Abstract:
A method is provided in one example embodiment and includes, for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units.
Abstract:
In one embodiment, a method includes displaying a test pattern on a display device associated with a client device, the test pattern comprising a stereoscopic image having first and second images and depth characteristics associated with an offset between the first and second images; adjusting the offset between the first and second images in response to inputs received from a user of the client device viewing said stereoscopic image from at least one viewing position; and storing the adjusted offset in a storage device.
Abstract:
In one illustrative example, a network cybersecurity procedure may be employed with use of at least one unmanned aerial vehicle (UAV), where the UAV includes an intermediary pairing device for providing a temporary connection between a first network (e.g. a private LAN) and a second network (e.g. the Internet). The network cybersecurity procedure may involve deploying the UAV in proximity to the first network, such that the intermediary pairing device pairs with a first pairing device via a first transceiver and with a second pairing device via a second transceiver. A temporary connection is established between the first network connected via the first pairing device and the second network connected via the second pairing device. Data is communicated between a first device (e.g. IoT device) or server of the first network and a second device or server of the second network over the temporary connection. During this time, the intermediary pairing device executes a cybersecurity service function. Once completed, the UAV may be withdrawn out of proximity of the first network. One or more features of the cybersecurity service function may be updated and the UAV redeployed. Multimodal data fusion techniques with use of a plurality of network and device sensors may be employed for device verification and/or anomaly detection.
Abstract:
According to one aspect, a method includes identifying at least a first chunk to be obtained, the at least first chunk including at least a first packet, and determining a deadline for the first chunk, the deadline being indicative of an amount of time before the first chunk is needed. The method also includes determining whether the deadline for the first chunk is relatively long, and de-prioritizing the first chunk with respect to obtaining the first chunk for queueing in a buffer when it is determined that the deadline for the first chunk is relatively long. Finally, the method includes obtaining the first chunk for queueing in the buffer, wherein obtaining the first chunk for queueing in the buffer includes obtaining the first chunk after obtaining a second chunk for queueing in the buffer, the second chunk having a shorter deadline than the deadline for the first chunk.
Abstract:
A method is provided in one example embodiment and includes, for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units.
Abstract:
In one embodiment, a method includes displaying a test pattern on a display device associated with a client device, the test pattern comprising a stereoscopic image having first and second images and depth characteristics associated with an offset between the first and second images; adjusting the offset between the first and second images in response to inputs received from a user of the client device viewing said stereoscopic image from at least one viewing position; and storing the adjusted offset in a storage device.
Abstract:
In one illustrative example, a network cybersecurity procedure may be employed with use of at least one unmanned aerial vehicle (UAV), where the UAV includes an intermediary pairing device for providing a temporary connection between a first network (e.g. a private LAN) and a second network (e.g. the Internet). The network cybersecurity procedure may involve deploying the UAV in proximity to the first network, such that the intermediary pairing device pairs with a first pairing device via a first transceiver and with a second pairing device via a second transceiver. A temporary connection is established between the first network connected via the first pairing device and the second network connected via the second pairing device. Data is communicated between a first device (e.g. IoT device) or server of the first network and a second device or server of the second network over the temporary connection. During this time, the intermediary pairing device executes a cybersecurity service function. Once completed, the UAV may be withdrawn out of proximity of the first network. One or more features of the cybersecurity service function may be updated and the UAV redeployed. Multimodal data fusion techniques with use of a plurality of network and device sensors may be employed for device verification and/or anomaly detection.
Abstract:
Techniques in an information-centric network (ICN) for facilitating the transport of passengers or items are described. In one illustrative example, a first mobile device is configured to operate as a mobile transportation-offering ICN endpoint device. The first mobile device may connect to one of a plurality of fixed-location ICN nodes in the ICN network. The first mobile device may communicate in the ICN network one or more interest packet messages indicating an interest in a passenger or item to transport. The interest in a passenger or item to transport may be indicated in, for example, a Named Data Object (NDO). The one or more interest packet messages may include current transportation route information indicating a current anticipated route of transportation for a current passenger or item. In response, the first mobile device may receive, from a second mobile device configured to operate as a mobile transportation-accepting ICN node, one or more response messages indicating an acceptance of the transport.
Abstract:
In one embodiment, an interactivity agent provides display data from a plurality of devices to a touch screen display via a network for simultaneous presentation on the touch screen display. The interactivity agent receives touch information regarding a touch action performed via the touch screen display with respect to the display data from a particular one of the plurality of devices. The interactivity agent translates the received touch information from the touch screen display into translated touch information for the particular device. The interactivity agent sends, to a particular device via the network, the translated touch information. The translated touch information causes the particular device to replicate the touch action on a display of the particular device.