Abstract:
In some implementations, radio access technology (RAT) signals can be monitored and used to synchronize an internal clock of a mobile device to a network system clock without registering the mobile device to the network. In some implementations, a RAT processor can be configured to receive RAT signals and to prevent transmission of RAT signals. In some implementations, the internal clock can be associated with a GNSS processor and can be used to calculate a location of the mobile device. In some implementations, a RAT processor that is configured for a particular radio access technology can be configured to monitor signals associated with another radio access technology when synchronizing the internal clock. In some implementations, the RAT processor can monitor signals in response to a power event. The power event can be associated with powering a display of the mobile device.
Abstract:
In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract:
In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract:
In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.
Abstract:
Computer-implemented methods, computer-readable media, and computer systems for managing power consumption in mobile devices are described. A mobile computer system executes a first computer application configured to receive data from a server system over a network, and a second computer application configured to periodically search for a connection to the network at a first time interval. In response to executing the second computer application, the mobile computer system determines that a strength of the connection is below a threshold strength. In response to determining that the strength of the connection is below the threshold strength, the mobile computer system executes the first computer application to delay requesting data from the server system until the connection to the network is detected.
Abstract:
In some implementations, radio access technology (RAT) signals can be monitored and used to synchronize an internal clock of a mobile device to a network system clock without registering the mobile device to the network. In some implementations, a RAT processor can be configured to receive RAT signals and to prevent transmission of RAT signals. In some implementations, the internal clock can be associated with a GNSS processor and can be used to calculate a location of the mobile device. In some implementations, a RAT processor that is configured for a particular radio access technology can be configured to monitor signals associated with another radio access technology when synchronizing the internal clock. In some implementations, the RAT processor can monitor signals in response to a power event. The power event can be associated with powering a display of the mobile device.
Abstract:
Computer-implemented methods, computer-readable media, and computer systems for managing power consumption in mobile devices are described. A mobile computer system executes a first computer application configured to receive data from a server system over a network, and a second computer application configured to periodically search for a connection to the network at a first time interval. In response to executing the second computer application, the mobile computer system determines that a strength of the connection is below a threshold strength. In response to determining that the strength of the connection is below the threshold strength, the computer system executes the first computer application to delay requesting data from the server system until the connection to the network is detected.
Abstract:
In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators.