Abstract:
A method includes, in response to determining that a distribution capacity of a network device exceeds a first distribution capacity threshold and that the distribution capacity of the network device does not exceed a second distribution capacity threshold, determining, at the network device, whether a data source satisfies a popularity criteria. The method includes, in response to determining that the data source satisfies the popularity criteria, sending, from the network device, data associated with the data source to a user device.
Abstract:
A method includes, in response to determining that a distribution capacity of a network device exceeds a first distribution capacity threshold and that the distribution capacity of the network device does not exceed a second distribution capacity threshold, determining, at the network device, whether a data source satisfies a popularity criteria. The method includes, in response to determining that the data source satisfies the popularity criteria, sending, from the network device, data associated with the data source to a user device.
Abstract:
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network. The method also includes sending an access request message directed to a messaging address in response to identifying the wireless-enabled device. The access request message includes information that identifies the wireless-enabled device includes a first selectable option to allow access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device. The access request message also and includes a second selectable option to deny access to the secured wireless network.
Abstract:
A method includes identifying, at a security device of a secured wireless network, a wireless-enabled device that is not authorized to access the secured wireless network. The method also includes sending an access request message directed to a messaging address in response to identifying the wireless-enabled device. The access request message includes information that identifies the wireless-enabled device includes a first selectable option to allow access to the secured wireless network without requiring user input of a network password associated with the secured wireless network via the wireless-enabled device. The access request message also and includes a second selectable option to deny access to the secured wireless network.