Abstract:
One embodiment in accordance with the invention is a method for enabling dynamic performance management for virtual servers. The method can include automatically detecting when a first physical server is operating beyond a threshold. Note that a plurality of virtual servers is operating on the first physical server. Also, it can be automatically determined which virtual server of the plurality of virtual servers is associated with the first physical server operating beyond the threshold. The virtual server associated with the first physical server operating beyond the threshold can be automatically moved to a second physical server to operate thereon.
Abstract:
According to one embodiment, an authentication system includes an authentication device. The authentication device includes a biometric scanner, a processor, and an interface. The biometric scanner receives biometric data for a user. The processor authenticates the user by comparing the received biometric data for the user to predetermined biometric information for the user. The processor generates an authentication token in response to the authentication. The processor continuously authenticates the user. The interface communicates the authentication token to a content providing device, the authentication token indicating the authentication of the user. The interface receives content from the content providing device in response to the authentication token.
Abstract:
A method and system for programming a universal remote control (URC) to operate with a new remote controlled device having a digital mark is disclosed. A digital representation of the mark is generated and sent to a multimedia content distribution network (MCDN) server, along with MCDN account information. The digital mark may be used to retrieve programming codes, which are sent to client premises equipment (CPE) at an MCDN client identified by the MCDN account information. The CPE may be instructed to reprogram the URC to control the new device using the programming codes. The digital mark may be scanned and sent to the server using wireless telephony service provided by the MCDN service provider.
Abstract:
Devices, methods, and computer program products are for facilitating enhanced social interactions using a mobile device. A method for facilitating an enhanced social interaction using a mobile device includes receiving an audio input at the mobile device, determining a salient portion of the audio input, receiving relevant information associated with the salient portion, and presenting the relevant information via the mobile device.
Abstract:
A system and methodology that can customize screen time-outs on a portable electronic device based on user activity is provided. The system employs a sensing component that receives data from one or more sensors located on the portable electronic device, for example, skin conductivity sensors. The sensing component determines whether the user is using the portable device, either actively or passively and also determines the identity of the user. A configuring component is employed to change one or more features or functions of the portable electronic device based on the information determined by the sensing component. In particular, the configuring component changes one of more features of the portable electronic device based on the preferences predefined by the identified user and device usage (active and passive usage).
Abstract:
Described are compositions and methods relating to variant filamentous fungi having altered growth characteristics. Such variants are well-suited for growth in submerged cultures, e.g., for the large-scale production of enzymes and other proteins for commercial applications.
Abstract:
A method and system for providing customer service information provide a central database containing software modules for tasks and services and configurations for the modules. Information is received specifying a procedure to be carried out. Software modules relating to tasks forming part of the procedure are invoked, and the information indicative of appropriate configurations for the specified procedure is passed to the software modules. The software modules access the configurations, and instantiate operational tasks applying the configurations. The operational tasks are consolidated into an operational procedure, and the operational procedure is provided to an operative.
Abstract:
A system and apparatus for supplying media content to portable communication devices is disclosed. An apparatus that incorporates teachings of the present disclosure can include, for example, a Set-Top Box (STB) having a cellular transceiver and a controller element to direct the cellular transceiver to transmit a media guide for the STB to a terminal device for presentation on a display unit of the terminal device. Additional embodiments are disclosed.
Abstract:
A method for providing audio portions of broadcast television signals is disclosed. A television signal is buffered by a multimedia client. In response to a user request, audio data may be obtained from a service provider and sent back to the multimedia client using a network back-channel. The obtained audio data may be synchronized with a video portion of the television signal and output to an audio device, while the television signal is output to a display device.
Abstract:
A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security processing element randomly selects one of the authentication modes for presentation to the user. The user must successfully enter data corresponding to the randomly selected authentication mode. In an alternative embodiment, the security processing element can randomly select a plurality of authentication modes that are sequentially presented to the user. The user must successfully respond to each of the plurality of requested authentication modes. In another embodiment, for high security communications, the security processing element may select from a subset of authentication modes that are considered to be more robust. Conversely, the security processing element may select from a subset of randomly presented authentication modes that are considered less robust when used in a low security setting.