Patent classifications
H04L67/1072
System and method for boosting up performance of NVMe-TCP transport
A method, computer program product, and computer system for using, by a computing device, free central processing unit (CPU) cycles for processing Non-Volatile Memory express Over Fiber (NVMeoF)/Transmission Control Protocol (TCP) sockets. Using the free CPU cycles for processing the NVMeoF/TCP sockets may include exposing a character device with a callback that iterates over the NVMeoF/TCP sockets for processing.
Assisted delivery service for networks
Systems and methods are provided for switching computing devices between edge servers and peer groups. One example method includes receiving, at a client computing device and from a first computing device, media content. A request to initiate an assisted delivery service is sent from the client computing device to a second computing device. The assisted delivery service is initiated in response to the request. The assisted delivery service comprises identifying, at the second computing device, one or more peer computing devices receiving the media content. At the second computing device, instructions that enable the client computing device to discover at least one of the peer computing devices are generated. The instructions are sent from the second computing device to the client computing device. At the client computing device, a peer computing device is discovered. A request to receive a portion of the media content is sent from the client computing device to a discovered peer computing device. The portion of the media content is received at the client computing device from the peer computing device.
Managed peer-to-peer sharing in cellular networks
A method, system and apparatus are provided for performing peer-to-peer (P2P) data sharing operations between user equipment (UE) devices in a wireless-enabled communications environment. A first client node comprises content data and operates in a server peer mode to provide content data. A second client node submits a request to a P2P application server (P2P AS) for the content data. In response, the P2P AS provides the address of the first client node to the second client node. The second client node then uses the provided address to submit a request to the first client node to provide the content data. The first client node accepts the request and then provides the content data to the second client node.
SYNCHRONOUS AND ASYNCHRONOUS ELECTRONIC VOTING TERMINAL SYSTEM AND NETWORK
Among other things, participants who belong to a group/crowd or group of participants can provide indications of relative values of ideas that belong to a body of ideas. A rank ordering according to the relative values of at least some of the ideas of the body is derived based on the indications provided by the participants. The participants can provide the indications in two or more rounds. Each of at least some of the participants provide the indications with respect to fewer than all of the ideas in the body in each of the rounds. Between each of at least one pair of successive rounds, the set of ideas is updated to reduce the role of some of the ideas in the next round. Voting can by synchronous, i.e. more or less simultaneously, or asynchronous, i.e. where voting occurs as groups of voters are reaching a critical mass (min number) to allow distribution of ideas groups.
Shared file system predictive storage techniques
Disclosed in some examples are predictive storage techniques for use in a distributed data system. The predictive storage techniques may be used to manage locally stored elements of a shared data collection, such as the storage of files on nodes of the distributed data system that are limited in local storage space. The predictive storage techniques may achieve a balance between consumption of local resources and timely access of important elements in the shared data collection. For example, the predictive storage techniques may be used for keeping or pre-caching certain items of a collection that are determined as likely to be used in local storage for convenient access, and allowing access the remaining items on request over a network.
Systems and Methods for Automating Design Transformations Based on User Preference and Activity Data
A method includes determining a recommended aspect for content that includes at least one image. The recommended aspect is determined at least in part based on activity data that indicates aspects of other content authored by or interacted with by a plurality of authors in at least one social network, website, application software, or mobile application software (app). The method further includes generating the content including the at least one image according to the recommended aspect. The recommended aspect is an aspect of the at least one image.
Methods and devices for content distribution
To control content distribution to plural mobile entities, a device for managing the distribution of the content may determine mobile entities which participate in sharing the same content and which are located in the same region. The mobile entities respectively have a first interface for communication with a mobile communication network and a second interface for forming an ad-hoc network with another mobile entity. A message indicating at least one peer address of a peer mobile entity may be selectively transmitted to a mobile entity. The peer address allows the mobile entity to retrieve at least a piece of the content over the second interface from another mobile entity.
Peer to peer remote application discovery
Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.
System, security and network management using self-organizing communication orbits in distributed networks
A method is provided of managing a non-static collection of machines. A first client machine runs a first communication protocol. The non-static collection of machines includes a first linear communication orbit, the first linear communication orbit comprising a sequence of machines that run the first communication protocol, and a second linear communication orbit, the second linear communication orbit comprising a sequence of machines that run a second communication protocol distinct from the first communication protocol. The first client machine receives an instruction from a server to install the second communication protocol, installs the second communication protocol, and then submits a registration request to the server. The first client machine receives, from the server, contact information of a list of potential neighbors. The first client machine then, proactively constructs and maintains a respective local segment of the second linear communication orbit.
Sharing of data with applications
A user may, when using an application of a first computing device, intend to share data with other computing devices. To share the data, sharing processes may be performed by the first computing device, any device that the data is to be shared with, and one or more network locations. The sharing processes may determine whether the data is available at any of the devices or at any of the one or more network locations. Any device or network location where the data is available may be selected as a source of the data. Any device where the data is unavailable may be sent the data from one or more sources. Once received, the data may be stored to enable access by an application.