Y10S707/922

Automated Lecture Deconstruction
20220027422 · 2022-01-27 · ·

An online platform generates a playlist of clips of a lecture accessed by a plurality of users of the online platform. The online platform receives a recording of the lecture, and receives a plurality of events captured during a time period corresponding to the lecture. Each captured event is associated with a time stamp corresponding to a time at which a user performed an activity while listening to the lecture. The online platform clusters the captured events based on the time stamps, and generates one or more clips of the recording of the lecture from the clustered events. The online platform generates a playlist including the clips of the lecture.

Automated lecture deconstruction

An online platform generates a playlist of clips of a lecture accessed by a plurality of users of the online platform. The online platform receives a recording of the lecture, and receives a plurality of events captured during a time period corresponding to the lecture. Each captured event is associated with a time stamp corresponding to a time at which a user performed an activity while listening to the lecture. The online platform clusters the captured events based on the time stamps, and generates one or more clips of the recording of the lecture from the clustered events. The online platform generates a playlist including the clips of the lecture.

Automated lecture deconstruction

An online platform generates a playlist of clips of a lecture accessed by a plurality of users of the online platform. The online platform receives a recording of the lecture, and receives a plurality of events captured during a time period corresponding to the lecture. Each captured event is associated with a time stamp corresponding to a time at which a user performed an activity while listening to the lecture. The online platform clusters the captured events based on the time stamps, and generates one or more clips of the recording of the lecture from the clustered events. The online platform generates a playlist including the clips of the lecture.

Automated Lecture Deconstruction
20190065515 · 2019-02-28 · ·

An online platform generates a playlist of clips of a lecture accessed by a plurality of users of the online platform. The online platform receives a recording of the lecture, and receives a plurality of events captured during a time period corresponding to the lecture. Each captured event is associated with a time stamp corresponding to a time at which a user performed an activity while listening to the lecture. The online platform clusters the captured events based on the time stamps, and generates one or more clips of the recording of the lecture from the clustered events. The online platform generates a playlist including the clips of the lecture.

Automated lecture deconstruction

An online platform generates a playlist of clips of a lecture accessed by a plurality of users of the online platform. The online platform receives a recording of the lecture, and receives a plurality of events captured during a time period corresponding to the lecture. Each captured event is associated with a time stamp corresponding to a time at which a user performed an activity while listening to the lecture. The online platform clusters the captured events based on the time stamps, and generates one or more clips of the recording of the lecture from the clustered events. The online platform generates a playlist including the clips of the lecture.

Method and apparatus for data file transfer using destination linked directories

A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided.

Detecting behavioral patterns and anomalies using activity profiles
09767302 · 2017-09-19 · ·

Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.

Transforming policies to enforce control in an information management system
09703978 · 2017-07-11 · ·

In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.

Inspecting code and reducing code size associated to a target
09684795 · 2017-06-20 · ·

Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system.

Hashing algorithm for network receive filtering

Roughly described, a network interface device is assigned a maximum extent-of-search. A hash function is applied to the header information of each incoming packet, to generate a hash code for the packet. The hash code designates a particular subset of the table within which the particular header information should be found, and an iterative search is made within that subset. If the search locates a matching entry before the search limit is exceeded, then the incoming data packet is delivered to the receive queue identified in the matching entry. But if the search reaches the search limit before a matching entry is located, then device delivers the packet to a default queue, such as a kernel queue, in the host computer system. The kernel is then responsible for delivering the packet to the correct endpoint.