Patent classifications
H04L67/303
Systems and methods for selectively obtaining a file via a direct file transfer or an indirect file transfer
In some implementations, a device may receive file location information identifying a file to be transferred to a user device associated with the first network provider, wherein the file location information identifies a domain name associated with a second network provider. The device may provide, based on the file location information, a request to obtain one or more records associated with the domain name. The device may receive the one or more records based on the request. The device may selectively obtain, based on the one or more records, the file from a first content device associated with the second network provider or from a second content device associated with a third-party provider. The device may provide the file to the user device.
Risk based virtual workspace delivery
Systems and methods can enable select virtual session capabilities on a user device configured to access a virtual session, which is an instance of a virtual machine. The user device can receive and forward to a gateway sever, a request to launch a virtual session. Based on the virtual session launch request, the gateway server can obtain a compliance profile determined from operational data. The gateway can permit user device access a virtual session hosted on a virtual machine (“VM”) server. The VM server can use the compliance profile and security data from the user device to determine a risk profile of the user device. The virtual session can be configured at the VM server based on the risk profile so as to allow access to a subset of available applications and functions within the applications for the virtual session.
Profile handling of a communications device
There is presented mechanisms for profile handling of a communications device (300). A method is performed by a local profile assistant (200a) of a proxy device (200). The method comprises obtaining an indication of handling a profile of the communications device (300). The method comprises establishing a first secure communications link with a local profile assistant of the communications device. The method comprises establishing a second secure communications link with a subscription management entity (430) of the communications device. The method comprises receiving information pertaining to handling of the profile by the local profile assistant of the communications device, the information being received from the subscription management entity over the second secure communications link. The method comprises providing the information to the local profile assistant of the communications device over the first secure communications link.
Network User Usage Profiling
Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery.
ELECTRONICALLY CONNECTED ENVIRONMENT
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for an electronically connected environment, such as implemented in connection with one or more computing and/or communication networks, devices, and/or protocols, for example.
SIGNAL UPLOAD OPTIMIZATION
Aspects of the technology described herein allocate limited computing resources, such as available bandwidth and battery power, to transferring the most urgent and important data from a client device to an online service. Client devices have enormous amounts of information about the user's activities that could be communicated to the service at any given time. However, the wireless transfer of information uses available battery power and can consume a user's data plan. The technology described herein uses a model to determine how often information should be sent to a service. The model can also determine what information to send. Different models can be implemented in different scenarios. The different models can include different weighting that will produce different decisions given the same inputs.
SOFTWARE APPLICATIONS AND INFORMATION APPARATUS FOR PRINTING OVER AIR OR FOR PRINTING OVER A NETWORK
Information apparatus and application software supporting printing over air or network are herein disclosed and enabled. The information apparatus may include one or more software components that include (1) a discovery component to discover a supported printer in a local area network (LAN) and to receive device information related to the printer (e.g., capability, language or format supported, identification) from the printer, and (2) a printing component to generate or obtain print data based on the device information received and to transmit the print data to the discovered printer. After establishing the connection to the LAN, application software (e.g., Internet browser, email, photos, documents) in the information apparatus may print digital content by using the discovery component to discover the printer in the LAN, and may use the printing component to obtain and transmit print data in a form that is acceptable to the printer for printing the digital content.
SYSTEMS AND METHODS FOR SEAMLESS HOST MIGRATION
Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication.
SYSTEM AND METHOD FOR ROUTING MEDIA
In one aspect, a method for managing streaming of video content to a client device includes providing the video content to a content distribution network for storage in a plurality of geographically separated resources of the content distribution network and receiving, from the client device via a packet-based telecommunication network, signaling to have the stored video content streamed to the client device. In response to the received signaling, one or more files are transmitted to the client device via the packet-based telecommunication network, each of the one or more files being in a format compatible with a media player on the client device, the one or more files comprising (i) an identification of one or more of the resources of the content distribution network available to facilitate streaming of one or more segments of the stored video content to the client device, the identification being dependent at least in part on a relationship between a geographic location of the client device and geographic locations of the resources of the content distribution network, and (ii) an identification of an advertising server, the identification of the advertising server being dependent at least in part on a relationship between the geographic location of the client device and a geographic location of the advertising server, wherein the one or more files, when processed by the client device, cause the client device to communicate with the identified one or more resources of the content distribution network and the advertising server to cause the one or more segments of the stored video to be streamed to the client device by the identified one or more resources of the content distribution network and cause one or more advertisements to be streamed from the advertising server to the client device.
Systems and methods for device-anonymous performance monitoring in a wireless network
An application, executed by a User Equipment (“UE”), may receive an identifier, which may be used to monitor Key Performance Indicators (“KPIs”) associated with the UE. Such KPIs may be monitored in conjunction with execution of the application, such as at times that the application sends and/or receives traffic. The KPIs may be associated with sensor data, resources, and/or other features or functionality of the UE. The UE may obtain an identifier associated with the application and/or the UE from a KPI monitoring system of some embodiments, may obtain user consent to monitor and/or report KPIs associated with the application, and may provide such KPIs to the KPI monitoring system in conjunction with the identifier. The KPI monitoring system may generate aggregated KPI information, associated with the application, based on the KPIs received from the UE and/or KPIs received from one or more other sources.