摘要:
A transport engine and method. The transport engine including an async socket module to provide network communications, a client module, coupled to the async socket module and an application layer, to initiate outbound network communications, and a server module, coupled to the async socket module and the application layer, to handle inbound network communications. The client module and the server module utilize the async socket module to read and write data to and from a network. The async socket module includes a buffer having a variable buffer size to enable the async socket module to read data without having to copy the data. The async socket module, the client module, and the server module operate asynchronously on a single thread of execution.
摘要:
A method, machine readable medium, and system are disclosed. In one embodiment the method comprises optimizing a web-based markup language document by removing all non-functional characters, compressing the document, storing the compressed and optimized document directly in a universal plug and play stack, and decompressing and transmitting the document in real-time in response to any given access request.
摘要:
A system and method for parsing XML strings. According to the method, an input string is transformed into linked list node structures. The syntax of the input string is verified. Using the linked list node structures that include attributes, linked list attribute structures are created. Using the reserved pointers from the linked list node structures, data segments within the input string are obtained. The linked list node structures and attribute structures are freed. Freeing the linked list node structures and attribute structures deletes the linked list node and attribute structures while maintaining pointers, defined within the linked list node and attribute structures, into the input string that define data and attributes within each of a plurality of elements contained within the input string.
摘要:
A system, an apparatus, and a method for automatically configuring a virtual private network. The system, apparatus, and method include providing virtual private network settings to the node in a common format for automatic exchange of information between networked devices.
摘要:
An apparatus, including a media service access module, and methods practiced thereon, for transparently facilitating a media rendering application to render a media file to a remote client device, are described herein.
摘要:
A pair of shorter range radio frequency networks may be linked together using a longer range communication protocol that is not based on the same radio frequency protocol utilized by the shorter range radio frequency networks. Enumeration data from one of the shorter range networks may be exchanged over a longer range network to combine the two shorter range networks using proxy devices such as cellular telephones. This may allow devices in a shorter range network to communicate over a longer range.
摘要:
Various embodiments for remote presentation of an interface of a computing device, such as a PC, are described herein. In particular, in various illustrated embodiments, a local device such as a Digital Media Adapter (DMA), mobile device, cellular telephone, etc. may be used to receive input from a remote control, where the local device provides human perceptible feedback, such as a sound, visual response, etc., responsive to use of the remote control. In some embodiments, the local device may contain a memory or cache for locally storing particular feedback data for human perceptible feedback. In various embodiments, a communication protocol is provided for storing, triggering, deleting, etc. feedback data in the memory or cache. Other embodiments may be disclosed or claimed.
摘要:
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements.
摘要:
A device, method, and system are disclosed. In one embodiment a computing device resides in a mesh network. The device includes a first storage device that operates when the computing device is awake. The first storage device stores a last known list of peer computing devices in the mesh network. The device also includes a second storage device that operates regardless of whether any central processing unit in the computing device is awake or asleep. The second storage device includes a local block that stores a list of resources provided by the first computing device and a list of computing devices in the mesh network verified by the first computing device. The second storage device also includes a remote block that stores an unverified remote list of computing devices in the mesh network.