Abstract:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.
Abstract:
Techniques for scrolling through displayed information are disclosed. For instance, an apparatus includes a scrolling management module to set one or more automatic scrolling preferences, and an application to output a content item in accordance with the one or more automatic scrolling preferences. Examples of such scrolling preferences include scrolling speeds, designated input mechanism(s) to adjust scrolling, and the activation/deactivation of orientation-based scrolling.
Abstract:
A method and apparatus for user data traffic handling for an EVDO enabled hybrid mode mobile device, the method having the steps of: blocking a system selection at the mobile device until no EVDO traffic state exists, the blocking step includes either monitoring whether a user changes a scan mode on the mobile device; and if the user changes the scan mode, checking whether the mobile device is in an EVDO traffic state; and if yes delaying a system selection until the EVDO traffic state is ended, or monitoring whether a user is in an EVDO traffic state, and if yes, preventing a user from accessing a scan mode menu on the mobile device.
Abstract:
Techniques involving the acquisition of wireless communications systems are disclosed. For example, an apparatus may store a list of one or more preferred wireless communications systems. Upon identifying a first accessible wireless communications system that is absent from the list, the device may acquire this system. However, after this acquisition, the device may further identify a second accessible wireless communications system. If the second system is included in the list of one or more preferred wireless communications systems, the apparatus may acquire the second system.
Abstract:
In one illustrative example, a mobile communication device has a plurality of software applications including an Internet browser application, an electronic mail (e-mail) communication application, and an audio or video player application. The mobile device is adapted to receive, from wireless communication networks or through use thereof, available quality of service data for the wireless networks and store the corresponding data in association with each network identification. The available quality of service data includes at least a bandwidth criterion and a delay criterion associated with each wireless network. For each one of the software applications, the mobile device is adapted to execute the software application; identify, based on the stored quality of service data, one or more wireless networks having a bandwidth criterion and a delay criterion that best match a bandwidth requirement and a delay requirement, respectively, of the executed software application; and select, based on the identifying, an available wireless network for communication using the executed software application.
Abstract:
There is described an isocyanate-based polymer foam having improved anti-yellowing properties. The foam produced from a formulation comprising an isocyanate, a blowing agent, a first active hydrogen-containing compound and a second active hydrogen-containing compound different than the first active hydrogen-containing compound. The second active hydrogen-containing compound comprises an active hydrogen-containing phosphite compound. A process for producing such a foam is also described.
Abstract:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.
Abstract:
Techniques involving the management of display parameters are disclosed. For example, an apparatus may include a display, a radio module, and a control module. The display employs various operational parameters, which can take on different values. Exemplary parameters include refresh rate and/or pixel clock rate. The radio module may receive a wireless signal at one or more reception frequencies. The control module may select values for these operational parameters of the display. This selection may be made according to characteristics of interference that would be emitted from the display at the one or more reception frequencies. Upon making this selection, the control module may direct the display to employ the selected parameter values.
Abstract:
Various embodiments of systems and techniques for providing location-based services (LBS) to a mobile computing device having a dual processor architecture are described. In one or more embodiments, the mobile computing device may comprise or implement hardware and/or software configured to enable LBS and data communications sessions using a single active data stack at any particular point in time. Other embodiments are described and claimed.
Abstract:
Various embodiments for providing enhanced power savings in mobile computing devices are described. In one or more embodiments, a mobile computing device may monitor the battery power level remaining. The mobile computing device may select a wireless connection type for an application based on Quality of Service (QoS) requirements of the application and the amount of battery power remaining. The mobile computing device may switch the application from a higher QoS wireless connection type to a lower QoS wireless connection type when the battery power falls below a threshold. Other embodiments are described and claimed.