Abstract:
The present invention relates to a viral particle. The viral particle has a radius of less than about 1 μm, and at least one peptide comprising at least a biologically active portion of CD47. The present invention also includes a method of increasing the life of a particle in vivo in a mammal. The method includes the steps of expressing at least one peptide comprising at least a biologically active portion of CD47 in a viral particle, and administering the viral particle having CD47 expressed to a mammal, wherein the administered viral particle has a longer half life in the mammal than an otherwise identical viral particle that does not have CD47 expressed thereon.
Abstract:
Methods and apparatus are disclosed to adjust resource allocation in a distributive computing network. An example method includes receiving data representing performance of a first resource allocation provided by the distributive computing network. The example method includes receiving a resource request specifying a second resource allocation to be provided by the distributive computing network. The example method includes simulating the distributive computing network using the data to determine an operating configuration for adjusting the first resource allocation to satisfy the resource request with a third resource allocation, different than the second resource allocation. The example method includes adjusting the first resource allocation based on the operating configuration.
Abstract:
A device is configured to enter a stealth mode in response to a trigger and/or triggering event. The trigger/triggering event can be a voice command, a depression(s) of a button(s) or pattern of buttons on the device, a keyboard and/or softkey entry, entry of a pattern on the display of the device, a designated movement of the device, detection of an event, and/or lack of detection of an event. The device activates the stealth mode without any indication to the user of the device that the device is activating the stealth mode. The stealth mode operates concurrently with all other functions of the device. A virtual secure channel can be established that allows communication with the device without providing an indication that the device is communicating via the virtual secure channel. A token can be utilized for authentication and to discriminate be stealth and normal modes.
Abstract:
Systems, methods, and computer program products are for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier.
Abstract:
Systems, methods, and devices that integrate a subscriber's communication services, including home wireline communication services, and a service-entity communication services are presented. User equipment (UE) is associated with a subscription for communication services, comprising wireline and wireless communication services, of a subscriber. The UE communicates with an enhanced service management component (ESMC) associated with a service entity to facilitate integration of at least a portion of the subscriber's communication services with the service entity's communication services while the UE is registered with the ESMC. While registered, the subscriber's UE is used to facilitate controlling a door lock to the subscriber's room associated with the service entity; and accessing the integrated communication services, including at least a portion of the home services, while in a location of the service entity, at least when the home services are provided via the same provider as that serving the service entity.
Abstract:
The present disclosure is directed to an apparatus and method for providing service to a residential gateway. The method includes detecting a service disruption associated with a first connection to a first residential gateway device. In response to the detected service disruption, a second residential gateway device selected at the first residential gateway may be used to establish a second connection to the first residential gateway device.
Abstract:
A system that incorporates teachings of the present disclosure may include, for example, a gateway having a controller to transport media data between a service provider network and one or more end user devices associated with the gateway, and transmit connection signals to a second gateway for establishing a management channel between the gateway and the service provider network when an undesired condition is detected, where the management channel transports management data associated with the gateway to the second gateway for transport to the service provider network using a separate transport queue of the second gateway. Other embodiments are disclosed.
Abstract:
A security social network allows registered members to participate in providing security. Persons can register and devices can be registered via a security social media web site. When a security event occurs, a member can notify the security social network, which can notify all registered members and registered devices in the area of the event. Mobile communication devices of members in the area can be controlled to turn on respective cameras, video recorders, audio recorders, microphones, or the like. And, remotely operable devices can be controlled to monitor, record, and/or transmit data. Collaboration of security social network members with private security agencies, law enforcement agencies, neighborhood watch groups, or the like, can provide comprehensive, timely, and effective security.
Abstract:
A method of managing a policy related to a network-based service can include receiving a policy request at a policy creation system from a service creation and development (SCD) system, the request identifying a network-based service. The method can also include developing a policy template related to the network-based service based on requirements of a service level agreement associated with the network-based service. The method can also include sending the policy template to the SCD system after verifying that the policy template meets the requirements of the service level agreement.
Abstract:
A method and system for interactive home monitoring includes detecting a visitor arriving at a premises of a multimedia content distribution network (MCDN) client by an intercom unit installed at the premises. The intercom unit may be coupled to the MCDN client, which may be configured to wirelessly communicate with a user of the MCDN client. A captured image of the visitor may be used to determine if an identity of the visitor is known or unknown. Based on the identity, a communication channel between the visitor and the user may be established at the intercom unit. The intercom unit may further be configured to provide further information to the visitor based on the visitor identity.