摘要:
A method and apparatus for providing access to and visibility of resources in a social network. In one embodiment, access rights and related access views are manually or automatically defined for information and resources associated with a human or device member of a social network circle. Selection of an access view for a social resource may be based, for example, on profile data and other characteristics of a particular device, user or group providing or seeking access to such resource. Likewise, various levels of access rights, including content and capabilities access views, may be assigned to a specific social resource or grouping of resources.
摘要:
A social networking system enables interaction between various devices, infrastructures, and the like based upon monitoring, analysis, processing, and the like of information received from devices. Some or all of an infrastructure can monitor information output from one or more socially controllable devices. Upon receiving a trigger or determining a trigger event processing of received data, some or all of the infrastructure, supporting processing systems, and the like can take one or more various responsive actions, including contacting a user associated with the social devices, contacting a third party that is not a member of the social network group, contacting a service that is a member of the group, and controlling or enabling others to control aspects of devices docked with the user's group. A user can manage various levels of authorized interaction between associated devices and a docked social group.
摘要:
An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services.
摘要翻译:Ad Hoc社交网络环境可以实现社交网络组和社交网络成员之间的信息和设备访问管理,无论是否具有访问限制和匿名性。 联系和访问信息可以即时交换和更新,而不需要用户通知其他联系人或联系设备,并且可以支持底层的联系人信息更改,使得临时终止或修改联系人访问,启用临时访问等。 Ad Hoc社交网络可以利用独特的标识符,代理元素等来支持各种会员匿名和Ad Hoc社交网络。 代理元素使SNET通过从成员撤回代理服务来拆除或解散。 将社群组联系信息存储在共享数据库中可以实现共享和更新联系信息,而无需通知受影响的联系人。 一些社交网络可以包括各种专门的设备和相关的服务。
摘要:
Streaming transcoder with adaptive upstream and downstream transcode coordination. A real-time transcoding environment is operative such that scalable video coding (SVC) is implemented to operate both upstream and downstream directions with respect to a middling device or transcoder such that the middling device or transcoder asked to coordinate upstream SVC with downstream SVC. Such upstream/ downstream SVC coordination may also employ local considerations such as processing resources, available memory, etc. of the middling device or transcoder. Also, characteristics associated with one or more other devices, communication links, communication networks, etc. may be used to direct such adaptation. Moreover, control and/or feedback signaling between respective devices may also be used to assist in the adaptive operation of such a real-time transcoding environment. Generally speaking, such coordination between upstream SVC and downstream SVC is performed automatically in a multipoint fashion considering local and/or remote characteristic(s) associated with the overall communication system.
摘要:
Secure handoff among devices during media playback. Playback of media, from one or more sources, on two or more respective devices is performed in an automated or simplified manner based upon a near field communications (NFC) or like security pairing transaction between those devices. The security pairing may provide direction for any of a number of operational parameters by which the media is to undergo playback on the different respective devices (e.g., source of the media, quality of the media, digital rights management (DRM), an authentication, authorization, and accounting (AAA) protocol, etc.). Certain implementations allow for user interaction to augment or override automatic or seamless operation between the respective devices for continuous playback of media thereon. Successive security pairings may be performed within any of a number of respective devices (e.g., from a first device to a second device, from a second device to a third device, etc.).
摘要:
A communications network is disclosed that includes one or more microwave backhaul nodes for routing communications between one or more near end mobile communications devices and one or more far end mobile communications devices. The communications network includes a central monitoring and control infrastructure, a remote monitoring and control infrastructure and/or a local monitoring and control infrastructure. The central monitoring and control infrastructure, the remote monitoring and control infrastructure and/or the local monitoring and control infrastructure can directly manage the one or more microwave backhaul nodes. Alternatively, the remote monitoring and control infrastructure and/or the local monitoring and control infrastructure can indirectly manage the one or more microwave backhaul nodes through the central monitoring and control infrastructure.
标题翻译:ütenüten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten ten
摘要:
A method and apparatus for providing access to and visibility of resources in a social network. In one embodiment, access rights and related access views are manually or automatically defined for information and resources associated with a human or device member of a social network circle. Selection of an access view for a social resource may be based, for example, on profile data and other characteristics of a particular device, user or group providing or seeking access to such resource. Likewise, various levels of access rights, including content and capabilities access views, may be assigned to a specific social resource or grouping of resources.
摘要:
Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Different levels of content security can be applied to the shared content, depending on who requests the content, the destination of the content, user preferences, content type, SNET, SNET circle, or other security parameters. Content can be tagged to limit the number of times it can be accessed, the length of time access is allowed, and to otherwise control redistribution. Content can also be protected by limiting host network access to the content, implementing SNET circle firewalls and virtual private networks, or transcoding content before allowing transmission to non-SNET circle or SNET members. Docking of devices into an SNET security circle can be restricted to properly secured devices.
摘要:
A social networking system offers a variety of device service and support functions via automated social network (SNET) group associations. Such functions can include, for example, device registration and warranty services, update and upgrade services, maintenance and testing services, resource utilization reporting services, cloning services, usage tutorials and user group interactions, targeted advertising, etc. In various embodiments, support services may be offered upon automated docking of a social device with a SNET group, such as a manufacturer's SNET group. Selection of available services may be automated based on device profile data. Alternatively, services may be manually selected through a user interface provided by a member device or support service. In other embodiments, all or portions of a first device may be cloned on a second device, either on a persistent or temporary basis.