摘要:
A computer-implemented method includes determining, at a set-top box device, positioning data associated with a location of the set-top box device. The computer-implemented method includes determining whether the set-top box device is authorized to receive media content at the location. The computer-implemented method also includes receiving the media content via a wireless transmission from a residential gateway when the set-top box device is authorized to receive the media content at the location.
摘要:
A computer-implemented method includes determining, at a set-top box device, positioning data associated with a location of the set-top box device. The computer-implemented method includes determining whether the set-top box device is authorized to receive media content at the location. The computer-implemented method also includes receiving the media content via a wireless transmission from a residential gateway when the set-top box device is authorized to receive the media content at the location.
摘要:
A method and computer readable medium for providing a mobile messaging event planning service in a communications network are disclosed. For example, the method assigns a mobile messaging identification code for an event, receives a text message including the mobile messaging identification code for the event and provides information associated with the event in response to the text message.
摘要:
A system that incorporates teachings of the present disclosure may include, for example, detecting an occurrence of an activity by synthesizing sensory data collected at a mobile communication device according to one or more references corresponding to the activity, sharing tracking information associated with the detected occurrence of the activity over a communication network, and presenting feedback information corresponding to the tracking information. Other embodiments are disclosed.
摘要:
A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event.
摘要:
In one embodiment, the present disclosure is a method and apparatus for location-based, just in time social networking. In one embodiment, a method for providing a social network includes receiving a request from a first user of the social network to provide information from a location of interest specified by the first user, and locating a group comprising at least one other user of the social network, where each of the at least one other user is currently at the location of interest and has volunteered to provide information from the location of interest, wherein the group is selected from a larger group of other users who are at a plurality of locations of interest.
摘要:
Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option.
摘要:
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
摘要:
A method for delivering content includes receiving the content at an edge server from a content provider, generating an upload signature for the content as received from the content provider where the upload signature includes a hash of the content, receiving a request for the content from a client system, providing the content to the client system, generating a download signature and a screen capture image for the content as provided to the client system, comparing the upload signature and the download signature, and generating an alert when the upload signature and the download signature do not match.
摘要:
Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service.