REMOTE DISPLAY CONTROL
    331.
    发明申请
    REMOTE DISPLAY CONTROL 有权
    远程显示控制

    公开(公告)号:US20150070250A1

    公开(公告)日:2015-03-12

    申请号:US14483928

    申请日:2014-09-11

    Inventor: Young-Tae Chang

    Abstract: Technologies are generally described for controlling remote display. In some examples, a method for controlling a remote display device using a handheld computing device includes receiving, by a handheld computing device, one or more data from one or more remote display devices over a wireless communication network, selecting a remote display device based on the received data and sending a control signal to the selected remote display device.

    Abstract translation: 技术通常用于控制远程显示。 在一些示例中,使用手持式计算设备来控制远程显示设备的方法包括:通过手持计算设备通过无线通信网络从一个或多个远程显示设备接收一个或多个数据,基于 接收的数据并向所选择的远程显示设备发送控制信号。

    ENCRYPTION USING REAL-WORLD OBJECTS
    332.
    发明申请
    ENCRYPTION USING REAL-WORLD OBJECTS 有权
    加密使用真实世界对象

    公开(公告)号:US20150063566A1

    公开(公告)日:2015-03-05

    申请号:US14517094

    申请日:2014-10-17

    Abstract: Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.

    Abstract translation: 通常描述技术来提供使用真实世界对象的加密方法。 在一些示例中,方法可以包括由第一电子设备捕获外部对象,生成与外部对象相关联的对象信号,基于对象信号生成加密密钥,以及将通过加密密钥加密的数据发送到 第二电子设备。

    AGGREGATION OF BANDWIDTH FROM MULTIPLE WIRELESS DEVICES
    333.
    发明申请
    AGGREGATION OF BANDWIDTH FROM MULTIPLE WIRELESS DEVICES 有权
    多重无线设备的带宽聚合

    公开(公告)号:US20150050898A1

    公开(公告)日:2015-02-19

    申请号:US14118649

    申请日:2013-08-13

    Abstract: Technologies are generally described for an aggregation of bandwidth from multiple wireless devices. In some examples, a source device may communicate with a destination device at a first bandwidth. The source device may divide data into a first piece and a second piece. The source device may transmit the first piece to a first wireless device and the second piece to a second wireless device over a first network. The first wireless device and second wireless device may communicate with the destination device at a second bandwidth and a third bandwidth respectively. The first bandwidth may be less than an aggregation of the second bandwidth and the third bandwidth. The first wireless device may transmit the first piece over a second network, different from the first network, to the destination device. The second wireless device may transmit the second piece over a third network, different from the first network, to the destination device.

    Abstract translation: 技术通常被描述为来自多个无线设备的带宽聚合。 在一些示例中,源设备可以以第一带宽与目的地设备进行通信。 源设备可以将数据划分为第一块和第二块。 源设备可以通过第一网络将第一块发送到第一无线设备,并将第二块发送到第二无线设备。 第一无线设备和第二无线设备可以分别以第二带宽和第三带宽与目的地设备进行通信。 第一带宽可以小于第二带宽和第三带宽的聚合。 第一无线设备可以通过不同于第一网络的第二网络将第一块传输到目的地设备。 第二无线设备可以通过不同于第一网络的第三网络将第二块传输到目的地设备。

    SECURING BACKING STORAGE DATA PASSED THROUGH A NETWORK
    336.
    发明申请
    SECURING BACKING STORAGE DATA PASSED THROUGH A NETWORK 有权
    通过网络保护备份存储数据

    公开(公告)号:US20150033036A1

    公开(公告)日:2015-01-29

    申请号:US14256616

    申请日:2014-04-18

    CPC classification number: H04L9/00 H04L9/0631 H04L2209/08

    Abstract: Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing storage device are in encrypted form before that data is transferred to another device or over a network. In some examples, the methods, data processing devices and computer readable media may be arranged to encrypt the data passed to the network when the data stored in the backing storage device is in unencrypted form. Also disclosed are methods, data processing devices and computer readable media that identify when the data stored in the backing storage device is in unencrypted form, including methods that may detect that the data may appear to be in encrypted form as a result of the data being compressed.

    Abstract translation: 本文描述的技术通常涉及方法,数据处理设备和计算机可读介质,以确保在将数据传送到另一设备或通过网络之前,存储在远程备份存储设备中的数据是加密形式。 在一些示例中,方法,数据处理设备和计算机可读介质可以被布置为当存储在后备存储设备中的数据是未加密的形式时加密传递到网络的数据。 还公开了识别何时存储在后备存储设备中的数据处于未加密形式的方法,数据处理设备和计算机可读介质,包括可以检测到数据可能看起来是加密形式作为数据的结果的方法 压缩

    DETERMINING USER KEY-VALUE STORAGE NEEDS FROM EXAMPLE QUERIES
    337.
    发明申请
    DETERMINING USER KEY-VALUE STORAGE NEEDS FROM EXAMPLE QUERIES 有权
    从示例查询中确定用户主要价值存储需求

    公开(公告)号:US20140372377A1

    公开(公告)日:2014-12-18

    申请号:US14470733

    申请日:2014-08-27

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally provided for conveying tree and index needs of a database by collecting and forwarding a statistically representative set of data requests so that a new datacenter can use its existing auto-learning and adjustment techniques to create local indices before receiving its first real or live requests. In some examples, requests at an origin datacenter may be collected to provide a small population of queries that are representative of a larger population of queries. Filters anonymizers may be employed to adhere to data sharing rules and restrictions while still allowing a new datacenter to build indices and test performance. Thus, the new datacenter may be trained asynchronously from another site and without actual data changing hands. Training and testing of destination database services may be completed before committing to customer migration.

    Abstract translation: 通常通过收集和转发统计上具有代表性的一组数据请求来传送数据库的树和索引需求的技术,使得新的数据中心可以在接收其第一个真实或实时之前使用其现有的自动学习和调整技术来创建本地索引 要求。 在一些示例中,可以收集原始数据中心的请求以提供代表较大群查询的小量查询。 可以使用过滤器匿名器来遵守数据共享规则和限制,同时仍然允许新的数据中心构建索引并测试性能。 因此,可以从另一个站点异步地训练新的数据中心,而不需要实际的数据更换手。 目的地数据库服务的培训和测试可能在承诺客户迁移之前完成。

    CACHE-INFLUENCED VIDEO GAMES
    338.
    发明申请
    CACHE-INFLUENCED VIDEO GAMES 有权
    高速缓存的视频游戏

    公开(公告)号:US20140357379A1

    公开(公告)日:2014-12-04

    申请号:US14119171

    申请日:2013-05-31

    Inventor: Ezekiel Kruglick

    Abstract: Technologies related to cache-influenced video games are generally described. In some examples, the content of video game outputs as experienced by players of a video game may be adaptively modified to make more effective use of digital assets that are loaded in a computing system cache. Cache-influenced video games may increase cache use by increasing use, within a video game, of digital assets in a cache relative to assets not in the cache, e.g., assets that are on disk or in database storage. Cached digital assets can be retrieved more efficiently than assets stored elsewhere, and therefore video game performance may be improved.

    Abstract translation: 通常描述与缓存影响的视频游戏相关的技术。 在一些示例中,可以自适应地修改视频游戏的玩家体验的视频游戏输出的内容,以便更有效地使用加载在计算系统高速缓存中的数字资产。 缓存影响的视频游戏可以通过在视频游戏中增加缓存中相对于不在高速缓存中的资产的数字资产(例如,在磁盘上或在数据库存储中的资产)来增加高速缓存的使用。 可以比存储在其他地方的资产更有效地检索缓存的数字资产,因此视频游戏性能可能会得到改善。

    SCHEMES FOR PROVIDING WIRELESS COMMUNICATION
    339.
    发明申请

    公开(公告)号:US20140348113A1

    公开(公告)日:2014-11-27

    申请号:US14455043

    申请日:2014-08-08

    Inventor: Yang-Won JUNG

    Abstract: Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a mobile operating server may include determining whether there is an authenticated wireless access point around a mobile device, if there is no authenticated wireless access point, determining whether there is a non-authenticated wireless access point whose capacity is over a predetermined value around the mobile device and if there is a non-authenticated wireless access point whose capacity is over the predetermined value, instructing the mobile device to connect to a wireless local area network provided by the non-authenticated wireless access point.

    CORE AFFINITY BITMASK TRANSLATION
    340.
    发明申请
    CORE AFFINITY BITMASK TRANSLATION 有权
    核心利益BITMASK翻译

    公开(公告)号:US20140344550A1

    公开(公告)日:2014-11-20

    申请号:US14124569

    申请日:2013-05-15

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F9/5044 G06F2209/502

    Abstract: Technologies are generally described for systems methods, and devices related to core affinity bitmask translation. An example system may include first, second, third and fourth cores, and a dispatcher. The dispatcher may be configured to receive a first request where the first request include a core affinity bitmask and instructions. The core affinity bitmask can identify at least the first core and the second core. The dispatcher may be configured to determine a first affinity between the first core and the second core. The dispatcher may then identify the third core and the fourth core as having similar affinity to achieve a substantially similar performance. The dispatcher may also be configured to generate a second request that includes a translated core affinity bitmask. The translated core affinity bitmask may be effective to identify the third core and the fourth core as appropriate cores to execute the instructions.

    Abstract translation: 技术通常描述为系统方法和与核心亲和位掩码转换相关的设备。 示例性系统可以包括第一,第二,第三和第四核以及调度器。 调度器可以被配置为接收第一请求,其中第一请求包括核心关联位掩码和指令。 核心相关位掩码可以至少识别第一核和第二核。 调度器可以被配置为确定第一核心和第二核心之间的第一亲和度。 然后,调度员可以将第三核心和第四核心识别为具有相似的亲和力以实现基本相似的性能。 调度器还可以被配置为生成包括翻译的核心相关位掩码的第二请求。 翻译的核心相关位掩码可以有效地将第三核和第四核确定为适当的核来执行指令。

Patent Agency Ranking