摘要:
Methods, systems, and apparatus, including encoded computer programs, for using free space set aside in hierarchical data documents, such as multimedia documents containing video and audio data. In one aspect, a method includes obtaining new data to be added to a document having a hierarchical structure, where the document includes stored data and free spaces at different nodes; determining whether a first node in the structure includes a first free space of a size sufficient for the new data; using the first free space in the first node to add the new data to the document when the size is sufficient; and when the size is insufficient: identifying a second node including a second free space in the structure, moving some of the second free space to the first free space, and using the increased first free space in the first node to add the new data to the document.
摘要:
This specification describes technologies relating to imparting cryptographic information in network communications, in general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing live media streams are disclosed. A storage format that can be used to record and then playback live streams including data-streams, audio-streams, video-streams, and other multi-media streams is also disclosed. The disclosed storage format is referred to as “raw”.
摘要:
This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing.
摘要:
This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for requesting potentially missing fragments in a media stream index are described in this specification. In one aspect, a method includes receiving a fragmented media stream index at a client system, where the media stream index includes a list of sequentially arranged fragment identifiers. Fragments listed in the media stream index can be requested from a server system. Fragment identifiers that are potentially missing in the media stream index can be identified based, at least in part, on a determined naming convention indicating the sequential arrangement of the fragment identifiers. Fragments can be requested based on the potentially missing fragment identifiers and processed for display when received.
摘要:
In general, in one aspect, streams associated with a playlist are received from a server. The playlist includes an ordering of streams that are queued for client-side playback from the server according to the ordering. Information associated with the receipt and playback of at least one of the streams is accessed. The client-side application requests to alter the streams of the playlist in response to the accessed information. The request identifies a desired playlist alteration and includes information that controls the playlist alteration. The streams of the playlist are displayed according to a playlist alteration made in response to the request.
摘要:
This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values.
摘要:
Technologies relating to work load distribution. A request is received for access to one of n server processes, where n is an integer greater than one. A mixing function is applied to an identifier associated with the request to generate a reproducible output representative of the identifier. A modulo operation is applied to the output, where a dividend in the modulo operation is the output and a divisor in the modulo operation is n, to determine a remainder. The request is assigned to a server process from the n server processes in accordance with the remainder.
摘要:
This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can be embodied in methods that include identifying a location in a pre-defined portion of a network communication to be sent in a client-server environment, wherein the pre-defined portion is reserved for random data, inserting cryptographic information into the pre-defined portion of the network communication at the location, and sending the network communication in the client-server environment to facilitate modifying interactions in the client-server environment based at least in part on a result of processing of the cryptographic information; and on a receiving side, receiving cryptographic information inserted into the pre-defined portion of the network communication in the client-server environment, identifying the location, processing the cryptographic information, and modifying interactions in the client-server environment based at least in part on a result of the processing.