Patent application number | Description | Published |
20090119458 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 05-07-2009 |
20120096224 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 04-19-2012 |
20120221792 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 08-30-2012 |
20120278555 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 11-01-2012 |
20120324530 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 12-20-2012 |
20120331570 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 12-27-2012 |
20130007227 | LOCAL STREAMING PROXY SERVER - A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its WiFi/LAN provides QoS guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization. “HTTP demand paging” is also possible. | 01-03-2013 |
20130318211 | ASSET STREAMING AND DELIVERY - Streaming assets to an asset streaming client is described. An asset streaming system is configured to generate a request to retrieve at least a portion of an asset. The asset streaming system is part of an asset streaming client and integrated in an operating system abstraction level with the operating system or in an abstraction level beneath the operating system abstraction level. An asset provider system can receive the request that is generated by the asset streaming system and provide the portion of the asset to the asset streaming system. The asset streaming client can then exploit the portion of the asset. | 11-28-2013 |
20140136601 | Application Streaming and Execution System for Localized Clients - For various implementations, a first application streaming client can obtain portions of an application from a application streaming server, execute the application based on those portions obtained, and provide a second application streaming client (a pixel-based application streaming client) access to the executing application using a pixel stream generated based on output from the executing application. Depending on the implementation, the first application streaming client could execute the application, based on the portions obtained, on behalf of a user at the application streaming client, on behalf of the pixel-based application streaming client, or both. In various implementations, the first application streaming client and the second application streaming client can be communicatively coupled through a local network (e.g., LAN or local WiFi), while the first application streaming client and the application streaming server can be communicatively coupled through a wider area network (e.g., WAN or MAN). | 05-15-2014 |
20140136602 | APPLICATION STREAMING USING PIXEL STREAMING - Systems and methods for pixel streaming a stream-enabled application to a client device that is executed on an intermediary client device virtualization system. Portions of a stream-enabled application are used to begin execution of the stream-enabled application on the client device virtualization system. The output of the beginning of execution of the stream-enabled application are used to generate a pixel based stream-enabled application stream. The pixel-based stream-enabled application stream is sent to the client device. User interactions in response to the display of the stream are represented in user interaction data. The user interaction is determined from the user interaction data and application execution commands are determined based on the determined user interaction. Continued execution of the stream-enabled application occurs based on the application execution commands. The pixel-based stream-enabled application stream is modified according to the continued execution of the stream-enabled application. | 05-15-2014 |
20140201387 | LOCAL STREAMING PROXY SERVER - A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its WiFi/LAN provides QoS guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization. “HTTP demand paging” is also possible. | 07-17-2014 |
20140207963 | ASSET STREAMING AND DELIVERY - Asset streaming and delivery including intercepting, at an asset streaming client, a request to exploit an asset virtualized on the asset streaming client. The asset is identified and an asset snapshot of the asset is obtained. Portions of the asset needed to exploit the asset according to the intercepted request exploit the asset are determined from an asset snapshot of the asset. The portions of the asset needed to exploit the asset according to the intercepted request are obtained and the asset is exploited according to the intercepted request using the portions of the asset. | 07-24-2014 |
20140325610 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 10-30-2014 |
20150019749 | DERIVING COMPONENT STATISTICS FOR A STREAM ENABLED APPLICATION - A technique for generating component usage statistics involves associating components with blocks of a stream-enabled application. When the streaming application is executed, block requests may be logged by Block ID in a log. The frequency of component use may be estimated by analyzing the block request log with the block associations. | 01-15-2015 |
20150067149 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 03-05-2015 |
20150067812 | LOCAL STREAMING PROXY SERVER - A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its WiFi/LAN provides QoS guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization. “HTTP demand paging” is also possible. | 03-05-2015 |
20150126282 | ADAPTIVE APPLICATION STREAMING IN CLOUD GAMING - Methods and systems for remotely provisioning immediately executable applications with license control in secure environments. Immediately initially executable portions of applications are pushed onto user desktops, and when applications are selected for use, additional components of selected applications are streamed to said desktops. | 05-07-2015 |
20150127774 | ADAPTIVE CLOUD-BASED APPLICATION STREAMING - Methods and systems for remotely provisioning immediately executable applications with license control in secure environments. Immediately initially executable portions of applications are pushed onto user desktops, and when applications are selected for use, additional components of selected applications are streamed to said desktops. | 05-07-2015 |
20150128293 | APPLICATION DISTRIBUTION NETWORK - Methods and systems for remotely provisioning applications from the cloud in secure environments with robust license control failover options using a hierarchical server topology. Cloud-based servers provide applications and licenses to an organization's local servers, which in turn serve applications and licenses to end user devices. By synchronizing information including license and application provision information among the local and cloud-based servers, an organization's local servers can continue to serve applications and licenses when one or more of the organization's local servers fail. | 05-07-2015 |
20150142926 | OPPORTUNISTIC BLOCK TRANSMISSION WITH TIME CONSTRAINTS - A technique for determining a data window size allows a set of predicted blocks to be transmitted along with requested blocks. A stream enabled application executing in a virtual execution environment may use the blocks when needed. | 05-21-2015 |
20150249671 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 09-03-2015 |
20150319258 | LOCAL STREAMING PROXY SERVER - A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its WiFi/LAN provides QoS guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization. “HTTP demand paging” is also possible. | 11-05-2015 |