Abstract:
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object.
Abstract:
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object.
Abstract:
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a web page loading on a browser, an analysis may be performed to determine a trust level for the object. The object is suppressed based on the trust level. A prompt is displayed to advise a user that the object has been suppressed, and to provide an opportunity to interactively accept or decline activation of an action for the object.
Abstract:
Program code enabling the streaming of HD content in real-time to a game console is stored on a storage medium remote from the game console. The game console executes software that facilitates transfer of the program code from the remote storage medium to the game console. The program code ensures that sufficient bandwidth exists on a network between the game console and a HD tuner, and enables the streaming of HD content in real-time to the game console.
Abstract:
Adware and viruses are examples of objects that may be embedded in a webpage or linked to a webpage. When such an object is detected to be associated with a webpage loading on a browser, an analysis may be performed to determine a trust level for the object. The object may be blocked in accordance with the trust level. A prompt may be displayed to advise a user that the object is being blocked, provide a description of the object, and to provide an opportunity to interactively accept or decline activation of an action for the object.
Abstract:
A system receives multiple data samples and determines time stamp values associated with each of the multiple data samples. The system identifies an earliest time stamp value and uses that time stamp value as an initial system clock value. The system may also subtract a delay factor from the earliest time stamp value to account for delay in decoding the multiple data samples. The earliest time stamp value is also communicated to an audio decoder and a video decoder. The audio and video decoders provide clock data back to a component that maintains the system clock value. If the difference between the clock data received from the decoders and the system clock value exceeds a threshold value, the system clock value is recalculated.
Abstract:
A transrate manager on a host computer determines if there is a limitation in network bandwidth and controls the bit-rate of streaming media content accordingly. The bit-rate is controlled by excluding types of video frames from the streaming media content and then reintroducing excluded types of video frames back into the streaming video content once the network has recovered.
Abstract:
Strategies are described for transmitting control information from a host module to a client module. The host module transmits the control information in-band along with a stream of media content information packets. The control information can be used to govern the operation of the client module. In one case, the control information alerts the client module to a discontinuity in streams, which may be the result of the user changing channels via the host or client module, etc., issuing a seek instruction, and so forth. Transmitting the control information in in-band fashion is advantageous because it reduces the need for complex linking between the control information and the associated content information.
Abstract:
Strategies are described for coalescing the processing tasks associated with a series of control events that occur relatively close together in time. The coalescing can involve eliminating redundant tasks by more directly advancing to a terminal control state. One exemplary application of the control coalescing is in the playback of media content information in a networked environment. When a user enters a series of commands to repeatedly change the channel, or repeatedly seek new positions within a single stream, the control coalescing comes into play by aggregating these control events so that it requires fewer control processing tasks to perform. This provision helps reduce the latency associated with handling multiple control events that occur close together in time.
Abstract:
A system for communicating between a terminal equipment and a mobile equipment in a wireless communication system, includes, in the terminal equipment an application, a communication stack, and a hardware driver layer. The communication stack includes a communication socket and a first network adapter component, the application communicating with the communication stack via the communication socket. The hardware driver layer includes a second network adapter component, the first network adapter component communicating with the second network adapter component. The mobile equipment includes a communication driver, the second network adapter component communicating with the communication driver, through which the terminal equipment communicates with the mobile equipment.