Abstract:
In an example implementation of the disclosed technology, a method includes predicting, by a computing device, a destination server that is predicted to be the destination of a message from a sending device connected to the computing device. The method also includes determining whether a connection exists between the computing device and the destination server. The method also includes, responsive to determining that no connection exists, determining a connection and caching the connection at the computing device. The method also includes, responsive to receiving a message for dispatch to the destination server, dispatching the message to the destination server via the connection.
Abstract:
Systems and techniques are provided for dynamic authentication using distributed mobile sensors. According to an embodiment of the disclosed subject matter, signals may be received from sensors. Some of the sensors may be located on a remote computing device. Heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems may be applied to the signals from sensors to determine a trust outcome. The trust outcome may be sent to be implemented by the enabling, disabling, or relaxing of a security measure based on the trust outcome.
Abstract:
In an example implementation of the disclosed technology, a method includes assigning a computing device to a region associated with a region server that comprises a plurality of region server instances. The method also includes generating device-to-region mapping and transmitting a replica of the device-to-region mapping to a messaging server instance and connection server instance. Further, the method includes receiving local device connection information comprising connection information relating the computing device and the connection server instance. The method also includes outputting the local device connection information to the plurality of region server instances. Additionally, the method includes receiving a message for delivery to the computing device and, responsive to accessing the local device connection information, transmitting the message to the connection server instance identified by the local device connection information.
Abstract:
A network traffic monitoring system monitors communications that a large number of personal electronic devices will direct to various services via various proxies. When a detection system determines that the volume of requests directed to at least one of the services exceeds a capacity limit threshold, a control system will command the proxies to instruct the devices to slow or stop the service requests until the system determines that it is clear to resume communication.
Abstract:
Systems and methods include storing execution parameters for handling application messages for two or more client applications and storing callback paths for notifying the two or more client applications of transmission of the application messages. The method includes receiving an indication of a client application message available for transmission, receiving one or more network control messages that include an indication of an activity state of a network. The method includes determining whether to the delay the client application message. Responsive to the determining, based at least in part on the indication from the one or more network control messages that a network connection is active, the method includes allowing transmission of the client application message, and sending an indication of acknowledgement by one or more of the callback paths.
Abstract:
In an example implementation of the disclosed technology, a method includes receiving, at a processor, an indication of a user intent, the user intent indicative of an intent of a user to control a functionality of a receiving device in wireless communication with the computing device. The method also includes serializing at least a portion of data representing the indication of the user intent into a text bundle. The method also includes generating a message configured to control the functionality of the receiving device according to the user intent, the message comprising at least the text bundle. Finally, the method includes transmitting the message for delivery to the receiving device.
Abstract:
In an example implementation of the disclosed technology, a method includes assigning a computing device to a region associated with a region server that comprises a plurality of region server instances. The method also includes generating device-to-region mapping and transmitting a replica of the device-to-region mapping to a messaging server instance and connection server instance. Further, the method includes receiving local device connection information comprising connection information relating the computing device and the connection server instance. The method also includes outputting the local device connection information to the plurality of region server instances. Additionally, the method includes receiving a message for delivery to the computing device and, responsive to accessing the local device connection information, transmitting the message to the connection server instance identified by the local device connection information.
Abstract:
Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
Abstract:
Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
Abstract:
Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.