Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
Systems and techniques are provided for restricting system calls using protected storage. A system call to a restricted system component may be received from an application. The application may be determined to have permission to make the system call to the restricted system component. A signature associated with the application may be verified using a public key from a protected storage. The public key may be sent to the protected storage by a computing device of a party authorized to modify data in the protected storage. The restricted system component may be permitted to perform a function indicated by the system call when the public key successfully verifies the signature associated with application.
Abstract:
Systems and techniques for implementing adaptive video stream testing are presented. In particular, installation of a digital rights management (DRM) client is validated. Furthermore, a decrypted video stream at a particular bitrate is received in response to validating a DRM client. Data throttling is implemented to simulate one or more network speeds for the decrypted video stream. Additionally, video playback time is measured for a codec at the one or more network speeds and it is determined whether the video playback time for the codec exceeds a predetermined threshold value. A test report is generated that lists the codec and the video playback time for the codec at the one or more network speeds.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.
Abstract:
An example method comprises receiving, by at least one computing device, a first notification from a first mobile computing device and a second notification from a second mobile computing device. The method may further comprise determining, based at least in part on a comparison of the first notification to the second notification, that the first mobile computing device has initiated a phone call with the second mobile computing device. The method may additionally comprise responsive to determining that the first mobile computing device has initiated the phone call with the second mobile computing device, sending, a first message to the first mobile computing device using a first data connection, and sending, a second message to the second mobile computing using a second data connection, wherein the first message and the second messages each indicate that the first and second mobile computing devices are able to exchange application data.