set of geographical locations indicating an area where network data coverage is poor. When it is determined that a client device is moving towards such an area, the client is forced or instructed to switch to a lower delivery bitrate for video segments in order to force the client's Adaptive Bit Rate (ABR) playback buffer to fill itself with enough low-quality video segments to enable the client to cross the area without video playback interruption. Thus, the client mobile device may be preemptively forced to choose the lowest bitrate specified in a manifest file for the delivered video segments as the bitrate for downloading video segments when approaching the poor coverage area. Hence, the client device can maintain a minimum level of Quality of Service (QoS) when moving through network areas with poor data coverage. | 2016-12-29 |
20160381114 | METHOD AND SYSTEM FOR REPLICATING A COMMUNICATION APPLICATION ON AN AUXILIARY COMPUTING DEVICE - According to embodiments described in the specification, a method and system for replicating an application on an auxiliary computing device are provided. The system includes the auxiliary computing device, a mobile computing device executing the application, and at least one server. The server provides the auxiliary computing device with a web application, and the auxiliary computing device presents a code generated using the web application on its display. The mobile computing device captures the code, and uses the code to establish a connection with the auxiliary computing device via the server. The server then routes data between the auxiliary computing device, the mobile computing device and other devices. The data includes application control data, which is routed between the mobile computing device and the auxiliary computing device; and message data, which is routed between the mobile computing device and other devices. | 2016-12-29 |
20160381115 | HTTP SERVER, METHOD FOR CONTROLLING THE SAME, AND IMAGE FORMING APPARATUS - If a host name and a port number of an HTTP request do not correspond to those of an HTTP server, it is determined whether or not the host name indicates a local host and an address of a client that has transmitted the request is a loop-back address, and if so, processing for the HTTP request is continued. | 2016-12-29 |
20160381116 | METHOD AND SYSTEM TO ESTIMATE USER DESIRED DELAY FOR RESOURCE ALLOCATION FOR MOBILE-CLOUD APPLICATIONS - A method for user-desired delay estimation for mobile-cloud applications includes: collecting, by a mobile application running on a mobile device, data using at least one of sensors, an application logger and a user feedback module of the mobile device; inferring, by the mobile device, a quality of experience based on the collected data; determining, by the mobile device, a desired delay based on the inferred quality of experience; and offloading, by the mobile device, a task to a cloud together with the desired delay. | 2016-12-29 |
20160381117 | Managing Open Shares in an Enterprise Computing Environment - Methods, systems, and computer-readable media for managing open shares in an enterprise computing environment are presented. In some embodiments, a computer system may receive a request to scan one or more servers for open shares. Then, the computer system may validate one or more input files associated with the request and verify access to the one or more servers. Next, the computer system may scan the one or more servers to create a runtime share list file identifying one or more open shares. Subsequently, the computer system may identify at least one open share to be remediated and may apply one or more remediation actions to the at least one open share. Thereafter, the computer system may update an output file to include remediation information identifying the one or more remediation actions applied to the at least one open share and may send the output file. | 2016-12-29 |
20160381118 | EXTRACTING AND FORMATTING CONTENT FROM WEB-RESOURCES - A system is provided for presenting content on a companion computing device associated with a primary computing device. A web-resource micro-app package is configured, when operating in concert with a companion manager executing on the primary computing device, to control the delivery and presentation of content on the companion computing device. The web-resource micro-app package is cross-platform and thus operable, without modification, with any of a number of different operating systems with which the companion manager and primary computing device might be associated. The web-resource micro-app package includes a location of a web-resource, identification of predetermined content items to be extracted from the web-resource, and presentation parameters for formatting a content group including at least some of the predetermined content items for presentation on the companion computing device. | 2016-12-29 |
20160381119 | IMAGE TRANSMISSION APPARATUS AND STORAGE MEDIUM - In an image transmission apparatus, a reading device reads image data from a document. A setting acquisition section acquires a transmission setting as a setting for transmission of the image data. An image transmission section transmits the image data through a communication device according to the transmission setting. The transmission setting includes a first transmission standard for transmitting a first file containing the image data, a second transmission standard for transmitting a second file containing the image data that is different from the first transmission standard, and a maximum size of the first file transmittable according to the first transmission standard. The image transmission section transmits the first file according to the first transmission standard when a size of the first file does not exceed the maximum size, and the second file according to the second transmission standard when the size of the first file exceeds the maximum size. | 2016-12-29 |
20160381120 | SYSTEM FOR EVENT DISSEMINATION - This disclosure is directed to a system for event dissemination. In general, a system may comprise a plurality of devices each including an event dissemination module (EDM) configured to disseminate events between the plurality of devices. New events may be generated during the normal course of operation in each of the plurality of devices. These events may be provided to at least one device designated as a network dispatch location. The network dispatch location may initiate the dissemination of the events. For example, each device may place received events into a local event queue within the device. The placement of an event into the local event queue may cause a counter in the EDM to increment. Incrementing the counter may, in turn, cause a trigger operation module in the EDM to perform at least one activity including, for example, forwarding the event to other devices within the plurality of devices. | 2016-12-29 |
20160381121 | QUERY ENGINE FOR REMOTE ENDPOINT INFORMATION RETRIEVAL - Embodiments are disclosed herein for remote retrieval of information from endpoints and comprise receiving a master query at an endpoint in a network environment and executing a set of one or more subqueries defined in the master query. Embodiments also comprise an execution of a first subquery that includes executing a function to produce a first output, applying one or more conditions to the first output to determine a second output, and determining a result of the master query based, at least in part, on the second output. In specific embodiments, the master query is received from another node over a network connection. In more specific embodiments, the function is executed on the endpoint to collect real-time information based on one or more parameters. In further embodiments, the function is one of a plug-in or a script. | 2016-12-29 |
20160381122 | SYSTEM AND METHOD FOR CONSTRUCTING CONTENT SITE VISITOR PROFILES - Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers. | 2016-12-29 |
20160381123 | Electronic Testing Device - Systems and methods for cabling verification may include one or more operations including, but not limited to: receiving floor plan data representing a floor plan of a premises; receiving at least one user input specifying a location of at least one cabling endpoint relative to the floor plan; receiving at least one user input selecting at least one cabling verification test for the at least one cabling endpoint; receiving one or more cabling verification test results for the at least one cabling endpoint obtained by at least one testing device; and updating at least one database element associated with the at least one cabling endpoint and maintained by the cloud-based server. | 2016-12-29 |
20160381124 | OPTIMIZING ROUTING AND LOAD BALANCING IN AN SDN-ENABLED CLOUD DURING ENTERPRISE DATA CENTER MIGRATION - Network routing and load balancing in a software design network (SDN)-enabled computing environment may be provided. Input data discovered from a source computing environment is received, wherein one or more of components of the source computing environment are to be migrated to a target computing environment, the input data comprising at least source configuration information and utilization information. Target compute resources, network design and system management design may be determined based on the input data, and a new network configuration generated as output. Based on these design decisions, the steady-state network management using SDN is proposed. The new network configuration may be transmitted to an SDN controller associated with the target computing environment for storing as flow table rules. The SDN controller pushes the flow table rules to one or more routing switches, the flow table rules for performing the network routing and the load balancing. | 2016-12-29 |
20160381125 | LOAD BALANCING USING A CLIENT SWAPPING OPERATION - A management server and method for load balancing a cluster of host computers analyzes load metrics of clients naming on the host computers in the cluster to select a first client that can be migrated from a first host computer in the cluster to a second host computer in the cluster to improve load balance for the cluster and a second client running on the second host computer that can be swapped with the first client running on the first host computer for a client swapping operation. The client swapping operation involves simultaneously migrating the first client from the first host computer to the second host computer and migrating the second client from the second host computer to the first host computer. | 2016-12-29 |
20160381126 | DISTRIBUTED NETWORK SERVICES - Providing a distributed network service includes: receiving network traffic at a first physical device; and executing a service engine to participate in the distributed network service. The distributed network service is provided to at least the first target application instance executing in a first VM on the first physical device, and a second target application instance executing in a second VM on a second physical device; and a shared state of the distributed network service is maintained with respect to the first physical device and the second physical device. | 2016-12-29 |
20160381127 | Systems and methods for dynamic networked peer-to-peer content distribution - Peer-to-peer (P2P) dynamic networks and/or sub-networks for file distribution between peers receiving the same content, wherein nodes are outside controlled networks and/or content distribution networks (CDNs), and wherein large data files are distributed or shared across and among the peer nodes. | 2016-12-29 |
20160381128 | MULTIPLE INSTANCE TYPES SERVING A SINGLE WORKLOAD OR APPLICATION - An instance service of a computing resource service provider may provide computing system instances to customers of the computing resource service provider. The computing system instances may be used by the customer to execute various customer workloads. Furthermore, the computing system instances may include an instance type indicating an amount of computing resources allocated to computing system instance of the instance type. The instance service may obtain requirement and/or constraints associated with the workload and determine a configuration of instance types to include in a set of instances configured to execute the customer workload. | 2016-12-29 |
20160381129 | RUNTIME FUSION OF OPERATORS - The streams environment includes a plurality of operators coupled with processing elements including a first processing element coupled with a first operator instructed with a first programming instructions, and a second processing element coupled with a second operator instructed with a second programming instructions. A workload of the first processing element and a workload of the second processing element are measured. A first threshold of the workload of the first processing element, and second threshold of the workload of the second processing element are determined. The first programming instructions and the second programming instructions are compared to determine if the first operator and the second operator are susceptible to fusion. The first operator is de-coupled and fused to the second processing element, in response to determining the first threshold and the determination that the first operator and the second operator are susceptible to fusion. | 2016-12-29 |
20160381130 | Stream-based data deduplication with peer node prediction - Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. As such, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are then re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. On-the-wire compression techniques are provided to reduce the amount of data transmitted between the peers. | 2016-12-29 |
20160381131 | CONTENT DISTRIBUTION SYSTEM - Network delivery of digital content decreases bandwidth requirements at a source and facilitates the transfer of digital content to consumers from one or more sources. The digital content includes an identifier that permits the digital content to be recognized even when distributed to more than one source. | 2016-12-29 |
20160381132 | SYSPLEXPORT ALLOCATION ACROSS A Z/OS SYSPLEX - A method, system, and program product for allocating a port for a connection by an application instance on a computer system is provided. The application instances used the port and a shared network address to connect to one or more application instances accessing the shared network address. A distributing stack creates at least one common table of available ports. Each table is associated with a different unique shared network address. When a request is received for a port to assign the shared network address, the distributing stack allocates a set of available ports. When a termination message is received, the distributing stack updates the common table of available ports associated with the shared network address. When a transfer from the distributing stack to a backup distributing stack is made, ownership of the common table of available ports is transferred to the backup distributing stack. | 2016-12-29 |
20160381133 | SYSTEM AND METHOD FOR DEPLOYING AN APPLICATION IN A COMPUTER SYSTEM - System and method for deploying an application in a computer system automatically extend an application topology of virtual computing resources of the computer system and application components of the application to be executed on the virtual computing resources to include an affinity-type rule for the virtual computing resources of the computer system based on at least one predefined policy of the application topology and deploy the application in the computer system by provisioning the virtual computing resources to the physical devices in the computer system based on the extended application topology. | 2016-12-29 |
20160381134 | SELECTIVELY DISABLING OPERATION OF HARDWARE COMPONENTS BASED ON NETWORK CHANGES - Disclosed herein are systems and methods for selectively disabling operation of hardware components based on network changes. In some embodiments, the hardware component may cause a platform to perform network discovery to receive first network discovery data, cause the platform to perform network discovery to receive second network discovery data, determine that the differences between the first and second data exceed a network change threshold, and in response to the determination, cause disablement of operation of one or more functions of the hardware component. Other embodiments may be disclosed and/or claimed. | 2016-12-29 |
20160381135 | BROKERED ADVANCED PAIRING - Examples described herein provide advanced pairing between an application and a selected device within an application-driven user experience. An application is enabled to pair devices within the application context and customize the user experience without relying on an experience or user interface provided by an operating system. This application-driven pairing is abstracted from protocols, allowing the application to provide custom pairing user experiences for any protocol. | 2016-12-29 |
20160381136 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR PROVIDING REST SERVICES TO FINE-GRAINED RESOURCES BASED ON A RESOURCE-ORIENTED NETWORK - A system, method, and computer program product are provided for accessing resources based on a resource-oriented network. In use, a request is received for a first resource. In response to receipt of the request for the first resource, a resource-oriented network mapping is identified. A second resource is identified based on the resource-oriented network mapping. Such second resource is accessed for generating a response. | 2016-12-29 |
20160381137 | MANAGEMENT OF ASYNCHRONOUS AND SYNCHRONOUS RESOURCE REQUESTS - Embodiments of the present invention provide systems, methods, and computer program products for managing requests for acquiring one or more resources in a computing environment. In one embodiment, successful acquisition of the one or more resources is determined. Embodiments of the present invention provide systems, methods, and computer program products for initiating a synchronous request to acquire the one or more resources, responsive to determining that the acquisition of the one or more resources is not successful. | 2016-12-29 |
20160381138 | Computing Erasure Metadata and Data Layout Prior to Storage Using A Processing Platform - Techniques are provided for computing data and metadata layout prior to storage in a storage system using a processing platform. An exemplary processing platform comprises one or more of a compute node and a burst buffer appliance. The processing platform communicates with a plurality of the compute nodes over a network, wherein a plurality of applications executing on the plurality of compute nodes generate a plurality of data objects; computes erasure metadata for one or more of the data objects on at least one of the compute nodes; and provides the erasure metadata with the corresponding one or more data objects to a storage system. The processing platform optionally determines a full set of the data objects to be stored and queries the storage system to determine an anticipated layout of the full set of the data objects to be stored. The anticipated layout allows special handling, for example, for small files and large files that are identified based on predefined criteria. | 2016-12-29 |
20160381139 | PRESENTING CONTENT USING DECOUPLED PRESENTATION RESOURCES - A facility for presenting document contents is described. In an application, the facility receives a request to materialize particular document content. In response to receiving the request, further in the application, the facility causes the document content to be retrieved, and causes presentation code to present the retrieved document content; this presentation code is neither native to the application nor linked into the application to be executed. | 2016-12-29 |
20160381140 | Method, System, and Computer-Readable Medium for Storing Diagnostic Data Relating to a Vehicle - A method for storing diagnostic data relating to a vehicle includes the steps of: reading one or more messages, the read messages including diagnostic data relating to the vehicle; transmitting the read messages to a buffer memory; transmitting the read messages to an aggregation component; aggregating the read messages by use of the aggregation component to form an aggregated message; transmitting the aggregated message to the buffer memory; checking whether a predefined fault event occurred during aggregation of the messages by the aggregation component; if a predefined fault event occurred: transmitting the predefined fault event to an extraction component, the predefined fault event including at least one predefined rule; executing the at least one predefined rule by the extraction component in order to extract the messages corresponding to the at least one predefined rule from the buffer memory; and storing the extracted messages and the fault event in a data memory, with the result that the extracted messages can be identified using the fault event. | 2016-12-29 |
20160381141 | COMMUNICATION METHOD BETWEEN TERMINALS AND TERMINAL - The present disclosure relates to technologies for a sensor network, machine-to-machine (M2M) communications, or machine type communications (MTC), and Internet of things (IoT), and may be utilized in intelligent services, based on the above technologies, such as a smart home, a smart building, smart cities, smart cars or connected cars, smart grids, healthcare, smart electronics, advanced medical services, public safety network communications through fusion and convergence with conventional IT technologies and various industries. Data transmission control between a group of uncoordinated electronic devices in a computer network including the use of transmission authorization request messages and transmission authorization grant messages. | 2016-12-29 |
20160381142 | Remote Flashing During Infusion - A medical device controller operating in conjunction with a medical device determines one or more current versions of executable code associated with one or more processors in a medical device. Medical devices may include infusion pumps, other patient treatment devices as well as vital signs monitors. The medical device controller determines one or more current versions of executable code and configuration information associated with the one or more processors in the medical device. The medical device controller further determines which of the processors in the medical device require updated executable code, and which of the processors in the medical device require updated configuration information. The medical device controller distributes to the medical device as required at least one of the updated executable code and the updated configuration information. The medical device deploys the distributed updates, and activates the updates at a clinically appropriate time. | 2016-12-29 |
20160381143 | Controlling an IoT Device Using a Remote Control Device via an Infrastructure Device - Described herein are implementations for using a remote control device to control a target device on a network. An exemplary remote control device may generate a data packet comprising a command for controlling the target device and a network address associated with the target device. The remote control device may establish a connection to an infrastructure device on the network, and transmit the data packet to the infrastructure device. The infrastructure device may multicast the data packet to a plurality of IoT devices on the network. An IoT device, of the plurality of IoT devices, may execute the command based on determining, using the network address, that the IoT device is the target device. | 2016-12-29 |
20160381144 | CONTROLLING AN IOT DEVICE USING A REMOTE CONTROL DEVICE VIA A REMOTE CONTROL PROXY DEVICE - Described herein are implementations for using a remote control device to control a target device on a network via a remote control proxy device. A remote control device may determine an IoT device capable of functioning as a remote control proxy device. The remote control device may generate a data packet comprising a command for controlling the target device and a network address associated with the target device, and transmit the data packet to the IoT device. If the IoT device determines, using the network address, that it is not the target device, the IoT device may either unicast the data packet to the target device or multicast the data packet to multiple intermediate IoT devices on the network. | 2016-12-29 |
20160381145 | System and Method for Managing Content on Multiple Computerized Devices - A system and method for controlling one or more computerized devices through a slave device that is appointed to operate as the master device is disclosed. The inventive method comprises an event defined by one or more event parameters, appointing a master device designation to a computerized device for the event, initiating a communication channel with one or more slave devices, initiating a slave application layer on one or more slave devices, presenting through the slave application layer a registration option for the event, receiving, a registration selection for the event, initiating a master application layer on the computerized device, presenting, through the master application layer, one or more slave command options, receiving, on the computerized device, one or more slave commands, and transmitting the one or more slave commands to one or more registered slave devices through the communication channel. | 2016-12-29 |
20160381146 | SYSTEM AND METHOD FOR CONNECTIVITY MANAGEMENT - One aspect of the present invention is to provide a Connectivity Management (CM) function for use in networks such as a wireless network. The CM function can support both User Equipment (UE) and Machine Type Communication (MTC) devices in the network. In one embodiment of the first aspect, there is provided methods and systems for CM for a plurality of different types of devices that may evaluate tracking criteria to determine where and when wireless resources will need to be allocated to a wireless device. In some embodiments, these tracking criteria include location tracking and/or activity tracking. Another aspect provides for the instantiation of virtual CM functions established at appropriate physical nodes to provide device specific or service specific CM. | 2016-12-29 |
20160381147 | INFORMATION TRANSMISSION METHOD AND APPARATUS - An information transmission method is provided. An apparatus receives a first session request from a third party application function, which includes identity information of the third party application function and identity information of a destination entity in a network. The apparatus establishes a first session with the third party application function; sends a second session request to the destination entity, which includes identity information of an anchor entity and the identity information of the third party application function. The apparatus establishes a second session with the destination entity; receives information reported by the destination entity, which includes a report event and identity information of the third party application function. The apparatus forwards the report event to the corresponding third party application function according to the identity information of the third party application function included in the information. Correct identification and forwarding of a packet flow is achieved. | 2016-12-29 |
20160381148 | NON-NETWORK CONTROLLER COMMUNICATION - The present disclosure is directed to a system for non-network controller communication. In general, an example wireless network may comprise a network controller (NC) device and at least one network member (NM) device. The at least one NM device may respond to inquiries received from outside-of-network (OoN) devices by providing at least an NC device name in a user-friendly form. This information may be provided via a new information element (IE). Should the at least one NC device later receive a service discovery request (e.g., from the OoN device), the at least one NC device may determine whether services it may provide are currently unavailable, and may then transmit a service discovery response including at least unavailable service information. In at least one embodiment, service discovery responses may also include information about current consumers of the unavailable services. | 2016-12-29 |
20160381149 | AUTOMATIC DISCOVERY AND ONBOARDING OF ELECTRONIC DEVICES - A computing device configured to facilitate on-boarding of an electronic device may comprise a processor and memory. The memory may store instructions that cause the processor to receive, over a public network, a first communication from the electronic device on a private network, comprising an address of the electronic device on the private network. A first identifier associated with the address of the electronic device on the public network and the received address of the electronic device on the private network may be stored in a persistent store. The computing device may then receive a first request from a browser and, based upon a second identifier associated therewith, retrieve the stored address of the electronic device on the private network. The retrieved address of the electronic device on the private network may then be sent, over the public network, in response to the received first request from the browser. | 2016-12-29 |
20160381150 | NETWORK FUNCTION VIRTUALIZATION (NFV) HARDWARE TRUST IN DATA COMMUNICATION SYSTEMS - A Network Function Virtualization (NFV) Management and Orchestration (MANO) data communication system drives an NFV Infrastructure (NFVI) to support a Network Service (NS). The NFV MANO system exchanges hardware trust data with a hardware-trusted subsystem in the NFVI to maintain hardware trust with the NFVI subsystem. The NFV MANO system exchanges NS data with an operations system and responsively exchanges network data to drive the NFVI to execute a Virtual Network Function (VNF) externally to the hardware-trusted subsystem to support the NS. The NFV MANO system also exchanges trust data for the NS with the operations system and responsively exchanges network data with the hardware-trusted subsystem to drive the subsystem to execute the VNF to support the NS. | 2016-12-29 |
20160381151 | DYNAMICALLY GENERATING SOLUTION STACKS - Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service. | 2016-12-29 |
20160381152 | METHOD FOR LOCATING A SERVICE AND METHOD FOR PROPOSING A SERVICE AND CORRESPONDING COMMUNICATION NETWORK DEVICES, SYSTEM, COMPUTER READABLE PROGRAM PRODUCTS AND COMPUTER READABLE STORAGE MEDIUMS - The present disclosure relates to a method for locating a service, to be performed in a device belonging to a network of communication devices. According to an embodiment, the method includes checking an availability of the service on the network, when the service is not available on the network, obtaining an installation requirement representative of a capacity required from a candidate device for an installation of the service on the candidate device, sending the obtained installation requirement on the network, receiving an indication of a compliance, of a candidate device of the network, to the installation requirement, sending an order of installation of the service to the candidate device according to the indication of compliance. The present disclosure relates to corresponding proposing method, devices, system, computer readable program products and computer readable storage mediums. | 2016-12-29 |
20160381153 | METHOD, APPARATUS, AND SOFTWARE FOR IDENTIFYING A SET OF OPTIONS FOR THE PROVISION OF A SERVICE - A method, apparatus and software is disclosed in which options for the provision of a service are each identified by an option identifier for use in determining the applicable options for a given service request. | 2016-12-29 |
20160381154 | Predicting Geolocation Of Users On Social Networks - A system and method for predicting the location of a user of social media utilizing information related to the interaction of the user with other users of the social media is described. | 2016-12-29 |
20160381155 | DETERMINING A PHYSICAL LOCATION OF A DEVICE - Embodiments of the present disclosure disclose a method, an apparatus and a computer program product for determining a physical location of a device by obtaining a first address of a device; and determining, based on a first mapping between the first address of the device and a location identifier of a physical location, the physical location of the device. | 2016-12-29 |
20160381156 | MANAGING FILE CHANGES MADE DURING A REVIEW PROCESS - A method for managing file changes is provided. A file editor is able to view if the file he is submitting for review, is already under review with any reviewer. A reviewer would be informed that another editor has edited the same file and has submitted his changes for review. Editors would be informed of all reviewer comments if there are multiple reviewers on one file. | 2016-12-29 |
20160381157 | ELECTRONIC CONTENT ENGAGEMENT DETERMINATION - This disclosure provides various techniques that may allow for tracking how a user interacts with content. For example, a user may interact with various types of content, such as web pages, applications, text, multimedia, or any other type of content. In one example of web page content, for example, this disclosure provides that executable code may be included with a web page and run on a user's system (e.g., via a web browser). The code may be capable of monitoring which content is visible in a viewport of the web browser, when the content is visible, and what part of the viewport contains the content. This monitoring data may be used to measure user interaction or engagement with the content. | 2016-12-29 |
20160381158 | Automatic Invitation Delivery System - A method may provide, by a content distribution system, access to interactive content, such as a game, to a group of users and obtain a social media data indicating an interaction level of the users on a social network. The method may determine a content sharing rating for the users based on the social media data and select a user from the group based on the content sharing rating. The method may determine a recommendation for an incentive to be provided to the user within the interactive content, in exchange for the user performing an action to connect the interactive content to the user on a social network, such as by posting a link to the game. The method may provide the recommendation to an administrative system that administers the interactive content, such as the game developer, and that is distinct from the content distribution system. | 2016-12-29 |
20160381159 | COMMUNICATION APPARATUS, SERVER, COMMUNICATION APPARATUS CONTROL METHOD, SERVER CONTROL METHOD, RECORDING MEDIUM CONTAINING COMMUNICATION APPARATUS CONTROL PROGRAM AND RECORDING MEDIUM CONTAINING SERVER CONTROL PROGRAM - A communication apparatus includes a memory and a processor. The processor is configured to perform operations including: storing group IDs; acquiring device IDs and calculation data items from a plurality of calculation devices, respectively, each device ID and each calculation data item being in association with each other; registering names in association with the acquired device IDs; and transmitting (i) the registered names corresponding to the acquired device IDs, in association with the stored group IDs, to a server and (ii) the calculation data items corresponding to the acquired device IDs, in association with the stored group IDs, to a server. | 2016-12-29 |
20160381160 | System and Computer Implemented Method of Personal Monitoring - A system and computer implemented method of personal monitoring is provided. The method includes allowing a user to engage in a number of on-line activities, determining, on a computer, if the user engaged in on-line activities, and if the determination is negative, then performing, on a computer, a number of responsive actions. The system and method further provide for an investigation of external modules; that is, the system and method investigate external sites such as, but not limited to, social networks, forums, weblogs (blogs), that are not associated with the personal monitoring module. The system and method further allow a proxy to respond for the user. | 2016-12-29 |
20160381161 | INFORMATION DEVICE IDENTIFICATION SYSTEM, INFORMATION DEVICE IDENTIFICATION METHOD, INFORMATION DEVICE, AND PROGRAM - An information device identification system includes: a remote host holding unit that holds a specific remote host name; a receiving unit that receives an inquiry about an internet protocol (IP) address corresponding to one remote host name; a determining unit that determines whether or not the one remote host name received by the receiving unit matches the specific remote host name held by the remote host holding unit; an IP address responding unit that responds by transmitting, to a device, an IP address of an information device instead of the IP address indicating one remote host when the determining unit determines that the one remote host name matches the specific remote host name; and a device ID responding unit that responds by transmitting, to the device, data including information for instructing the device to connect to a predetermined redirect destination and specific information for uniquely identifying the information device. | 2016-12-29 |
20160381162 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - An information processing apparatus includes following components. A memory stores user identification information identifying a user, terminal identification information identifying a terminal used as a user interface of the information processing apparatus, and operational context information indicating a status of an operation performed on the terminal in association with one another. An execution unit executes a process. A memory controller controls, in response to the user switching the terminal from a first terminal to a second terminal, the memory to change the terminal identification information from information identifying the first terminal to information identifying the second terminal. The transmission unit transmits, in response to occurrence of information to be displayed in relation to the process started in response to an operation on the first terminal, display information used to display a window corresponding to the operational context information to the second terminal if the terminal identification information has been changed. | 2016-12-29 |
20160381163 | SHARED EXPERIENCE AND MULTI-DEVICE HARDWARE PLATFORM - A system for real-time sharing of social experiences across multiple devices, comprising a social event manager that receives interaction from users via a network, wherein at least one of the plurality of users hosts a shared social event, a plurality of communication adapters each configured to facilitate communication between user devices and an event manager, a scheduling server that schedules events and notifies users of event scheduling, and a synchronization module that maintains synchronicity of media between participating users, and methods for sharing social experiences. | 2016-12-29 |
20160381164 | OPTIMIZING STORAGE IN A PUBLISH / SUBSCRIBE ENVIRONMENT - Creating message files in a publication subscription computer system by: (i) receiving data corresponding to a first message; (ii) receiving a list of subscribers that subscribe to a topic of the first message; and (iii) creating a digital data file that includes a payload data and a consumption metadata. The payload data includes content data corresponding to the first message. The consumption metadata includes data relating to whether one or more subscribers of the list of subscribers will potentially consume the first message at a later period in time from the time of receiving the content data corresponding to the first message. | 2016-12-29 |
20160381165 | Electronic Notifications - In one embodiment, a method includes accessing for a user one or more electronic notifications that include information about a social network. The social network includes a plurality of nodes connected by a plurality of edges, with at least one node corresponding to the user. The method further includes determining, for each of the electronic notifications, a score that estimates whether a user interaction with the social network will result if the electronic notification is provided to the user. The method further includes determining, based at least in part on the determined scores, an action to take with respect to the electronic notifications. | 2016-12-29 |
20160381166 | ASSESSMENT OF CONTENT DELIVERY SERVICES USING PERFORMANCE MEASUREMENTS FROM WITHIN AN END USER CLIENT APPLICATION - A system for measuring and monitoring performance of online content is provided. In one embodiment, the system includes an intermediary device, such as a web proxy, that receives client requests for content, such as requests for web pages. The device obtains the requested content, modifies it by applying one or more performance optimizations, and serves it to the client. The device also inserts code into the content for execution by the client to gather and report data reflecting, e.g., how quickly the client is able to get and process the content. The code includes information identifying the modifications the device made, and this is reported with the timing data, so that the effect on performance can be analyzed. In other embodiments, the device selects one of multiple versions of content, and the inserted code contains information identifying the selected version. The foregoing are merely examples; other embodiments are described herein. | 2016-12-29 |
20160381167 | Unified Content Posting - Methods, apparatuses and systems to provide a unified content posting mechanism. | 2016-12-29 |