摘要:
The described implementations relate to automatic network selection in relation to wireless mobile devices. One method can be applied to a mobile device that has both Wi-Fi and cellular capabilities. The method can attempt to identify Wi-Fi network availability for the mobile device. This method also evaluates whether to configure the mobile device to accomplish data communication over an identified Wi-Fi network or a cellular network.
摘要:
The present invention finds candidate objects for remote differential compression. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. An algorithm provides enhanced efficiencies for allowing the receiver to locate a set of objects that are similar to the object that needs to be transferred from the sender. Once this set of similar objects has been found, the receiver may reuse any chunks from these objects during the RDC algorithm.
摘要:
Binary executables are distributed in a distributed manner by equipping a server with a bootstrap program. The server provides the bootstrap program to a client computer in response to the client's request for the binary executables. The bootstrap program is designed to enable the client computer to obtain the binary executables in one or more portions from one or more peer locations that have already downloaded the said binary executables. In one embodiment, the bootstrap program also monitors the performance associated with obtaining the portions of the binary executables, and reports the performance data to a resource naming service that tracks peer locations that cache the binary executables. In one embodiment, the binary executables also includes a component that registers the client computer as a peer location that caches the binary executables, and provides the binary executables to other client computers responsive to their requests. In various embodiments, content is distributed in like manner.
摘要:
Peer devices register with a resource locator service so that the peer devices can be uniquely identified in a networking environment. An addressing scheme addresses a peer resource in the networking environment based on the unique identifier of a peer device that is a master publisher of the resource. Based on the addressing scheme, the resource locator service can track the location of the master publisher of the resource as well as additional locations of peer devices that have cached the resource and made it available. In various embodiments, the resource locator service can service requests for peer resources by providing a list of locations where the resource is expected to be available or, in the case of non-compatible requester, provide access to the resource itself.
摘要:
Binary executables are distributed in a distributed manner by equipping a server with a bootstrap program. The server provides the bootstrap program to a client computer in response to the client's request for the binary executables. The bootstrap program is designed to enable the client computer to obtain the binary executables in one or more portions from one or more peer locations that have already downloaded the said binary executables. In one embodiment, the bootstrap program also monitors the performance associated with obtaining the portions of the binary executables, and reports the performance data to a resource naming service that tracks peer locations that cache the binary executables. In one embodiment, the binary executables also includes a component that registers the client computer as a peer location that caches the binary executables, and provides the binary executables to other client computers responsive to their requests. In various embodiments, content is distributed in like manner.
摘要:
Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.
摘要:
A call is established between a user at a mobile device and a contact logged into a communication service through a computer application. A user selects a contact through a page displayed on a mobile device. The contact may be an email address, a messaging username, or some other contact other than a phone number. A call registration record with the contact data is generated at a network server. The mobile device places a call to a VoIP system, the VoIP system receives the call, retrieves the call registration record and establishes an audio connection between the cell phone and the computer application through which the contact is logged into the communication service. The audio connection is a hybrid connection consisting of a mobile device voice connection between the caller's cell phone and a gateway system and a VoIP connection between a computer and the gateway system.
摘要:
Collection-based object replication is described in a system that includes a client computing device (client) connected to a server and multiple data storage nodes. In one aspect, a data storage node generates a replica of multiple replicas of a collection. The collection is a unit of data placement, access, replication, and repair. Other data storage nodes are also configured with a respective replica of the multiple replicas. The data storage node verifies whether an object received directly from the client for storage in the collection has been fully replicated by the other data storage nodes in respective replicas.
摘要:
A sender email client, in response to a request to send an email with attachment, determines whether a recipient of the email has distributed storage separate from an incoming email server of the recipient for storing email attachments. If so, a location server is consulted for the distributed storage's network address and its availability is determined. The send request is then serviced accordingly. An email service, in response to receiving an email with attachment, determines whether a recipient of the email has distributed storage for storing email attachments. If so, its network address and availability are likewise determined. The attachments are forwarded to the recipient's distributed storage for storage, when it becomes available. An email recipient client, in response to a request to access an email attachment, retrieves the attachment from the recipient's distributed storage or the incoming email server, as appropriate.
摘要:
A logical file system is described that distributes copies of files across various different physical storage resources yet provides a consistent view to the user of his or her data, regardless of which machine the user is accessing the files from, and even when the user's computer is offline. The distributed file system uses smart data redundancy to enable a virtually infinite amount of storage as long as additional storage resources are made available to the distributed file system. The result is a reliable storage system that does not necessarily tie the user's data to the user's particular computer. Instead, the user's data is associated with the user—for life—or for however long the user would like the data to be maintained, regardless of whether the user's computer or data storage components are replaced or destroyed.