Patent application number | Description | Published |
20100313230 | Testing a Content-Delivery System - A content delivery networked is monitored to verify operation of control channels for the delivery of content to a customer. Monitoring includes joining a connection with at least one control channel in the network, decoding content of a signal in the control channel, determining whether the decoded content complies with a pre-determined rule corresponding to content transmitted in the control channel, and producing a report indicating whether the decoded content is compliant with the rule. In addition, a graphical user interface (GUI) displays the status and results of testing the control channel. The GUI is configured to perform generating a display representing testing status of a plurality of DSG tunnels in a first frame and test results of the DSG tunnels in a second frame and providing details of a DSG tunnel test when selected by a user. | 12-09-2010 |
20120304205 | Monitoring and Activity Reporting of Enhanced Media Content - A monitoring and analysis system is disclosed that gathers and analyzes information about distributed enhanced content delivery to end user or other equipment. The system may establish communications connections along the content delivery system, filter content received from different locations of the system, and compare the received content with an expected content characteristic. Also, a radio frequency signal from the distribution network may be converted into an Internet Protocol (IP) format by a converter so that the transformed signal may be similarly analyzed as other signals from the system. A report may be consequently generated that is indicative of the received enhanced content and any detected discrepancies with respect to expected enhancement events. Identification of the enhanced content may be based on the program association table and the program map table in order to determine the packet ID of the application signals. | 11-29-2012 |
20130018632 | Monitoring and Using Telemetry DataAANM Field; BrianAACI EvergreenAAST COAACO USAAGP Field; Brian Evergreen CO USAANM Van Doorn; JanAACI Castle RockAAST COAACO USAAGP Van Doorn; Jan Castle Rock CO USAANM Kiok; JosephAACI West ChesterAAST PAAACO USAAGP Kiok; Joseph West Chester PA USAANM Groustra; DanielAACI LittletonAAST COAACO USAAGP Groustra; Daniel Littleton CO USAANM Torluemke; MarkAACI CentennialAAST COAACO USAAGP Torluemke; Mark Centennial CO USAANM Hall; JimAACI CentennialAAST COAACO USAAGP Hall; Jim Centennial CO USAANM Leddy; JohnAACI Bryn MawrAAST PAAACO USAAGP Leddy; John Bryn Mawr PA US - Aspects of the disclosure relate to monitoring and using telemetry information in various ways. For example, a system that monitors telemetry information may include a user that gathers telemetry information of a device and transmits the information to a monitored room. A manager may join a monitored room and monitor the monitored room for particular types of telemetry information. In one example, a manager may determine whether a downstream device is experiencing a network problem, such as a low bitrate. A manager may also transmit commands to the player via the monitored room, which causes the downstream device to operate in accordance with the transmitted command. In one example, a manager may transmit a command that causes a player to decode a particular service. | 01-17-2013 |
20130041972 | Content Delivery Network Routing Using Border Gateway Protocol - An announcement protocol may allow disparate, and previously incompatible, content delivery network caches to exchange information and cache content for one another. Announcement data may be stored by the respective caches, and used to determine whether a cache is able to service an incoming request. URL prefixes may be included in the announcements to identify the content, and longest-match lookups may be used to help determine a secondary option when a first cache determines that it lacks a requested content. | 02-14-2013 |
20130138795 | Cache Eviction During Off-Peak Transactions - Transaction activity of a cache maintaining content may be monitored to determine periods of transaction activity below a first threshold amount of transactions. A period of anticipated transaction activity above a second threshold amount of transactions may be determined. A period of anticipated transaction activity below the first threshold may be selected based upon the monitored periods of transaction activity below the first threshold and the determined period of anticipated transaction activity above the second threshold. Content then may be evicted from the cache during the selected period of anticipated transaction activity. | 05-30-2013 |
20130173817 | Transmission of Content Fragments - Some aspects of the disclosure relate to transmitting content over a network. For example, a device may determine that it is missing a content fragment from its cache, and may send a request for the content fragment. A network device may be configured to respond to such requests by transmitting the content fragment. In some instances, this may allow receiving devices to acquire the missing content fragment without the need to transmit a request for content. | 07-04-2013 |
20130198401 | SYSTEM AND METHOD FOR DATA STREAM FRAGMENTATION WITH SCALABILITY - A method of data conditioning is disclosed that in one aspect can include the steps of receiving a data stream, encoding a time code in the data stream to identify a portion of the data stream corresponding to a content fragment, and separating the identified portion of the data stream to define the content fragment, wherein the content fragment comprises the encoded time code. | 08-01-2013 |
Patent application number | Description | Published |
20120147021 | GRAPHICS COMPUTE PROCESS SCHEDULING - A method, system, and computer program product are disclosed for providing improved access to accelerated processing device compute resources to user mode applications. The functionality disclosed allows user mode applications to provide commands to an accelerated processing device without the need for kernel mode transitions in order to access a unified ring buffer. Instead, applications are each provided with their own buffers, which the accelerated processing device hardware can access to process commands. With full operating system support, user mode applications are able to utilize the accelerated processing device in much the same way as a CPU. | 06-14-2012 |
20120229481 | ACCESSIBILITY OF GRAPHICS PROCESSING COMPUTE RESOURCES - A method, system, and computer program product are disclosed for providing improved access to accelerated processing device compute resources to user mode applications. The functionality disclosed allows user mode applications to provide commands to an accelerated processing device without the need for kernel mode transitions in order to access a unified ring buffer. Instead, applications are each provided with their own buffers, which the accelerated processing device hardware can access to process commands. With full operating system support, user mode applications are able to utilize the accelerated processing device in much the same way as a CPU. | 09-13-2012 |
20130159664 | Infrastructure Support for Accelerated Processing Device Memory Paging Without Operating System Integration - In a CPU of the combined CPU/APD architecture system, the CPU having multiple CPU cores, each core having a first machine specific register for receiving a physical page table/page directory base address, a second machine specific register for receiving a physical address pointing to a location controlled by an IOMMUv2 that is communicatively coupled to an APD, and microcode which when executed causes a write notification to be issued to the physical address contained in the second machine specific register; receiving in the first machine specific register of a CPU core, a physical page table/page directory base address, receiving in the second machine specific register of the CPU core, a physical address pointing to a location controlled by the IOMMUv2, determining that a control register of the CPU core has been updated, and responsive to the determination that the control register has been updated, executing microcode in the CPU core that causes a write notification to be issued to the physical address contained in the second machine specific register, wherein the physical address is able to receive writes that affect IOMMUv2 page table invalidations. | 06-20-2013 |
Patent application number | Description | Published |
20080235372 | METHOD AND SYSTEM FOR MEASURING STATUS AND STATE OF REMOTELY EXECUTING PROGRAMS - A system and method for providing attestation and/or integrity of a server execution environment are described. One or more parts of a server environment are selected for measurement. The one or more parts in a server execution environment are measured, and the measurements result in a unique fingerprint for each respective selected part. The unique fingerprints are aggregated by an aggregation function to create an aggregated value, which is determinative of running programs in the server environment. A measurement parameter may include the unique fingerprints, the aggregated value or a base system value and may be sent over a network interface to indicate the server environment status or state. | 09-25-2008 |
20080235804 | Dynamic Creation and Hierarchical Organization of Trusted Platform Modules - A trusted platform module is presented that is capable of creating, dynamically, multiple virtual trusted platform modules in a hierarchical organization. A trusted platform module domain is created. The trusted platform module creates virtual trusted platform modules, as needed, in the trusted platform module domain. The virtual trusted platform modules can inherit the permissions of a parent trusted platform module to have the ability to create virtual trusted platform modules themselves. Each virtual trusted platform module is associated with a specific partition. Each partition is associated with an individual operating system. The hierarchy of created operating systems and their privilege of spawning new operating systems is reflected in the hierarchy of trusted platform modules and the privileges each of the trusted platform modules has. | 09-25-2008 |
20100070781 | METHOD AND SYSTEM FOR BOOTSTRAPPING A TRUSTED SERVER HAVING REDUNDANT TRUSTED PLATFORM MODULES - Multiple trusted platform modules within a data processing system are used in a redundant manner that provides a reliable mechanism for securely storing secret data at rest that is used to bootstrap a system trusted platform module. A hypervisor requests each trusted platform module to encrypt a copy of the secret data, thereby generating multiple versions of encrypted secret data values, which are then stored within a non-volatile memory within the trusted platform. At some later point in time, the encrypted secret data values are retrieved, decrypted by the trusted platform module that performed the previous encryption, and then compared to each other. If any of the decrypted values do not match a quorum of values from the comparison operation, then a corresponding trusted platform module for a non-matching decrypted value is designated as defective because it has not been able to correctly decrypt a value that it previously encrypted. | 03-18-2010 |