摘要:
Enhanced computer- and network-based methods, techniques, and systems for an enhanced file server that provides search and recommendations “in-band” as part of a request to the file server are provided. Example embodiments provide a Enhanced File Server (“EFS”), which enables file servers and the like, to search for and/or to recommend information (e.g., content, data, or the like) based upon a file request to the file server. This enables a user of the EFS to avoid the use of a separate search or recommendation system, such as a search engine, to find information. An Enhanced File Server implements its own search and recommendation capabilities and allows users to search for and obtain recommendations for information through its standard file-access mechanisms. Searches and requests for recommendations are performed using especially constructed file names The EFS may present results to the user using synthesized content.
摘要:
A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digital video recorder (“DVR”) devices and media center devices, and in other situations may include other types of media devices and/or other electromechanical (“E/M”) devices that may be centrally controlled, such as E/M devices for home automation that may operate independently or in conjunction with the media devices. In some situations, the CM system communicates with the connected devices via a network and using appropriate protocol(s), and may be accessed remotely via a network so as to allow a user to remotely operate the CM system. The CM system may further control searching, identification, selection, and presentation of pieces of media content by the connected device(s).
摘要:
Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. For a read operation, a host issues a read request and the data storage system determines a checksum value before servicing the read request. The checksum is validated at the top of the I/O stack on the host by the file system filter driver.
摘要:
Methods, systems, and techniques for recommending content using a measure of security group based similarity are provided. Embodiments described herein provide enhanced computer- and network-based methods, techniques, and systems for a recommender system, e.g., for content servers, that uses security group membership as the basis for determining user similarity. In particular, upon request for a recommendation, an enhanced content provider, through the use of the Security Based Recommender (SBR), provides indications of similar content based upon the security group membership of the requestor. The SBR determines similar content by determining what content was accessed by others within the security group membership of the requester. The recommendations may be ranked or filtered or combined with other types of recommendations, such as social network filtering, statistical based filtering, or the like.
摘要:
A content management (CM) system is provided to centrally control operation of one or more connected devices by issuing control requests and/or data requests. In some situations the connected device(s) include devices that control presentation of television programming-related content, such as digital video recorder (“DVR”) devices and media center devices, and in other situations may include other types of media devices and/or other electromechanical (“E/M”) devices that may be centrally controlled, such as E/M devices for home automation that may operate independently or in conjunction with the media devices. In some situations, the CM system communicates with the connected devices via a network and using appropriate protocol(s), and may be accessed remotely via a network so as to allow a user to remotely operate the CM system. The CM system may further control searching, identification, selection, and presentation of pieces of media content by the connected device(s).
摘要:
A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability of the network, transmission packets containing a unique header are send by one application in the system through the process, which stores the transmission packets in queue, and upon filling of the queue writes filled queue to a send volume contained on a storage system. The storage system then copies the data to a second volume, which can be read by a second application. The first and second volumes can either be remotely dispersed or local to one another.
摘要:
Techniques are described for managing various types of content in various ways, such as based on voice commands or other voice-based control instructions provided by a user. In some situations, at least some of the content being managed includes content of a variety of types, such as music and other audio information, photos, images, non-television video information, videogames, Internet Web pages and other data, etc., which may be managed via the voice controls in a variety of ways, such as to allow a user to locate and identify content of potential interest, to schedule recordings of selected content, to manage previously recorded content (e.g., to play or delete the content), to control live television, etc. This abstract is provided to comply with rules requiring it, and is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email application. The emails are periodically downloaded without attachments in response to a poll of the server and if a sufficient high-speed connection to the server is available, and then the downloaded email is locally stored in a local cache of the portable computer. Attachments associated with downloaded emails stored in the local cache can be selectively downloaded, via a background process, from the server independently of the operating mode of the email application and during any suitable power state of the electronic device. Synchronization of attachments to emails in the local cache is also independently performed, thereby bypassing synchronization that is normally performed by the email application while in the online mode.
摘要:
An electronic device, such as a hand-held portable computer, is provided with client-side email capability that allows emails to be independently downloaded from a server, regardless of an operating mode of an email application and without using the standard email retrieval mechanism of the email application. The emails are periodically downloaded without attachments in response to a poll of the server and if a sufficient high-speed connection to the server is available, and then the downloaded email is locally stored in a local cache of the portable computer. Attachments associated with downloaded emails stored in the local cache can be selectively downloaded, via a background process, from the server independently of the operating mode of the email application and during any suitable power state of the electronic device. Synchronization of attachments to emails in the local cache is also independently performed, thereby bypassing synchronization that is normally performed by the email application while in the online mode.
摘要:
Techniques are described for managing various types of content in various ways, such as based on voice commands or other voice-based control instructions provided by a user. In some situations, at least some of the content being managed includes content of a variety of types, such as music and other audio information, photos, images, non-television video information, videogames, Internet Web pages and other data, etc., which may be managed via the voice controls in a variety of ways, such as to allow a user to locate and identify content of potential interest, to schedule recordings of selected content, to manage previously recorded content (e.g., to play or delete the content), to control live television, etc. This abstract is provided to comply with rules requiring it, and is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.