Abstract:
Aspects of the subject disclosure may include, for example, obtaining predicted available bandwidths for an end user device, monitoring buffer occupancy of a buffer of the end user device, determining bit rates for portions of media content according to the predicted available bandwidths and according to the buffer occupancy, and adjusting bit rates for portions of media content according to the predicted available bandwidths and according to the buffer occupancy during streaming of the media content to the end user device over a wireless network. Other embodiments are disclosed.
Abstract:
A method that incorporates teachings of the subject disclosure may include, for example transmitting, via a connection to a network having an available digital bandwidth, a first pre-fetch media content item of media content items included in the a media recommendation transmitted to a communication device, the first pre-fetch media content item having a first rank. Responsive to a determination of a change in the available digital bandwidth, the transmitting of the first pre-fetch media content item is stopped and a second pre-fetch media content item of media content items included in the media recommendation is transmitted via the connection to the network. The second pre-fetch media content item has a second rank. Other embodiments are disclosed.
Abstract:
A method that incorporates teachings of the subject disclosure may include, for example transmitting, via a connection to a network having an available digital bandwidth, a first pre-fetch media content item of media content items included in the a media recommendation transmitted to a communication device, the first pre-fetch media content item having a first rank. Responsive to a determination of a change in the available digital bandwidth, the transmitting of the first pre-fetch media content item is stopped and a second pre-fetch media content item of media content items included in the media recommendation is transmitted via the connection to the network. The second pre-fetch media content item has a second rank. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, a broadcast services platform includes a memory that stores operational instructions. A processor executes the operational instructions to: receive user data, the user data including a list of users and performance metric data corresponding to individual ones of the users; sort the list of the users in order of the performance metric data to generate a sorted list of the users; partition the sorted list of the users to generate a plurality of user groups; and generate network resource allocation data that allocates network resources to provide broadcast services to the users. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, determining a deadline for completion of the transfer of the data content item to the mobile device. A set of locations of the mobile device is determined between the first time and the deadline, a candidate plurality of wireless base stations is identified, based on the forecasted plurality of locations, to wirelessly transfer a portion of the data content item to the mobile device during the time period. A utilization of a wireless base station of the candidate set of wireless base stations is forecasted during the time period, a transfer time is determined within the time period based on the forecasted utilization and the deadline, and the transfer time is provided to the mobile device. Other embodiments are disclosed.
Abstract:
Methods, apparatus, systems and articles of manufacture disclosed herein can be used to identify an internet domain to which an encrypted network communication is targeted. A disclosed method includes collecting a plurality of unencrypted communications with a domain name server, and identifying, by executing an instruction with a processor, network traffic patterns associated with the unencrypted communication based on a combination of routing information, internet protocol flow data, and internet transactions associated with the plurality of unencrypted communications with the domain name server. An example disclosed method further includes determining, by executing an instruction with a processor, and based on the network traffic patterns associated with the unencrypted communications, the internet domain to which the encrypted communication is to be delivered.
Abstract:
Aspects of the subject disclosure may include, for example, obtaining predicted available bandwidths for an end user device, monitoring buffer occupancy of a buffer of the end user device, determining bit rates for portions of media content according to the predicted available bandwidths and according to the buffer occupancy, and adjusting bit rates for portions of media content according to the predicted available bandwidths and according to the buffer occupancy during streaming of the media content to the end user device over a wireless network. Other embodiments are disclosed.
Abstract:
A crowd-sourced mobile messaging spam detection and defense system includes an application running on a mobile device. The application uses an unwanted message detection algorithm to analyze and classify messages as potential unwanted messages. The potential unwanted messages are presented to a user for confirmation that the messages are unwanted messages. In response to confirmation, the mobile device transmits a notification to a virtual machine associated with the user. The virtual machine uses the notification to update the unwanted message detection algorithm which may then be transmitted to the mobile device. The virtual machine may also transmit the notification to a global virtual machine. The global virtual machine may use the notification to update a set of classification rules maintained by the global virtual machine and transmit the set of classification rules as necessary to the multiple virtual machines for use in updating the unwanted message detection algorithm.
Abstract:
A mechanism is provided for predicting video engagement from network measurements for a user device connected to a wireless network. Wireless network measurements are retrieved from a wireless network device in the wireless network. The wireless network measurements are related to the user device of a user. It is determined that the user device is engaged in a video streaming session. A computer classifies the video streaming session as one of a plurality of classes, in which the plurality of classes predict an outcome of the video streaming session for the user device.
Abstract:
A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.