Patents Issued in August 24, 2017
-
Publication number: 20170244756Abstract: A security matrix layer between a first and second conductive shorting layers are located within a printed circuit board (PCB) that carries out cryptographic data handling functions. The security matrix layer includes at least two microcapsules each containing one or more reactants. When the security matrix layer is accessed, drilled, or otherwise damaged, the microcapsules rupture and the reactants react to form at least an electrically conductive material. The electrically conductive material contacts and shorts the first and second conductive shorting layers. A monitoring device that monitors whether the first and second conductive shorting layers have shorted detects the short and passes a tamper signal that is received by one or more computer system devices to respond to the unauthorized physical access attempt.Type: ApplicationFiled: February 19, 2016Publication date: August 24, 2017Inventors: Gerald K. Bartley, Darryl J. Becker, Matthew S. Doyle, Joseph Kuczynski, Timothy J. Tofil
-
Publication number: 20170244757Abstract: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system between member institutions comprising a host system and a source system. Host and source institutions function to share the transaction records from member institutions such that a host institution that is a member of the block chain may obtain the transaction records of all source institutions of the block chain. The transaction records are validated on the block chain such that the transaction records are secure represent a source of truth.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventors: Joseph Benjamin Castinado, Richard Huw Thomas, Manu Jacob Kurian, Eric Eugene Sifford
-
Publication number: 20170244758Abstract: A method for securely connecting to a remote server that provides improved Internet security. In the method, a client receives a request to connect to a remote server associated with a domain name. The client, when resolving the domain name, determines whether the remote server supports at least one predetermined IP layer security protocol. The client performs a key exchange protocol with the remote server to generate at least one shared secret in response to determining that the remote server supports the at least one predetermined IP layer security protocol. The client connects to the remote server using the at least one shared secret in the IP layer security protocol.Type: ApplicationFiled: February 24, 2016Publication date: August 24, 2017Inventors: Jeffree Froelicher, Lalitha B.S. Suryanarayana, Giridhar Mandyam
-
Publication number: 20170244759Abstract: A system for policy-managed secure code execution and messaging for computing devices where each trusted application is managed independently of others and is not visible to unauthorized inspection or execution. If a file bundle received by the system contains metadata concerning the context of the file or its execution, the metadata is decrypted if necessary. If the file bundle containing the executable code is encrypted, its key is stored in a policy server to await adjudication of the request to execute. If the policy server allows execution of the executable code, the key stored in the policy server is used to decrypt the file bundle and the resulting executable code is stored as a trusted application in secure memory. Future requests to execute the trusted application are adjudicated by the policy server and enforced by the exclusive policy execution point associated with that trusted application in secure memory.Type: ApplicationFiled: September 5, 2014Publication date: August 24, 2017Inventors: Philip Attfield, Daniel Schaffner, Michael Thomas Hendrick
-
Publication number: 20170244760Abstract: A JIT service in a cloud computing environment manages just-in-time access to resources in the cloud computing environment for DevOps personnel who do not have persistent access to restricted data or the ability to modify the cloud computing environment to gain access to restricted data. When JIT access to a resource is requested by a DevOps device, the JIT service retrieves a JIT policy for the resource that includes screening criteria limiting automatic granting of JIT access to DevOps personnel who meeting the screening criteria. Screening information for the DevOps personnel is evaluated against one or more screening requirements set forth by the screening criteria. If the screening criteria and any other criteria of the JIT policy are satisfied, the JIT service provisions JIT access to the resource for the DevOps device.Type: ApplicationFiled: May 8, 2017Publication date: August 24, 2017Inventors: RAMNATH PRASAD, PRADEEP AYYAPPAN NAIR, VEENA RAMACHANDRAN, SANDEEP KALARICKAL, THOMAS KNUDSON, PAVAN GOPAL BANDLA, CHETAN SHANKAR, RANAJOY SANYAL, QINGSU WU, CHI ZHOU, DOUG KIRSCHNER, RYAN MEYER, THOMAS KEANE
-
Publication number: 20170244761Abstract: Computer nodes in a network manage the configuration of neighbor nodes and enforce policy compliance by scanning neighboring nodes and taking corrective action based on consensus. A testing node scans a neighboring target node and identifies if the target node violates the policy. The testing node requests common neighbors of the target node to repeat the scan. If the common neighbors agree that the target node violates the policy, a corrective action is taken to ensure compliance with the policy. Corrective action includes reconfiguration of the target node. Nodes also perform negative checking to ensure adherence to separation rules restricting interaction between neighboring nodes. A testing node attempts to perform a restricted action with a neighboring restricted node. If the restricted action is successful, the testing node takes corrective action on the target node to ensure that subsequent attempts to perform the restriction action are denied access in compliance with the policy.Type: ApplicationFiled: February 20, 2016Publication date: August 24, 2017Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20170244762Abstract: A system for collection and analysis of forensic and event data comprising a server and an endpoint agent operating on a remote system. The server is configured to receive event data including process creation data, persistent process data, thread injection data, network connection data, memory pattern data, or any combination thereof, and analyze the event data to detect compromises of a remote system. The endpoint agent is configured to acquire event data, and communicate the event data to the server.Type: ApplicationFiled: February 17, 2017Publication date: August 24, 2017Inventors: Ross R. Kinder, Aaron Hackworth, Matthew K. Geiger, Kevin R. Moore, Timothy M. Vidas, Oliver J. Palmer, Jon Ramsey, Matt J. McCormack
-
Publication number: 20170244763Abstract: A network client device is disclosed having a media streamer for processing a media stream received at a first port of a client device. Further included is a setup controller configured to transmit a set-up request message and a discovery message without waiting for acknowledgement of reception of the set-up request message before transmission of the discovery message, from a second port and the first port respectively, to predetermined ports of a server device.Type: ApplicationFiled: February 9, 2017Publication date: August 24, 2017Inventor: Raoul Mallart
-
Publication number: 20170244764Abstract: Embodiments of the present invention relate to a method for content sharing, where the method includes: receiving a content share request, establishing a share session with a receiving terminal, and sharing session content, which is played on a first initiating terminal, with the receiving terminal; and receiving a state notification about transferring the played session content from the first initiating terminal to a second initiating terminal, and according to the state notification, ending the share session or continuing to share the session content continuously played on the second initiating terminal. According to the embodiments of the present invention, CoD content watched on the initiating terminal can be shared, and when transfer occurs between display terminals of the content share initiator, a content share AS can perceive the transfer, and continuity of the share session can be ensured. The present invention further relates to a device for content sharing.Type: ApplicationFiled: May 10, 2017Publication date: August 24, 2017Applicant: HUAWEI DEVICE CO., LTD.Inventors: Lei WANG, Wenmei GAO, Shunan FAN, Xiaoqiang LV
-
Publication number: 20170244765Abstract: Embodiments for providing an architecture for WebRTC to access Internet Protocol (IP) multimedia subsystem (IMS) are generally described herein. In some embodiments, a non-IMS user equipment (UE) is provided along with an Application Signaling Interworking Function (ASIF) co-located with the non-IMS UE. The non-IMS UE is arranged to send a register message to the ASIF for registering the non-IMS UE with an IMS core. The ASIF is arranged to translate the register message from the non-IMS UE to IMS-based signaling and to register the non-IMS UE with the IMS core using the register message translated to IMS-based signaling.Type: ApplicationFiled: April 10, 2017Publication date: August 24, 2017Inventors: Chang Hong Shan, Muthaiah Venkatachalam
-
Publication number: 20170244766Abstract: A method, executed by a computer, for provisioning chat rooms (e.g. audio, video, and/or text-based communication) includes determining a topic by accessing one or more user communities, creating a chat corresponding to the topic, selecting one or more users to invite to the chat using a template, and inviting the one or more users to the chat. A computer program product and computer system corresponding to the above method are also disclosed herein.Type: ApplicationFiled: February 19, 2016Publication date: August 24, 2017Inventors: Akash U. Dhoot, Shailendra Moyal, Bhavuk Srivastava
-
Publication number: 20170244767Abstract: A multimedia conferencing service uses accessible-forwarding-plane network elements such as OpenFlow® controllers and OpenFlow®-enabled switches. A conferencing server receives a conference subscription request including a network address of a L2/L3 signaling server, and connects to an accessible-forwarding-plane controller to control an accessible-forwarding-plane switch. Flow tables and group tables are managed to classify traffic with minimum table usage and update frequency. Media channels are established between clients through the OpenFlow®-enabled switches, relieving bottlenecks at the conferencing server.Type: ApplicationFiled: February 23, 2016Publication date: August 24, 2017Inventors: Rittwik Jana, John F. Murray, Vijay Gopalakrishnan, Shu Shi, Bo Han, Bo Yan, Lusheng Ji
-
Publication number: 20170244768Abstract: A collaboration system that facilitates a collaboration session with a first participant and a second participant is provided. The collaboration system varies a response to input based on the participant who provides the input. The collaboration system may receive input data from a participant interacting with a shared surface. When the input data is received from the first participant, the collaboration system generates first output data that may be a modification of the first input data that is based at least on first customization information associated with the first participant and displays the first output data. When the input data is received from the second participant, the collaboration system generates second output data that may be a modification of the second input data that is based at least on second customization information associated with the second participant and displays the second output data.Type: ApplicationFiled: February 19, 2016Publication date: August 24, 2017Inventors: Francis Zhou, Connor Weins, Albert Hwang, Narasimhan Raghunath
-
Publication number: 20170244769Abstract: A method of low latency group-addressed audio/video streaming in an IEEE 802.11 wireless network is provided. A data stream from at least one access point is transmitted to a plurality of wireless receiving stations as multicast traffic. The data stream comprises beacon frames at beacon intervals. Data packets of the data stream from the at least one access point are transmitted to a plurality of wireless receiving stations as multicast traffic as soon as available for transmission. The transmission of data packets that were transmitted during a previous beacon interval is repeated during a subsequent beacon interval as multicast traffic.Type: ApplicationFiled: February 23, 2017Publication date: August 24, 2017Inventors: Rafael Cauduro Dias de Paiva, Daniel Fischer
-
Publication number: 20170244770Abstract: In accordance with an embodiment, described herein is a system and method for client-initiated playlist shuffle in a media content environment. A shuffle logic is configured to provide a shuffle order for a plurality of media content items, including associating each media content item with a placement interval within which the media content item can be placed, and a weight that determines the average position of the placement interval; associating each media content item with a random value that indicates a random offset or position within its placement interval; calculating an ordering score for each media content item based on its weight plus its random offset into its placement interval; collecting indications for the plurality of media content item that reflect their ordering scores; and placing the plurality of media content items into the shuffle order, for subsequent playback by a media device.Type: ApplicationFiled: February 19, 2016Publication date: August 24, 2017Inventors: Per Eckerdal, Lukas Polacek
-
Publication number: 20170244771Abstract: A native content handler in a user device, such as a smart phone, determines whether requested content may by delivered using special handling, such as prioritized or sponsored access. A listener of the content handler determines whether special handling may possibly be applicable to the content, and the listener modifies a universal resource locator (URL) associated with the content to mark the URL. An agent portion of the content handler exchanges data with a validation device to determine whether the user device is actually eligible to receive the content with the special handling. If the user device is eligible, the agent uses data provided by the validation device to obtain the content using the special handling.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventors: Guanrao Chen, Jian Huang, Susan Kelly
-
Publication number: 20170244772Abstract: A method for multi-streaming multimedia content data over a network to affiliated client devices is provided. A manifest including a list of Universal Resource Indicators (URIs) for different segments of multimedia content data for selected primary multimedia content and a list of URIs for different segments of multimedia content data for at least one alternate multimedia content related to and different from the selected primary multimedia content is built and made available for download over the network with a transfer protocol. Synchronization of display of the selected primary multimedia content on a primary display and display of the at least one alternate content on the at least one auxiliary client device is thereby enabled. A system for streaming multimedia data over a network to affiliated client devices is also disclosed.Type: ApplicationFiled: May 8, 2017Publication date: August 24, 2017Inventor: Barry P. Falvo
-
Publication number: 20170244773Abstract: A system and method are disclosed for managing the wireless delivery of streaming media content to a user equipment (UE) device. A UE device establishes a network connection with a local wireless network, which in turn is associated with a wireless network region with a corresponding data infrastructure server. The UE device then requests predetermined streaming media content from the data infrastructure server. A determination is made whether the requested streaming media content is stored in transcoded form on the data infrastructure server. If so, then a control information network is implemented to transmit and receive streaming media content control data between the UE device and the data infrastructure server. In turn, the streaming media content control data is used by the data infrastructure server to control the transmission of the transcoded streaming media content over a data network for delivery to the UE device.Type: ApplicationFiled: May 9, 2017Publication date: August 24, 2017Inventors: Arnold Sheynman, Mark Pecen, Marcel Villaflor, Dake He
-
Publication number: 20170244774Abstract: Implementations generally relate to the sharing of media content. In some implementations, a method includes providing a grid view in a user interface, where the grid view displays media content items that have been shared in a network. The method also includes providing a gallery view in response to a user selecting a media content item among the media content items in the grid view, where the gallery view displays the selected media content item. The method also includes providing a share menu view in response to the user selecting a re-share button, where the share menu view displays options for sharing the selected media content item. The method also includes providing a comment view, where the comment view enables the user to comment on the selected media content item. The method also includes re-sharing the selected media content item to other users.Type: ApplicationFiled: March 14, 2016Publication date: August 24, 2017Applicants: Sony Corporation, Sony Network Entertainment International LLCInventors: Steven Trombetta, Shunsuke Kunieda
-
Publication number: 20170244775Abstract: A video server is configured to convert frame data of a spherical image to frame data of a equirectangular image such that a first area corresponding to a field of view received from a client device is a middle area of the equirectangular image. The video server is further configured to scale the first area at a first resolution, scale a second area of the equirectangular image adjacent to the first area at a second resolution smaller than the first resolution, scale a third area of the equirectangular image that is adjacent to the first area and is not adjacent to the second area, at a third resolution smaller than the first resolution, and rearrange the scaled first area, second area and third area such that the scaled second area and the scaled third area are adjacent to each other, to generate reformatted equirectangular image frame data to be encoded.Type: ApplicationFiled: September 16, 2016Publication date: August 24, 2017Applicant: ALCACRUZ INC.Inventors: SANGYOO HA, SUNGBAE KIM
-
Publication number: 20170244776Abstract: Disclosed are a coded video data processing method and apparatus which consider a random access, and a coded video data generating method and apparatus which consider a random access. The coded video data processing method includes obtaining a bitstream of coded video data, obtaining metadata information used for video-processing of pictures having a decoding order after a random access point picture in the bitstream, and performing video-processing on decoded video data among the pictures having the decoding order after the random access point picture, based on the metadata information.Type: ApplicationFiled: October 15, 2015Publication date: August 24, 2017Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Tammy LEE, Seung-hoon HAN
-
Publication number: 20170244777Abstract: A method to enhance a subjective quality of experience for an application may include receiving network performance data, the data representing at least one observable application characteristic, and the subjective quality of experience (QoE) survey data. The method may further include generating at least one perception model which relates the data representing at least one observable application characteristic and the network performance data, and determining a QoE model which relates the subjective QoE survey data and the data representing at least one observable application characteristic. The method may further include inverting the at least one perception model and the QoE model to obtain a relationship between network performance parameters and the at least one observable application characteristic, and adjusting network parameters based on the at least one inverted perception model and inverted QoE model.Type: ApplicationFiled: February 19, 2016Publication date: August 24, 2017Inventors: Ye Ouyang, Carol Becht, Krishna Pichumani Iyer
-
Publication number: 20170244778Abstract: In an example embodiment, a supervised machine learning algorithm is used to train a communication reply score model based on an extracted first set of features and second set of features from social networking service member profiles and activity and usage information. When a plurality of member search results is to be displayed, for the member identified in each of the plurality of member search results, the member profile corresponding to the member is parsed to extract a third set of one or more features from the member profile, activity and usage information pertaining to actions taken by the members on the social networking service is parsed to extract a fourth set of one or more features, and the extracted third set of features and fourth set of features is inputted into the communication reply score model to generate a communication reply score, which is displayed visually to a searcher.Type: ApplicationFiled: February 23, 2016Publication date: August 24, 2017Inventors: Qiang Zhu, Qingbo Hu
-
Publication number: 20170244779Abstract: Methods, systems, and media for presenting a virtual operating system on a display device are provided. In some implementations, a method for presenting a virtual operating system user interface (Virtual OS UI) is provided, the method comprising: receiving a request to provide the virtual OS UI for a display coupled to a media receiving device; selecting applications; generating the virtual OS UI including the applications; causing the media receiving device to present the virtual OS UI on the display; receiving signals from a remote control to select a second application; executing the second application; causing the media receiving device to present the second application on the display; receiving signals from the remote control to select media content; causing the media receiving device to request the selected media content; and causing the media receiving device to present the requested media content using the display.Type: ApplicationFiled: December 3, 2015Publication date: August 24, 2017Inventor: Stewart Reichling
-
Publication number: 20170244780Abstract: A computer-implemented technique can include establishing, between a computing device and a mobile computing device, a short-range wireless communication link. In response to establishing the communication link, the computing device can provide a selectable option for a user to attach a media item to an electronic document accessed by the computing device. In response to a user selection of the selectable option, the computing device can transmit, to the mobile computing device via the communication link, a command, wherein receipt of the command causes the mobile computing device to initiate a media capture mode. The computing device can then receive, from the mobile computing device via the communication link, the captured media item and, in response to receiving the captured media item, the computing device can attach the captured media item to the electronic document.Type: ApplicationFiled: October 16, 2015Publication date: August 24, 2017Applicant: GOOGLE INC.Inventor: Erik Hubert Dolly Goossens
-
Publication number: 20170244781Abstract: A computing device includes at least one processor and an analysis module. The analysis module is to monitor status information for a first set of compute nodes. The analysis module is also to receive a level-one conclusion from a second manager node, wherein the level-one conclusion is generated by the second manager node based on at least in part on status information for a second set of compute nodes. The analysis module is also to generate a level-two conclusion based on the level-one conclusion, where the manager node, the first set of compute nodes, the second manager node, and the second set of compute nodes are included in a multi-node computing system.Type: ApplicationFiled: October 31, 2014Publication date: August 24, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Andrew A. WALTON, Timothy F. FORELL, Zhikui WANG
-
Publication number: 20170244782Abstract: Aspects include balancing work of tasks at a sending node of a transaction server in a network. A method can include processing a task from the top of a work queue at the sending node, where the task is an instance of a transaction which requires a transaction message to be sent from the sending node using a network connection. The transaction message is divided into chunks of partial transaction sub-messages. For each chunk, it can be dynamically determined whether a pacing response indicator is required based on metrics that monitor the activity in the work queue and a number of chunks of the transaction message already sent.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventors: Michael D. Brooks, Alan Hollingshead, Julian C. Horn, Philip I. Wakelin
-
Publication number: 20170244783Abstract: One embodiment of the invention disclosed herein provides techniques for managing data access in a distributed computing system. A site engine detects a first subscription request from a first subscriber for a first data object included in a plurality of data objects. The site engine determines whether the first data object is locally available within a first site that is included in a plurality of sites and associated with the first subscriber. If the first data object is locally available within the first site, then the site engine services the first subscription request locally within the first site. If the first data object is not locally available within the first site, then the site engine establishes a peer-to-peer relationship with a second site that is included in the plurality of sites for accessing the first data object via the second site.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventor: Paolo MARESCA
-
Publication number: 20170244784Abstract: In a distributed computing network, requests for allocation of resources to tenant workloads and messages identifying resource availability are received and aggregated. Resources are allocated to the workloads in accordance with a distribution policy defining values for resource entitlements of the tenants. The values include pre-emption quantities. In response to determining that a quantity of resources allocated for workloads of a first tenant is less than the tenant's pre-emption quantity, processing of another workload from a second tenant is interrupted to re-allocate resources from the second tenant's workload to the first tenant's workload.Type: ApplicationFiled: April 29, 2016Publication date: August 24, 2017Inventors: Jason T.S. LAM, Chong CHEN, Lei GUO, Xiaodi KE
-
Publication number: 20170244785Abstract: A scalable virtualized network core is provided to allow for incrementally adjusting network resources in response to changing demand, and for improved flexibility in network management and control. The scalable virtualized network core provides a cloud evolved packet core that has virtual machines performing the functions of the individual server elements. As demand for network resources changes, additional virtual machines can be brought online or virtual machines can be terminated to efficiently address the demand. An abstraction agent can be provided to facilitate the physical to logical connections so that to the perspective of elements in a radio access network, no changes have been made. The abstraction agent also facilitates network control and management of the virtual machines.Type: ApplicationFiled: May 9, 2017Publication date: August 24, 2017Inventors: Ioannis Broustis, Rittwik Jana, Sarat Puthenpura, Nemmara K. Shankaranarayanan
-
Publication number: 20170244786Abstract: Described herein are methods, systems, and software for accommodating failover of a content node in a content delivery network. In one example, a method of operating a control node includes receiving content requests issued by end user devices. The method further provides, for at least a first content request, mapping a first connection between a first end user device and a first content node, the first connection defined by at least a network address of the first end user device and a virtual next hop network address, and directing traffic associated with the first connection to the first content node using at least the virtual next hop network address. The method also includes identifying a service interruption associated with the first content node and, responsive to the service interruption, identifying a second content node to handle the communications for the first connection.Type: ApplicationFiled: May 8, 2017Publication date: August 24, 2017Inventor: João Diogo Taveira Araújo
-
Publication number: 20170244787Abstract: Techniques for hot swapping and hot scaling containers between cloud services are disclosed. In one example, a method includes storing, with a cloud exchange, data indicating an association of a first container of a first private network with a second container of a second private network, wherein the first private network and the second private network are coupled to the cloud exchange to send and receive data packets via the cloud exchange. The method further includes sending, with the cloud exchange based on the association, state of the first container to the second container.Type: ApplicationFiled: December 28, 2016Publication date: August 24, 2017Inventors: Venkatachalam Rangasamy, Parveen Kumar, Jaganathan Jeyapaul, Brian J. Lillie
-
Publication number: 20170244788Abstract: Aspects of the disclosure relate to managing migration of an application. The managing migration of an application includes establishing a source dataset. The source dataset includes a set of source features. The source features relate to a source. The source includes the application. A determination of a first set of migration plans is made. The determination is made with an evaluation. The evaluation is made using the source dataset and a set of legacy features. The evaluation is performed with a cost measure. The application is migrated from the source to the target. The migration is based on the determined first set of migration plans.Type: ApplicationFiled: May 5, 2017Publication date: August 24, 2017Inventors: Kun Bai, Jinho Hwang, Brian Peterson, Maja Vukovic
-
Publication number: 20170244789Abstract: A programmer input in a programming language is received, where the programmer input includes i) a built-in function of a computational application corresponding to retrieving data from electronic storage objects, and ii) a first parameter specifying the electronic storage object from which data is to be retrieved. The computational application evaluates the programmer input to generate one or more messages corresponding to requests for a server to retrieve data from the electronic storage object. The one or more messages are sent to the server to retrieve data from the electronic storage object. Data retrieved from the electronic storage object by the server is received, and the retrieved data is made available in a document for processing by the computational application, where the retrieved data is in a format recognized by the computational application.Type: ApplicationFiled: May 9, 2017Publication date: August 24, 2017Inventors: Stephen WOLFRAM, Bradley ASHBY
-
Publication number: 20170244790Abstract: A method includes receiving, by a distribution server, a plurality of network traffic records. The distribution server generates a first hash from a first plurality of fields in a first of the plurality of network traffic records and generating a second hash from a second plurality of fields in a second of the plurality of network traffic records. The distribution server determines that the first and second of the plurality of network traffic records relate to a session. The method includes transmitting the first and second of the plurality of network traffic records to one of a plurality of worker computing devices selected based on the determination and on at least one of the first and second hash. The distribution server transmits a request for an enumeration of addresses ranked according to a criterion, receives partial enumerations from a plurality of worker computers, and generates a combined, deduplicated enumeration.Type: ApplicationFiled: May 11, 2017Publication date: August 24, 2017Inventor: Vincent Berk
-
Publication number: 20170244791Abstract: A network system, and a method of use thereof, includes a first network subscriber arranged in an automation network of an automation system, a second network subscriber having a cloud computing infrastructure, and a communication unit for transmitting acquired data from the first network subscriber to the second network subscriber. The communication unit includes a first interface, which is configured as an input/output module and connected to the first network subscriber, and a second interface, which is configured as an agent and connected to the second network subscriber.Type: ApplicationFiled: February 17, 2017Publication date: August 24, 2017Applicant: SIEMENS AKTIENGESELLSCHAFTInventor: THOMAS RIPPLINGER
-
Publication number: 20170244792Abstract: A power-line carrier (PLC) terminal control apparatus, system, and method, where the PLC terminal control apparatus is configured to receive a subscription request sent by a PLC terminal system, where the subscription request includes an identifier of the PLC terminal system and a topic for controlling the PLC terminal system, establish a correspondence between the topic and the identifier of the PLC terminal system in a mapping table according to the subscription request, send a subscription response message to the PLC terminal system according to the correspondence, where the subscription response message includes the topic, receive a control message published by a message queuing telemetry transport (MQTT) publisher, where the control message includes a control word and the topic, and the control word controls an operation performed based on the topic, and send the control message to the PLC terminal system according to the correspondence.Type: ApplicationFiled: May 5, 2017Publication date: August 24, 2017Inventors: Bin Yin, Xin Lei, Mujia Lin, Yun Zhou
-
Publication number: 20170244793Abstract: Techniques for creating a persistent connection between client devices and one or more remote computing resources, which may form a portion of a network-accessible computing platform. This connection may be considered “permanent” or “nearly permanent” to allow the client device to both send data to and receive data from the remote resources at nearly any time. In addition, both the client device and the remote resources may establish virtual channels over this single connection. If no data is exchanged between the client device and the remote computing resources for a threshold amount of time, then the connection may be severed and the client device may attempt to establish a new connection with the remote computing resources.Type: ApplicationFiled: May 8, 2017Publication date: August 24, 2017Inventors: Fred Torok, Frederic Johan Georges Deramat, Vikram Kumar Gundeti, Peter Spalding VanLund
-
Publication number: 20170244794Abstract: A distributed node service management system utilizes multiple existing processor nodes of a distributed computing system, in support of the primary data processing functions of the distributed computing system. The distributed node service management system coordinates and manages service functions on behalf of processor nodes of the distributed computing system. Other features and aspects may be realized, depending upon the particular application.Type: ApplicationFiled: May 5, 2017Publication date: August 24, 2017Applicants: International Business Machines Corporation, International Business Machines CorporationInventors: Joseph W. Dain, Stefan Lehmann, Dan Melamed
-
Publication number: 20170244795Abstract: The present invention includes a wireless communication method and device comprising a one-to-one exchange of wireless electronic device identifications or unique profile IDs between a sending and a receiving party who are both registered users of the electronic business/personal card service and further comprising upload of the wireless electronic identifications to a data server computer system wherein said system matches said identifications with those of registered users and said computer system displays information about the user associated with each identification.Type: ApplicationFiled: January 3, 2017Publication date: August 24, 2017Inventor: Dan COFFING
-
Publication number: 20170244796Abstract: Systems and methods are disclosed for analyzing a plurality of clickstreams associated with a resource to identify popular navigational patterns traversed by users of the resource. The analysis provides a navigational framework for performing continued analysis on segmented portions of the identified navigational patterns. To facilitate the analysis, clickstreams associated with the resource are analyzed to identify sets of clickstreams that have a common group of assets with which users of the resource interacted. Navigational patterns, which include commonly traversed series of assets interacted with by the users, are determined for the identified sets. The navigational pattern is then provided to identify popular navigational patterns traversed by users of the resource.Type: ApplicationFiled: February 18, 2016Publication date: August 24, 2017Inventors: ZHICHENG LIU, ALAN WILSON, MATTHEW HOFFMAN, LUBOMIRA DONTCHEVA
-
Publication number: 20170244797Abstract: Systems, methods, and apparatus to identify media devices are disclosed. An example method includes establishing a table of device identifiers and respective media access control (MAC) addresses corresponding to devices on a home network, the device identifiers provided by a panelist associated with the home network during a registration process. The home network is monitored for a network communication sent by a requesting device separate from a network communications monitor, the network communications monitor installed in the home network associated with a panelist home. A device identifier of the requesting device is identified from the table of device identifiers and respective MAC addresses based on a MAC address of the requesting device. In response to a failure to identify the device identifier, the panelist is prompted to provide the device identifier for the requesting device.Type: ApplicationFiled: May 5, 2017Publication date: August 24, 2017Inventor: Jan Besehanic
-
Publication number: 20170244798Abstract: A method for managing push notifications on portable devices. The method includes receiving an indication from a user of a mobile device to initiate a notification rule at a first time. The method further includes identifying a context for initiation of the notification rule, wherein the context includes at least one application of the mobile device that is executing on the mobile device at the first time. The method further includes determining whether the context is present at a second time. The method further includes, responsive to determining the context is present at the second time, initiating the notification rule.Type: ApplicationFiled: February 18, 2016Publication date: August 24, 2017Inventors: Lisa Seacat DeLuca, Dana L. Price, Aaron J. Quirk, Shelbee D. Smith-Eigenbrode
-
Publication number: 20170244799Abstract: Various embodiments of the invention disclosed herein provide techniques for transforming and distributing data in a distributed computing system. New data types are created on-demand by deriving, transforming, and aggregating data from already existing data sources. A data transformation engine identifies a first subscription request received from a first subscriber for a first resource included in a plurality of resources. The data transformation engine determines that the first resource is not available from any publisher included in a plurality of publishers. The data transformation engine generates a transformation rule that transforms a set of second resources available from a set of first publishers included in the plurality of publishers into the first resource. The data transformation engine transforms the set of second resources into the first resource based on the inferred transformation rule. The data transformation engine publishes the first resource to the first subscriber.Type: ApplicationFiled: February 24, 2016Publication date: August 24, 2017Inventors: Daniel SCHONFELD, Paolo MARESCA
-
Publication number: 20170244800Abstract: An example peripheral device implementation system and associated methods are described. The example peripheral device implementation system includes a central database, a peripheral service including a peripheral service interface, a communication platform, non-transitory computer-readable medium, and a processing device. The processing device can be configured to establish communication between a cloud environment and the central database, the peripheral service, and a client device. The processing device can be configured to establish communication between a peripheral device and the cloud environment, and automatically perform a self-registration of the peripheral device to the cloud environment.Type: ApplicationFiled: February 17, 2017Publication date: August 24, 2017Inventor: Rohit Magazine
-
Publication number: 20170244801Abstract: A method includes generating, at a media device, a user profile based on first data received from a portable device. The first data indicates media content sent to a display device of the portable device by an application on the portable device. The method includes recording, via the media device, a media content item from a content source, where the media content item is selected based on the user profile. The method also includes sending the media content item from the media device to the portable device via a local area network. The portable device stores the media content item at a pre-cache memory to enable the portable device to playback the media content item from the pre-cache memory when the portable device is not able to communicate via the local area network.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventor: Arthur Richard Brisebois
-
Publication number: 20170244802Abstract: Apparatuses, methods, and program products are disclosed for pre-caching streaming content. One apparatus includes a processor, and a memory that stores code executable by the processor. The code is executable by the processor to determine to perform pre-caching of streaming content. The code is also executable by the processor to determine a streaming content to pre-cache. The code is executable by the processor to pre-cache the streaming content.Type: ApplicationFiled: February 24, 2016Publication date: August 24, 2017Inventors: Russell Speight VanBlon, Scott Wentao Li, Joaquin F. Luna
-
Publication number: 20170244803Abstract: A web browser (20) at a client (12) generates a request (26) for content from an origin server (18). A cache server (16) intercepts the request and examines the request to determine whether the request should be transformed. More specifically, the cache server compares transform criteria (40) to a uniform resource identifier portion (28) and a header portion (30) associated with the request. By transforming the request such that information in the header portion is included in the uniform resource identifier portion, the cache server can cache the content associated with the request using the uniform resource identifier portion of the request.Type: ApplicationFiled: April 22, 2017Publication date: August 24, 2017Applicant: Parallel Networks, LLCInventor: Avinash C. Saxena
-
Publication number: 20170244804Abstract: A computer-implemented method, operable with a content delivery network (CDN) uses late binding of caching policies; by a caching node in the CDN, in response to a request for content, determining if the content is cached locally. When it is determined that said content is cached locally, then: determining a current cache policy associated with the content; and then determining, based on said current cache policy associated with the content, whether it is acceptable to serve the content that is cached locally; based on said determining, when it is not acceptable to serve the content that is cached locally, obtaining a new version of the content and then serving the new version of the content, otherwise when it is acceptable to serve the content that is cached locally, serving the content that is cached locally.Type: ApplicationFiled: May 8, 2017Publication date: August 24, 2017Inventors: Christopher Newton, William Crowder
-
Publication number: 20170244805Abstract: Systems, methods, and non-transitory computer-readable media can obtain a set of configuration options for an event, the configuration options specifying information for grouping users that are participating in the event. A determination is made that a set of users have confirmed their participation in the event. Each user in the set is assigned to a respective group based at least in part on one or more criteria specified in the configuration options for the event. Each user assigned to a group is provided with information describing at least their respective group.Type: ApplicationFiled: February 23, 2016Publication date: August 24, 2017Inventors: David Thomas Callies, Christopher William Dentel