Patent application number | Description | Published |
20100192134 | MAPPING BREAKPOINTS BETWEEN WEB BASED DOCUMENTS - The present invention extends to methods, systems, and computer program products for mapping breakpoints between Web based documents. Embodiments of the invention facilitate extracting corresponding client script blocks from different Web based documents to disassociate the client script blocks with their relative locations within the Web based documents. From the extracted client side script blocks, a position for mapping a breakpoint from one client side script block another client side script block can be determined. The breakpoint is then copied from the one client script block and inserted into the determined position in the other client script block. The client script blocks can then be re-associated with their relative locations in the Web based documents from which they were extracted. | 07-29-2010 |
20110137899 | PARTITIONED LIST - Initial items can be partitioned into a plurality of partitions. The partitions can be stored in a partitioned list in computer storage. An index to the partitions can be generated. One or more initial items can be invalidated, and additional items can be appended to the partitioned list in a storage space previously occupied by the invalidated initial items. The index can be updated to omit references to the invalidated items, and to include references to the additional items. Also, a slice of an application call tree can be generated from a partition loaded into memory from a log. A representation of the slice can be displayed on a computer display, even before the entire application call tree is generated from the log. | 06-09-2011 |
20110145800 | Building An Application Call Graph From Multiple Sources - A system and method for generating a computer program call graph. A profiler may insert probes into a debuggee computer program, the probes generating call trace events. Checkpoints may be performed during execution of the debuggee program, so that a snapshot of the call stack is performed. Call trace events and checkpoint snapshots are logged and serialized. Logged call trace events and checkpoints may be retrieved and used in combination to generate a call graph and a shadow stack. Mechanisms facilitate combining the different sources of debuggee program information and determining whether the call graph and shadow stack are determinate or indeterminate at any time. The mechanisms may provide for improved accuracy of generated call graphs. | 06-16-2011 |
20110154300 | Debugging From A Call Graph - A system and method for debugging a computer program by using a call graph. A call graph that represents trace events during execution of a debuggee program may be used as input to a system that enables a user to debug the debuggee program. Mechanisms facilitate conditionally forming clusters of event nodes, a cluster indicative of multiple event nodes corresponding to an execution of a source language statement. During a debugging session, in response to a command to perform a step operation, the nodes of a cluster are processed together so that a step corresponds to multiple events if the multiple events correspond to a single source language statement. A mechanism for inspecting variables is provided. Variable values may be selectively propagated and provided based on the call graph and a static control flow analysis of the debuggee program. | 06-23-2011 |
Patent application number | Description | Published |
20150382385 | CONFIGURATION OF LAYER-1 DESTINATION ADDRESS FOR DEVICE-TO-DEVICE COMMUNICATIONS - Systems and methods that configured a Layer-1 destination address for D2D communications. One embodiment is a controller in a network that receives a discovery request from first User Equipment (UE), identifies an application code to announce the first UE during a discovery procedure, and provides the application code to the first UE. The controller receives an address request from the first UE for a D2D communication with one or more second UEs identified during the discovery procedure. The controller derives a Layer-1 destination address for the D2D communication, and provides the Layer-1 destination address to the first UE and to the at least one second UE for pre-configuration of the Layer-1 destination address at the first UE and the at least one second UE before the D2D communication. | 12-31-2015 |
20160044613 | NOTIFICATION OF RELAY CAPABILITIES FOR UE-TO-NETWORK RELAY FUNCTIONS - One embodiment is a relay User Equipment (UE) enabled for UE-to-network relay. The relay UE determines relay capabilities for acting as a relay to re-transmit traffic between a remote UE and a network. The relay UE generates synchronization signals for synchronizing with other relay UEs in proximity for device-to-device (D2D) communication, and inserts an indication of the relay capabilities in the synchronization signals. The relay UE transmits the synchronization signals over-the-air to the other relay UEs. | 02-11-2016 |
20160095126 | MODIFYING PARAMETERS OF A WIRELESS ACCESS NODE - A capability for modifying parameters of a wireless access node is provided. The capability for modifying parameters of a wireless access node may support use of parameter monitoring and computation functions to jointly improve or optimize capacity for voice and data users in wireless networks. The capability for modifying parameters of a wireless access node may include detecting a trigger event associated with the wireless access node, modifying a signal-to-interference-and-noise ratio (SINR) threshold of the wireless access node responsive to the trigger event, modifying a call admission control (CAC) threshold of the wireless access node based on evaluation of a parameter associated with modification of the SINR threshold of the wireless access node, and further modifying the CAC threshold of the wireless access node based on evaluation of a parameter associated with modification of the CAC threshold of the wireless access node. | 03-31-2016 |
Patent application number | Description | Published |
20140006579 | TECHNIQUES TO DISCOVER SERVICES RECURSIVELY IN A DISTRIBUTED ENVIRONMENT | 01-02-2014 |
20140244708 | BACKWARDS-COMPATIBLE FEATURE-LEVEL VERSION CONTROL OF AN APPLICATION USING A RESTLIKE API - Client and server-side instances of an application leverage an application programming interface (API) that complies with a representational state transformation architecture and supports backwards-compatible feature-level version control. A resource maintained by the server-side instance of the application is revised independent of revisions of a remainder of the application. The server-side instance of the application maintains multiple versions of a resource and/or a resource that is a superset of revisions of the resource, such that a compatible version of the resource is served to the client-side instance of the application. | 08-28-2014 |
20140244721 | REAL-TIME COMMUNICATIONS USING A RESTLIKE API - A computing device executes a client-side instance of an application that supports bi-directional real-time synchronous communication and real-time asynchronous communication with a server computing device by way of an application programming interface (API) that conforms to representative state transfer (RESTlike) design principles. An eventing framework on the server computing device is used to aggregate updates to resources on the server that are requested by the client computing device, and is further used to transmit metadata to the client computing device that indicates which updates are available. Real-time sensitive updates are included in the metadata, and the client computing device can decide when and how to retrieve other available updates. An asynchronous operation is modeled on the server computing device by an operation resource that can modify other resources on the server computing device and cause updates regarding status of the operation to be sent to the client computing device. | 08-28-2014 |
20140245420 | WEB TICKET BASED UPON A SYMMETRIC KEY USABLE FOR USER AUTHENTICATION - Described herein are various aspects pertaining to a web ticket that is used in connection with authenticating a user. The web ticket is generated through use of a symmetric key, and is less than two hundred bytes in size. A ticket issuer executing on a first computing device generates the web ticket responsive to receiving authentication data from a client computing device, and transmits the web ticket to such client computing device. The client computing device includes the web ticket in requests for data transmitted to a second server computing device that is in communication with the ticket issuer. The second server computing device includes a validator that validates the web ticket using the symmetric key, which is shared between the first server and the second server. | 08-28-2014 |
Patent application number | Description | Published |
20090216837 | SECURE RESERVATIONLESS CONFERENCING - Techniques are disclosed providing secure reservationless conferencing, allowing an organizer to arrange a meeting while off-line from a conferencing server, with the conferencing server still enforcing security for the meeting. | 08-27-2009 |
20100217874 | TUNNELING OF REMOTE DESKTOP SESSIONS THROUGH FIREWALLS - Endpoints are enabled to facilitate desktop and/or application sharing in enhanced communication systems using Session Initiation Protocol (SIP) and Remote Desktop Protocol (RDP) protocols by tunneling RDP packets through an Interactive Connection Establishment (ICE) channel built-in within the Real-time Transport Protocol (RTP), thus allowing RDP sessions to traverse Network Address Translators (NATs) or firewalls. | 08-26-2010 |
20110258432 | METHOD AND SYSTEM FOR RELIABLE PROTOCOL TUNNELING OVER HTTP - The embodiments described herein generally relate to methods and systems for tunneling arbitrary binary data between an HTTP endpoint and an arbitrary destination. Such tunneling of data is valuable in an environment, for example, in which a browser-based client communicates in the HTTP protocol and desires to exchange data with a remote endpoint understanding non-HTTP communications. A relay server is used as a “middle man” to connect the client to the destination, and components supporting the necessary protocols for data exchange are plugged into the relay server. To achieve reliable and ordered transmission of data, the relay server groups sessions through the assignment of session identifiers and tracks the exchange of messages through the assignment of sequence and acknowledgment numbers. Further, the relay server provides for authenticating the HTTP endpoint with the destination and for handling other operations not available in the constrained environment of the Web-based client. | 10-20-2011 |
20130018950 | CONNECTING A DEVICE TO A MEETINGAANM Narayanan; Giridhar KalpathyAACI BellevueAAST WAAACO USAAGP Narayanan; Giridhar Kalpathy Bellevue WA USAANM Gomber; PujaAACI BellevueAAST WAAACO USAAGP Gomber; Puja Bellevue WA USAANM Rao; DeepakAACI BellevueAAST WAAACO USAAGP Rao; Deepak Bellevue WA USAANM Elias; AnnikaAACI RedmondAAST WAAACO USAAGP Elias; Annika Redmond WA USAANM Anantharaman; SundarAACI RedmondAAST WAAACO USAAGP Anantharaman; Sundar Redmond WA USAANM Choudhary; NishantAACI BellevueAAST WAAACO USAAGP Choudhary; Nishant Bellevue WA US - One or more techniques and/or systems are disclosed for joining a device to a meeting. A device can send a request to join the meeting, such as by selecting a meeting request link in an invitation received at the device. A join meeting service may receive the request, authenticate the request, and return a code package and meeting related document. The code package can be used at the device, and/or at the join meeting service, to identify one or more meeting clients (e.g., applications) on the device. A supported meeting client that may be used to join the device to the meeting can be selected from the one or more meeting identified clients, if at least one meeting client is identified, and launched to join the device to the online meeting. | 01-17-2013 |
20130024690 | CENTRALIZED SERVICE FOR DISTRIBUTED SERVICE DEPLOYMENTS - A centralized service communicatively links an application provider to a plurality of different message forwarding services. The centralized service receives a request and authenticates the application provider associated with the request. Further, the centralized service delivers a message embodied by the request to a first message forwarding service with a first protocol and/or to a second message forwarding service with a second protocol different than the first protocol. | 01-24-2013 |
20130152196 | THROTTLING OF ROGUE ENTITIES TO PUSH NOTIFICATION SERVERS - Techniques for throttling of rogue entities to push notification servers are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may store an application, the application maintaining a monitored domain table, the application maintaining an offending domain table, the application operative to receive an incoming request from a client in a domain, to detect harmful activity based on the request, and to respond to the harmful activity based on one or both of the monitored domain table and the offending domain table. Other embodiments are described and claimed. | 06-13-2013 |
Patent application number | Description | Published |
20090083183 | DISTRIBUTED SECURE ANONYMOUS CONFERENCING - A communications manager of an enterprise receives an add-conference request to host a conference by the enterprise from an organizer client, wherein the conference to enable an anonymous user that does not have enterprise credentials to join the conference. The communications manager sends an add-conference response to the organizer client indicating that the conference is organized. | 03-26-2009 |
20100185956 | SIGNALING SUPPORT FOR SHARER SWITCHING IN APPLICATION SHARING - Architecture for seamless role switching in application sharing. A multipoint control unit (MCU) can be used for connecting multiple clients over a network. An application sharing component establishes an application sharing session over the MCU, and application content is exchanged from a sharer client to one or more viewer clients. Each client can communicate a media connection preference to the session. Client sharer and viewer roles are defined during creation of the application sharing session. A client can seamlessly switch roles during the session from a viewer to a sharer, and vice-versa, so that different application content can be shared to the session viewers. The session can be restricted to only one sharer so that the viewing clients view one sharer client at a time. | 07-22-2010 |
20110060694 | DISTRIBUTED SECURE ANONYMOUS CONFERENCING - A communications manager of an enterprise receives an add-conference request to host a conference by the enterprise from an organizer client, wherein the conference to enable an anonymous user that does not have enterprise credentials to join the conference. The communications manager sends an add-conference response to the organizer client indicating that the conference is organized. | 03-10-2011 |
20120221642 | HIGH AVAILABILITY CONFERENCING - A method, system, and architecture for providing a conference system that effectively achieves high availability conferencing is provided. The conference system architecture provides a conference system that comprises a set of stateless conference servers and a shared conference store to provide highly available conferencing to its users. The conference servers serve (host) conferences (meetings) that allow users to conduct distributed conferences. Each conference server generally performs conference provisioning operations and conference control operations. The shared conference store provides for the storage of conference state information, thus allowing the conference servers in the conference server pool to be stateless by maintaining conference state information on the shared conference store. A stateless conference server may also locally maintain, for example, in cache memory, some of the conference state information that is maintained on the shared conference store. | 08-30-2012 |
Patent application number | Description | Published |
20100242091 | NETWORK VIDEO MESSAGING - Embodiments related to network video messaging are disclosed. One disclosed embodiment provides a method that comprises receiving a video message from a client application of a source client; associating a navigation link with the video message; transmitting a notification message to the recipient client including the navigation link; receiving a retrieval request from the recipient client to access the video content via the navigation link; and transmitting the video content to the recipient client responsive to receiving the retrieval request by providing a persistent download of the video content from the storage server if the download condition indicates that a persistent download of the video content is permissible; and providing a transient download of the video content to the recipient client while prohibiting a persistent download of the video content if the download condition indicates that a persistent download of the video content is not permissible. | 09-23-2010 |
20120304262 | AUTOMATING CLOUD SERVICE RECONNECTIONS - Technologies are generally described for automatically reconnecting a security principal to cloud services through correlation of security principal identifier attributes. A new security principal for a user may be detected and automatically reconnected to the user's cloud based services. An administrator for the security domains may specify a value of a unique security principal metadata attribute for the original security principal in a customizable security principal metadata attribute in the new security principal in the same or new security domain. A secondary verification metadata attribute may optionally be specified to ensure the correct security principal is reconnected to the user's cloud based resources. The correlation between the original security principal for the user and the new security principal may be used to reconnect the user's cloud resources. | 11-29-2012 |
20130036422 | OPTIMIZED DATACENTER MANAGEMENT BY CENTRALIZED TASK EXECUTION THROUGH DEPENDENCY INVERSION - A Datacenter Management Service (DMS) is provided as a platform designed to automate datacenter management tasks that are performed across multiple technology silos and datacenter servers or collections of servers. The infrastructure to perform the automation is provided by integrating heterogeneous task providers and implementations into a set of standardized adapters through dependency inversion. A platform automating datacenter management tasks may include three main components: integration of adapters into an interface allowing a common interface for datacenter task execution, an execution platform that works against the adapters, and implementation of the adapters for a given type of datacenter management task. | 02-07-2013 |
20140165066 | OPTIMIZED DATACENTER MANAGEMENT BY CENTRALIZED TASK EXECUTION THROUGH DEPENDENCY INVERSION - A Datacenter Management Service (DMS) is provided as a platform designed to automate datacenter management tasks that are performed across multiple technology silos and datacenter servers or collections of servers. The infrastructure to perform the automation is provided by integrating heterogeneous task providers and implementations into a set of standardized adapters through dependency inversion. A platform automating datacenter management tasks may include three main components: integration of adapters into an interface allowing a common interface for datacenter task execution, an execution platform that works against the adapters, and implementation of the adapters for a given type of datacenter management task. | 06-12-2014 |
Patent application number | Description | Published |
20150134800 | Managed Directory Service - Techniques for connecting computer system entities to remote computer system resources are described herein. A computer system entity that requests access to a remote computer system resource has that request fulfilled by a managed directory service which receives the request and connects the computer system entity to the remote computer system resource. While connected, the managed directory service receives commands to perform operations on the remote computer system resource and, if the computer system entity is authorized to perform the operations on the remote computer system resource, the managed directory service performs the operation on the remote computer system resource. | 05-14-2015 |
20150134826 | Managed Directory Service Connection - Techniques for connection computer system entities to local computer system resources are described herein. A computer system entity that requests access to a local computer system resource has that request fulfilled by a managed directory service which receives the request and connects the computer system entity to the local computer system resource. While connected, the managed directory service receives commands to perform operations on the local computer system resource and, if the computer system entity is authorized to perform the operations on the local computer system resource, the managed directory service performs the operation on the local computer system resource. | 05-14-2015 |
20150134827 | MANAGED DIRECTORY SERVICE WITH EXTENSION - Techniques for connecting computer system entities to remotely extended local computer system resources are described herein. A computer system entity that requests access to a local computer system resource has that request fulfilled by a managed directory service which receives the request and connects the computer system entity to the local computer system resource. While connected, the managed directory service extends the local computer system resource to a corresponding extended remote computer system resource, receives commands to perform operations on the local or extended remote computer system resources and, if the computer system entity is authorized to perform the operations on the appropriate computer system resource, the managed directory service performs the operations on the appropriate computer system resource. | 05-14-2015 |
20150135257 | SINGLE SET OF CREDENTIALS FOR ACCESSING MULTIPLE COMPUTING RESOURCE SERVICES - A user may utilize a set of credentials to access, through a managed directory service, one or more services provided by a computing resource service provider. The managed directory service may be configured to identify one or more policies applicable to the user. These policies may define the level of access to the one or more services provided by the computing resource service provider. Based at least in part on these policies, the managed directory service may transmit a request to an identity management system to obtain a set of temporary credentials that may be used to enable the user to access the one or more services. Accordingly, the managed directory service may be configured to enable the user, based at least in part on the policies and the set of temporary credentials, to access an interface, which can be used to access the one or more services. | 05-14-2015 |
20150135272 | IDENTITY POOL BRIDGING FOR MANAGED DIRECTORY SERVICES - A customer of a computing resource service provider may utilize a set of credentials to request creation of an identity pool within a managed directory service. Accordingly, the managed directory service may create the identity pool. Instead of having the customer create a separate account within this identity pool, the managed directory service may create a shadow administrator account within the identity pool, which may be used to manage other users and resources in the identity pool within the managed directory service. The managed directory service further exposes an application programming interface command that may be used to obtain a set of credentials for accessing the shadow administrator account. The customer may use this command to receive the set of credentials and access the shadow administrator account. Accordingly, the customer can manage users and resources in the identity pool within the managed directory service. | 05-14-2015 |
20150160956 | AUTOMATIC DIRECTORY JOIN FOR VIRTUAL MACHINE INSTANCES - A customer utilizes an interface provided by a virtual computer system service to provision a virtual machine instance and join this instance to a directory. The interface may have previously obtained the domain name and the Internet Protocol addresses for one or more directories available to the customer for joining the virtual machine instance. The virtual computer system service may communicate with a managed directory service to obtain a set of temporary credentials that may be used to transmit a request to the directory to allow joining of the virtual machine instance. Upon provisioning of the instance, an agent operating within the instance may be configured to obtain the domain name and Internet Protocol addresses for the directory to establish a connection with the directory. The agent may also be configured to obtain the set of temporary credentials to transmit a request to the directory for joining of the instance. | 06-11-2015 |
20160094584 | MANAGEMENT OF APPLICATION ACCESS TO DIRECTORIES BY A HOSTED DIRECTORY SERVICE - Features are disclosed for facilitating management of network directories of multiple organizations by a centralized directory management system. Various applications can access the directories of the organizations via the directory management system according to the permissions that the applications have been granted by the respective organizations. Organizations may maintain directories on-premises or off-premises, and the applications can access the directories via the directory management system regardless of the physical location of the directories. Additionally, the applications may be hosted by a computing service provider that also hosts or otherwise manages the directory management service, or the applications can be hosted by third-party servers separate from the directory management system and the organizations. | 03-31-2016 |
Patent application number | Description | Published |
20090174557 | COMPACT FLEXIBLE HIGH GAIN ANTENNA FOR HANDHELD RFID READER - A compact flexible high gain antenna is disclosed which includes a co-planar array of at least three substantially parallel main conducting antenna elements, a reflector, a driven element, and a director. Each of these elements may be terminated on the ends by a stub element, and the reflector and the director may include an intermediate meander element. Stub elements capacitively load the antenna, while meander elements inductively load the antenna, and the loading affects the resonant frequency of the antenna. The conducting antenna elements may be affixed to a flexible dielectric substrate and may be bent or curved into different compact shapes, suitable for fitting manufacturing form factors for a handheld RFID reader. The antenna has a high directional gain which results in a longer operating range. | 07-09-2009 |
20100328073 | METHOD AND SYSTEM TO DETERMINE THE POSITION, ORIENTATION, SIZE, AND MOVEMENT OF RFID TAGGED OBJECTS - A method and system of determining spatial identification of an object, such as orientation, size, location, range, and/or movement, using an RFID system is disclosed. An RFID system can comprise one or more RFID reader receiving antennas that query one or more RFID tags coupled to the object. The measurement of the phase of the tag responses at the reader antennas and phase differentials as a function of distance, frequency, and time are the basis of spatial identification. The system can work with conventional Gen 2 tags and readers without modification of the tags or protocol. | 12-30-2010 |
20130249736 | SYNTHETIC APERTURE RFID HANDHELD WITH TAG LOCATION CAPABILITY - A system for determining a bearing or location of a radio frequency identification (RFID) tag using a handheld RFID reader is described. In one embodiment, the reader is equipped with an accelerometer. A user moves the reader while the reader receives the tag's signal and determines the tag signal's phase at multiple locations. The locations of the reader antenna can be reconstructed using the accelerometer data. By using the phase determined at multiple locations in conjunction with the location of the reader antenna, the reader can determine the bearing of the tag. For an RFID reader not equipped with an accelerometer, the sign and ratio of the rate of change in the phase of a tag's signal to the distance traveled by the reader antenna can be used to determine the location of the tag relative to the reader. | 09-26-2013 |
20160033634 | SYNTHETIC APERTURE RFID HANDHELD WITH TAG LOCATION CAPABILITY - A system for determining a bearing or location of a radio frequency identification (RFID) tag using a handheld RFID reader is described. In one embodiment, the reader is equipped with an accelerometer. A user moves the reader while the reader receives the tag's signal and determines the tag signal's phase at multiple locations. The locations of the reader antenna can be reconstructed using the accelerometer data. By using the phase determined at multiple locations in conjunction with the location of the reader antenna, the reader can determine the bearing of the tag. For an RFID reader not equipped with an accelerometer, the sign and ratio of the rate of change in the phase of a tag's signal to the distance traveled by the reader antenna can be used to determine the location of the tag relative to the reader. | 02-04-2016 |
Patent application number | Description | Published |
20120127512 | BRANCH OFFICE DIRECT PRINTING - Methods and apparatus for printing by a client computer reduce network usage and print delay, while performing print configuration and management at a centralized print server. The print server controls enablement of a branch office printing mode. When the branch office printing mode is enabled, the client computer sends spooled print data directly to a selected printer in the branch office. When the branch office printing mode is disabled, the client computer sends the spooled print data to the centralized print server, and the print server routes the print data to the selected printer. The print server performs configuration and management functions for the client computer in both operating modes. The print server may enable and disable the branch office printing mode on a per queue basis. | 05-24-2012 |
20120139690 | CONTEXT DEPENDENT COMPUTER OPERATION - A context dependent computing device. The computing device configures itself for operations based on its context. The computing device may determine its context by reading a value from a tag using low power transmissions such that receiving a value from the tag provides an indication of proximity to a location where the tag is affixed. The value read provides an indication of a desired operation. In response to reading a value of a tag, the computing device may identify an application to launch, identify devices with which to pair or take other actions that configure the computing device for its context. | 06-07-2012 |
20120144083 | UNIVERSAL DOCK FOR CONTEXT SENSITIVE COMPUTING DEVICE - A dock for interacting with a computing device. The computing device configures itself for operations based on its context, which may be determined form the dock by reading a value from a tag on the dock. The computing device may use low power transmissions such that receiving a value from the tag provides an indication of proximity to the dock. The value read provides an indication of a desired operation, and, in response to reading a value of the tag, the computing device may launch an application, pair with devices in the vicinity of the dock, or take other actions that configure the computing device. A universal dock, usable with computing devices of a plurality of form factors, may be implemented by providing an array of tags and, in some cases, a non-contact power supply. | 06-07-2012 |
20120157038 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 06-21-2012 |
20130217357 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 08-22-2013 |
20140323084 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 10-30-2014 |
Patent application number | Description | Published |
20090248868 | Contact Management in a Serverless Peer-to-Peer System - Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example. | 10-01-2009 |
20090319473 | METHOD AND SYSTEM OF USING A LOCAL HOSTED CACHE AND CRYPTOGRAPHIC HASH FUNCTIONS TO REDUCE NETWORK TRAFFIC - The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner. | 12-24-2009 |
20090320099 | Content Retrieval - Content retrieval techniques are described. In an implementation, a determination is made as to whether a client is permitted to receive content requested by the client. When the client is permitted to receive the content, a communication is formed to be communicated via a wide area network that includes a hash list having a hash of each of a plurality of blocks of the content, each hash being configured to enable the client to locate a corresponding one of the blocks of the content via a local area network. | 12-24-2009 |
20090327505 | Content Identification for Peer-to-Peer Content Retrieval - Described is a technology in which client content requests to a server over a wide area network (WAN) are responded to with hash information by which the client may locate the content among one or more peer sources coupled to the client via a local area network (LAN). The hash information may be in the form of a segment hash that identifies multiple blocks of content, whereby the server can reference multiple content blocks with a single hash value. Segment boundaries may be adaptive by determining them according to criteria, by dividing streamed content into segments, and/or by processing the content based on the content data (e.g., via RDC or content/application type) to determine split points. Also described is content validation using the hash information, including by generating and walking a Merkle tree to determine higher-level segment hashes in order to match a server-provided hash value. | 12-31-2009 |
20110295948 | CONTENT IDENTIFICATION FOR PEER-TO-PEER CONTENT RETRIEVAL - Described is a technology in which client content requests to a server over a wide area network (WAN) are responded to with hash information by which the client may locate the content among one or more peer sources coupled to the client via a local area network (LAN). The hash information may be in the form of a segment hash that identifies multiple blocks of content, whereby the server can reference multiple content blocks with a single hash value. Segment boundaries may be adaptive by determining them according to criteria, by dividing streamed content into segments, and/or by processing the content based on the content data (e.g., via RDC or content/application type) to determine split points. Also described is content validation using the hash information, including by generating and walking a Merkle tree to determine higher-level segment hashes in order to match a server-provided hash value. | 12-01-2011 |
20130067061 | Network Communication and Cost Awareness - Network communication and cost awareness techniques are described. In one or more implementations, functionality is exposed through one or more application programming interfaces (APIs) that is accessible to a plurality of applications of the computing device to perform network communication. Data is returned to one or more of the plurality of applications regarding a cost network used to perform the network communication. | 03-14-2013 |
20130067080 | Storage and Communication De-Duplication - Storage and communication de-duplication are described. In one or more implementations, a system comprises one or more modules that are implemented at least partially in hardware, the one or more modules configured to utilize one or more algorithms to calculate hashes of chunks of data, the hashes used to replace the chunks in the data for storage locally in the system as well as to communicate the hashes in response to a request received via a network for the data to avoid communicating at least one of the chunks of the data via the network. | 03-14-2013 |
20140298314 | METHOD FOR EFFICIENT CONTENT DISTRIBUTION USING A PEER-TO-PEER NETWORKING INFRASTRUCTURE - Disclosed is a method for efficiently distributing content by leveraging the use of a peer-to-peer network infrastructure. In a network of peers, a handful peers can receive content from centralized servers. These peers can then flood this content out to more clients who in turn can send the content along to others. Ultimately, a request for content can be fulfilled by locating the closest peer and obtaining the content from that peer. In one embodiment the method can be used to distribute content by creating content distribution groups of one or more client computing devices and redirecting requests for content from the server to the content distribution group. A further contemplated embodiment efficiently streams time sensitive data through the use of a spanning tree architecture of peer-to-peer clients. In yet another embodiment the present invention provides for more efficient use of bandwidth for shared residential broadband connections. | 10-02-2014 |
Patent application number | Description | Published |
20100098235 | METHOD AND SYSTEM FOR FORWARDING TELEPHONE CALLS BASED ON PRESENCE INFORMATION - A call forwarding system forwards telephone calls based on presence information of a user as reported by computing devices associated with a telephone number. When a telephone system receives an incoming call directed to one of the telephone numbers of the user's computing devices, it sends an incoming call event to each computing device. Upon receiving the incoming call event from a telephone system, each computing device determines whether the user is most likely present at that computing device based on the presence information. When a computing device determines that the user is most likely present at that computing device, it sends a notification to the telephone system to forward the incoming call to the telephone number associated with that computing device to effect the automatic forwarding of a call based on presence information. | 04-22-2010 |
20110185006 | AGGREGATING USER PRESENCE ACROSS MULTIPLE ENDPOINTS - A presence aggregation system provides a presence server that allows users to publish information regarding their availability with the presence server. The presence server maintains a record of each user's published information. When an endpoint publishes information regarding a user's availability at that endpoint with the presence server, the presence server provides all of the user's published information, including the information just published, to each of the user's endpoints, including the endpoint which published the information. This allows each of the user's endpoints to generate an aggregated availability of the user. The presence server may also provide all of the user's published information, including the information just published, to each of the subscribing users' endpoints. This allows the subscribing users to also generate a view of the user's aggregated availability. | 07-28-2011 |
20120195305 | AGGREGATING ENDPOINT CAPABILITIES FOR A USER - A method and system for aggregating capabilities from multiple endpoints associated with a user are provided. The system aggregates the capabilities of the endpoints associated with a user into an aggregate view of available modes of communication for reaching the user. Then, the system publishes the aggregate view so that other users who want to send communications to the user will know the modes of communication available for that user. In addition, the system may designate certain modes of communication as preferred or as capable of reaching the user. | 08-02-2012 |
20150365488 | AGGREGATING ENDPOINT CAPABILITIES FOR A USER - A method and system for aggregating capabilities from multiple endpoints associated with a user are provided. The system aggregates the capabilities of the endpoints associated with a user into an aggregate view of available modes of communication for reaching the user. Then, the system publishes the aggregate view so that other users who want to send communications to the user will know the modes of communication available for that user. In addition, the system may designate certain modes of communication as preferred or as capable of reaching the user. | 12-17-2015 |
Patent application number | Description | Published |
20080201703 | Packaging content updates - Aspects of the present invention are directed at obtaining user feedback and causing a package of content updates to be created and distributed based on the received feedback. In accordance with one embodiment, a method is provided for creating a package that contains one or more content updates configured to change the content that is displayed by default when a program executes. More specifically, the method includes obtaining input that describes one or more content updates. In this regard, the input received may include the user-defined content that will be displayed when the program executes and the identity of the content displayed by default. Then, the method assembles selected content updates into a package that is suitable for transmission over a network connection. When the package is assembled, processing is provided that allows the content updates in the package to be implemented on a remote computing device. | 08-21-2008 |
20080301660 | Maintaining Multiple Versions of a Software Application on a Device - Described are systems and methods for maintaining software applications on a computer. Multiple profiles having distinct attributes are defined on the computer. Separate updates for software applications are defined for individual profiles. A service module installed on the computer automatically selects appropriate updates for software applications for installation according to the individual profiles. | 12-04-2008 |
20080301667 | Dynamically Updating Software Applications on a Device - Described are systems and methods for updating software applications on a computer. Parameters associated with installed software applications are collected and transmitted to a server and installation instructions are determined based on the parameters. Installation instructions are then received from the server and appropriate updates are automatically installed according to the received instructions. | 12-04-2008 |
20080301669 | Dynamically Self-Updating by a Software Application on a Device - Described are systems and methods for self-updating software applications on a computer system. Installed software applications register with a service module installed on the computer. The service module requests updates for the installed software applications, including itself, and receives identification of available updates, including an update for itself. After receiving the identification, the service module automatically installs the identified updates, including updating itself. | 12-04-2008 |
20080301672 | Installation of a Software Product on a Device with Minimal User Interaction - Described are systems and methods for installing software products on a computer. A software product is identified and authorized for installation on a computer. Parameters useful for installing the software product are identified and transmitted to a server. Installations instructions are received from the server, and the identified software product is automatically installed according to the received instructions. | 12-04-2008 |
20140019956 | Packaging Content Updates - Aspects of the present disclosure are directed to obtaining user feedback and causing a package of content updates to be created and distributed based on the received feedback. In accordance with one embodiment, a method is provided for creating a package that contains one or more content updates that are configured for implementation on a remote device. | 01-16-2014 |
20150309787 | Packaging Content Updates - Aspects of the present disclosure are directed to obtaining user feedback and causing a package of content updates to be created and distributed based on the received feedback. In accordance with one embodiment, a method is provided for creating a package that contains one or more content updates that are configured for implementation on a remote device. | 10-29-2015 |