Patent classifications
H04L67/34
MULTIPLE-STAGE BOOTLOADER AND FIRMWARE FOR BASEBOARD MANAGER CONTROLLER AND PRIMARY PROCESSING SUBSYSTEM OF COMPUTING DEVICE
At power on of a computing device, a baseboard management controller (BMC) of the computing device executes, a first-stage bootloader program to download a second-stage bootloader program from a first server. The BMC executes the second-stage bootloader program to download third-stage firmware of the BMC from a second server. The BMC executes the third-stage firmware to download firmware of a primary processing subsystem of the computing device from a third server, and to start the primary processing subsystem by causing the primary processing subsystem to execute the firmware of the primary processing subsystem.
PROVIDING UPDATED APPLICATION DATA FOR PREVIEWING APPLICATIONS ON A DISPLAY
Embodiments provide methods and systems for updating application data in snapshots of applications for previewing. Some embodiments update application data by determining when current application data may expire and retrieving updated application data. The application data for various applications in a preview mode may be updated based on an allotted budget. Permission can be selectively granted to applications to obtain updated data so as to control the budget. Application data in the snapshots may appear updated to a user as the user browses the dock without requiring the applications to request updated application data when the user enters the dock, regardless of whether each application is active. Further, some embodiments may generate a snapshot using a layer hierarchy and image layer data generated while the application was last running if the time associated with when the application was last active is later than the time associated with an existing snapshot.
CAPTURING AND DEPLOYING APPLICATIONS USING MAXIMAL AND MINIMAL SETS
Systems and methods are described for packaging and deploying applications using minimal and maximal component sets. A minimal set of application components that includes at least the necessary components for launching the application is first downloaded to an endpoint device from a central server. The application is launched on the endpoint from the minimal set. If the application requests a missing component that is not available on the endpoint, the missing component is requested and delivered on-demand from a maximal set located on the server, where the maximal set contains all possible application components. The application is suspended during the download of the missing component. After the missing component is downloaded, the application is resumed, having access to the missing component on the endpoint.
Notification Extensions for Applications
In some implementations, a computing device can use notification extensions for applications to preprocess a notification received by the computing device and present content associated with a notification. For example, applications installed on the computing device can provide a service extension for preprocessing the notification. When a notification associated with the application is received, the notification system on the computing device can invoke the service extension for the application to preprocess the notification (e.g., to download additional content, encrypt/decrypt notification data, etc.). Applications can provide content extensions to present notification content. For example, a content extension associated with the application can be invoked by the notification system to present media content (or other content) associated with a received notification in an application specific manner.
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING CUSTOMIZABLE CACHING STRATEGY BASED ON TRAFFIC PATTERN TO OPTIMIZE MEMORY FOOTPRINT AND REDUCE LATENCY
A method, apparatus, and computer program product are provided to implement a customized caching strategy which optimizes the implementation based on usage patterns. In the context of a method a client request for a service is intercepted and an authentication check is performed for the client request based on cached data. In an instance in which the authentication check succeeds, the method performs an authorization check for the client request based on the cached data. In an instance in which the authorization check succeeds, the method forwards the client request for the service to the service. A corresponding apparatus and a computer program product are also provided.
CODE MONITORING TO RECOMMEND ALTERNATIVE APPLICATIONS
Disclosed herein at methods and systems for monitoring and analyzing code and identifying a suitable substitute for the identified code. A central server identifies inserted code configured to communicate session data to a second server. The central server then identifies an application having functionality corresponding to the inserted code. The central server then provides an indication of the corresponding application.
SCORING TRUSTWORTHINESS, COMPETENCE, AND/OR COMPATIBILITY OF ANY ENTITY FOR ACTIVITIES INCLUDING RECRUITING OR HIRING DECISIONS, COMPOSING A TEAM, INSURANCE UNDERWRITING, CREDIT DECISIONS, OR SHORTENING OR IMPROVING SALES CYCLES
Systems and methods for recruiting, counter-terrorism/security, insurance underwriting, sales and marketing improvement, decisioning financial transactions and collections, and social scoring are provided. Machine learning can assign connectivity values to other community members, including individuals, companies, products, brands, cities or neighborhoods, etc. Connectivity values may be automatically harvested from or assigned by third parties or based on the frequency and/or type of interactions between community members. Connectivity values may represent such factors as alignment, reputation within the community, degree of trust, competence at one or more skills, or compatibility with others. The degree and type of connectivity between two entities may be assessed by computing a connectivity value based upon connections between entities and relative or absolute trust, competence and/or compatibility features of the connections. Connectivity values identify best prospects (customers, hires, dates), find off-grid people, underwrite insurance, ‘decision’ loans & collections, shorten sales cycles, etc.
Device and Process for Providing Mobile Gamification
A wireless device to provide mobile gamification services includes a transceiver configured to transmit data, an application to remotely connect via a network to a mobile website, to download a game from the mobile website to the wireless device, to execute the game locally on the wireless device, to execute the game via the mobile website, to redeem game rewards associated with wireless services, and to select the game rewards associated with the wireless services, a processor to control the transceiver and execute the application, a display to display the game and the game rewards, and a computer readable medium to store the application and user preferences associated with the game and with the wireless services.
SECURE ON-PREMISES TO CLOUD CONNECTOR FRAMEWORK
Embodiments implement a secure connector framework at a cloud infrastructure. Embodiments receive one or more notebook profiles from an on-premises system corresponding to a first cloud customer, the on-premises system comprising at least one of one or more datasets, one or more models, or one or more libraries, the notebook profiles comprising permission sets that specify a level of access to the datasets, the models and the libraries, the notebook profiles corresponding to an on-premises machine learning (“ML”) notebook. Embodiments transform the received notebook profiles into a cloud policy set for sharing the datasets, the models and the libraries. Embodiments then transmit and receive corresponding data from the first cloud customer to a second cloud customer, the transmitted and received data based on the cloud policy set.
Region-Specific Configuration
A notification server may be configured to receive a message from a device, determine a device location from the message, determine a location identifier corresponding to the determined device location, and send the location identifier to the device. The device may be configured to generate a configuration identifier based on the location identifier and send a configuration data request including the configuration identifier to a cache server. The cache server may be configured to receive the configuration data request from the device, select a device configuration corresponding to the configuration identifier, where the device configuration is specific to the device location, and send the selected device configuration to the device. The device may be further configured to configure the device according to the selected device configuration.