摘要:
A DSL network topology is provided for the interconnections between a telecom carrier and households. Each household is provided with an HCC (Home Communications Centre) for facilitating digital communication. The digital communication includes DSL (Digital Subscriber Line) communication. A method of forming a DSL network such that existing copper pair wire is reused is also provided.
摘要:
A DSL network topology is provided for the interconnections between a telecom carrier and households. Each household is provided with an HCC (Home Communications Centre) for facilitating digital communication. The digital communication includes DSL (Digital Subscriber Line) communication. A method of forming a DSL network such that existing copper pair wire is reused is also provided.
摘要:
Dynamic, asymmetric rings and related communication equipment and methods are disclosed. Various features may be implemented to provide any or all of several degrees of freedom for managing resources in a communication network. Communication rates may be optimized on a node-to-node basis or overall on a network level. Different rates may be configured and possibly dynamically adjusted between different nodes, and/or for different directions of traffic transfer. Bandwidth can be dynamically allocated along a string of the communication nodes in a ring or linear topology in some embodiments. Direction of traffic transfer represents an additional possible degree of freedom in a ring topology, in that traffic can be transferred in either direction in a ring, such as the direction of least delay.
摘要:
Dynamic, asymmetric rings and related communication equipment and methods are disclosed. Various features may be implemented to provide any or all of several degrees of freedom for managing resources in a communication network. Communication rates may be optimized on a node-to-node basis or overall on a network level. Different rates may be configured and possibly dynamically adjusted between different nodes, and/or for different directions of traffic transfer. Bandwidth can be dynamically allocated along a string of the communication nodes in a ring or linear topology in some embodiments. Direction of traffic transfer represents an additional possible degree of freedom in a ring topology, in that traffic can be transferred in either direction in a ring, such as the direction of least delay.
摘要:
A geographical merchant consortium commerce system provides contextual offers to subscribed customers to encourage shopping locally. The system includes a plurality of merchants that operate a business within a geographical region, such as within a mall or town. A customer subscribes to the system and provides contextual data such as demographic data, a shopping list and specific personal dates, such as wedding anniversary, or birthday. The system also conducts analysis of internet activity to determine smart needs of the customer. The system then provides contextual offers to the subscribed customer for products based on the contextual data. These offers may be a combined contextual offer, having two or more products from two or more of the plurality of merchants. In addition, a contextual offer may be a proximity contextual offer that is provided to the subscribed customer when they move close to the geographical region of the plurality of merchants.
摘要:
Specific DNA sequences for binding various clinically relevant analytes from the human body are described. Each of these sequences or their linear, two- and three-dimensional linked sequences can function in varying assay and sensor formats with varying degrees of success. Linkage of the whole or partial DNA sequences (putative binding sites) can be used to enhance specificity and affinity towards complex targets, thereby improving assay selectivity and sensitivity in many instances. In addition, a FRET-based quantitative method is described for normalizing analyte data by assessing urine creatinine and urea levels. Finally, a method is described for removing creatinine or urea by size-exclusion chromatography prior to a FRET-based aptamer assay to avoid the denaturing effects of these compounds.
摘要:
A curated application store is a virtual storefront that includes applications provisioned from one or more application databases. For example, a curator may browse through an application database to find notable applications based on his or her expertise in a certain area and then provision the notable applications from the application database for inclusion in an application store curated by the curator. Accordingly, users browsing for applications pertaining to the area of expertise of the curator may shop for the applications from within a virtual application mall which includes a collection of curated application stores such as the application store curated by the curator. In return, the curator of the store may receive a revenue share from the purchases made within his or her application store.
摘要:
A method of extending user profile. A user specific data related to an application is received and stored for integration with a user profile. A template for the application is received and stored. The template tailors the user specific data based on aesthetic preferences of the user to generate a tailored user specific data. The user profile is extended based on the user specific data for the application and the template for the application. The user profile including the tailored user specific data may be provided for rendering. Local information, e.g., geographical location, of the user may be determined to tailor the user profile based on the local information. The user specific data and/or the template may be in a markup language format. Update to the user specific data and/or template may be pushed when available.
摘要:
A technique allows software developers to develop applications for a smart phone or other terminal by unlocking the terminal so that it can run unsigned applications. A developer registers with a web-based service, agrees to registration terms, and provides authentication credentials. Data which verifies the authentication credentials is provided back to the developer's computer. The terminal is connected to the developer's computer, and via a user interface, the developer requests registration of the terminal. In response, the terminal receives the data from the developer's computer, and provides the data and a unique terminal identifier to the service. If authorized, the service returns a persistent token or license which is stored at, and used to unlock, the terminal. The service can also provide a command which enforces an expiration date. The terminal checks in with the service to determine if the account is in good standing, and is re-locked if warranted.