摘要:
Various embodiments disclosed herein are related to a non-transitory computer readable storage medium. In some embodiments, the medium includes instructions stored thereon that, when executed by a processor, cause the processor to detect, on a server, a first symptom observable on a first one or more clusters. In some embodiments, the first symptom is indicative of an issue. In some embodiments, the instructions cause the processor to trigger additional data collection by a plurality of edge processing units for the first one or more of clusters, detect, in a second one or more clusters within the first one or more clusters, a second symptom indicative of the issue, and generate a remediation action for a third one or more clusters having the first symptom and the second symptom. In some embodiments, the second one or more clusters include the third one or more clusters.
摘要:
Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.
摘要:
Virtual sensor technology, in which a camera is controlled to capture at least one configuration image of an area monitored by a monitoring system and input is received that defines one or more characteristics of the at least one configuration image that enable sensing of an event in the area. Based on the received input, configuration data used in sensing the event is generated and stored. After storage of the configuration data, the camera is controlled to capture one or more images of the area, the one or more images are analyzed based on the configuration data, and occurrence of the event is detected based on the analysis of the one or more images. Based on detecting occurrence of the event, a transmitting device is controlled to send, to a controller of the monitoring system, a signal that indicates the detection of the occurrence of the event.
摘要:
The present disclosure provides a terminal-based control method for a smart household appliance and a terminal, and relates to a field of controlling a smart device. The terminal-based control method for a smart household appliance of the present disclosure comprises: determining a working state of each smart household appliance; when it is determined that at least one smart household appliance is in a power-on state through the terminal, opening a second-level control interface of at least one smart household appliance in the power-on state; the second-level control interface is configured to adjust working parameters of the smart household appliance. Through the second-level control interface, the working parameters of the smart household appliance may be adjusted directly, thereby realizing and improving convenience of controlling the smart household appliance.
摘要:
Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.
摘要:
Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.
摘要:
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
摘要:
The security control apparatus includes a network control unit for receiving a security protocol-based packet that includes a protocol control header and data and that is transmitted between a cloud-based virtual desktop interaction remote agent unit and a virtual machine of a cloud-based virtual desktop interaction device, and blocking network traffic between cloud-based virtual desktop interaction remote agent unit and the virtual machine, depending on received results of checking. A policy checking unit checks whether information extracted from the security protocol-based packet is compliant with control policies, and transmits results of checking to the network control unit. If the information is not compliant with the control policies, a security solution interaction unit transmits the extracted information to an external security solution, and transmits results of checking by a corresponding security solution to the network control unit.
摘要:
An example non-transitory computer-readable medium stores instructions that, when executed by a control device, cause the control device to perform functions. The functions comprise configuring a first playback device associated with a first user-account to (i) play media content from a playback queue comprising one or more audio tracks stored at a network location and (ii) enable one or more other user-accounts associated with other playback devices to subscribe to the playback queue. The functions further comprise receiving an indication that a second user-account associated with a second playback device has subscribed to the playback queue. The functions further comprise in response to receiving the indication, displaying a subscriber indicator on the control device showing that the second user-account has subscribed to the playback queue. An example control device and an example method, both related to the example non-transitory computer-readable medium, are also disclosed herein.
摘要:
A Customizable Storage Controller (CSC) is a software defined storage device controller, a replacement for the ASIC storage controller approach that has been used up to now. The differences from the current storage controllers are that the CSC software will need to be protected from unauthorized modification and provides an excellent place to add additional storage management functionality. The CSC type of storage controller is a good place to integrate the F+ Storage Firewall storage protection technology, fitting the needs of the CSC as well as protecting stored data from unauthorized access. This portion of the larger patent disclosure provides the design of a CSC both with a software version of a F+ Storage Firewall, as well as an improved (more secure) CSC designed with a security co-processor and locked firmware. These designs can be implemented with standard parts such as microprocessors and/or FPGAs (Field Programmable Gate Arrays), RAM (Random Access Memory), and some version of nonvolatile memory as a program store.