50 patents in CPC class H04W
A computer implemented system for dynamically optimizing enterprise applications, have been disclosed. The system includes a capturing module configured to capture at least the user requirements including non functional requirements, and definitions corresponding to an enterprise application to be deployed. The system further includes an identifier for identifying at least the processes and services corresponding to each of the user requirements. The identified processes are subsequently customized and, a plurality of customizable computer accessible objects are generated. A model, comprising the customizable computer accessible objects is created. The model is a representation of the computer infrastructure required for successful deployment of the application. The computer accessible objects are dynamically and iteratively optimized depending upon their performance.
An intelligently distributed stage data mining system is disclosed herein, including an intelligent central server, a first WLAN receiving and transmitting unit, a local cluster control unit, a second WLAN receiving and transmitting unit, a third WLAN receiving and transmitting unit, a self-adaptive multi-dimensional transmission processing unit, a plurality of ZigBee receiving and transmitting units and a distributed data extraction unit. The intelligent central server is used for sending data acquisition and stage correction instruction to the local cluster control unit, and for receiving the stage real-time data uploaded by the self-adaptive multi-dimensional transmission processing unit. The local cluster control unit is used for receiving the data acquisition instruction sent by the intelligent central server, and forwarding instructions to the self-adaptive multi-dimensional transmission processing unit.
An information provision method includes accumulating, in a first database, a first identifier identifying each of one or more service providers, and first device information indicating an electrical device to be designated by each of the one or more service providers in association with each other; accumulating, in a second database, a second identifier identifying each of one or more users, and second device information indicating an electrical device to be used by the one or more users in association with each other; extracting a service provider associated with the first device information when the second device information is updated by addition of a new electrical device to be used by one of the one or more users, and when the new electrical device is included in the electrical devices indicated by the first device information.
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
An apparatus for maintaining privacy when providing media content to a group includes at least one sensor coupled to a processor that is configured to observe, based on sensor data from the sensor(s), that more than one user is engaged with the apparatus, and to obtain user identities for at least a first user and a second user engaged with the apparatus. The processor looks-up a first privacy preference for the first user and a second privacy preference for the second user based on the user identities of both users. The processor determines restricted content based on the first privacy preference and the second privacy preference and determines and outputs for display suggested content for engagement by the first user and the second user, based on the restricted content, where the suggested content satisfies criterion for the first privacy preference and the second privacy preference.