摘要:
In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol. The link quality may represent the quality of the end-to-end connection between client and server with upper and lower bounds on the injection of additional traffic used for measurement. In some embodiments, the measurement technique may be selected based on the type of measurement that is desired. Accuracy may be maintained by selecting the type of measurement used based on current and previous network conditions. In one embodiment, a state model is used to determine the frequency of measurement and to determine when the measurements have produced a stable estimate of the link quality.
摘要:
An invention is disclosed for efficiently processing and transmitting graphics data in a remote desktop environment. In embodiments of the invention, a connection is established between a remote desktop server computer and a remote desktop client computer. The remote desktop server computer may process graphics data representative of a remote user desktop. The remote desktop server computer may divide the remote desktop screen in data regions and portions. The remote desktop server computer may then encode and transmit each region to the remote desktop client computer at a certain quality that may be adjusted progressively across the screen frames. The remote desktop server computer may also stop encoding and transmitting the portions of the data region that would not be visible to a user when the region is rendered on a display. The remote desktop user experiences an image quality gradually improving with each frame containing information about the image.
摘要:
Implementations of the present invention efficiently establish secure connections between a client and server, at least in part by authenticating the client and server early on in the connection setup phases. A client initiating a connection with a server identifies the secure communication protocols enabled at the client, and identifies these protocols in a connection request it sends to the server. The server processes the message and responds with a communication protocol it deems appropriate for the connection. The client and server then exchange appropriate authentication information, and then establish a connection session that implements the chosen communication protocol, and encrypts messages using the negotiated communication protocol. Additional implementations relate to reestablishing dropped connections behind virtual Internet Protocol addresses, without necessarily having to recommit much connection resource overhead.
摘要:
The present invention analyzes a user's or client application's requirements and searches for a solution based on the end-to-end latency requirements (requested or derived), data formats, control protocols, timing and synchronization, local streaming, and resource availability. The search for a solution is tracked to allow backtracking from the point of no solution. Once a solution is determined, the system translates the solution into requirements for the individual components of the graph.
摘要:
Presented is a system and method for determining a user's intent. Specifically, constituents and a topology are derived from the user's expression of intent, which can be stated broadly or stated in specific detail. The intent is expressed verbally, written, or in an XML format. The constituents and topology are resolved into a configuration based upon contexts. The contexts, which include a resource context, a user context, and an application context, includes information about the user's preferences, location, restrictions, device and network availability, and content availability. The configuration is then implemented.
摘要:
Presented is a system and method for determining a user's intent. Specifically, constituents and a topology are derived from the user's expression of intent, which can be stated broadly or stated in specific detail. The intent is expressed verbally, written, or in an XML format. The constituents and topology are resolved into a configuration based upon contexts. The contexts, which include a resource context, a user context, and an application context, includes information about the user's preferences, location, restrictions, device and network availability, and content availability. The configuration is then implemented.
摘要:
High Fidelity remoting can be enabled by loading a hybrid remote session in a computer system. The hybrid remote session can include components loaded in a console session and components loaded in a remote session.
摘要:
A strategy is described in which multiple testing agents perform multiple respective tests in a multi-user environment. One such multi-user environment allows multiple clients to interact with remote applications that are executed on a server. According to one exemplary case, a central test management module coordinates the execution of the multiple tests by the testing agents. For instance, the test management module can prevent testing agents that make demands on a global state of the multi-user environment from interfering with other testing agents.
摘要:
Presented is a system and method for determining a user's intent. Specifically, constituents and a topology are derived from the user's expression of intent, which can be stated broadly or stated in specific detail. The intent is expressed verbally, written, or in an XML format. The constituents and topology are resolved into a configuration based upon contexts. The contexts, which include a resource context, a user context, and an application context, includes information about the user's preferences, location, restrictions, device and network availability, and content availability. The configuration is then implemented.
摘要:
Embodiments that facilitate the fair and dynamic distribution of central processing unit (CPU) time are disclosed. In accordance with one embodiment, a method includes organizing one or more processes into one or more groups. The method further includes allocating a CPU time interval for each group. The allocation of a CPU time interval for each group is accomplished by equally distributing a CPU cycle based on the number of groups. The method also includes adjusting the allocated CPU time intervals based on a change in the quantity of the one or more groups.