Holt, WA
Beau Hodges Holt, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20150071542 | AUTOMATED REDACTION - In embodiments, one or more computer-readable media may have instructions stored thereon which, when executed by a processor of a computing device provide the computing device with a redaction module. The redaction module may be configured to receive a request to redact a selection of text from a document and identify instances of the text occurring within the document through an analysis of word coordinate information of an image of the document. The redaction module may further be configured to generate redaction information, including redaction coordinates, the redaction coordinates may be based on the word coordinate information associated with respective instances of the text occurring within the document. The redactions, when applied to the image in accordance with the redaction coordinates, may redact the respective instances of the text. Other embodiments may be described and/or claimed. | 03-12-2015 |
Brandon Holt, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140047452 | Methods and Systems for Scalable Computing on Commodity Hardware for Irregular Applications - A computing system for scalable computing on commodity hardware is provided. The computing system includes a first computing device communicatively connected to a second computing device. The first computing device includes a processor, a physical computer-readable medium, and program instructions stored on the physical computer-readable medium and executable by the processor to perform functions. The functions include determining a first task associated with the second computing device and a second task associated with the second computing device are to be executed, assigning execution of the first task and the second task to the processor of the first computing device, generating an aggregated message that includes (i) a first message including an indication corresponding to the execution of the first task and (ii) a second message including an indication corresponding to the execution of the second task, and sending the aggregated message to the second computing device. | 02-13-2014 |
Clancy Holt, Chehalis, WA US
Patent application number | Description | Published |
---|---|---|
20080302351 | Gas-Fired Portable Heater - A portable gas fired heater includes a combustion chamber having an air inlet and an air outlet. A low DC voltage (optionally AC voltage) fan or blower directs air through the combustion chamber so that the air is heated. Preferably, a vortex generator is located between the fan or blower and the combustion chamber such that air entering the combustion chamber swirls. The heater is designed to have a low center of gravity and thus difficult to tip-over. Nevertheless, several safety features are provided including a tip-over switch, thermal coupler, temperature limit switch, and a manual shutoff. | 12-11-2008 |
Erik Holt, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090025067 | GENERIC EXTENSIBLE PRE-OPERATING SYSTEM CRYPTOGRAPHIC INFRASTRUCTURE - A cryptographic device protocol provides a generic interface allowing pre-OS applications to employ any of a variety of cryptographic devices within the pre-OS environment. The generic interface can be used independent of the specific cryptographic devices and is independent of the cryptographic or hashing algorithms used by each device. Cryptographic functions may be performed in the pre-OS environment by pre-OS applications communicating with cryptographic device drivers using the cryptographic device protocol that is independent of the cryptographic devices. Each cryptographic device may be identified by a unique device identifier and may have a number of keys available to it, with each key being identified by a unique key identifier. | 01-22-2009 |
20100082987 | TRANSPARENT TRUST VALIDATION OF AN UNKNOWN PLATFORM - A transparent trust validation of an unknown platform can be performed by communicationally coupling it to a trusted device, such as a portable peripheral device carried by a user, or one or more remote computing devices. Information from the unknown platform can be obtained by boot code copied to it from the trusted device and such information can be validated by the trusted device. The trusted device can then provide an encrypted version of decryption key to the boot code which can request the Trusted Platform Module (TPM) of the unknown platform to decrypt and return the decryption key. If the information originally obtained from the unknown platform and validated by the trusted device was authentic, the TPM will be able to provide the decryption key to the boot code, enabling it to decrypt an encrypted volume comprising applications, operating systems or other components. | 04-01-2010 |
20110099625 | TRUSTED PLATFORM MODULE SUPPORTED ONE TIME PASSWORDS - A Trusted Platform Module (TPM) can be utilized to implement One Time Password (OTP) mechanisms. One or more delegation blobs can be created by the TPM and the delegation authentication values of the delegation blobs can be based on the version number of the delegation blobs. A data blob with a protected secret can comprise a pointer to the delegation table of the TPM. The version number can be provided to an authority from which an OTP (a delegation authentication value) can be received. The OTP can be utilized to gain access to the secret and an authentication value of the key blob, which can be utilized to increase the version number of all associated delegation blobs. Policy limitations can be associated with the delegation blobs and can be enforced by policy enforcement mechanisms that can reference the TPM tick counter to enforce temporal policy restrictions. | 04-28-2011 |
20110167503 | TPM-BASED LICENSE ACTIVATION AND VALIDATION - A Trusted Activation License (TAL) can be comprised of a key unique to a Trusted Platform Module (TPM) and identifying information of the software applications bundled with the computing device having that TPM. To activate the software applications, the identifying information in the TAL can be compared against that of the software applications being activated, and the unique TPM key in the TAL can be compared against that of the TPM on the computing device on which the activation is taking place. Subsequent validations can be based on a protected association between the TAL and an Attestation Identity Key (AIK) that can be generated by the TPM as part of the activation step. Optionally, Platform Configuration Registers (PCRs) of the TPM can be periodically changed during validation to protect against useage of one TPM for validations on multiple computing devices. | 07-07-2011 |
Erik L. Holt, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20110099367 | KEY CERTIFICATION IN ONE ROUND TRIP - Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client that requests the certificate. The client creates a certificate request, and then has the TPM create an attestation identity key (AIK) that is bound to the certificate request. The client then asks the TPM to sign the new key as an attestation of non-migratability. The client then sends the certificate request, along with the attestation of non-migratability to the CA. The CA examines the certificate request and attestation of non-migratability. However, since the CA does not know whether the attestation has been made by a trusted TPM, it certifies the key but includes, in the certificate, an encrypted signature that can only be decrypted using the endorsement key of the trusted TPM. | 04-28-2011 |
Erik L. Holt, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100095120 | TRUSTED AND CONFIDENTIAL REMOTE TPM INITIALIZATION - Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running. | 04-15-2010 |
20140089664 | TRUSTED AND CONFIDENTIAL REMOTE TPM INITIALIZATION - Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running. | 03-27-2014 |
Erik Lee Holt, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090031408 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 01-29-2009 |
20110176682 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20110179282 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20110179283 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 07-21-2011 |
20130290724 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 10-31-2013 |
20130297944 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 11-07-2013 |
20150149782 | INTEGRITY PROTECTED SMART CARD TRANSACTION - Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN′ value based on a user-specified PIN and a modifier and using the PIN′ value for unlocking the smart card. | 05-28-2015 |
James A. Holt, Issaquah, WA US
Patent application number | Description | Published |
---|---|---|
20100250643 | Platform for Societal Networking - Described is a technology in which a platform unifies various social network and alerting mechanisms to provide a relationship-based communication network. An affiliation service allows organizations and individuals to connect, grant permissions and share useful information about themselves in the form of relationship-based and other attributes. A publishing service routes that information to the correct recipients, including by matching desired attributes to attributes of clients recipients. A data exchange service facilitates reporting, routing, monitoring and responding to such information, as well as providing relevant external data feeds to clients. In this manner, users and organizations are able to more easily connect and work together to resolve societal problems via a single platform that facilitates user and organizational participation. | 09-30-2010 |
James A. Holt, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20140016113 | DISTANCE SENSOR USING STRUCTURED LIGHT - The subject disclosure is directed towards a distance sensor that outputs one or more (e.g., infrared) light patterns from a transmitting element. Signals from any reflective entity (e.g., a surface or object) within the sensor's range are captured by a receiving element. The captured image is digitized into digital data representing each light pattern, and the digital data is processed (e.g., including using triangulation) to determine distance data of the distance sensor relative to the reflective surface. | 01-16-2014 |
Keone J. Holt, Duvall, WA US
Patent application number | Description | Published |
---|---|---|
20160142095 | MULTIPLE RADIO FREQUENCY (RF) SYSTEMS USING A COMMON RADIO FREQUENCY PORT WITHOUT AN RF SWITCH - Methods and systems are disclosed for changing between multiple radio frequency (RF) systems. The method comprising transmitting, by a first radio frequency (RF) transmitter of a first RF system, a first RF signal from an antenna, receiving, by a first RF receiver of the first RF system, a second RF signal from the antenna, and receiving, by a second RF receiver of a second RF system, the second RF signal from the antenna, wherein a first RF port of the first RF system and a second RF port of the second RF system are both connected to a common RF port of the antenna, and wherein the first and second RF systems operate with overlapping frequency bands. | 05-19-2016 |
Keone J. Holt, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130214964 | AIRCRAFT RADAR ALTIMETER STRUCTURE - Embodiments described herein are directed towards a radar altimeter for mounting onto an aircraft. The radar altimeter includes a base configured to mount to an external surface of an aircraft, the base having an inner portion and a flange disposed around the inner portion, wherein the inner portion has a generally rectangular geometry defining a long dimension and a short dimension. A chassis is mounted to the base and has a planar portion that is disposed perpendicular to a plane formed by the base. A plurality of circuit boards are mounted to the planar portion of the chassis and disposed parallel to the planar portion of the chassis. The base is configured to mount over a second aperture in the external surface of the aircraft such that the chassis and the plurality of circuit boards are placed through the aperture and are disposed inside of the aircraft. | 08-22-2013 |
Nicholas Leonard Holt, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20110270964 | USING DNS REFLECTION TO MEASURE NETWORK PERFORMANCE - A top level domain name system (DNS) server receives a DNS query from a local DNS resolver, the DNS query requesting a network address corresponding to a domain name. The top level DNS server reflects the local DNS resolver to a reflector DNS server. The reflector DNS server reflects the local DNS resolver to a collector DNS server, which in turn returns the network address to the local DNS resolver. The reflector DNS server and collector DNS server are both in the same data center, and one or more network performance measurements for communications between the local DNS resolver and the data center are determined based on the communications between the local DNS resolver and both the reflector DNS server and the collector DNS server. | 11-03-2011 |
20130159383 | APPLICATION-DRIVEN CDN PRE-CACHING - Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client application. The indicated additional content (and the desired content, if not already cached) is retrieved from an origin server. The desired content is transmitted to the client application at the user device, and the additional content is cached at the caching server. Subsequently, a second request may be received from the client application that includes a request for the additional content. The additional content, which is now cached at the caching server, is served to the client application by the caching server in response to the second request (rather than being retrieved from the origin server). | 06-20-2013 |
Nick Holt, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120203866 | PROXY-BASED CACHE CONTENT DISTRIBUTION AND AFFINITY - A distributed caching hierarchy that includes multiple edge routing servers, at least some of which receiving content requests from client computing systems via a load balancer. When receiving a content request, an edge routing server identifies which of the edge caching servers the requested content would be in if the requested content were to be cached within the edge caching servers, and distributes the content request to the identified edge caching server in a deterministic and predictable manner to increase the likelihood of increasing a cache-hit ratio. | 08-09-2012 |
20130346465 | APPLICATION ENHANCEMENT USING EDGE DATA CENTER - A management service that receives requests for the cloud computing environment to host applications, and improves performance of the application using an edge server. In response to the original request, the management service allocates the application to run on an origin data center, evaluates the application by evaluating at least one of the application properties designated by an application code author or provider, or the application performance, and uses an edge server to improve performance of the application in response to evaluating the application. For instance, a portion of application code may be offloaded to run on the edge data center, a portion of application data may be cached at the edge data center, or the edge server may add functionality to the application. | 12-26-2013 |
20140095649 | PROXY-BASED CACHE CONTENT DISTRIBUTION AND AFFINITY - A distributed caching hierarchy that includes multiple edge routing servers, at least some of which receiving content requests from client computing systems via a load balancer. When receiving a content request, an edge routing server identifies which of the edge caching servers the requested content would be in if the requested content were to be cached within the edge caching servers, and distributes the content request to the identified edge caching server in a deterministic and predictable manner to increase the likelihood of increasing a cache-hit ratio. | 04-03-2014 |
20150358401 | LOAD BALANCING WITH LAYERED EDGE SERVERS - An edge server node comprises an edge server, a DNS, and a load controller. The DNS is assigned to a layer of edge server nodes where each layer of edge server nodes has a DNS anycast IP address for the DNSs of that layer and a FQDN for that layer. The DNS either handles or offloads requests to resolve the FQDN for the assigned layer to balance the load on the edge server. A request is offloaded by returning the FQDN for another layer. The load controller monitors the load on the edge server and directs the DNS to offload requests to reduce the load on the edge server. | 12-10-2015 |
20150381757 | PROXY-BASED CACHE CONTENT DISTRIBUTION AND AFFINITY - A distributed caching hierarchy that includes multiple edge routing servers, at least some of which receiving content requests from client computing systems via a load balancer. When receiving a content request, an edge routing server identifies which of the edge caching servers the requested content would be in if the requested content were to be cached within the edge caching servers, and distributes the content request to the identified edge caching server in a deterministic and predictable manner to increase the likelihood of increasing a cache-hit ratio. | 12-31-2015 |
Robert Richard Kenneth Holt, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20120233528 | TIME-BASED VIEWING OF ELECTRONIC DOCUMENTS - Various embodiments provide techniques for time-based viewing of electronic documents. Examples of electronic documents include websites, webpages, text documents, web-based documents, and so on. In at least some embodiments, a time-based viewer is provided that enables a user to select a particular date and/or time for which to view an electronic document. The user can then navigate through the electronic document and view how the document will appear or did appear at the selected date and/or time. In at least some embodiments, a page container is provided that can include definitions for different versions of a page of an electronic document. According to some embodiments, the different versions of the page can correspond to different publication dates for the page. In some implementations, the time-based viewer can access a page container to retrieve a particular version of a page for display. | 09-13-2012 |
20130254653 | Time-Based Viewing of Electronic Documents - Various embodiments provide techniques for time-based viewing of electronic documents. Examples of electronic documents include websites, webpages, text documents, web-based documents, and so on. In at least some embodiments, a time-based viewer is provided that enables a user to select a particular date and/or time for which to view an electronic document. The user can then navigate through the electronic document and view how the document will appear or did appear at the selected date and/or time. In at least some embodiments, a page container is provided that can include definitions for different versions of a page of an electronic document. According to some embodiments, the different versions of the page can correspond to different publication dates for the page. In some implementations, the time-based viewer can access a page container to retrieve a particular version of a page for display. | 09-26-2013 |
Rohan John Holt, Edmonds, WA US
Patent application number | Description | Published |
---|---|---|
20130174702 | SYSTEMS AND METHODS FOR MINIMIZING A TOTAL NUMBER OF CUTS TO SEPARATE MEDIA INSTANCES IMAGED ONTO A MEDIA SHEET - A system and method utilizes strategies, priority rules, specifications, and comparisons to calculate the fewest number of cuts to separate individual instances from an imaged media sheet. Embodiments of the systems and methods may produce an optimal or more efficient arrangement of the media instances on an imaged media to minimize a total number of cuts to separate the instances, and thus reduce an overall cost. | 07-11-2013 |
Ronald Holt, Chehalis, WA US
Patent application number | Description | Published |
---|---|---|
20080302351 | Gas-Fired Portable Heater - A portable gas fired heater includes a combustion chamber having an air inlet and an air outlet. A low DC voltage (optionally AC voltage) fan or blower directs air through the combustion chamber so that the air is heated. Preferably, a vortex generator is located between the fan or blower and the combustion chamber such that air entering the combustion chamber swirls. The heater is designed to have a low center of gravity and thus difficult to tip-over. Nevertheless, several safety features are provided including a tip-over switch, thermal coupler, temperature limit switch, and a manual shutoff. | 12-11-2008 |
Steven C. Holt, Woodinville, WA US
Patent application number | Description | Published |
---|---|---|
20100058184 | METHODS AND SYSTEMS FOR DEPLOYING A NAVIGATION TOOL ASSOCIATED WITH A CONTINUOUS IMPROVEMENT APPROACH FOR AN ENTERPRISE - A computer-based method for accessing the various individual tools from multiple continuous improvement programs from a single user interface is described. The method includes generating a user interface with a plurality of selectable icons, each icon corresponding to a predefined continuous improvement (CI) cycle step, providing, upon receiving a user selection of one of the CI cycle steps, user selectable process steps to the user interface, providing, upon receiving a user selection of one of the process steps, user selectable tool choices to the user interface, and generating, upon receiving a user selection of one of the tool choices, at least one interactive user interface that provides at least one of an example of the tool choice and instructions relating to the use of the tool choice. | 03-04-2010 |
Steven D. Holt, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20150289580 | Protective Foot Covering Device - A protective foot covering device keeps a wearer's foot dry, particularly while showering. The device includes a boot having an upper end, a lower end and a perimeter wall coupled to and extending between the upper and lower ends. The upper end includes a peripheral edge defining an access opening into a hollow interior of the boot. The boot further includes a shaft and a vamp. The shaft is coupled to and extends downwardly from the peripheral edge. The vamp is coupled to and extends forwardly from the shaft toward a toe of the boot. The boot has a slit extending therein defining first and second overlapping sections extending through the shaft downwardly from the upper end. A sole is coupled to and covers the lower end. A coupler is attached to the boot and removably couples the first and second overlapping sections together to close the slit. | 10-15-2015 |
Todd Edward Holt, Vancouver, WA US
Patent application number | Description | Published |
---|---|---|
20100055144 | High aspect ratio template and method for producing same - Millimeter to nano-scale structures manufactured using a multi-component polymer fiber matrix are disclosed. The use of dissimilar polymers allows the selective dissolution of the polymers at various stages of the manufacturing process. In one application, biocompatible matrixes may be formed with long pore length and small pore size. The manufacturing process begins with a first polymer fiber arranged in a matrix formed by a second polymer fiber. End caps may be attached to provide structural support and the polymer fiber matrix selectively dissolved away leaving only the long polymer fibers. These may be exposed to another product, such as a biocompatible gel to form a biocompatible matrix. The polymer fibers may then be selectively dissolved leaving only a biocompatible gel scaffold with the pores formed by the dissolved polymer fibers. | 03-04-2010 |
William Gifford Holt, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20120154404 | ASSESSMENT RESULTS VIEWER - An assessment results viewer displays the results of assessments that quantify the performance of an aspect of a computing device. The viewer presents both an overview of the collected data and mechanisms for displaying ever-increasing details, including raw data itself The viewer further provides actionable information to the user that can offer the user guidance, or otherwise suggest potential courses of action. The viewer automatically aggregates multiple iterations of the same assessment to generate derivative overview data, and automatically aligns data collected by the same assessment across multiple job files. Such aggregation and alignment is performed by reference to metadata, including identifying information. Data can be presented in tabular form, and users can pivot along different axis to focus on groupings of data. | 06-21-2012 |
William Zachary Patrick Holt, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20130339500 | Simulation of Network Conditions for Video Delivery - In one embodiment, a method receives a request for a video stream of video content from a client. A playlist for the video stream is retrieved. The playlist is for a plurality of portions of video content. A traffic shaping service adjusts the playlist for a set of portions in the plurality of portions according to a set of rules where adjusting allows the service to perform traffic shaping for the set of portions. The method then sends the adjusted playlist to the client. During playback of the video content at the client, the traffic shaping service receives a request for a portion in the set of portions from the client using the adjusted playlist. The method determines a rule to apply to the portion where the rule is associated with a network condition and simulates the network condition for the portion to perform the traffic shaping service. | 12-19-2013 |
20130340022 | Architecture for Simulation of Network Conditions for Video Delivery - In one embodiment, a method includes retrieving a playlist for a video stream of video content for a client. The playlist is for portions of video content for the video stream. A traffic shaping service determines a set of rules for the playlist for a set of portions in the plurality of portions where each rule is associated with a network condition. For each rule, the method performs: dynamically allocating a port and setting a network condition to apply to the port according to the rule. During playback of the video content, the traffic shaping service receives a request for a portion from the client and determines a port associated with the request for the portion. The method then sends a traffic shaped portion through the determined port where the network condition is applied to the traffic shaped portion based on the network condition being set on the port. | 12-19-2013 |