摘要:
The present invention provides for a system and method facilitating configuration management. The system includes a configuration store that stores persisted configuration and/or dependency information associated with application(s), and, a configuration service component that manages access to the configuration store. The system can further include a configuration management engine (e.g., API) that allows client application(s) to access, query and/or modify setting(s). In accordance with an aspect of the present invention, application(s) submit an XML assembly manifest which comprises: the assembly identity, the application binaries, its dependencies etc. The manifest can also include a configuration section that declaratively specifies the persisted settings for the application. The configuration section includes an XSD-based schema that defines rich types for the settings and the settings themselves, and metadata for these settings including description and default values, manageability attributes (e.g., migrate, backup, policy), and integrity constraints called assertions (that could potentially describe the relationships between settings).
摘要:
A technique for selecting a media streaming engine, such as a stream server, to source a media stream to a client involves receiving feedback information from a client that indicates a quality of service experienced by the client and then selecting a media streaming engine, from a set of media streaming engines, in response to the feedback information. In an embodiment, the feedback information is provided in Real-Time Control Protocol (RTCP) messages. For example, the RTCP messages are Receiver Report (RR) messages that contain packet loss and/or inter-arrival jitter information. Feedback information such as packet loss and/or inter-arrival jitter information represents the actual quality of service experienced by a client for a media stream. Because a media streaming engine is selected based on the actual quality of service experienced by a client, the selection process can be configured to optimize the quality of service of the media streaming.
摘要:
Systems and methods are disclosed for creating image maps. Some embodiments include a method comprising the steps of: capturing a first image illuminated by natural light and capturing a second image illuminated by infrared light. The second image may be captured at the same time as the first image. The R, G, and B values for each pixel in the first image may be determined. The intensity for each pixel in the first image may be calculated. An IR intensity for each pixel in the second image may be calculated. A depth value may then be estimated for each pixel using the ratio of the IR intensity and the intensity of corresponding pixels in the first and second images.
摘要:
A system and process are provided to reduce the latency associated with delivery of data for trick functions (e.g., fast-forward or rewind) in data distribution systems. In response to a request for a trick function associated with program data being streamed to a user terminal, first trick data frames for the trick function are retrieved from a first computing apparatus (e.g., a storage server) and in the meantime second trick data frames for the trick function are generated at a second computing apparatus (e.g., streaming server). Until the first trick data frames arrive from the first computing apparatus, the second computing device streams the second trick data frames to the user terminal. The second computing apparatus streams the first trick data frame to the user terminal as they arrive. A user at the user terminal experiences minimal delay in viewing a requested trick function since the second computing apparatus begins sending the trick data to the user terminal before the pre-built trick data arrives for streaming to the user terminal. The streaming server also buffers trick data frames for a current speed trick that may be used for dynamically generating trick data frames a next higher speed trick requested by the user terminal.
摘要:
In accordance with the present invention, a system, method, and computer-readable medium for aggregating the knowledge base of a plurality of security services or other event collection systems to protect a computer from malware is provided. One aspect of the present invention is a method that proactively protects a computer from malware. More specifically, the method comprises: using anti-malware services or other event collection systems to observe suspicious events that are potentially indicative of malware; determining if the suspicious events satisfy a predetermined threshold; and if the suspicious events satisfy the predetermined threshold, implementing a restrictive security policy designed to prevent the spread of malware.
摘要:
In accordance with this invention, a system, method, and computer-readable medium that aggregates the knowledge base of a plurality of antivirus software applications are provided. User mode applications, such as antivirus software applications, gain access to file system operations through a common information model, which obviates the need for antivirus software vendors to create kernel mode filters. When file system operations are available to antivirus software applications, the present invention may cause each antivirus software application installed on a computing device to perform a scan to determine if the data is malware.
摘要:
Techniques are provided herein for failover streaming mechanisms. At a first device (e.g., a content router device) that is configured to interface with a plurality of streaming servers for real-time protocol packet streams, communications are configured with a client device and a first of the plurality of streaming servers associated with a streaming session from the first streaming server to the client device so that the first device receives client session control and session feedback messages associated with the streaming session and so that a packet stream associated with the streaming session transmitted by the first streaming server to the client device does not pass through the first device. The first device stores session state information comprising an address of the client device, streaming session identification information and data representing a current state of the streaming session at the client device derived from the client session control and session feedback messages. Upon detecting a failure of the first streaming server, the first device selects a second of the plurality of streaming servers for serving the streaming session previously served by the first streaming server, and then initiates a streaming session from the second streaming server to the client device in order to continue from a state of the streaming session previously served by the first streaming server prior to the failure without any indication at the client device of the switching from the first streaming server to the second streaming server.
摘要:
The present invention is directed toward a system, method, and a computer-readable medium for efficiently loading data into memory in order to scan the data for malware. The logic provided in the present invention improves the experience of a user when operating a computer protected with antivirus software. One aspect of the present invention is a method that identifies a pattern in which data in a file is loaded into memory from a computer-readable medium. Then the method identifies a pattern in which data in the file may be loaded into memory in a way that minimizes the time required to read data in the file. When a subsequent scan of the file is scheduled to occur, the method causes data in the file to be loaded in memory using the pattern that minimizes the time required to read data in the file.
摘要:
In accordance with the present invention, a system, method, and computer-readable medium for sharing information between computers, computing devices, and computing systems in a networking environment to determine whether a network is under attack by malware is provided. In instances when the network is under attack, one or more restrictive security policies that protect computers and/or resources available from the network are implemented.
摘要:
The present invention provides a system, method, and computer-readable medium for quarantining a file. Embodiments of the present invention are included in antivirus software that maintains a user interface. From the user interface, a user may issue a command to quarantine a file or the quarantine process may be initiated automatically by the antivirus software after malware is identified. When a file is marked for quarantine, aspects of the present invention encode file data with a function that is reversible. Then a set of metadata is identified that describes attributes of the file including any heightened security features that are used to limit access to the file. The metadata is moved to a quarantine folder, while the encoded file remains at the same location in the file system. As a result, the encoded file maintains the same file attributes as the original, non-quarantined file, including any heightened security features.