Patent classifications
H04L67/30
Methods and apparatus to facilitate using a streaming manifest including a profile indication
The present disclosure relates to methods and devices for facilitating using a streaming manifest including a profile signal for content encoded based on a encapsulation format. An example method disclosed herein includes identifying structures associated with first media, wherein the first media is associated with a first streaming format. The example method also includes generating a streaming manifest for the first media, wherein the streaming manifest maps the structures associated with the first media to structures associated with a second streaming format, and including an indication with the streaming manifest, wherein the indication identifies the streaming profile used to map the structures.
Methods and apparatus to facilitate using a streaming manifest including a profile indication
The present disclosure relates to methods and devices for facilitating using a streaming manifest including a profile signal for content encoded based on a encapsulation format. An example method disclosed herein includes identifying structures associated with first media, wherein the first media is associated with a first streaming format. The example method also includes generating a streaming manifest for the first media, wherein the streaming manifest maps the structures associated with the first media to structures associated with a second streaming format, and including an indication with the streaming manifest, wherein the indication identifies the streaming profile used to map the structures.
Methods, Systems, And Apparatuses For User Segmentation And Analysis
Methods, systems, and apparatuses for user segmentation and analysis are described herein. An analytics subsystem may use a plurality of activity data to generate a plurality of user profiles, corresponding user interest clouds for each user device of a plurality of user devices, and a geographic interest cloud associated with a particular client identifier. In another example embodiment, the analytics subsystem may generate an industry interest cloud associated with the particular client identifier. For example, the industry interest cloud may indicate interests of users associated with a particular industry. In a further example embodiment, the analytics subsystem may determine (e.g., identify) a plurality of clusters of users. For example, each of the plurality of clusters of users may comprise one or more user profiles having common interests, common geographic location, common industry affiliation, a combination thereof, and/or the like.
Taking bulk actions on items in a user interface
Disclosed are various approaches for generating a user interface in which data items are grouped together. Additionally, a bulk action can be taken by a user on a grouping of data items within the user interface. An example of such a user interface can be within an email client used to manage email messages. Email messages can be grouped according to a grouping factor and a bulk action can be taken on a grouping from within the user interface.
Taking bulk actions on items in a user interface
Disclosed are various approaches for generating a user interface in which data items are grouped together. Additionally, a bulk action can be taken by a user on a grouping of data items within the user interface. An example of such a user interface can be within an email client used to manage email messages. Email messages can be grouped according to a grouping factor and a bulk action can be taken on a grouping from within the user interface.
Computer-readable medium, information processing device, and method for providing better accessibility to cloud server
A non-transitory computer-readable medium stores computer-readable instructions executable by a processor of an information processing device communicably connected with an image processing apparatus and a cloud server. The computer-readable instructions realize an application configured to, when executed by the processor, cause the processor to perform, in response to receiving an import instruction to import a workflow, reading, from an export file, workflow information representing the workflow that is a sequence of processes using the image processing apparatus and the cloud server, and selecting one of a plurality of methods to obtain authentication information for accessing the cloud server to perform the workflow represented by the read workflow information, and access, in response to receiving a workflow execution instruction to perform the workflow, the cloud server by using the authentication information obtained in the selected method.
Detection of external messaging attacks using trust relationships
External messaging attacks are detected using trust relationships. A profile is built for each target within an organization using extracted header data from multiple prior messages. Trust scores are derived for each sender of a message for each target profile, each trust score is derived from a degree and a quantity of communication between the respective sender and the target in the extracted header data. Incoming messages are received and a target and a sender of each incoming message is determined. A trust score is retrieved for the sender from the profile of the target for each incoming message, labels are generated for each of incoming message based on the respective trust score, and the respective label is applied to be visible to the target in association with the message for each respective message.
Detection of external messaging attacks using trust relationships
External messaging attacks are detected using trust relationships. A profile is built for each target within an organization using extracted header data from multiple prior messages. Trust scores are derived for each sender of a message for each target profile, each trust score is derived from a degree and a quantity of communication between the respective sender and the target in the extracted header data. Incoming messages are received and a target and a sender of each incoming message is determined. A trust score is retrieved for the sender from the profile of the target for each incoming message, labels are generated for each of incoming message based on the respective trust score, and the respective label is applied to be visible to the target in association with the message for each respective message.
Network shutdown for cyber security
A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
System and method for usage billing of hosted applications
A system, method, and computer readable medium for usage billing of one or more hosted applications serving one or more clients. The hosted applications are contained within one or more isolated environments or run without isolated environments. The system may include usage billing based on one or more of resources open, amount of data flowing through resources, number of open files, number of transactions, number of concurrent users, number of processes, CPU utilization and memory usage, The system may further include a management interface where administrators may add, remove and configure isolated environments, configure client policies and credentials, and force upgrades. If using isolated environments, the isolated environments may be isolated from other applications and the host operating system on the clients and applications within the isolated environments may run without performing an application-installation on the client.