H04L67/1085

PREVENTING ABUSE IN CONTENT SHARING SYSTEM
20180107707 · 2018-04-19 ·

The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device, one or more first content items for one or more first user accounts of a content sharing system. The method further includes storing the first content items at the content sharing system. The method further includes receiving, by the processing device, a second content item for a second user account of the content sharing system. The method further includes comparing, by the processing device, the received second content item to the stored first content items to determine that the second content item is not exclusive to the second user account. The method further includes restricting a privilege of the second user account for the second content item in response to the determination that the second content item is not exclusive to the second user account.

EXTENDED PEER-TO-PEER CHANNEL LIST
20180109609 · 2018-04-19 ·

A method of facilitating peer-to-peer connection involves transmitting, by a first peer device, an identification of the first peer device and information regarding its capabilities. The information regarding its capabilities including a list of transmission channels that the first peer device is capable of supporting, an indication of which transmission channels the first peer device is capable of supporting as a group owner, and/or an indication of which transmission channels the first peer device is capable of supporting as a client. The first peer device receives from a second peer device, an identification of the second peer device and information regarding its capabilities including a list of transmission channels that the second peer device is capable of supporting. The first peer device and the second peer device then negotiate which of the first and second peer devices should be the group owner and which should be the client.

Opportunistically connecting private computational resources to external services

A description of computing resource requirements for execution of an application associated with a publicly available service is obtained. Access to computing resources is opportunistically obtained from a computing entity that includes a private computing device that is external to, and separate from, the publicly available service. The computing resource requirements are intelligently matched to available computing resources of the computing entity with private computing resources that are temporarily available from a private computing device source. The intelligent matching is performed using an optimization analysis.

Device for identifying digital content

Examples disclosed herein provide for the sharing of digital content stored on a device via an image that is representative of the digital content. The device, in response to selection of digital content stored on the device, extracts frames from the digital content that are representative of the digital content. In response to selection of one of the frames, the device captures digitally handwritten customizations made to the selected frame to create a customized image. The device extracts features at least from the handwritten customizations made to the selected frame to identify the customized image. The device uploads the digital content, the customized image, and the extracted features to a remote database.

Systems and methods for ephemeral eventing

Embodiments are provided for ephemeral eventing. Ephemeral eventing may involve sending metadata portions associated with content items from a user device to a content management system prior to uploading the content portions of the content items. The content management system may then assign the content items to one or more events. The event assignments may then be sent back to the user device, allowing the content items to be locally displayed according to their events as if the content items had already been uploaded to the content management system.

Access control center auto launch

Methods and systems provide indirect and temporary access to a company's IT infrastructure and business applications. The methods/systems involve establishing an access control center (ACC) to control the access that technical support personnel may have to the company's IT infrastructure and business applications. Thin client terminals with limited functionality may then be set up in the ACC for use by the technical support personnel. The thin client terminals connect the technical support personnel to workstations outside the ACC that operate as virtual desktops. The virtual desktops in turn connect the technical support personnel to the IT infrastructure and business applications. An ACC application may be used to automatically establish the connection between the thin client terminals and the virtual desktops and the virtual desktops and the IT infrastructure and business applications.

Dynamic window adjustments in a streaming environment

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. In response to triggering the eviction policy for the first window and the second window, the first tuple stored in the first window can be compared with the second tuple stored in the second window. Based upon the comparing, it can be determined that the first tuple and the second tuple go outside of a join threshold. In response to determining that the first tuple and the second tuple go outside of a join threshold, the eviction policy of the first window can be altered.

Dynamic window adjustments in a streaming environment

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. In response to triggering the eviction policy for the first window and the second window, the first tuple stored in the first window can be compared with the second tuple stored in the second window. Based upon the comparing, it can be determined that the first tuple and the second tuple go outside of a join threshold. In response to determining that the first tuple and the second tuple go outside of a join threshold, the eviction policy of the first window can be altered.

MANAGING DOWNLOAD REQUESTS RECEIVED TO DOWNLOAD FILES FROM A SERVER
20180077220 · 2018-03-15 ·

A method and system of managing downloads of a file from a server. A determination is made of whether or not a number of current connections between a client and the server is less than a preset threshold number, exceeding one, of allowable concurrent connections with the server. If the determination is that the number of current connections is less than the preset threshold number, responsive to a request by the client to download the file pursuant to another connection between the client and the server, the computer establishes the other connection. between the client and the server and downloads the file to the client via the other connection. If the determination is that the number of current connections is at least the preset threshold number, the computer denies a request by the client to download the file from the server using another connection between the client and the server.

SOCIAL SIGNATURE
20180077251 · 2018-03-15 ·

The disclosure is directed to determining a social signature of a user of an application, e.g., a social networking application. The social signature can be a representation of social properties of a person, and can be determined based on various factors, e.g., user profile of the user and friends of the user. The social signature can be used for various applications, e.g., determining socially similarity of a user pair and determining if a user is a spammer. The social signature is determined as a vector of k buckets in which each of the k buckets indicates a count of friends of the user assigned to the corresponding bucket. A social similarity of a user pair is determined as a function of the social signatures of the user pair. A user is determined as likely to be a spammer if the social signature of the user is of a specified pattern.