H04L67/1085

DYNAMIC WINDOW ADJUSTMENTS IN A STREAMING ENVIRONMENT

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. In response to triggering the eviction policy for the first window and the second window, the first tuple stored in the first window can be compared with the second tuple stored in the second window. Based upon the comparing, it can be determined that the first tuple and the second tuple go outside of a join threshold. In response to determining that the first tuple and the second tuple go outside of a join threshold, the eviction policy of the first window can be altered.

DIGITAL ASSET MANAGEMENT FOR ENTERPRISES
20170308616 · 2017-10-26 ·

Systems and method for managing digital assets for a plurality of enterprises. The system may include enterprise profiles for each of the enterprises. Each enterprise profile can include one or more cost centers representative of divisions of the enterprise. Assets can be organized within cost centers within containers and folders. The arrangement of containers and folders can be representative of an organization structure of a division of the enterprise. Access to assets within the cost center can be determined by an access control module and be based on user-level and container-level permissions.

CENTRALIZED MANAGEMENT OF A P2P NETWORK

Telemetry data from a plurality of peer computers of a peer-to-peer network is aggregated via a computer network. Each of the plurality of peer computers sends telemetry data relating to transfer of a digital content item within the peer-to-peer network. A designated peer computer is quarantined from transferring a digital content item within the peer-to-peer network according to one or more health metrics of the peer-to-peer network derived from the telemetry data aggregated from the plurality of peer computers

PREVENTING ABUSE IN CONTENT SHARING SYSTEM
20170235787 · 2017-08-17 ·

The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device, one or more first content items for one or more first user accounts of a content sharing system. The method further includes storing the first content items at the content sharing system. The method further includes receiving, by the processing device, a second content item for a second user account of the content sharing system. The method further includes comparing, by the processing device, the received second content item to the stored first content items to determine that the second content item is not exclusive to the second user account. The method further includes restricting a privilege of the second user account for the second content item in response to the determination that the second content item is not exclusive to the second user account.

Centralized management of a P2P network

Telemetry data from a plurality of peer computers of a peer-to-peer network is aggregated via a computer network. Each of the plurality of peer computers sends telemetry data relating to transfer of a digital content item within the peer-to-peer network. A mitigation operation that modifies transfer of a digital content item between peer computers of the peer-to-peer network is performed according to one or more health metrics of the peer-to-peer network. The one or more health metrics are derived from the telemetry data aggregated from the plurality of peer computers.

Dynamic window adjustments in a streaming environment

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. In response to triggering the eviction policy for the first window and the second window, the first tuple stored in the first window can be compared with the second tuple stored in the second window. Based upon the comparing, it can be determined that the first tuple and the second tuple go outside of a join threshold. In response to determining that the first tuple and the second tuple go outside of a join threshold, the eviction policy of the first window can be altered.

METHOD AND SYSTEM FOR RECOMMENDING CONTENT
20170193106 · 2017-07-06 ·

The present teaching relates to recommending content by analyzing the streamed data. A request is received from a user requesting one or more recommendations from a set of items. A first distribution indicative of an interest distribution of the user in a plurality of topics is obtained. For each item, a second distribution indicative of a classification distribution of the item with respect to the plurality of topics is obtained. A score is estimated based on the first distribution and the second distribution, wherein the score indicates likelihood that the user is interested in the item. The scores associated with the set of items are ranked. The one or more recommendations are presented based on the ranked scores

System and method of adaptive bit-rate streaming

A method includes receiving information from a tracker device indicating that a plurality of devices is associated with a media content item. The method also includes establishing peer-to-peer sessions with a first group and a second group of the devices, selecting the first group based on a first bit-rate satisfying a threshold bit-rate, and sending a first request, via a first peer-to-peer session, to a first device of the first group. The media content item is divided into a plurality of chunks. The first request identifies a first chunk. The method also includes receiving the first chunk, modifying the threshold bit-rate based on a number of buffered chunks, and selecting the second group based on a second bit-rate satisfying the modified threshold bit-rate. The method also includes sending a second request to a second device of the second group. The second request identifies a second chunk.

Systems and methods for providing mobile browser access to mobile device functionalities

A content handler application that may be provided on a mobile device to provide extensions to a web based application. The content handler may provide the web application access features such as the camera, GPS, A/V input and output, file system and secure uploads. The content handler may be a certified application for use on the mobile device and calls applications to access the features of the mobile device. The web applications may be updated without concern for the content handler. Because the user experience and business logic are contained in the web application they are unaffected by the certification and multi-platform issues as this is limited to only the content handler.

METHODS AND APPARATUS TO IMPROVE TRANSMISSION OF A FIELD DATA SET TO A NETWORK ACCESS POINT VIA PARALLEL COMMUNICATION SESSIONS
20170171319 · 2017-06-15 ·

Methods, apparatus, systems and articles of manufacture to transfer a data set via parallel communications are disclosed herein. Example methods include controlling the distribution of portions of a field data set to a network access point via a plurality of parallel communication sessions established by respective ones of a plurality of communication devices with the network access point. Example methods also include comparing a first value based on a respective data transfer rate of a first one of the communication sessions to a second value based on a respective data transfer rate of a second one of the communication sessions to determine whether to establish a new communication session with a third one of the plurality of communication devices. In response to determining to establish a new communication session, a processor instructs a third one of the communication devices to establish the new communication session to transmit a respective portion of the field data set to the network access point.