Abstract:
A system is configured to receive input to define one or more download policies from a group of available download policies, including one or more network restriction policies, one or more time restriction policies, one or more event restriction policies, and one or more location restriction policies. The system is further configured to receive an instruction to download particular content, determine that the one or more download policies permit the particular content to be downloaded, download the particular content when the one or more download policies permit the particular content to be downloaded, and generate a notification that the particular content is available to be accessed.
Abstract:
A decoder includes multiple decode gates, each to provide one bit of a decoded output signal. At least two of the decode gates share a transistor. According to one aspect, each of the multiple decode gates is a skewed gate.
Abstract:
A stacked die semiconductor package that includes a substrate with a plurality of adhesive portions arranged in a manner to create at least one gap between the adhesive portions. The package also includes a first semiconductor chip having a non-active surface in contact with the adhesive portions, and an active surface being electrically connected to the substrate. In the package, a second semiconductor chip the non-active surface of the second semiconductor chip is attached to the non-active surface of the first semiconductor chip by a layer of adhesive therebetween. The active surface of the second semiconductor chip is electrically connected to the substrate. An encapsulant material covers the first and second semiconductor chips and their associated electrical connections. The encapsulating material fills the at least one gap between the plurality of adhesive portions and thereby encapsulates the second semiconductor chip and its associated electrical connection.
Abstract:
A low power memory bit line precharge scheme. A memory bit line is coupled to a first read precharge device. A second write precharge device is also coupled to the memory bit line and is to be enabled only in response to a memory write operation. The first read and second write precharge devices are sized such that their combined drive strength is sufficient to precharge the first memory bit line during a precharge period following a write operation.
Abstract:
Methods, devices, and non-transitory storage mediums provide a program handoff between user devices. The program handoff permits a user to select a user device with which to resume a playing of the program. The program handoff also permits a user to set a reminder for playing the program. Methods, devices, and non-transitory storage mediums provide for an application layer-based network offloading of programs. A program is buffered based on a network offloading time and the program is played from a buffer during an execution of a network offload. Network offload prediction is used to minimize network offload time and buffering.
Abstract:
A stacked die semiconductor package that includes a substrate with a plurality of adhesive portions arranged in a manner to create at least one gap between the adhesive portions. The package also includes a first semiconductor chip having a non-active surface in contact with the adhesive portions, and an active surface being electrically connected to the substrate. In the package, a second semiconductor chip the non-active surface of the second semiconductor chip is attached to the non-active surface of the first semiconductor chip by a layer of adhesive therebetween. The active surface of the second semiconductor chip is electrically connected to the substrate. An encapsulant material covers the first and second semiconductor chips and their associated electrical connections. The encapsulating material fills the at least one gap between the plurality of adhesive portions and thereby encapsulates the second semiconductor chip and its associated electrical connection.
Abstract:
A method that includes receiving a first request for video content from a user of a user device; retrieving an identifier for the user device using an application programming interface; sending a second request to receive the video content that includes the identifier; receiving an instruction to provide payment to rent or purchase the video content; sending the payment in response to the instruction; receiving the video content and a token, where the video content is encrypted based on a key and where the token indicates that the payment was processed; sending a third request to obtain a license associated with the video content that includes the token and the identifier; receiving the license, which includes the key and terms under which the video content is to be processed; decrypting the video content, using the key, when the decrypting is performed in a manner permitted by the terms; and playing the decrypted video content.
Abstract:
Methods, devices, and non-transitory storage mediums provide a program handoff between user devices. The program handoff permits a user to select a user device with which to resume a playing of the program. The program handoff also permits a user to set a reminder for playing the program. Methods, devices, and non-transitory storage mediums provide for an application layer-based network offloading of programs. A program is buffered based on a network offloading time and the program is played from a buffer during an execution of a network offload. Network offload prediction is used to minimize network offload time and buffering.
Abstract:
A method that includes receiving a first request for video content from a user of a user device; retrieving an identifier for the user device using an application programming interface; sending a second request to receive the video content that includes the identifier; receiving an instruction to provide payment to rent or purchase the video content; sending the payment in response to the instruction; receiving the video content and a token, where the video content is encrypted based on a key and where the token indicates that the payment was processed; sending a third request to obtain a license associated with the video content that includes the token and the identifier; receiving the license, which includes the key and terms under which the video content is to be processed; decrypting the video content, using the key, when the decrypting is performed in a manner permitted by the terms; and playing the decrypted video content.