Abstract:
Methods, systems, and products translate addresses in residential networks. A residential gateway translates requests for content such that the residential gateway appears as both a requestor and a destination for requested content, regardless of an actual requesting device or a desired output device.
Abstract:
In a network, packets are fragmented into head and non-head fragments. Non-head fragments are saved up front at an entry point, while a network switch forwards only the head fragment to Layer 4-Layer 7 (L4-L7) features for processing. The switch records changes that are performed on the head fragment's fields by the L4-L7 features while they process the head fragment. At an exit point, fields of the saved non-head fragments are overwritten with information that was recorded for the head fragment. This can include updating or modifying the source and destination parameters of the non-head fragments in an intelligent manner by reusing the results of the packet processing that was performed on the head fragment. This fragmentation handling technique avoids having to redundantly process the non-head fragments in the same manner as the head fragments.
Abstract:
Devices, systems, and methods are disclosed for connecting a plurality of mobile devices in a videoconference over a cellular network via a videoconferencing server. At least one of the mobile devices includes a camera to capture a video of a participant in the videoconference. The video is transmitted to the videoconferencing server on the cellular network. The videoconferencing server edits the video and sends the edited video to receiving mobile devices in real-time. The receiving mobile devices output the video as a projection by using an internal mobile projector or transmit the video to an external display device. A sending mobile device may also act as a receiving mobile device, such that each of the participants may view video of other participants in his/her own background/environment while communicating with the other participants. In some variations, the videoconferencing server removes the background from the video and may replace the background such that the images of participants are placed in front of a new background or in each other's background.
Abstract:
Consistent with the present disclosure, a method and apparatus for providing a uniform spectral gain of an optical amplifier is provided. Namely, a “balancing” step is carried out in which an optical channel having the lowest power level input to an optical circuit, such as an dynamic gain equalizer (DGE), is assigned a zero “attenuation error” and is substantially un-attenuated by the DGE. The lowest power level optical signal does not require further attenuation and effectively serves as a reference power level, which the power levels of the remaining optical signals are set to. For example, remaining optical signals are assigned either positive or negative attenuation errors relative to the zero attenuation error based on optical signal input powers to the DGE and accumulated DGE attenuations over time. Those optical signals having a negative attenuation error are substantially unattenuated by the DGE, because such optical signals are adequately attenuated and do not require further attenuation. On the other hand, the DGE is controlled to attenuate those optical signals having positive attenuation errors to thereby flatten the output spectrum of the amplifier. In one example, interpolation techniques may be employed to control those portions of the DGE (e.g., attenuators or pixels) that do not receive a channel, such that adjacent pixels that receive channels may impart a desired amount of attenuation. In addition, further interpolation may be provided to appropriately control the DGE pixels, if the number of channels supplied to the DGE is different than the number of pixels of the DGE.
Abstract:
In a network, packets are fragmented into head and non-head fragments. Non-head fragments are saved up front at an entry point, while a network switch forwards only the head fragment to Layer 4-Layer 7 (L4-L7) features for processing. The switch records changes that are performed on the head fragment's fields by the L4-L7 features while they process the head fragment. At an exit point, fields of the saved non-head fragments are overwritten with information that was recorded for the head fragment. This can include updating or modifying the source and destination parameters of the non-head fragments in an intelligent manner by reusing the results of the packet processing that was performed on the head fragment. This fragmentation handling technique avoids having to redundantly process the non-head fragments in the same manner as the head fragments.
Abstract:
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.
Abstract:
A method, system, and computer program product for providing external software applications with access to data elements contained within a database is provided. In one embodiment, a Service Request Module (SRM) receives a request from the external software application for data from the database. The SRM determines whether the requesting application is authorized to access the requested data and, if so, reformulates the request to form a new request, wherein the new request conforms to standards understandable by the database. Once the data is received from the database, the SRM reformats the data into a format desired by the requesting application and transmits the data back to the requesting software application. The present invention, thus allows changes can be made to the database, without requiring that each application that may make calls to the database be edited with new code. Rather, all that needs to be done is to edit a table with Application Program Interface (API) parameters for each application that makes calls to the database.
Abstract:
An electronic messaging client caches copies of a subset of electronic messages available in a remote store in a local store of a user device. When the user device is in an online state, the client provides for the blended presentation of electronic messages such that a user can concurrently view information about the electronic messages that have been cached in the local store as well as information about electronic messages that are stored only in the remote store. The client also presents a blended state associated with a container of electronic messages to a user of a user device and enables a user to execute a search of cached electronic messages stored in a local store as well as of electronic messages stored in the remote store.
Abstract:
Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response.
Abstract:
Systems and methods for seamless automated updating of a subscriber's address book based on relationships or “links” created between a subscriber and their contacts. The contacts are stored in a centralized addressbook database, and any updates to a subscriber's profile or record within the database results in an update to each of the subscriber's contacts' local address books stored on the contacts' devices. The system includes communication devices on a network being associated with subscribers of the network and an application server hosting an addressbook application, the application server having linking logic that creates a link between the subscribers where a modification of the first address on the addressbook database by the first subscriber results in a subsequent modification of the first address within a local copy of the addressbook database stored on a memory on the second device associated with the second subscriber.