摘要:
A technique for supporting trick modes in a streaming digital video environment involves receiving a source stream of digital video content that is encoded for a normal playout rate and generating a root trick mode stream from the source stream, wherein the root trick mode stream is generated for a playout rate that is faster than the normal playout rate. The root trick mode stream is then used to generate subsequent trick mode streams that have faster playout rates than the root trick mode stream. Using a root trick mode stream to generate subsequent trick mode streams requires only one trick mode stream to be generated at ingest and therefore reduces ingest processing requirements and eliminates the need to store a different trick mode stream for every possible trick mode playout rate.
摘要:
A technique for managing the streaming of digital video content to multiple clients involves identifying an attribute of a content element that is streamed to a client and selecting a protection mechanism for the content element as a function of the attribute, wherein the protection mechanism enables streaming of the content element to the clients in the event of a resource failure. In an example, the identified attribute is an indication of the popularity of the content element (e.g., as measured by the number of active streams), such that the protection mechanism is selected as a function of the popularity of the content element. In an embodiment, protection mechanisms that offer a higher level of protection are selected for the more popular content elements and protection mechanisms that offer a lower level of protection are selected for the less popular content elements.
摘要:
A method and system for conditioning a media stream for splicing are disclosed. In an embodiment, content-specific splice points, which correspond to a possible playout splice point within an original media stream, are identified for both audio and video components of the original media stream. Once the audio bitstream and video bitstream splice points are identified, the audio bitstream in the vicinity of the audio bitstream splice point is packetized into IP packets containing only audio with one of the audio-containing IP packets having an IP packet boundary that corresponds to the audio bitstream splice point and the video bitstream in the vicinity of the video bitstream splice point is packetized into IP packets containing only video with one of the video-containing IP packets having an IP packet boundary that corresponds to the video bitstream splice point. The conditioned original media stream is then transmitted downstream to a splicer.
摘要:
A method and system for conditioning a media stream for splicing are disclosed. In an embodiment, content-specific splice points, which correspond to a possible playout splice point within an original media stream, are identified for both audio and video components of the original media stream. Once the audio bitstream and video bitstream splice points are identified, the audio bitstream in the vicinity of the audio bitstream splice point is packetized into IP packets containing only audio with one of the audio-containing IP packets having an IP packet boundary that corresponds to the audio bitstream splice point and the video bitstream in the vicinity of the video bitstream splice point is packetized into IP packets containing only video with one of the video-containing IP packets having an IP packet boundary that corresponds to the video bitstream splice point. The conditioned original media stream is then transmitted downstream to a splicer.
摘要:
A network transmitter schedules packets so that packets are transmitted to a host or group of hosts so as not to overload any particular part of the network. In an embodiment, the transmitter uses packet data structures with a schedule indication for packets placed in the queue so that an independently running adaptor may know when to remove packets from the queue and transmit them. In an alternative embodiment, packets are scheduled by setting a future interrupt for transmitting a packet or group of packets. In a further embodiment, packets are placed in temporal sets where a temporal set is a group of packets that can be transmitted in succession without violating the bandwidth limitations of any network segment.
摘要:
The disclosure generally describes computer-implemented methods, software, and systems for identifying a preferred next best customer for pharmaceutical sales representatives to contact to promote a pharmaceutical product. A customer can be defined as any health care practitioner, health care facility, health care hospital system, or health care plan.
摘要:
A system and process are provided to reduce the latency associated with delivery of data for trick functions (e.g., fast-forward or rewind) in data distribution systems. In response to a request for a trick function associated with program data being streamed to a user terminal, first trick data frames for the trick function are retrieved from a first computing apparatus (e.g., a storage server) and in the meantime second trick data frames for the trick function are generated at a second computing apparatus (e.g., streaming server). Until the first trick data frames arrive from the first computing apparatus, the second computing device streams the second trick data frames to the user terminal. The second computing apparatus streams the first trick data frame to the user terminal as they arrive. A user at the user terminal experiences minimal delay in viewing a requested trick function since the second computing apparatus begins sending the trick data to the user terminal before the pre-built trick data arrives for streaming to the user terminal. The streaming server also buffers trick data frames for a current speed trick that may be used for dynamically generating trick data frames a next higher speed trick requested by the user terminal.
摘要:
A method for detecting reachability of client computers communicatively coupled in a computer network to a server computer. A plurality of identifier tags are resident in the memory of the server. The server generates a data packet comprising an I.C.M.P. echo packet and selects a first identifier tag from among the plurality of identifier tags resident in memory, the first identifier tag being chosen to correspond to a first client computer. The server inserts the first identifier tag into the proper data segment of the echo packet and forwards the packet to the first client. After a predetermined time awaiting a responsive ping from the client, the server determines if the client is tag-compliant or non tag-compliant.
摘要:
A master processor, such as a processor embedded in a network interface card, is coupled to a memory via a memory data bus. The master processor generates addresses for the memory and controls the reading and writing of the memory at addressed locations. A slave processor, such as an optional encryption engine, has a data input/output bus connected to the memory data bus. The master processor also controls the reading and writing of data to/from the slave processor via the memory data bus. The master processor effects data transfers from the memory to the slave processor over the data bus by generating a series of memory addresses to read the data from the memory onto the data bus. As each data word appears on the data bus, it is written into the slave processor. The master processor effects data transfers from the slave processor to the memory over the data bus by reading a series of data from the slave processor onto the data bus, generating a series of memory addresses as the data are being read from the slave processor, and writing each data word into the memory as it appears on the data bus.
摘要:
A network adaptor that generates interrupts to a host system when data is received from the network or downloaded from system memory for transmittal over the network. The adaptor generates interrupts after a delay determined by an interrupt deferral mechanism, which includes one or more timers and/or one or more counters. Interrupts are generated, for example, after a predetermined time has elapsed after a DMA completion or after a certain number of packets are counted.