Patents Issued in November 9, 2017
-
Publication number: 20170324777Abstract: Various embodiments pertain to techniques for injecting supplemental data into search query results delivered to an operating system. More specifically, an operating system can submit a search query to a directory server (or some other network-accessible database), and then pass results of the search query to a local proxy. The local proxy can inject supplemental data into the results. For example, the local proxy could inject bogus user account information in an effort to obfuscate an unauthorized entity who attempts to penetrate the network by parsing the results of the search query.Type: ApplicationFiled: July 13, 2017Publication date: November 9, 2017Inventors: Almog Ohayon, Guy Franco, Roi Abutbul
-
Publication number: 20170324778Abstract: Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets to the tools and uses latency-based timeouts with respect to the return of processed packets from the tools. Initially, the network system measures processing latencies for the tools and sets at least one timeout threshold based upon the processing latencies. The network system then receives an input packet from a network source, generates a timestamp, concurrently sends an output packet to the tools based upon the input packet, tracks return packets from the tools, and determines whether a timeout has occurred with respect to the timeout threshold based upon a difference between the timestamp and a current timestamp. If a timeout does not occur, a secure packet is forwarded to a network destination. If a timeout does occur, return packet tracking for the input packet is ended.Type: ApplicationFiled: May 5, 2016Publication date: November 9, 2017Inventors: Scott Register, Shardendu Pandey, Glenn Chagnot, Deepesh Arora
-
Publication number: 20170324779Abstract: A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader. A correspondence between the functional model, security implementation model, and the requirements model is analyzed, whereby the correspondence indicates that compliance/security/accreditation requirements defined in the requirement model match with security objectives implemented by controls defined by the security implementation model. Next, it is determined whether correspondence is or is not given based on the analysis of the correspondence and then evidence is generated based on the analysis of the correspondence and the determination and the impact of changes is analyzed.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventors: Ulrich Lang, Rudolf SCHREINER
-
Publication number: 20170324780Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.Type: ApplicationFiled: July 27, 2017Publication date: November 9, 2017Inventors: Charles White, Joseph Brand, Stephen Edwards
-
Publication number: 20170324781Abstract: At least one security policy is obtained from a policy creator at a controller in an SDN network. The security policy is implemented in the SDN network, via the controller,based on one or more attributes specifying a characteristic of the security policy, a role of the creator of the security policy, and a security privilege level of the role of the creator of the security policy.Type: ApplicationFiled: June 30, 2014Publication date: November 9, 2017Applicant: Alcatel LucentInventors: Zhiyuan HU, Xueqiang YAN, Zhigang LUO
-
Publication number: 20170324782Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.Type: ApplicationFiled: June 29, 2017Publication date: November 9, 2017Inventors: Gregory Branchek Roth, Matthew James Wren, Brian Irl Pratt
-
Publication number: 20170324783Abstract: An embodiment provides a user equipment that includes a processor configured to receive a Session Initiation Protocol (SIP) NOTIFY message transmitted by a network component as a result of a registration event. The SIP NOTIFY message contains at least a portion of information included in a first SIP message sent between a first user equipment and the network component. Another embodiment provides method and apparatus for a network node to determine whether filter criteria include one or more indicators that specify the need for information, and including in a second SIP message the information specified by the one or more indicators.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: Andrew Michael Allen, Jan Hendrik Lucas Bakker
-
Publication number: 20170324784Abstract: In one embodiment, a method includes determining an occurrence of a trigger event; sending a notification to the caller-user; receiving a request from the caller-user to initiate the call session; establishing the call session to enable a media stream of the caller-user to be received by the callee-user; and sending the media stream to the callee-user.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Inventors: Stephane Taine, Edward Young Zhang, Dwayne B. Mercredi, Michael Leggett, Brendan Benjamin Aronoff, Peter Henry Martinazzi, Evan Patrick Noon, Duckjin Kang, John Randall Ehrhardt
-
Publication number: 20170324785Abstract: In one embodiment, a method includes sending an availability-notification a caller-user in response to an occurrence of a trigger event; establishing a call session to enable a media stream comprising media of the caller-user that is of a first type to be received by a callee-user; sending the media of the first media type to the callee-user; re-establishing the call session to enable a media stream comprising media of the callee-user that is of a second media type to be received by the caller-user; and sending the media of the second media type to the caller-user.Type: ApplicationFiled: October 18, 2016Publication date: November 9, 2017Inventors: Stephane Taine, Edward Young Zhang, Dwayne B. Mercredi, Michael Leggett, Brendan Benjamin Aronoff, Peter Henry Martinazzi, Evan Patrick Noon, Duckjin Kang, John Randall Ehrhardt
-
Publication number: 20170324786Abstract: This disclosure is directed to an apparatus for modifying a temporal signal association in a complex computing network such that a future computing operation is intelligently executed based on the modified signal association.Type: ApplicationFiled: May 5, 2016Publication date: November 9, 2017Inventor: Jeffrey W. Mankoff
-
Publication number: 20170324787Abstract: A SIP-based method for supplementary services configuration is extended by the introduction of means for a network to service supplementary services interrogation requests from a UE by responding to a SIP INVITE sent by the UE. The response may be a SIP message and include, e.g., in the SIP message body a machine-readable representation of the interrogated service's current configuration.Type: ApplicationFiled: October 9, 2014Publication date: November 9, 2017Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventor: Anders WIDEBRANT
-
Publication number: 20170324788Abstract: Methods for providing conference service and apparatus thereof are provided, one of methods comprises, receiving identification information of a first user and identification information of a first terminal of the first user from the first terminal of the first terminal, receiving identification information of the first user and identification information of a second terminal of the first user from the second terminal of the first terminal, transmitting first contents to the first terminal of the first user and receiving at least one first reaction information about the first contents from the second terminal of the first user.Type: ApplicationFiled: May 3, 2017Publication date: November 9, 2017Applicant: SAMSUNG SDS CO., LTD.Inventors: Hee Tae YOON, Bo Mi KIM, Hwa Shin LEE, Shin LEE
-
Publication number: 20170324789Abstract: A method for processing a broadcast signal, the method includes receiving a broadcast signal via a broadcast stream, the broadcast signal including service components of a broadcast service, service signaling information for signaling the broadcast service and a service list table; parsing the broadcast signal and obtaining the service list table, the service list table including bootstrap information for indicating a Real time Object delivery over Unidirectional Transport (ROUTE) session which delivers the service signaling information; obtaining the service signaling information by using the bootstrap information, the service signaling information includes first and second metadata, wherein the first metadata is used to determine a transport mode of each of the service components, and wherein the second metadata provides session description information for accessing the service components from the broadcast stream; and obtaining the service components for the broadcast service, and providing the broadcast sType: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Applicant: LG ELECTRONICS INC.Inventors: Minsung KWAK, Jangwon LEE, Woosuk KO, Sungryong HONG
-
Publication number: 20170324790Abstract: Methods, systems, and media for presenting a notification indicating playback availability are provided.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Inventors: Jun Li, Suman Basak
-
Publication number: 20170324791Abstract: An approach is provided for quick content channel discovery, and with minimal latency, streaming of a content stream, and switching from one content stream to another content stream available from various content providers. A method includes a buffering of one or more original content streams from one or more provider sources to generate one or more buffered content streams by at least one buffering service. The method also includes determining one or more requests from at least one device to access at least one of the one or more original content streams. The method further includes, in response to the one or more requests, an initiation of a streaming of at least one of the one or more buffered content streams from the at least one buffering service to the at least one device in place of the at least one of the one or more original content streams.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventor: Mika KUULUSA
-
Publication number: 20170324792Abstract: A switching module is adapted to configure switches between source buffers and rendering pipelines. Each of the switches has one or more selection inputs each representing encoded data for a media track from one of the source buffers. Each of the switches also has a selection output associated with one of the rendering pipelines for decoding and rendering. The switching module is further adapted to use the switches to manage which of the media tracks, if any, have encoded data routed to the rendering pipelines during media streaming. The rendering pipelines can include a video rendering pipeline and one or more audio rendering pipelines, where the switching module is part of a media engine adapted to determine a clock source in one of the audio rendering pipeline(s), and the clock source is used to drive synchronization of the media tracks.Type: ApplicationFiled: July 20, 2017Publication date: November 9, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Stephen J. Estrop, Matthew Howard, Marcin Stankiewicz, Shijun Sun
-
Publication number: 20170324793Abstract: Systems and methods for automatically generating top level index files for use in adaptive bitrate streaming in accordance with embodiments of the invention are dislosed. One embodiment of the method of the invention includes receiving a request from a playback device at a playback server, where the request identifies a piece of content, retrieving a list of assets associated with the identified piece of content using the playback server, filtering the list of assets using at least one predetermined criterion using the playback server, generating a top level index file describing each asset in the filtered list of assets using the playback server, and sending the top level index file to the playback device using the playback server.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Applicant: Sonic IP, Inc.Inventors: Jason Braness, Evan Wallin, Ederson Ferreira
-
Publication number: 20170324794Abstract: Disclosed are a method of controlling a source device in a sink device and apparatus therefor. The present invention includes the steps of outputting the video data received from the source device to a display unit, recognizing a text from a screen corresponding to the video data outputted to the display unit, saving the recognized text to a memory to correspond to location information on the screen corresponding to the video data, receiving a voice signal, converting the received voice signal into a text, and if a specific text including at least one portion of the converted text exists in the recognized text, sending a message corresponding to a user input of selecting the specific text from the screen corresponding to the video data to the source device.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Applicant: LG ELECTRONICS INC.Inventors: Jeongyun JEONG, Chiho SHIN, Byounghyun SHIN
-
Publication number: 20170324795Abstract: A data transmission device mediates transmission/reception of data when delivering encrypted data between a server and a terminal device. The data transmission device includes a receiver for receiving encrypted data, a transmitter for transmitting data received by the receiver, and a controller for controlling data transmission speed depending on the amount of received data. The controller determines whether or not a series of data are subjected to initial transmission with respect to each series of data received by the receiver. Upon determining initial transmission data, the controller precludes the initial transmission data, among a series of data, from a transmission-speed limitation range so as to control the transmitter to transmit the initial transmission data. The controller limits the data transmission speed of the transmitter by way of pacing, and therefore the controller transmits data by switching between a pacing mode and a non-pacing mode.Type: ApplicationFiled: November 19, 2015Publication date: November 9, 2017Applicant: NEC CorporationInventors: Hiroko ASHIDA, Akihiko UWANO
-
Publication number: 20170324796Abstract: A method of delivering a live stream is implemented within a content delivery network (CDN) and includes the high level functions of recording the stream using a recording tier, and playing the stream using a player tier. The step of recording the stream includes a set of sub-steps that begins when the stream is received at a CDN entry point in a source format. The stream is then converted into an intermediate format (IF), which is an internal format for delivering the stream within the CDN and comprises a stream manifest, a set of one or more fragment indexes (FI), and a set of IF fragments. The player process begins when a requesting client is associated with a CDN HTTP proxy. In response to receipt at the HTTP proxy of a request for the stream or a portion thereof, the HTTP proxy retrieves (either from the archive or the data store) the stream manifest and at least one fragment index.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Applicant: Akamai Technologies, Inc.Inventors: Christopher R. Knox, Philip A. Lisiecki, James Mutton, Chuck Bernard
-
Publication number: 20170324797Abstract: The disclosure relates to an apparatus for providing low-latency real-time broadcast content in an MMT-based streaming service and a computer-readable recording medium having a related program recorded therein. According to the disclosure, when a streaming request event for an arbitrary channel occurs, the apparatus determines whether the streaming request event satisfies an event condition for switching to a low-latency real-time broadcast mode. Depending on a determination results, the apparatus transmits a streaming request to a first or second streaming server for providing a streaming service based on a first or second media transmission technique. Then the apparatus receives and decodes a first or second streaming data packet of real-time broadcast content from the first or second streaming server and plays the decoded first or second streaming data packet.Type: ApplicationFiled: June 14, 2017Publication date: November 9, 2017Inventor: Jongmin LEE
-
Publication number: 20170324798Abstract: A reception terminal is provided in a communication system including a transmission terminal that transmits packets in a real-time stream and a transfer terminal that caches and transfers packets transmitted from the transmission terminal. The reception terminal includes a receiver which receives packets, and circuitry which obtains a first available band between the reception terminal and the transfer terminal and a second available band between the reception terminal and the transmission terminal. The reception terminal includes a transmitter which transmits requests to the transfer terminal at a frequency that is based on the first available band, wherein the frequency defines how often the requests are transmitted and the requests trigger transmission of packets from the transfer terminal to the reception terminal in the first available band.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventor: Eiichi Muramoto
-
Publication number: 20170324799Abstract: A news feed system is provided to generate augmented news feed for a member of an on-line social network. When a request is detected to construct a news feed for a member in an on-line social network system, the news feed system determines a cohort of the member and, from the updates that are being presented in their respective news feeds to members of the cohort, selects a leaderboard set of updates. The leaderboard set of updates is used in constructing a news feed web page for the member.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Guy Lebanon, Zheng Li, Ying Xuan, Nikita Igorevych Lytkin
-
Publication number: 20170324800Abstract: Methods and systems may provide for detecting a sharing event with respect to an original uniform resource locator (URL) and replacing one or more characters of the original URL with a context attribute of the sharing event to obtain a modified URL. Additionally, a user prompt may be generated, wherein the user prompt includes a recommendation to substitute the modified URL for the original URL. In one example, at least a portion of the context attribute is independent of a web page associated with the original URL.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Lisa Seacat DeLuca, Dana L. Price, Aaron J. Quirk, Shelbee D. Smith-Eigenbrode
-
Publication number: 20170324801Abstract: Performing a distributed data operation. A method includes receiving a request for one or more data operations from a first computing system, such as a client. The method further includes determining a number of node endpoints that can be used to satisfy the query. Based on the number of node endpoints, the method further includes selecting a plan from the group consisting essentially of a flat data operation plan, a hierarchical data operation plan or a combination of partially flat/partially hierarchical data operation plan. The request for one or more data operations is serviced using the selected data operation plan.Type: ApplicationFiled: July 25, 2017Publication date: November 9, 2017Inventors: Cristian Petculescu, Amir Netz
-
Publication number: 20170324802Abstract: A metric data aggregator includes a processor and a data store. The processor is configured to obtain service level metric data from a plurality of proxy servers; obtain cloud level metric data from a plurality of proxy servers and at least one load balancer; aggregate the service level metric data and the cloud level metric data; and provide the aggregated service level and cloud level metric data to a remote user. The data store configured to store aggregated cloud level and service level metric data; and retrieve the aggregated service level and cloud level metric data in response to queries.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Inventors: Seungyoung Kim, Daniel Good, Sai Bathina, Ihor Bilyy
-
Publication number: 20170324803Abstract: Methods and systems are provided for testing graphical elements within a graphical user interface associated with a computer file, such as a web page. One exemplary method involves a computing device coupled to a communications network identifying a visible subset of graphical elements within a graphical user interface associated with a computer file available over the network and identifying a testable subset of the visible subset. To identify the testable subset the computing device obtains spatial display properties for each graphical element of the visible subset, performs a hit test for the respective graphical element using the spatial display properties, and retains the respective graphical element in the testable subset based on a result of the hit test corresponding to the respective graphical element. The testable subset thereby includes graphical elements that are perceptible to human users, and conversely, excludes imperceptible graphical elements.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Applicant: salesforce.com, inc.Inventor: Hilal SHAATH
-
Publication number: 20170324804Abstract: Information regarding the status of an update to a universal integrated circuit card (UICC) being performed across a mobile wireless communication network is provided to a server involved in the update process and/or to a user of the mobile communication device having the UICC. The UICC update server sends an update trigger to the mobile communication device, and the UICC initiates establishment of a communication link to receive the update. The UICC further causes a baseband processor of the mobile communication device to send a proof-of-receipt of the update trigger by short message service (SMS) messaging back to the update server. Additionally or alternatively, the UICC causes the baseband processor to send a wakeup message to a mobile device application executing on the mobile device. The wakeup message includes status information relating to the UICC update which can be provided to a user of the mobile device.Type: ApplicationFiled: July 25, 2017Publication date: November 9, 2017Applicant: Cellco Partnership d/b/a Verizon WirelessInventors: Warren Hojilla UY, Mauricio Pati Caldeira de Andrada
-
Publication number: 20170324805Abstract: Configurations for providing a multi-tier hierarchy to manage geographical data are disclosed. The subject technology identifies a first geographic location and determines where, in a geographic hierarchy, the first location belongs, including associating one or more labels with the first location. Each label is associated with a respective level in the geographic hierarchy that includes the first location. The subject technology identifies a second, different geographic location and determines where, in the geographic hierarchy, the second location belongs. One or more different number of levels in the geographic hierarchy are determined to associate with the second location than a number of levels in the geographic hierarchy associated with the first location. The subject technology associates one or more labels for the one or more different number of levels with the second location, and uses respective labels to target content delivered to users associated with the first or second locations.Type: ApplicationFiled: July 3, 2014Publication date: November 9, 2017Inventors: Amin CHARANIYA, Krzysztof Duleba, Jessica Mignone, James Thomas Dowdell, Aileen Tang, Smita Hashim, Ankur Gupta, Luuk Van Dijk
-
Publication number: 20170324806Abstract: The present invention relates to a software program in the form of a mobile application that allows the user to control an autonomous vehicle (or driverless vehicle, terms used here interchangeably) by use of a mobile device utilizing cloud servers. The effect of the use of this software program is to allow users to manipulate a motor vehicle's computer, such as locking and unlocking the car door, rolling up and down the car window's, and manipulating the car's audio, for example, all done utilizing cloud servers. By utilizing cloud servers instead of the currently utilized Bluetooth technology, the user may control a vehicle from far away, a distance far enough that radio waves cannot be used as a mean of communicating between the mobile device and the vehicle.Type: ApplicationFiled: August 18, 2015Publication date: November 9, 2017Inventor: Robert Valentin Salinas
-
Publication number: 20170324807Abstract: Embodiments disclose systems, methods, and computer program products to perform an operation for proactively sending content to mobile devices. The operation generally includes receiving, from an application executing on a mobile device, a request to access content, and identifying, from a plurality of content items, at least a first content item responsive to the request. The operation also includes determining at least a second one of the content items based at least in part on the request, a context of the mobile device and feedback regarding at least one of the content items sent to the mobile device. The operation further includes generating a response to the request that includes at least the first content item and the second content item, and sending the response to the application.Type: ApplicationFiled: May 5, 2016Publication date: November 9, 2017Inventors: Yu GU, Inseok HWANG, Su LIU, Yaoguang WEI
-
Publication number: 20170324808Abstract: Devices, methods, and systems for monitoring a building management system are described herein. One method includes monitoring an attribute of a building, monitoring an activity related to the attribute performed by an operator, and publishing the activity performed by the operator and the attribute of the building.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Inventors: Deepak Sundar M, Soumen Ghosh, Rajesh Kulandaivel Kulandaivel Sankarapandian, Raveendran Manickam, Paramesh Muthuraj, Ganesh N
-
Publication number: 20170324809Abstract: Techniques for performing intelligent load balancer selection in a multi-load balancer environment are provided. In one embodiment, a computer system can generate a user interface for deploying a virtual IP address (VIP) on a load balancer in a network environment, where the network environment includes a plurality of load balancers, and where the user interface presents a plurality of criteria for selecting one of the plurality of load balancers. The computer system can further receive, from a user, a selection of one or more of the plurality of criteria, and can collect, from each load balancer in the plurality of load balancers, statistics that are relevant to the one or more criteria. The computer system can then select a load balancer from among the plurality of load balancers based on the one or more criteria and the collected statistics.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Inventor: Dhanashri Patil
-
Publication number: 20170324810Abstract: As disclosed herein a computer-implemented method includes providing a plurality of resource allocation zones corresponding to a plurality of overcommit policies. The method further includes receiving a request for a resource for a tenant, and determining a selected overcommit policy corresponding to an anticipated resource need. The method further includes selecting a resource allocation zone for the tenant from the plurality of resource allocation zones, and providing the resource to the tenant. A computer program product and a computer system corresponding to the above method are also disclosed herein.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Ashish Billore, Sudheesh S. Kairali
-
Publication number: 20170324811Abstract: A platform for tracking external data transmissions through implementation of a data transmission inventory and registration process. The data transmission inventory provides for collection of data transmission logs and data transmission schedules from various sources throughout an enterprise. The information from the data transmission inventory is used to determine whether a pending, ongoing or completed data transmission is currently registered and, if so, whether the registration is currently valid. If a determination is made that no registration exits or the current registration is invalid, a validation/registration process ensues, whereby the data, the internal source and the external target are validated according to requisite requirements of the corresponding transmission. If validated, the data channel is deemed valid and is registered.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Mitchell T. Boston, Paul G. Roscoe, Renee M. Melin, Manu Jacob Kurian, Saritha Vrittamani
-
Publication number: 20170324812Abstract: The disclosed embodiments include data storage systems and methods to store data. In one embodiment, the system includes a storage medium having a plurality of partitions for storing data values of a dataset. The system also includes a system manager operable to receive a data value connected to the system manager and assign a plurality of data subsets of the dataset to the plurality of partitions. The system also includes a key manager operable to assign a key of a key space to each data value of the dataset. The system also includes a top layer data manager and at least one bottom layer data manager, each bottom layer data manager assigned to a data subset. The top layer data manager passes data values to the at least one bottom layer data manager. The system also includes an allocation manager operable to dynamically readjust a storage space of the partition.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Inventor: Michael Roy Stute
-
Publication number: 20170324813Abstract: A performance-based storage service level agreement (SLA) can be established that specifies one or more storage performance parameters. A storage allocation process can include receiving a request for a storage SLA that specifies one or more storage performance parameters, determining, for a virtual machine (VM) and based at least in part on the one or more storage performance parameters in the storage SLA: (i) a storage location among a set of candidate storage locations, and (ii) an amount of storage to allocate. The amount of storage can then be allocated at the storage location for the VM to use in making storage requests. Runtime enforcement of the storage SLA can utilize a scheduling mechanism that buffers individual storage requests into different queues that are used for meeting one or more storage performance requirements specified in storage SLA.Type: ApplicationFiled: May 6, 2016Publication date: November 9, 2017Inventors: Navendu Jain, Luhui Hu
-
Publication number: 20170324814Abstract: A system and method for providing data redundancy. The method includes receiving a write instruction, the write instruction including data to be written to a primary remote direct access (RDMA) storage and a primary block address corresponding to a designated primary block of the primary RDMA storage, wherein the designated primary block is associated with a primary lock stored in the primary RDMA storage; determining whether the primary lock and at least one secondary lock are obtained, wherein each secondary lock is associated with a secondary block of a distinct secondary RDMA storage; and writing the data included in the write instruction to the designated primary data block and each secondary data block associated with the obtained at least one secondary lock, when it is determined that the primary lock and the at least one secondary lock have been obtained.Type: ApplicationFiled: May 2, 2017Publication date: November 9, 2017Applicant: Excelero Storage Ltd.Inventors: Yaniv ROMEM, Ofer OSHRI, Omri MANN, Daniel Herman SHMULYAN
-
Publication number: 20170324815Abstract: The invention relates to a method for controlling an online service outside the vehicle by means of an operating device of a motor vehicle, comprising the steps: Determining an operating input performed by a user on the operating device and selecting one of several service functions of the online service depending on the operating input. This selection possibility should be adapted to the vehicle type-dependent operating concept of the motor vehicle. The operating elements available on the operating device are determined and converter data, which contain a control instruction for controlling the selection of the service function depending on operation signals of the determined operating elements, are provided. The selection of the service function then takes place depending on the operating element operated during the operating input and depending on the converter data.Type: ApplicationFiled: October 30, 2015Publication date: November 9, 2017Applicant: Audi AGInventor: Stefan SELLSCHOPP
-
Publication number: 20170324816Abstract: In one embodiment, the present invention is a method and apparatus for social networking in a dynamic environment. In one embodiment, a method for social networking in a network includes broadcasting a first set of one or more keywords representing one or more interests of a first user in the network, receiving a response from a second user in the network indicating interest in at least one of the interests of the first user, and connecting to a server in the network, where the server hosts a group for supporting communications between at least the first network user and the second network user.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Inventors: MEHRAD YASREBI, James E. Jackson
-
Publication number: 20170324817Abstract: Various aspects of this disclosure provide systems and methods for managing vehicle on-board diagnostic (OBD) data in a network of moving things. As non-limiting examples, various aspects of this disclosure provide systems and methods for interfacing with vehicle OBD systems, acquiring OBD data, communicating OBD data, and/or processing OBD data in a network of moving things, for example including OBD data of autonomous vehicles and other vehicles.Type: ApplicationFiled: February 8, 2017Publication date: November 9, 2017Inventors: Patricia Oliveira, João Gomes
-
Publication number: 20170324818Abstract: A system and method for analyzing media requests and evaluating the authenticity of geographic data associated with the media requests. A mobile device may use media requests to retrieve media items that are displayed to a user. A media request may include geographic data with latitude and longitude information and entity data identifying a user, application, mobile device, or combination thereof. The system may analyze the geographic data to identify locations and may analyze the entity information to identify user activity. The user activity may be internet activity of an application running on another device (e.g., user's desktop). The system may then correlate the user activity (e.g., accessing a venue web site) with the geographic locations (e.g., venue locations) to evaluate the authenticity of the geographic data associated with the mobile requests.Type: ApplicationFiled: May 9, 2016Publication date: November 9, 2017Inventors: Melinda Han Williams, Ori M. Stitelman
-
Publication number: 20170324819Abstract: Some listeners or viewers of online music or video may play the music or video repeatedly without actually listening to or watching the music or video, thereby wasting network resources, reducing bandwidths to other users, and slowing down or creating latency for the downloading of music or video by other users who actually listen to or watch the music or video. In some instances, owners of music or video content may encourage their fans to play the music or video repeatedly to increase their popularity ratings or copyright royalties. Inflated plays of music or video may be detected by applying one or more modifications to the music and monitoring for reactions by users, if any, to the modifications. The lack of a reaction by a user may indicate an inflated playback, whereas the presence of a reaction may indicate that the playback is legitimate.Type: ApplicationFiled: May 3, 2016Publication date: November 9, 2017Inventor: Ronit Kassis
-
Publication number: 20170324820Abstract: The social networking system monitors implicit interactions between a user and objects of the social networking system with which the user has not established a connection. Based on the implicit interactions between the user and an object, the social networking system identifies a soft connection between the user and the object. The social networking system may then identify soft connections to include in a candidate list of soft connections to recommend to the user. The social networking system may also extract signals from the set of candidate list of soft connections, and may use the extracted signals to rank the soft connections in the list of candidate soft connections. The social networking system may then recommend soft connections to the user based on the rank associated with the soft connections in the candidate list of soft connections.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventors: James Wah Hou Wong, Ashish Kumar Yadav, Jinyi Yao, Bradley Ray Green
-
Publication number: 20170324821Abstract: Among other disclosures, a method may include collecting historical communication data, personal data and usage statistics relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include depositing the collected data into a repository. The method may include presenting the usage statistics in response to user behavior.Type: ApplicationFiled: July 22, 2017Publication date: November 9, 2017Inventors: Matthew BREZINA, Adam SMITH
-
Publication number: 20170324822Abstract: Systems and techniques are disclosed for publishing related media content based on the velocity measure for media content. The velocity measure for the media content may be determined based on a change in engagement rate such as a change in rate of sharing the media content via social media. The related media content may be published on a media outlet such as a website, blog, and/or an aggregation page and the publication may provide more exposure to the media content.Type: ApplicationFiled: July 25, 2017Publication date: November 9, 2017Inventors: Peter Cashmore, Robyn Peterson, Chris Heald, Dimitri Dimoulakis, Mario Antonetti, Kevin Gisi, Darren Tome
-
Publication number: 20170324823Abstract: A server cluster and method for providing a push notification service are provided. The method includes searching for, by a management server cluster, a first push server corresponding to predetermined search criteria from among a plurality of push servers upon receiving a request to connect with a push server from a mobile terminal; providing, by the management server cluster, connection information regarding the found first push server to the mobile terminal; and delivering, by the first push server, upon generation of a notification event after connecting with the mobile terminal, event information corresponding to the push notification event to the connected mobile terminal.Type: ApplicationFiled: July 20, 2017Publication date: November 9, 2017Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ka-Ram KO, Hee SEO, Jung-Hwan CHOI, In-Gyu KIM
-
Publication number: 20170324824Abstract: An M2M communication architecture, information interaction method and apparatus are provided. The M2M communication architecture includes a first terminal side middleware and a second terminal side middleware or a network side middleware connected to the first terminal side middleware, herein the first terminal side middleware or the second terminal side middleware is located between a terminal side application and an underlying network service, the first terminal side middleware or the second terminal side middleware includes a module for resource abstraction and a module for semantic processing; the network side middleware is located between the network side application and the underlying network service, and the network side middleware includes a module for resource abstraction and a module for semantic processing.Type: ApplicationFiled: December 29, 2014Publication date: November 9, 2017Inventor: Aifang SUN
-
Publication number: 20170324825Abstract: When a user sends a request to access an asset or resource, for example a program code file or a media file, the access request can be processed by a proxy device. The proxy can use directory information obtained from a directory, for example a company-wide Lightweight Directory Access Protocol (LDAP) directory, to determine whether or not the request is from an authorized network user listed in the directory. The proxy can use management information obtained from another database to determine roles, subordinate assignment information, and access authorization information associated with the requesting user. The proxy can conditionally route the request to a resource host based on the directory information and the management information. The proxy can also transform a resource returned in response to the request by using pipeline language parameters included in a URL associated with the access request.Type: ApplicationFiled: July 24, 2017Publication date: November 9, 2017Applicant: iHeartMedia Management Services, Inc.Inventors: James M. Long, III, Travis D. Terry, Thomas Dacre Drapeau
-
Publication number: 20170324826Abstract: System and method for supporting proxy based multicast forwarding in a high performance computing environment. In accordance with an embodiment, a proxy based multicast forwarding system and method can be utilized. A proxy, either software, firmware, or hardware based, can be initialized and run within a local subnet domain, wherein the proxy is a member of at least one multicast group (MCG). The proxy can be configured to forward packets to other subnet domains in several different methods.Type: ApplicationFiled: July 21, 2017Publication date: November 9, 2017Inventors: Bjørn Dag Johnsen, Arvind Srinivasan, Bartosz Bogdanski