摘要:
A wagering game system and its operations are described herein. In embodiments, the operations can include tracking progress of a wagering game player account (player account) for a persistent-state game. The player account can fulfill progression requirements for the persistent-state game, such as by performing wagering game activities. The operations can then provide, or reward, the player account with progress in the persistent-state game. Operations can mark the progress by presenting progress markers on a progress chart available to the player account. The progress chart can be based on an episodic theme. The operations can present episodic theme content at certain locations on the progress chart. The operations can further unlock content based on progress in the persistent-state game and present unlocked content to the player account. Operations can also enforce progress limits, where the player account can perform gaming activities to remove the progress limits.
摘要:
A third party device location estimation mechanism can be implemented in a wireless communication network. In one embodiment, a distance between an observing communication device and a reference communication device and a distance between the observing communication device and a target communication device are determined. An exchange of messages between the target communication device and the reference communication device is detected at the observing communication device. Timing information associated with the exchanged messages is determined at the observing communication device. A distance between the target communication device and the reference communication device is determined at the observing communication device based, at least in part, on the distance between the observing communication device and the reference communication device, the distance between the observing communication device and the target communication device, and the timing information associated with the messages exchanged between the target communication device and the reference communication device.
摘要:
A method of authenticating a data processing device includes receiving a request to authenticate the data processing device. In response, an authentication key is accessed an authenticated at an authentication module. The authentication key is stored at a storage module that is located within the same integrated circuit package as the authentication module, so that the authentication key can be communicated to the module without exposing the key to unauthorized probing. The integrated circuit package also includes a tamper detection module to determine whether a memory of the data processing device has been accessed. In response to determining the memory has been accessed, the tamper detection module instructs the authentication module to not authenticate the data processing device.
摘要:
Disclosed are systems and methods for communicating among stations coupled to a communication medium by receiving signals from a plurality of the stations, determining signal strength values for each of the received signals based on at least a portion of the signal, and based on the signal strength values, selecting a detection threshold such that, in response to a signal having a signal strength in excess of the detection threshold, the signal is processed according to a protocol of a subset of the stations.
摘要:
Management of a file hierarchy for a clustered file system can be distributed across nodes of the cluster. A cluster file hierarchy is accessed to determine location of a file in response to a request to write to a file. A first node maintains the cluster file hierarchy. It is determined that management of a fileset object, which represents a fileset that includes the file, has been delegated to a second node based, at least in part, on said accessing the cluster file hierarchy. A node file hierarchy maintained by the second node is accessed responsive to determining the delegation. The cluster file hierarchy represents filesets of the clustered file system and the node hierarchy represents a subset of one or more of the filesets. Location of the file is determined based, at least in part, on said accessing the node file hierarchy.
摘要:
Communicating between stations in a network is described. A plurality of stations coordinate according to a distributed protocol to select a first station to transmit over a shared medium. The communication includes transmitting between the first station and a second station over the shared medium during a time period in which stations other than the first and second stations refrain from transmitting over the shared medium. The first station transmits information that grants permission to the second station to transmit during the time period.
摘要:
A transmission suppression apparatus includes a first modulator that converts a symbol to a waveform. The apparatus further includes a first non-linear filter, configured to at least partially compensate for non-linear distortions of a transmission signal path. The apparatus further includes a first medium coupling device for coupling signals to a communication medium. The apparatus further includes a second medium coupling device for coupling signals from the communication medium. The apparatus further includes summing circuitry with a first input connected to an output of the second medium coupling device. The apparatus further includes cancellation circuitry, connected to a second input of the summing circuit, that converts the symbol to an analog waveform that is substantially 180 degrees out of phase with the analog waveform encoding the symbol on the first input to the summing circuit.
摘要:
A mashup session manager maintains state of the mashup session to ensure presentation consistency/uniformity across the execution environments. The mashup session manager also tracks the participating execution environments associated with a mashup session (e.g., usernames, device identifiers, network addresses, etc.), and transmits data for presentation consistency to the participating execution environments. In some cases, a view of the mashup session at a participating execution environment may not be current (“stale mashup session view”). The mashup session manager can detect if a view at a participating execution environment is of a past mashup session state, and provide data for the stale mashup session view to become current. In addition, the mashup session manager can propagate design modifications to the participants of the mashup session.
摘要:
While creating a document in a document editing application, a user may wish to locate more information on a particular topic to add more detail to the document. For example, a user begins creating an outline of topics for a research paper. Functionality can be implemented in a document editing application to dynamically perform searches on determined keywords, and to automatically associate search results with those keywords. In addition, searches are refined based on document context, and results can be categorized based on prior consumption of the information contained in each result. This allows a user to locate results best pertaining to topics in the document while being able to retrieve resources that have been useful in the past. Automatically performing searches and associating search results with text in a document gives a user instant access to relevant information which allows the user to spend less time researching.
摘要:
Securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the network authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the boot code authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information.