Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
Modifying remote service discovery based on presence involves identifying service discovery data using ad-hoc, peer-to-peer, service discovery protocols of a local network. The service discovery data is aggregated via an entity of the local network. Presence data associated with a remote device located outside of the local network is identified and the aggregated service discovery data is altered based on the presence data. The altered aggregated service discovery data is made available to the remote device using out-of-band communications. The out-of-band communications are different from the service discovery protocols of the local network.
Abstract:
Various methods are described for expanding the display of a web application across multiple devices. One example method may comprise receiving an indication of content associated with a main frame of a web application. The method may further comprise displaying of the content associated with the main frame. Furthermore, the method may comprise searching for one or more external devices. Each of the one or more external devices may comprise a display for rendering content associated with a respective expanded frame of the web application. The method of this example embodiment may further comprise establishing a connection with the one or more external devices. Furthermore, the method may comprise providing for transmission to each of the one or more external devices of an indication of the content associated with the respective expanded frame. Similar and related example methods, example apparatuses, and example computer program products are also provided.
Abstract:
A mobile terminal includes a processor capable of operating a link manager. The link manager is capable of at least partially operating a wireless connection between the terminal and an access point in an active mode, where the access point is coupled to a network. The link manager is also capable of transitioning the connection from the active mode to a standby mode or hibernate mode. In this regard, transitioning the connection includes entering the mobile terminal in a power-saving mode of a bearer of the connection, such as a Bluetooth power-saving mode, and directing the access point to reduce traffic flowing from the network across the connection to the mobile terminal when the mobile terminal is otherwise capable of receiving the traffic.
Abstract:
A method and system for distinguishing between devices of different types (e.g., mobile and stationary devices) in a wireless local area network (WLAN) in order to provide additional services to one or the other. The method includes obtaining a device type for the terminal, and providing specific services to the terminal if the terminal is a device of a certain type.
Abstract:
A Content Directory Service (CDS) security service specifying, in a user friendly manner, which users of a media server or other UPnP device own which content. The security service also permits the owners of content to control who is permitted to read the content. A CDS account manager is used to define user accounts and associated rights, such as validity periods and default rights. The CDS account manager is used by a security console which owns the media server. A CDS content manager is used to manipulate the rights to objects. The CDS content manager is used by a registered security aware control point (i.e., a control point associated with a user account) and can be used to change read and write access lists on the object.
Abstract:
A mobile device is coupled to an ad-hoc, peer-to-peer local area network via a public network. A secure data connection is created between the mobile device and an access point of the local area network so that the mobile device operates in an address space of the local network. A proxy for the mobile device is operated on the local network. The proxy maintains one or more state variables related to operation of the mobile device on the local network. The proxy simulates a reduced power mode of the mobile device on the local network for purposes of shaping traffic over the secure data connection and provides the state variables to entities of the local network on behalf of the mobile device.