user

Should you use Userbase for your next static site?

During the winter 2020 Pointless Weekend, we built TrailBuddy (working app coming soon). Our team consisted of four developers, two project managers, two front-end developers, a digital-analyst, a UXer, and a designer. In about 48 hours, we took an idea from Jeremy Field’s head to a (mostly) working app. We broke up the project in two parts:. First, a back-end that crunches trail, weather, and soil data. That data is exposed via a GraphQL API for a web app to consume.

While developers built the API, I built a static front end using Next.js. Famously, static front-ends don’t have a database, or a concept of “users.” A bit of functionality I wanted to add was saving favorite trails. I didn’t want to be hacky about it, I needed some way to add users and a database. I knew it’d be hard for the developers to set this up as part of the API, they had their hands full with all the #soil-soil-soil-soil-soil (a slack channel dedicated solely to figuring out our soil data problem—those were plentiful.) I had been looking for an excuse to use Userbase, and this seemed like as good a time as any.

A textbook Userbase use case

“When would I use it?” The Usebase site lists these reasons:

  • If you want to build a web app without writing any backend code.
  • If you never want to see your users' data.
  • If you're tired of dealing with databases.
  • If you want to radically simplify your GDPR compliance.
  • And if you want to keep things really simple.

This was a perfect fit for my problem. I didn’t want to write any more backend code for this. I didn’t want to see our user’s data, I don’t care to know anyone’s favorite trails.* A nice bonus to not having users in our backend was not having to worry about keeping their data safe. We don’t have their data at all, it’s end-to-end encrypted by Userbase. We can offer a reasonable amount of privacy for free (well for the price of using Userbase: $49 a year.) I am not tired of dealing with databases, but I’d rather not. I don’t think anyone doesn’t want to simplify their GDPR compliance. Finally, given our tight timeline I wanted nothing more than to keep things really simple.

A sign up form that I didn't have to write a back-end for

Using Userbase

Userbase can be tried for free, so I set aside thirty minutes or so to do a quick proof of concept to make sure this would work out for us. I made an account and followed their Quickstart. Userbase is a fundamentally easy tool to use, but their quickstart is everything I’d want out of a quickstart:

  • Written in the most vanilla way possible (just HTML and vanilla JS). This means I can adapt it to my needs, in this case React using Next.js
  • Easy to follow, it does the most barebones tour of the functionality you can expect to get out of the SDK (software development kit.) In other words it is quick and it is a start
  • It has a live demo and code samples you can download and run yourself

It didn’t take long after that to integrate Userbase into our app with more help from their great docs. I debated whether to add code samples of what we did here, and I didn’t because any reader would be better off using the great quickstart and docs Userbase provides—they are that clear, and that good. Depending on your use case you’ll need to adapt the examples to your needs, for us the trickiest things were creating a top level authentication context to manage users in the app, and a custom hook to encapsulate all the logic for setting, updating, and deleting favourite trails in the app. Userbase’s SDK worked seamlessly for us.

A log in form that I didn't have to write a back-end for

Is Userbase for you?

Maybe. I am definitely a fan, so much so that this blog post probably reads like an advert. Userbase saved me a ton of time in this project. It reminded me of “The All Powerful Front End Developer” talk by Chris Coyer. I don’t fully subscribe to all the ideas in that talk, but it is nice to have “serverless” tools like Userbase, and all the new JAMstacky things. There are limits to the Userbase serverless experience in terms of scale, and control. Obviously relying on a third party for something always carries some (probably small) risk—it’s worth noting Usebase includes a note on their pricing page that says “You can host it yourself always under your control, or we can run it for you for a full serverless experience”—Still, I wouldn’t hesitate this to use in future projects.

One of the great things about Viget and Pointless Weekend is the opportunity to try new things. For me that was Next.js and Userbase for Trailbuddy. It doesn’t always work out (in fact this is my first pointless weekend where a risk hasn’t blown up in my face) but it is always fun. Getting to try out Userbase and beginning to think about how we may use it in the future made the weekend worthwhile for me, and it made my job on this project much more enjoyable.

*I will write a future post about privacy conscious analytics in TrailBuddy when I’ve figured that out. I am looking into Fathom Analytics for that.



  • Code
  • Front-end Engineering

user

Common traps in user needs research and how to avoid them

Whether you call it a field visit, a contextual inquiry or a customer discovery interview, the goal of early stage research is the same: to uncover users' needs. Here are 5 mistakes I've seen crop up time and again in this kind of research.




user

Inform user about automatic comment closing time

To prevent spammers from flooding old articles with useless comments you can set WordPress to close comments after a certain […]




user

Customizing the User Registration Notification eMails

If a new user registers at a WordPress site the new user and the administrator receive notification mails: User: From: […]




user

Should you use Userbase for your next static site?

During the winter 2020 Pointless Weekend, we built TrailBuddy (working app coming soon). Our team consisted of four developers, two project managers, two front-end developers, a digital-analyst, a UXer, and a designer. In about 48 hours, we took an idea from Jeremy Field’s head to a (mostly) working app. We broke up the project in two parts:. First, a back-end that crunches trail, weather, and soil data. That data is exposed via a GraphQL API for a web app to consume.

While developers built the API, I built a static front end using Next.js. Famously, static front-ends don’t have a database, or a concept of “users.” A bit of functionality I wanted to add was saving favorite trails. I didn’t want to be hacky about it, I needed some way to add users and a database. I knew it’d be hard for the developers to set this up as part of the API, they had their hands full with all the #soil-soil-soil-soil-soil (a slack channel dedicated solely to figuring out our soil data problem—those were plentiful.) I had been looking for an excuse to use Userbase, and this seemed like as good a time as any.

A textbook Userbase use case

“When would I use it?” The Usebase site lists these reasons:

  • If you want to build a web app without writing any backend code.
  • If you never want to see your users' data.
  • If you're tired of dealing with databases.
  • If you want to radically simplify your GDPR compliance.
  • And if you want to keep things really simple.

This was a perfect fit for my problem. I didn’t want to write any more backend code for this. I didn’t want to see our user’s data, I don’t care to know anyone’s favorite trails.* A nice bonus to not having users in our backend was not having to worry about keeping their data safe. We don’t have their data at all, it’s end-to-end encrypted by Userbase. We can offer a reasonable amount of privacy for free (well for the price of using Userbase: $49 a year.) I am not tired of dealing with databases, but I’d rather not. I don’t think anyone doesn’t want to simplify their GDPR compliance. Finally, given our tight timeline I wanted nothing more than to keep things really simple.

A sign up form that I didn't have to write a back-end for

Using Userbase

Userbase can be tried for free, so I set aside thirty minutes or so to do a quick proof of concept to make sure this would work out for us. I made an account and followed their Quickstart. Userbase is a fundamentally easy tool to use, but their quickstart is everything I’d want out of a quickstart:

  • Written in the most vanilla way possible (just HTML and vanilla JS). This means I can adapt it to my needs, in this case React using Next.js
  • Easy to follow, it does the most barebones tour of the functionality you can expect to get out of the SDK (software development kit.) In other words it is quick and it is a start
  • It has a live demo and code samples you can download and run yourself

It didn’t take long after that to integrate Userbase into our app with more help from their great docs. I debated whether to add code samples of what we did here, and I didn’t because any reader would be better off using the great quickstart and docs Userbase provides—they are that clear, and that good. Depending on your use case you’ll need to adapt the examples to your needs, for us the trickiest things were creating a top level authentication context to manage users in the app, and a custom hook to encapsulate all the logic for setting, updating, and deleting favourite trails in the app. Userbase’s SDK worked seamlessly for us.

A log in form that I didn't have to write a back-end for

Is Userbase for you?

Maybe. I am definitely a fan, so much so that this blog post probably reads like an advert. Userbase saved me a ton of time in this project. It reminded me of “The All Powerful Front End Developer” talk by Chris Coyer. I don’t fully subscribe to all the ideas in that talk, but it is nice to have “serverless” tools like Userbase, and all the new JAMstacky things. There are limits to the Userbase serverless experience in terms of scale, and control. Obviously relying on a third party for something always carries some (probably small) risk—it’s worth noting Usebase includes a note on their pricing page that says “You can host it yourself always under your control, or we can run it for you for a full serverless experience”—Still, I wouldn’t hesitate this to use in future projects.

One of the great things about Viget and Pointless Weekend is the opportunity to try new things. For me that was Next.js and Userbase for Trailbuddy. It doesn’t always work out (in fact this is my first pointless weekend where a risk hasn’t blown up in my face) but it is always fun. Getting to try out Userbase and beginning to think about how we may use it in the future made the weekend worthwhile for me, and it made my job on this project much more enjoyable.

*I will write a future post about privacy conscious analytics in TrailBuddy when I’ve figured that out. I am looking into Fathom Analytics for that.



  • Code
  • Front-end Engineering

user

Cute Collection of 210 User Interface Icons

Did you remember how was your life before Freepik and Flaticon. No I can’t remember the dark ages either. To celebrate this golden times, they are giving away once more an incredible package of 210 User Interface Icons in 3 versions: Flat, filled and lineal.  Download This work is licensed under a Creative Commons Attribution 3.0 License …

Cute Collection of 210 User Interface Icons Read More »




user

Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter. (arXiv:2005.03550v1 [cs.SI])

Recent studies have confirmed a growing trend, especially among youngsters, of using Online Social Media as favourite information platform at the expense of traditional mass media. Indeed, they can easily reach a wide audience at a high speed; but exactly because of this they are the preferred medium for influencing public opinion via so-called fake news. Moreover, there is a general agreement that the main vehicle of fakes news are malicious software robots (bots) that automatically interact with human users. In previous work we have considered the problem of tagging human users in Online Social Networks as credulous users. Specifically, we have considered credulous those users with relatively high number of bot friends when compared to total number of their social friends. We consider this group of users worth of attention because they might have a higher exposure to malicious activities and they may contribute to the spreading of fake information by sharing dubious content. In this work, starting from a dataset of fake news, we investigate the behaviour and the degree of involvement of credulous users in fake news diffusion. The study aims to: (i) fight fake news by considering the content diffused by credulous users; (ii) highlight the relationship between credulous users and fake news spreading; (iii) target fake news detection by focusing on the analysis of specific accounts more exposed to malicious activities of bots. Our first results demonstrate a strong involvement of credulous users in fake news diffusion. This findings are calling for tools that, by performing data streaming on credulous' users actions, enables us to perform targeted fact-checking.




user

High Performance Interference Suppression in Multi-User Massive MIMO Detector. (arXiv:2005.03466v1 [cs.OH])

In this paper, we propose a new nonlinear detector with improved interference suppression in Multi-User Multiple Input, Multiple Output (MU-MIMO) system. The proposed detector is a combination of the following parts: QR decomposition (QRD), low complexity users sorting before QRD, sorting-reduced (SR) K-best method and minimum mean square error (MMSE) pre-processing. Our method outperforms a linear interference rejection combining (IRC, i.e. MMSE naturally) method significantly in both strong interference and additive white noise scenarios with both ideal and real channel estimations. This result has wide application importance for scenarios with strong interference, i.e. when co-located users utilize the internet in stadium, highway, shopping center, etc. Simulation results are presented for the non-line of sight 3D-UMa model of 5G QuaDRiGa 2.0 channel for 16 highly correlated single-antenna users with QAM16 modulation in 64 antennas of Massive MIMO system. The performance was compared with MMSE and other detection approaches.




user

Adaptive Dialog Policy Learning with Hindsight and User Modeling. (arXiv:2005.03299v1 [cs.AI])

Reinforcement learning methods have been used to compute dialog policies from language-based interaction experiences. Efficiency is of particular importance in dialog policy learning, because of the considerable cost of interacting with people, and the very poor user experience from low-quality conversations. Aiming at improving the efficiency of dialog policy learning, we develop algorithm LHUA (Learning with Hindsight, User modeling, and Adaptation) that, for the first time, enables dialog agents to adaptively learn with hindsight from both simulated and real users. Simulation and hindsight provide the dialog agent with more experience and more (positive) reinforcements respectively. Experimental results suggest that, in success rate and policy quality, LHUA outperforms competitive baselines from the literature, including its no-simulation, no-adaptation, and no-hindsight counterparts.




user

Determining a dynamic user profile indicative of a user behavior context with a mobile device

Methods, apparatuses and articles of manufacture for use in a mobile device to determine whether a dynamic user profile is to transition from a first state to a second state based, at least in part, on one or more sensed indicators. The dynamic user profile may be indicative of one or more current inferable user behavior contexts for a user co-located with the mobile device. The mobile device may transition a dynamic user profile from a first state to a second state, in response to a determination that the dynamic user profile is to transition from the first state to the second state, and operatively affect one or more functions performed, at least in part, by the mobile device based, at least in part, on the transition of the dynamic user profile to the second state.




user

Inferring user preferences from an internet based social interactive construct

In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an internet based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the internet based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation.




user

Apparatus and method for recognizing representative user behavior based on recognition of unit behaviors

An apparatus for recognizing a representative user behavior includes a unit-data extracting unit configured to extract at least one unit data from sensor data, a feature-information extracting unit configured to extract feature information from each of the at least one unit data, a unit-behavior recognizing unit configured to recognize a respective unit behavior for each of the at least one unit data based on the feature information, and a representative-behavior recognizing unit configured to recognize at least one representative behavior based on the respective unit behavior recognized for each of the at least one unit data.




user

Systems and methods for analysis of network equipment command line interface (CLI) and runtime management of user interface (UI) generation for same

Systems and methods are disclosed that may be implemented for network management system (NMS) configuration management support for network devices using a learning and natural language processing application to capture the usage and behavior of the Command Line Interface (CLI) of a network device with the aid of a CLI knowledge model, which in one example may be ontology-based.




user

Observation-based user profiling and profile matching

Observation-based user profiling and profile matching are provided. The network behavior of users of a computer-implemented social network are observed and used for user profiling. By observing network behavior instead of necessarily relying on user self-reported data, accurate and objective user profiles can be formed; user profiling is accomplished based on the observed network behaviors with or without the knowledge of the user being profiled. The observed network behaviors can include the customization of a visual graphic, a media preference, a communication preference, or a selection of words from a word list. The user profiles can be with respect to a domain and two or more users can be matched based on their profiles with respect to the same domain. User ratings and profile updating based on the ratings are also provided.




user

User-coordinated resource recovery

A computing system resource recovery method can include identifying a resource manager associated with a computing transaction, classifying the computing transaction to determine a predetermined metric, measuring an actual metric of the computing transaction, comparing the predetermined metric to the actual metric to detect abnormal behavior in the transaction and modeling the abnormal behavior to determine how the resource manager is affected by the abnormal behavior.




user

Method for transmitting data from an infrastructure of a radio communication network to user devices, and devices for implementing the method

Within a radio communication network infrastructure transmitting data organized into a sequence of symbols to a receiving device over a plurality of radio links, data to be transmitted is encoded according to an error correction coding scheme in order to produce a set of systematic symbols and a set of corresponding redundancy symbols; the systematic symbols and a first subset of the corresponding redundancy symbols are transmitted, over a first radio link among said plurality of radio links, in broadcast mode, and a second subset of the corresponding redundancy symbols, distinct from the first one, is transmitted over a second radio link among said plurality of radio links.




user

System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information

A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.




user

Method, apparatus and computer program for determining the location of a user in an area

Apparatus for orientating a user in a space wherein the space comprises a plurality of zones of which only certain zones constitute functional zones wherein each functional zone includes a first type device containing information relating to the position of the zone in the space and wherein the first type device is reactive to the presence of a second type device associated with the user to provide the user with the information to determine the orientation of the user in the space. A method of orientating the user within the space and guiding the user toward one or more features in the space is also disclosed.




user

Sound localization for user in motion

Methods, apparatus, and computer programs for simulating the source of sound are provided. One method includes operations for determining a location in space of the head of a user utilizing face recognition of images of the user. Further, the method includes an operation for determining a sound for two speakers, and an operation for determining an emanating location in space for the sound, each speaker being associated with one ear of the user. The acoustic signals for each speaker are established based on the location in space of the head, the sound, the emanating location in space, and the auditory characteristics of the user. In addition, the acoustic signals are transmitted to the two speakers. When the acoustic signals are played by the two speakers, the acoustic signals simulate that the sound originated at the emanating location in space.




user

Method and system for facilitating communications for a user transaction

Current human-to-machine interfaces enable users to interact with a company's database and enter into a series of transactions (e.g., purchasing products/services and paying bills). Each transaction may require several operations or stages requiring user input or interaction. Some systems enable a user to enter a voice input parameter providing multiple operations of instruction (e.g., single natural language command). However, users of such a system do not know what types of commands the system is capable of accepting. Embodiments of the present invention facilitate communications for user transactions by determining a user's goal transaction and presenting a visual representation of a voice input parameter for the goal transaction. The use of visual representations notifies the user of the system's capability of accepting single natural language commands and the types of commands the system is capable of accepting, thereby enabling a user to complete a transaction in a shorter period of time.




user

Adaptive user interface for widescreen devices

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adapting user interfaces for devices that include widescreen displays. In one aspect, a method includes determining a size characteristic of a display of a mobile device, determining a size characteristic of content that is to be displayed on the display, and comparing the size characteristic of the content to the size characteristic of the display. The method also includes selecting one or more controls to display in a portion of the display that is not to be used to display the content based on comparing the size characteristic of the content to the size characteristic of the display, displaying the content, and displaying the selected controls in a portion of the display that is not used to display the content.




user

User interfaces for displaying relationships between cells in a grid

User interfaces for displaying relationships between cells in a grid. In one example embodiment, a user interface includes a grid including rows and columns and a plurality of cells each having a specific position in the grid. A first one of the cells is related to a second one of the cells. The grid is configured to display, upon selection of the first cell or second cell, a visual representation of the relationship between the first cell and the second cell.




user

Dynamically composed user interface help

A user interface help dialog for a computer system is provided in which the computer system has a plurality of system parameters and the user interface includes a plurality of command options that may be enabled or disabled. A cursor for indicating one of the command options is also provided. To generate the help dialog the identity of a disabled command option to which the cursor indicates is first identified. The status of a subset of the system parameters is then evaluated, the system parameters subset being determined in dependence on the identified command option. A help dialog to be displayed to the user is then generated, the content of which is dependent on the status of the evaluated system parameters.




user

User interface with enlarged icon display of key function

To improve the consumer experience with portable electronic devices, a user interface combines the use of capacitive sensors with tactile sensors in an input device. When a user places a finger, stylus, or other input instrument near a given key button, a capacitive sensor causes the display to display temporarily an indication of the function of that key in an enlarged format. The user may then press the associated key button to activate the desired function. In one exemplary embodiment, the capacitive sensor fixes the functionality to the function indicated in the display. In this embodiment, a tactile input applied to any key, whether the correct key, multiple keys, or a single incorrect key, results in activating the function indicated in the display as a result of the capacitive input.




user

3D mobile user interface with configurable workspace management

Systems and methods of a 3D mobile user interface with configurable workspace management are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of a three-dimensional, multi-layer user interface of a mobile device in a mobile network. User environment may include one or more layers or levels of applications, services, or accounts that are all easily accessible to and navigable by the user. For example, an indicator can be used to access a workspace in 3D representing a category or grouping of services or applications for the user. The user can customize or create a unique, non-mutually exclusive grouping, aggregation, or category of applications, services, accounts, or items. The grouping of indicators can be used to swiftly and efficiently navigate to a desired application, service, account or item, in a 3D-enabled user environment.




user

Apparatus and method for user input for controlling displayed information

In accordance with an example embodiment of the present invention, a method for proximity based input is provided, comprising: detecting presence of an object in close proximity to an input surface, detecting a displayed virtual layer currently associated with the object on the basis of distance of the object to the input surface, detecting a hovering input by the object, and causing a display operation to move at least a portion of the associated virtual layer in accordance with the detected hovering input.




user

Detecting automated identities in computer user communities

A computer-implemented method of detecting automated identities, including. The method includes, using one or more computing devices, providing for display to a user a first representation of a first profile for a first identity and a second representation of a second profile for a second identity, providing for display to the user a choice indication mechanism for indicating a judgment about the first representation of the first profile for the first identity and the second representation of the second profile for the second identity, receiving an indication of the judgment from the user about the first representation of the first profile for the first identity and the second representation of the second profile for the second identity, and determining whether at least one of the first identity, the second identity, or the user is more or less likely to be automated, based at least in part on the received indication.




user

Device, method, and graphical user interface for managing concurrently open software applications

A method includes displaying a first application view. A first input is detected, and an application view selection mode is entered for selecting one of concurrently open applications for display in a corresponding application view. An initial group of open application icons in a first predefined area and at least a portion of the first application view adjacent to the first predefined area are concurrently displayed. The initial group of open application icons corresponds to at least some of the concurrently open applications. A gesture is detected on a respective open application icon in the first predefined area, and a respective application view for a corresponding application is displayed without concurrently displaying an application view for any other application in the concurrently open applications. The open application icons in the first predefined area cease to be displayed, and the application view selection mode is exited.




user

Translating user motion into multiple object responses

A system for translating user motion into multiple object responses of an on-screen object based on user interaction of an application executing on a computing device is provided. User motion data is received from a capture device from one or more users. The user motion data corresponds to user interaction with an on-screen object presented in the application. The on-screen object corresponds to an object other than an on-screen representation of a user that is displayed by the computing device. The user motion data is automatically translated into multiple object responses of the on-screen object. The multiple object responses of the on-screen object are simultaneously displayed to the users.




user

Method of rendering a user interface

A user interface (UI) is presented in which a UI client engine is associated with an application, and a UI rendering engine is associated with the client engine. The UI rendering engine receives the scene graph and data items associated with elements of the scene graph, and processes a rendering thread to render a UI in accordance with the scene graph and the data items, independently of further input from the client UI engine.




user

Internet streaming and dynamic reconfiguration of user displays

Internet streaming from broadcast radio or television stations is described wherein triggers for dynamic content from internal or external systems cause an encoder system to generate command messages, and to optionally synchronize those command messages with any delays associated with the triggering events. Command messages are delivered through a streaming media distribution system to client media players which obtain or present the dynamic content, in association with any desired configuration changes to the appearance of the media player or the method or manner in which the dynamic content is presented.




user

User initiated rule-based restrictions on messaging applications

A method, system and computer program product are disclosed for user initiated rule based restrictions on sending messages from a sender to a receiver in a communications network. The receiver establishes a set of rules for the sender that allows the sender a limited number of defined messages events with the receiver. The defined message events may be messages or message sessions. When the sender attempts to send a message to the receiver, it is determined whether a message session currently exists between the sender and the receiver. If a current session exists, the rules set by the receiver are used to determine if the message is allowed to be sent to the receiver. If a session does not currently exist, the rules are used to determine whether a new session is allowed. If a new message session is allowed, a new session is established, and the message is sent to the receiver during the new session.




user

System and method for supporting video processing load balancing for user account management in a computing environment

A system and method can support user account management in a computing environment. The computing environment can include a video encoding pool to support load balancing and a managing server, such as a privileged account manager server. The video encoding pool includes a set of nodes that are able to perform one or more video processing tasks for another node. Furthermore, the managing server can receive a request from a managed node in the computing environment for delegating a video processing task, and can select one or more nodes from the video encoding pool to load babalance and to perform the video processing task.




user

Biometric monitoring device with heart rate measurement activated by a single user-gesture

A biometric monitoring device measuring various biometric information is provided that allows the person to take and/or display a heart rate reading by a simple user interaction with the device, e.g., by simply touching a heart rate sensor surface area or moving the device in a defined motion pattern. Some embodiments of this disclosure provide biometric monitoring devices that allow a person to get a quick heart rate reading without removing the device or interrupting their other activities. Some embodiments provide heart rate monitoring with other desirable features such as feedback on data acquisition status.




user

Methods, systems, and computer readable media for simulating realistic movement of user equipment in a long term evolution (LTE) network

Methods, systems, and computer readable media for simulating realistic movement of user equipment in an LTE network are disclosed. According to one method, a logical topology of a long term evolution (LTE) access network is defined that includes defining connections between one or more eNodeBs (eNBs). A physical topology of the LTE access network is defined that includes defining locations of the eNBs and sectors, where the physical network topology is mapped to the logical network topology. One or more problem areas are defined within the physical network topology, where the one or more problem areas include locations where signal quality is degraded. One or more paths are defined through the physical network topology. A traffic profile for a user equipment (UE) device is defined. A plurality of messages is generated for simulating the movement of a UE device along a path through the physical network topology.




user

Method for performing handover, user equipment, base station, and radio communication system

Provided is a method for performing a handover from a first base station to a second base station by a user equipment that is performing a radio communication over a communication channel formed by aggregating a plurality of component carriers. The method includes a step of transmitting a handover command for a component carrier for which a handover has been approved by the second base station among the plurality of component carriers from the first base station to the user equipment and a step of trying to make an access from the user equipment to the second base station for each component carrier in response to the handover command.




user

MU-MIMO-OFDMA systems and methods for servicing overlapping co-scheduled users

Methods and systems for conveying or transmitting to any given user in an OFDMA-MU-MIMO system scheduling information of other co-scheduled users to permit the user to perform error-correction on received data and/or interference reduction on its received signals. The scheduling information can include resource block assignment, modulation constellations employed, coding rates employed, power levels utilized and precoder matrix indices used. Further, the scheduling information can be conveyed in part through dedicated reference symbol layers or pilot streams. Moreover, a base station may transmit a preliminary estimate of the total number of users the base station expects to schedule, or an upper-bound on the total number of users, to the MU-MIMO users to permit the MU-MIMO users to determine preferred precoder matrix indices and indications of channel quality indices.




user

Quality of service application controller and user equipment application profiler

Various topologies of a quality of service application controller and related techniques to optimize the communications performance an application executing on a device participating in a communications environment are disclosed. The communications environment may include a cellular network, an unlicensed spectrum network, or a combination of the two. The quality of service application controller observes one or more key performance indicators of the communications network, and retrieves a policy from a policy store specific to the application. The quality of service application controller then modifies the execution of the application and/or the configurable aspects of the communications environment to optimize the communications performance of the application. For example, the application's data throughput may be increased, the power draw of the application may be minimized, data requested by the application may be minimized, or the apparent response time of the application's response to a web service may be minimized.




user

Mobile user terminal, mobile communication system, base station, and communication method

A mobile user terminal, which communicates with a base station in an intermittent fashion, the mobile user terminal includes a radio transmitter which transmits downlink channel quality information indicating downlink channel quality and an uplink pilot signal to a base station in an intermittent fashion; and a transmit time controller which synchronizes transmit time of the downlink quality information and transmit time of the uplink pilot signal relative to each other, such that the downlink quality information and the uplink pilot signal are sent in adjacent different timings in a period corresponding to a state of intermittent communicate.




user

User interface for geofence associated content

A location aware user interface on a wireless handset is described. The location aware user interface comprises a location module configured to transmit a location message to a remote server via a network. The remote server is configured to determine whether the wireless handset is within a geofence. The user interface further comprises a display module configured to display at least one content item associated with the geofence. The user interface also comprises an input module configured to receive a user-created content item and transmit the received user-created content item to the remote server. The remote server is configured to associate the content item with the geofence in which the wireless handset is located.




user

Monitoring user activity on a mobile device

Monitoring user activity on a mobile device is described. In one aspect, video content is received and played to a user of the mobile device. The monitoring activity detects an interruption of playback of the video content and determines an event associated with the interruption. The event is stored in the mobile device and communicated to a remote device.




user

User based parental controls

User-based parental controls (UBPC) are provided. UBPC are provided to users according to a user profile associated with a specific user. Parental controls may be tailored to meet a parental control need according to each user. User profiles may be created by one or more administrative users and may include restrictions according to a TV, movie, application, or game rating system, specific channels, or specific programs. User profiles may be stored in a remote database allowing for various media content receiving and/or viewing devices to access the user profiles for applying parental control features according to a specific user profile. A user profile may be altered by one or more administrative users who may create an override access code which may allow the administrative user to manage other users' parental controls.




user

Synchronization of user interactive events with on-screen events during playback of multimedia stream

A method includes receiving, at a multimedia device, a data stream representing multimedia content, the data stream comprising first timing information for the multimedia content, and metadata representing interactive event information associated with the multimedia content, the metadata comprising second timing information for the interactive event information. During the playback of the multimedia content, a first user interactive event is identified that is associated with a first time point in the playback of the multimedia content based on the interactive event information, and the first user interactive event is performed concurrent with the first time point in the playback of the multimedia content.




user

System and method in a television system for presenting information associated with a user-selected object in a television program

A system and method in a television system for presenting information associated with a user-selected object in a television program is provided. An identity of a user-selected object in a television program being presented to a user is determined. Based at least in part on the identity of the user-selected object in the television program, information to present to the user is determined. The determined information is presented to the user on a television display.




user

Internet TV module for enabling presentation and navigation of non-native user interface on TV having native user interface using either TV remote control or module remote control

A display device such as a TV has both HDMI and IP network interfaces and uses the HDMI interface to exchange IP network parameters with an audio video application module (AVAM) upon HDMI connection. In this way, an IP-based peer-to-peer or client-server network connection can be automatically established to promote faster communication when sharing and executing applications between the devices than is typically available over the CEC link of HDMI.




user

System and method for switching between media streams while providing a seamless user experience

An electronic device with one or more processors, memory and a display receives a first request to display a first video stream on the display. In response to receiving the first request, the electronic device displays the first video stream on the display. While displaying the first video stream on the display, the electronic device receives a second request to display a second video stream on the display. In response to receiving the second request, the electronic device displays at least a portion of the first video stream on the display concurrently with at least a portion of the second video stream, where the second video stream was received, at least in part, from a content source in response to a request from the electronic device to the content source for delivery of the second video stream from the content source.




user

User to user game referrals

A method is disclosed in a gaming and media system for quickly and easily creating and sending mail communications including pre-populated, or preformed, messages. Upon receipt of a communication, a recipient may also quickly and easily download a game discussed in the message.




user

Communication system for helmeted user

A communication system for a user having a helmet including earphones and a microphone and including a two-way radio and a microphone-including unit carried by the user and connected to the two-way radio includes a sensor for sensing the presence of the user's head within the helmet. A transmitter associated with the sensor transmits a wireless signal to the microphone-including unit which enables the microphone-including unit to wirelessly receive voice-carrying signals transmitted from the helmet microphone for conductance to the two-way radio and enables the microphone-including unit to wirelessly transmit voice-carrying signals which are received by the microphone-including unit from the two-way radio to the helmet earphones. In addition, helmet-carried componentry permits the user to simultaneously communicate through the two-way radio and a bluetooth enabled cell phone.




user

Heterogeneous network (HetNet) user equipment (UE) radio resource management (RRM) measurements

Methods and apparatus for performing radio resource management (RRM) measurements in a heterogeneous network (HetNet) are provided in an effort to prevent failure of RRM measurement procedures in a dominant interference scenario. Several alternatives are provided for determining particular resources (e.g., subframes) to use for performing the RRM measurements, wherein the particular resources are based on cooperative resource partitioning between cells of the HetNet, wherein the cells may be of different types (e.g., macro, pico, or femto cells). These alternatives include, for example: (1) intra-frequency or intra-RAT (radio access technology) alternatives, which may involve transmitting resource partitioning information (RPI) in or deriving non-serving cell RPI based on the serving cell's RPI, as well as (2) inter-frequency or inter-RAT alternatives, where the RRM measurements may be performed during a measurement gap.




user

User detachment when a handover or change occurs in heterogeneous network

A method for user detachment when a handover or change occurs in a heterogeneous network is provided. The method includes: a user equipment (UE) is handed over or switched from a source network to a target network; a network element on a network side determines whether to detach the UE from the source network, and if yes, the network element on the network side detaches the UE from the source network. A system and a device for user detachment when a handover or change occurs in a heterogeneous network, and another method for user detachment when a handover or change occurs in a heterogeneous network are also provided.