Abstract:
A system and/or method substantially as shown and described with respect to at least the previous description, for copyright registration and/or screening.
Abstract:
Applications are provided that contain code of a programming language enabling simultaneous display on a screen of both two-dimensional and three-dimensional content. Furthermore, development systems and program libraries supporting the same are provided. A first command is generated by first program code of an application. The first command directs a first configuration of a first region of the screen to support the three-dimensional content. A second command is generated by second program code of the application. The second command directs a second configuration of a second region of the screen to support the two-dimensional content. The display of the three-dimensional content is caused within the first region of the screen, and the display of the two-dimensional content is caused within the second region of the screen.
Abstract:
Adaptive multi-standard video coder supporting adaptive standard selection and mid-stream switch-over. Automatic or semi-automatic selection and reselection between various respective communication protocols or standards (e.g., or profiles of such protocols or standards, subsets of such protocols or standards, etc.) may be made based on any of a number of local and/or remote considerations. For example, characteristics associated with one or more other devices, communication links, communication networks, etc. within a communication system may direct the automatic or semiautomatic selection and reselection between such communication protocols or standards (e.g., or profiles thereof, or subsets thereof, etc.). Also, characteristics associated with local operating conditions (e.g., available processing resources, available memory, etc.) this may be used in accordance with making such selection and reselection. Moreover, consideration may be made with respect to which communication protocol/standard provides relative benefit over others based on a given communication systems present capabilities and conditions.
Abstract:
A communication link may be managed between the user interface and a system, where the user interface allows a user to select the system. The user interface is determined to be capable of being used with the system. It is communicated that the user interface may be used with the system. The user requests that the user interface be allocated for use with the system. The user interface is allocated for use with the system.
Abstract:
An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services.
Abstract:
A first of a plurality of intermediate routing devices is operable to advertise to and/or receive status information from remaining one(s) of the intermediate routing devices. The intermediate routing devices may store and/or analyze the advertised and/or received status information and may make routing decisions based on it. The first routing device may advertise status information for itself and/or for one or more other intermediate routing devices. Data may be routed based on type of data, service level and/or priority associated with the data. The advertised and/or received status information comprises current status information, predicted status information and/or past status information which may be based on one or more of port status, CPU utilization, memory utilization, quality of service (QoS), bandwidth utilization, bandwidth availability, traffic load, congestion, number of connections handled and capability to provide a particular level of service.
Abstract:
A method and apparatus support delivering a video media stream to a wireless device by exchanging communication signals through a secure communications interface to establish first and second communication channels. The channels may be according to different communication protocols. A first portion of the streamed video media stream over the first communication channel is encrypted while a second portion of the video media stream over the second communication channel is not encrypted. The second portion is based on the first. In addition to encryption of only the first portion, one embodiment includes using different communication protocols for the first and second channels to further enhance secure media delivery.
Abstract:
A communication system is described that allows co-located viewers to simultaneously consume different media content, such as different video content, via the same display screen, wherein video content delivered to at least one co-located viewer is not visible to the other co-located viewer(s). The communication system comprises an infrastructure that includes multiple pathways for delivering media content from one or more media sources to the eyes of each of the co-located viewers, wherein each pathway passes through the pixels of a pixel array included in the shared display screen. The pathways also include distributed or non-distributed processing circuitry that manages certain resources that are shared among the multiple pathways, wherein such shared resources may include shared display resources (e.g., pixels of the pixel array and light generated thereby) and shared data communication resources (e.g., bandwidth on data communication links and processing resources of nodes located on such links).
Abstract:
A social networking system offers a variety of fixed and intelligent services and social device resources participating as members in a social network (SNET) group. Such members may include, for example, social billing and payment services, digital assistants and artificial intelligence functions, robotic control and training services, media content storage and playback services, data backup services, services that support distributed processes such as distributed research projects, networking elements such as network attached storage (NAS), firewalls, proxies, etc. In various embodiments, such services and resources may become available upon being selectively docked or otherwise associated (e.g., through docking of a supporting device) with a SNET group by a human member or third party via a docked user device. Selection of available services may be supported through a visual menu provided by a member device or support service.
Abstract:
Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Different levels of content security can be applied to the shared content, depending on who requests the content, the destination of the content, user preferences, content type, SNET, SNET circle, or other security parameters. Content can be tagged to limit the number of times it can be accessed, the length of time access is allowed, and to otherwise control redistribution. Content can also be protected by limiting host network access to the content, implementing SNET circle firewalls and virtual private networks, or transcoding content before allowing transmission to non-SNET circle or SNET members. Docking of devices into an SNET security circle can be restricted to properly secured devices.