Patent application number | Description | Published |
20090234948 | Using Multiple Servers to Divide a Virtual World - Embodiments of the invention provide a method for distributing data from within a virtual world to multiple hosts. In one embodiment, primary areas within the virtual world may be hosted on servers controlled by the provider of the virtual world. At the same time, some areas within the virtual world may be controlled by a second party and hosted by a secondary server. In the virtual environment, an interface may be provided to access the area controlled by the second party. | 09-17-2009 |
20090235191 | Method for Accessing a Secondary Virtual Environment from Within a Primary Virtual Environment - Embodiments of the invention provide a method for distributing data from within a virtual world to multiple hosts. In one embodiment, primary areas within the virtual world may be hosted on servers controlled by the provider of the virtual world. At the same time, some areas within the virtual world may be controlled by a second party and hosted by a secondary server. In the virtual environment, an interface may be provided to access the area controlled by the second party. | 09-17-2009 |
20090320134 | Detecting Secondary Infections in Virus Scanning - A method, computer program product or computer system for scanning files in a computer system to detect additional infected files of a computer virus when a first infected file of the computer virus is identified, includes maintaining a friends tree for each file in the computer system, maintaining a search tree using the friends trees for scanning the files, searching the files listed in the search tree for the additional infected files, and quarantining the additional infected files detected in the searching. | 12-24-2009 |
20090328034 | ESTABLISHING A BI-DIRECTIONAL GRID COMPUTING NETWORK - A method of establishing a bi-directional grid computing network includes submitting a processing job from a job requester to a central repository, querying nodes associated with the job requester to process the processing job, identifying suitable nodes associated with the job requester to process the processing job, transmitting the processing job from the job requester to at least one of the suitable nodes associated with the job requester, processing the processing job on the at least one suitable node associated with the job requester, and returning results from processing the processing job to the job requester. | 12-31-2009 |
20100228558 | Aggregate Content-Based Advertising - Techniques are disclosed selecting a targeted advertisement to present to an individual, based upon the product preference of others and the individual's relationships with others. By analyzing content such as images and text, an individual's interest in a product or an individual's relationship with another person may be determined. Generally, a profile may store the above information and a relational product grid may provide an organized description of the relationships and product interests. The salability of a given product to a particular individual may be determined by analyzing the relational product grid. Based upon the salability, advertisers may decide whether to advertise a product to an individual. Thus, by leveraging personal relationship data, advertisers may expand their targeted advertising campaigns. | 09-09-2010 |
20100332912 | VISUAL FEEDBACK SYSTEM FOR USERS USING MULTIPLE PARTITIONS ON A SERVER - Systems, methods and articles of manufacture are disclosed for conveying which hardware components of a logically partitioned computer system are assigned to a selected logical partition of the computer system. Partition information for the computer system may be received. Further, a request may be received from a user to view which hardware components of the computer system are assigned to a selected logical partition of the computer system. Based on the received partition information, hardware components may be determined that are assigned to the selected logical partition. Based on the determined hardware components, a virtual model of the computer system may be generated that visually distinguishes hardware components assigned to the selected logical partition from hardware components not assigned to the selected logical partition. Responsive to the request, the virtual model may be output to a graphical display device. | 12-30-2010 |
20120131480 | MANAGEMENT OF VIRTUAL MACHINE SNAPSHOTS - A virtual machine snapshot mechanism takes snapshots of virtual machines on a computer system, generates relationships between a snapshot and resources on the computer system, and provides a graphical display of one or more snapshots that allow visually determining which snapshots include which resources. A user may search the snapshots based on user-specified criteria. If an exact match is not available, and closest match is identified in the graphical display. | 05-24-2012 |
20120192251 | DETERMINING TRUST DATA FOR DEVICES IN A NETWORK - In an embodiment, a first device detects a first interaction between the first device and a second device. The first device assigns a first rating of the first interaction. The first device calculates an internal trust for the second device based on the first rating and a first time since the occurrence of the first interaction. The first device receives trust data from a third device. The first device calculates a community trust for the second device based on the trust data and an internal trust that the first device has for the third device. The first device calculates a total trust that the first device has for the second device based on the community trust and the internal trust that the first device has for the second device. If the total trust is less than a minimum threshold, the first device disallows a second interaction. | 07-26-2012 |
20120330993 | CONTACT RECOMMENDATION SYSTEM FOR A USER COMMUNICATION - Techniques are described for allowing a first user to efficiently send contact information to a second user using a user communication of a messaging application such as email programs, instant messaging programs, social media websites, or chat rooms. The messaging application may maintain a name database that stores names that are relevant to a first user. When the first user then types or speaks a name into a user communication (e.g., an email, instant message, or voice message), the messaging application provides the first user with the names stored in the name database that match the name in the user communication. Additionally, the messaging application may use ranking data associated with each matched name to order the names according to relevance. The first user can then select the correct name (if there are multiple matched names) which prompts the messaging application to automatically send contact information to the intended recipient of the user communication either within the current user communication or in a separate communication. In this manner, the first user is able to efficiently send contact information of relevant names to a recipient. The recipient may then use the contact information to communicate with the suggested contact. | 12-27-2012 |
20130121135 | DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130121166 | DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130121175 | MITIGATING EFFECTS OF PREDICTED FAILURES IN A MOBILE NETWORK BASESTATION DUE TO WEATHER - Basestation equipment in a mobile data network is subject to harsh environmental conditions at many remote locations. International Business Machines Corporation (IBM) has introduced a Mobile Internet Optimization Platform (MIOP) appliance, referred herein as the MIOP@NodeB. This appliance is placed at the edge or basestation of a mobile data network to provide a platform for hosting applications and enhancing mobile network services. The introduction of an edge appliance provides a platform for additional reliability functions. A predictive failure mechanism in the basestation appliance mitigates the effects of predicted failures in a mobile network basestation due to weather conditions. The predictive failure mechanism considers historical data, ambient environmental conditions, weather alerts and weather forecasts to take pre-emptive action to avert partial or total failure of the basestation equipment. | 05-16-2013 |
20130121324 | DATA CACHING AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. An edge caching mechanism is provided within a basestation to perform caching of data at the edge of the mobile data network. The edge caching mechanism analyzes historical usage data that indicates historical accesses to the basestation. Data patterns in the historical usage data may be used to define cache load criteria and to optionally define cache flush criteria. This architecture allows caching of data at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130122856 | DATA CACHING AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. An edge caching mechanism is provided within a basestation to perform caching of data at the edge of the mobile data network. The edge caching mechanism analyzes historical usage data that indicates historical accesses to the basestation. Data patterns in the historical usage data may be used to define cache load criteria and to optionally define cache flush criteria. This architecture allows caching of data at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 05-16-2013 |
20130122894 | MITIGATING EFFECTS OF PREDICTED FAILURES IN A MOBILE NETWORK BASESTATION DUE TO WEATHER - Basestation equipment in a mobile data network is subject to harsh environmental conditions at many remote locations. International Business Machines Corporation (IBM) has introduced a Mobile Internet Optimization Platform (MIOP) appliance, referred herein as the MIOP@NodeB. This appliance is placed at the edge or basestation of a mobile data network to provide a platform for hosting applications and enhancing mobile network services. The introduction of an edge appliance provides a platform for additional reliability functions. A predictive failure mechanism in the basestation appliance mitigates the effects of predicted failures in a mobile network basestation due to weather conditions. The predictive failure mechanism considers historical data, ambient environmental conditions, weather alerts and weather forecasts to take pre-emptive action to avert partial or total failure of the basestation equipment. | 05-16-2013 |
20130155835 | APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 06-20-2013 |
20130155843 | AUTONOMIC ERROR RECOVERY FOR A DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - A mechanism provides autonomic recovery for a breakout appliance at the edge of a mobile data network from a variety of errors using a combination of hardware, software and network recovery actions. The recovery actions proceed upon a sliding scale depending on the severity of the problem to achieve the goals of minimizing disruption to traffic flowing through the NodeB while also maintaining an acceptable cost of ownership/maintenance of the system by automatically recovering from as many problems as possible. The error recovery functions within the breakout system hide the error recovery complexities from the management system upstream in the mobile data network. For critical, non-recoverable errors, the autonomic recovery mechanism works in conjunction with a fail-to-wire module to remove the breakout system in the event of a failure in such a way that the mobile data network functions as if the breakout system is no longer present. | 06-20-2013 |
20130155873 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 06-20-2013 |
20130157616 | APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 06-20-2013 |
20130157644 | AUTONOMIC ERROR RECOVERY FOR A DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - A mechanism provides autonomic recovery for a breakout appliance at the edge of a mobile data network from a variety of errors using a combination of hardware, software and network recovery actions. The recovery actions proceed upon a sliding scale depending on the severity of the problem to achieve the goals of minimizing disruption to traffic flowing through the NodeB while also maintaining an acceptable cost of ownership/maintenance of the system by automatically recovering from as many problems as possible. The error recovery functions within the breakout system hide the error recovery complexities from the management system upstream in the mobile data network. For critical, non-recoverable errors, the autonomic recovery mechanism works in conjunction with a fail-to-wire module to remove the breakout system in the event of a failure in such a way that the mobile data network functions as if the breakout system is no longer present. | 06-20-2013 |
20130159322 | CONTACT RECOMMENDATION SYSTEM FOR A USER COMMUNICATION - Techniques are described for allowing a first user to efficiently send contact information to a second user using a messaging application such as email programs, instant messaging programs, social media websites, or chat rooms. The messaging application may maintain a name database that stores names relevant to a first user. When the first user then inputs a name into a user communication (e.g., an email, instant message, or voice message), the messaging application provides the first user with the names stored in the name database that match the name in the user communication. Additionally, the messaging application may use ranking data associated with each matched name to order the names according to relevance. The first user can then select the correct name (if there are multiple matched names) which prompts the messaging application to automatically send contact information to the intended recipient of the user communication. | 06-20-2013 |
20130160085 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 06-20-2013 |
20130163413 | LAYERED CONTROL OF SERVICE INTERFACE FOR A BREAKOUT COMPONENT IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system. | 06-27-2013 |
20130165177 | LAYERED CONTROL OF SERVICE INTERFACE FOR A BREAKOUT COMPONENT IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The breakout component includes a service interface that performs primary control by one system, and backup control by a different system. | 06-27-2013 |
20130198641 | PREDICTIVE METHODS FOR PRESENTING WEB CONTENT ON MOBILE DEVICES - Once a computing device receives a request to display a webpage, the device may use criteria to determine the portion of the page that is likely to be the most relevant to the user. The computing device may then zoom in (i.e., adjust the relative size and position of the elements in the webpage) and pan or scroll through the webpage such that the most relevant portion is displayed. Additionally, the computing device may superimpose on the displayed portion of the webpage links that represent other portions of the webpage that are currently not displayed but are relevant to the currently displayed portion. Selecting a link causes the computing device to display the corresponding portion. Furthermore, as the user zooms out, the computing device may also highlight hotspots or points of interests for the new content that is being displayed. | 08-01-2013 |
20130208580 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 08-15-2013 |
20130208674 | HOSTING EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 08-15-2013 |
20130265868 | HOSTING DEVICE-SPECIFIC EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts edge applications, including third party edge applications, that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 10-10-2013 |
20130265936 | HOSTING DEVICE-SPECIFIC EDGE APPLICATIONS AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation, and hosts device-specific edge applications that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. | 10-10-2013 |
20140010075 | OVERLOAD DETECTION AND HANDLING IN A DATA BREAKOUT APPLIANCE AT THE EDGE OF A MOBILE DATA NETWORK - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. The appliance includes overload detection and handling within the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network. | 01-09-2014 |
20140022985 | OFFLOADING RUNNING A NEEDED EDGE APPLICATION TO A NEIGHBORING BASESTATION IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network that includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation connected to user equipment, and hosts edge applications that perform one or more mobile network services at the edge of the mobile data network. When a breakout component is not running a needed edge application, and the needed edge application is running in a neighboring basestation, the breakout component can route the request for the needed edge application to the neighboring basestation via the overlay network. The neighboring basestation processes the request using the needed edge application, then returns the data to the original basestation via the overlay network. The original basestation thus maintains the subscriber session with the user equipment while offloading the work of the needed application to a neighboring basestation. | 01-23-2014 |
20140023036 | METHOD FOR TRANSFERRING A SESSION FOR USER EQUIPMENT TO A DIFFERENT BASESTATION RUNNING A NEEDED EDGE APPLICATION - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation connected to user equipment, and hosts edge applications that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. When a breakout component is not running a needed edge application, the session for the user equipment may be transferred to a neighboring basestation that is running the needed edge application. | 01-23-2014 |
20140023037 | TRANSFERRING A SESSION FOR USER EQUIPMENT TO A DIFFERENT BASESTATION RUNNING A NEEDED EDGE APPLICATION - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A breakout component in the radio access network breaks out data coming from a basestation connected to user equipment, and hosts edge applications that perform one or more mobile network services at the edge of the mobile data network based on the broken out data. When a breakout component is not running a needed edge application, the session for the user equipment may be transferred to a neighboring basestation that is running the needed edge application. | 01-23-2014 |
20140036690 | AGGREGATED APPLIANCE IN A MOBILE DATA NETWORK - A mobile data network includes a breakout appliance at the edge of the mobile data network and an appliance in the core network that includes multiple enclosures. Each appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliances without revealing details regarding the hardware and software used to implement the appliances. An aggregate appliance in the mobile data network defines high-level commands, which each have a corresponding set of steps that are performed when the high-level command is executed. Each step causes one or more of the defined commands to be executed on the breakout appliance and/or the appliance in the core network and/or one a related software entity. This aggregated appliance allows configuring and controlling the breakout appliance and the appliance in the core network in a way that is transparent to most existing components in the mobile data network. | 02-06-2014 |
20140038154 | AUTOMATIC EBOOK READER AUGMENTATION - Method, system, and computer program product for performing an operation for automatic electronic book augmentation. The operation presents an electronic book via a display screen of an electronic device, and identifies user preferences. The operation then determines a current reading position of a user within the electronic book. The operation then identifies, based on the user's current reading position, a context within the electronic book. The operation then identifies, based on the context and the user preferences, sensory effects to enhance the user's experience. The operation then outputs the sensory effects. | 02-06-2014 |
20140038583 | AGGREGATED APPLIANCE IN A MOBILE DATA NETWORK - A mobile data network includes a breakout appliance at the edge of the mobile data network and an appliance in the core network that includes multiple enclosures. Each appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliances without revealing details regarding the hardware and software used to implement the appliances. An aggregate appliance in the mobile data network defines high-level commands, which each have a corresponding set of steps that are performed when the high-level command is executed. Each step causes one or more of the defined commands to be executed on the breakout appliance and/or the appliance in the core network and/or one a related software entity. This aggregated appliance allows configuring and controlling the breakout appliance and the appliance in the core network in a way that is transparent to most existing components in the mobile data network. | 02-06-2014 |
20140040711 | AUTONOMOUS GADGET MANAGEMENT SYSTEM - Techniques are described for outputting web page components, or gadgets, on a web page or other graphical user interface. A gadget automatically conforms to particular styles based on the styles of the other gadgets and of controlling relationships to the other gadgets that are determined from page analysis and other policies. | 02-06-2014 |
20140040880 | APPLICATION DEPLOYMENT IN HETEROGENEOUS ENVIRONMENTS - Techniques are disclosed for evaluating an application to determine a processing environment suited for executing the application. A request may be received to execute the application. If execution data identified for the application do not satisfy a first set of criteria, the application is deployed for execution on a first processing environment. If the execution data satisfy the first set of criteria, the application is deployed for execution partially in time on a second processing environment, based on the execution data. The second processing environment provides a higher capability than the first processing environment in terms of at least one resource type. | 02-06-2014 |
20140278360 | PRESENTING KEY DIFFERENCES BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to identify differences between different media formats of a media title, by identifying at least one component of each of the different media formats of the media title, the at least one component comprising a unit of the media title, annotating a respective text transcription of each of the different media formats of the media title to include at least one attribute of the respective at least one component, computing a difference score for a first component of a first media format of the media title relative to each of the remaining different media formats of the media title, and upon determining that the difference score for the first component relative to a second media format of the media title exceeds a predefined threshold, creating an indication that the first component of the first media format is different from the second media format. | 09-18-2014 |
20140281982 | PRESENTING KEY DIFFERENCES BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to present differences between a plurality of different media formats of a single media title, by presenting the media title in a first media format, of the plurality of different media formats, monitoring a progress of the presentation of the media title in the first format, identifying a first difference between the first media format and a second media format, of the plurality of different media formats of the media title, and providing an indication of the first difference based on the progress of the presentation of the media title in the first media format. | 09-18-2014 |
20140281989 | SYNCHRONIZING PROGRESS BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to resume playback between different media formats of a media title, by monitoring progress of a user consuming the media title in a first media format, differences existing between the first media format and the different media formats, responsive to the user stopping consumption of the media title in the first media format, computing a stopping point in the first media format, identifying at least one resume point for each of the different media formats, computing a similarity score for each identified resume point based on a similarity of the stopping point in the first media format and each identified resume point, and upon determining that the user has triggered an indication to consume the media title in a second media format, resuming playback of the media title at a resume point for the second media format having the highest similarity score. | 09-18-2014 |
20140282573 | RESOLVING DEPLOYMENT CONFLICTS IN HETEROGENEOUS ENVIRONMENTS - Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is resolved between the first application and at least a second application. | 09-18-2014 |
20140282582 | DETECTING DEPLOYMENT CONFLICTS IN HETEROGENOUS ENVIRONMENTS - Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is detected between the first application and at least a second application. | 09-18-2014 |