Patent application number | Description | Published |
20140330764 | BATTERY DRAIN ANALYSIS AND PREDICTION FOR WIRELESS DEVICES - Technologies for wireless device battery analysis and prediction are disclosed. A described technology includes extracting first attributes associated with first applications; collecting data samples from wireless devices that are configured to execute one or more of the first applications, each of the data samples including (i) one or more application identifiers identifying one or more processes executing on a wireless device during a time duration, and (ii) battery drain information associated with the time duration; determining battery usage characteristics of the extracted first attributes based on correlations among a portion of the data samples; extracting second attribute(s) associated with a second application; identifying one or more of the extracted first attributes that correspond respectively to the second attribute(s); and using one or more of the determined battery usage characteristics that correspond respectively to the one or more identified first attributes to determine a battery usage profile for the second application. | 11-06-2014 |
20150161633 | TREND IDENTIFICATION AND REPORTING - Technologies related to data analysis and reporting are disclosed. Data is gathered from multiple social media sources, including gathering data related to issues that users are experiencing related to the use of a deployed device. Trending data is identified based at least in part on an analysis of the gathered data. The trending data is classified into categories. Data similarity between the trending data in a respective category is measured to create groups. Groups and information related to issues associated with a given group are reported. | 06-11-2015 |
20150207813 | Techniques for sharing network security event information - This disclosure provides techniques for pooling and searching network security events reported by multiple sources. As information representing a security event is received from one source, it is searched against a central or distributed database representing events reported from multiple, diverse sources (e.g., different client networks). Either the search or correlated results can be filtered and/or routed according at least one characteristic associated with the networks, for example, to limit correlation to events reported by what are presumed to be similarly situated networks. The disclosed techniques facilitate faster identification of high-relevancy security event information, and thereby help facilitate faster threat identification and mitigation. Various techniques can be implemented as standalone software (e.g., for use by a private network) or for a central pooling and/or query service. This disclosure also provides different examples of actions that can be taken in response to search results. | 07-23-2015 |