摘要:
A conferencing system provides the scheduling of virtual meetings with meeting lobbies so that a meeting presenter can conduct a virtual meeting without the need to send out invitations to attendees. A person that wants to conduct a virtual meeting can schedule with the conferencing system a meeting with a meeting lobby. The meeting lobby has an address, but there is no associated privileged information, such as a meeting password. Would-be meeting attendees use the meeting lobby address to enter the meeting lobby as visitors in the lobby, and request to enter the meeting from the meeting lobby. A meeting presenter can then either grant authorization for a visitor in the meeting lobby to enter the meeting, or deny authorization for a visitor in the meeting lobby to enter the meeting. If a visitor in the meeting lobby is denied authorization to enter the meeting from the meeting lobby, the conferencing system removes the visitor from the meeting lobby.
摘要:
Storing audio data encoded in any of a plurality of different audio encoding formats is enabled by parametrically defining the underlying format in which the audio data is encoded, in audio format and packet table chunks. A flag can be used to manage storage of the size of the audio data portion of the file, such that premature termination of an audio recording session does not result in an unreadable corrupted file. This capability can be enabled by initially setting the flag to a value that does not correspond to a valid audio data size and that indicates that the last chunk in the file contains the audio data. State information for the audio data, to effectively denote a version of the file, and a dependency indicator for dependent metadata, may be maintained, where the dependency indicator indicates the state of the audio data on which the metadata is dependent.
摘要:
A conferencing system provides the scheduling of virtual meetings with meeting lobbies so that a meeting presenter can conduct a virtual meeting without the need to send out invitations to attendees. A person that wants to conduct a virtual meeting can schedule with the conferencing system a meeting with a meeting lobby. The meeting lobby has an address, but there is no associated privileged information, such as a meeting password. Would-be meeting attendees use the meeting lobby address to enter the meeting lobby as visitors in the lobby, and request to enter the meeting from the meeting lobby. A meeting presenter can then either grant authorization for a visitor in the meeting lobby to enter the meeting, or deny authorization for a visitor in the meeting lobby to enter the meeting. If a visitor in the meeting lobby is denied authorization to enter the meeting from the meeting lobby, the conferencing system removes the visitor from the meeting lobby.
摘要:
An apparatus is disclosed comprising a base and a container. The container typically includes a top portion and a bottom portion, wherein the top portion is hinged to the bottom portion. The container is fixed to the base so that the top portion can be rotated upwards to reveal a cavity in the container for storing objects. The container may include a lock which can be locked to prevent the cavity from being exposed. The base may have an open box structure with a chamber in which the container is placed.
摘要:
An operating system of a device receives, from an application executing on that device, data that identifies a category of hardware resources that the application needs to use in order to function. That category is mapped to a specified set of hardware resources of the device. The operating system also receives, from the application, data that identifies a mode. The mode corresponds to an intended use of a set of hardware resources and is mapped to a group of hardware resource settings that are consistent with the intended use. The operating system allocates, to the application, a particular set of hardware resources that are mapped to the category. The operating system configures one or more hardware resources in the particular set of hardware resources in conformity with a particular group of settings that are mapped to the mode.
摘要:
A conferencing system provides the scheduling of virtual meetings with meeting lobbies so that a meeting presenter can conduct a virtual meeting without the need to send out invitations to attendees. A person that wants to conduct a virtual meeting can schedule with the conferencing system a meeting with a meeting lobby. The meeting lobby has an address, but there is no associated privileged information, such as a meeting password. Would-be meeting attendees use the meeting lobby address to enter the meeting lobby as visitors in the lobby, and request to enter the meeting from the meeting lobby. A meeting presenter can then either grant authorization for a visitor in the meeting lobby to enter the meeting, or deny authorization for a visitor in the meeting lobby to enter the meeting. If a visitor in the meeting lobby is denied authorization to enter the meeting from the meeting lobby, the conferencing system removes the visitor from the meeting lobby.
摘要:
Systems and methods for streaming of multimedia files over a network are described. A streaming delivery accelerator (SDA) caches content from a content provider and streams the cached content to a user. Cached content is incrementally added to the cache memory, and the SDA is disconnected from the content provider when sufficient content for a predetermined time of play has been received. The caching process can be iterative, with only content not previously retained in the cache requested from the content provider. A method for cache eviction of content no longer of interest to users is also described.
摘要:
A conferencing system provides the scheduling of virtual meetings with meeting lobbies so that a meeting presenter can conduct a virtual meeting without the need to send out invitations to attendees. A person that wants to conduct a virtual meeting can schedule with the conferencing system a meeting with a meeting lobby. The meeting lobby has an address, but there is no associated privileged information, such as a meeting password. Would-be meeting attendees use the meeting lobby address to enter the meeting lobby as visitors in the lobby, and request to enter the meeting from the meeting lobby. A meeting presenter can then either grant authorization for a visitor in the meeting lobby to enter the meeting, or deny authorization for a visitor in the meeting lobby to enter the meeting. If a visitor in the meeting lobby is denied authorization to enter the meeting from the meeting lobby, the conferencing system removes the visitor from the meeting lobby.