Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
The terms "a," "an," "the," and "said" are used in this specification to denote the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.; the terms "first" and "second" and the like are used merely as labels, and are not intended to limit the number of their objects.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities.
In view of the problems in the related art, the present disclosure proposes an apparatus information processing method. Fig. 1 shows a flow diagram of a device information processing method, as shown in fig. 1, including at least the following steps:
S110, receiving equipment information sent by an Internet of things server and storing the equipment information; the device information is sent to the Internet of things server by the Internet of things device.
And S120, counting the equipment information of the Internet of things equipment to obtain a statistical result, and if the statistical result meets the warning condition, generating warning information for warning that the Internet of things equipment is abnormal.
In the method and the device provided by the exemplary embodiment of the disclosure, on one hand, the equipment information is not stored in the internet of things server any more, so that the situation that the equipment information is lost due to the fact that the equipment information cannot be recorded in time in the upgrading or downtime process of the internet of things server is avoided; on the other hand, the equipment information is counted to obtain a counting result, and if the counting result meets the warning condition, warning information is generated, so that the efficiency of maintaining, managing and controlling the Internet of things equipment is improved.
The respective steps of the device information processing method are described in detail below.
In step S110, receiving device information transmitted by the internet of things server, and storing the device information; the device information is sent to the Internet of things server by the Internet of things device.
In the exemplary embodiment of the present disclosure, in the internet of things, ubiquitous connection between an object and between objects and people may be achieved through access of various networks, where the internet of things device is the object in the internet of things device, and the device information refers to device information corresponding to the internet of things device, specifically, the device information may include login time of the internet of things device, log-out information of the internet of things device, device identification of the internet of things device, update time of the internet of things device, and any information related to the internet of things device, which is not limited in this exemplary embodiment.
The login time refers to the time of accessing the Internet of things by the Internet of things device, the logout time refers to the time of exiting the Internet of things by the Internet of things device, the update time refers to the time of updating the device information, and the device identifier refers to the identification information representing the Internet of things device. The internet of things server refers to a server in the prior art for acquiring and storing device information.
However, in the present exemplary embodiment, the device information is not stored in the internet of things server any more, but when the internet of things server receives the device information transmitted by the internet of things device, the device information is transferred to the device information server so that the device information server stores the device information.
For example, fig. 2 shows a schematic diagram of a storage process of device information, as shown in fig. 2, in which the device 210 is an internet of things device, the server 220 is an internet of things server, the server 230 is a device information server, the database 240 is a database for storing device information, and after the internet of things server 220 receives the device information sent by the internet of things device 210, the device information is transmitted to the device information server 230, so that the device information server 230 stores the device information in the database 240.
In an alternative embodiment, fig. 3 shows a schematic flow chart of storing device information in a device information processing method, where the device information includes a login time, and as shown in fig. 3, the method at least includes the following steps: in step S310, if the log-out instruction of the internet of things device sent by the internet of things server is received within the preset time, the log-in time is not stored.
There are two kinds of logins, one is the login in the normal state and the other is the login in the abnormal state, and the login in the normal state does not have frequent login and login, however, the login in the abnormal state has frequent login and login, and the preset time is a preset time value for determining whether the current login is the login in the normal state or the login in the abnormal state.
The logout instruction refers to an instruction that the Internet of things server exits the Internet of things. If the equipment information server receives a log-out instruction sent by the Internet of things server within the preset time, the log-in under the abnormal state is proved, and the log-in time is not stored.
For example, a student can start shower a by scanning a two-dimensional code, at this time, shower a accesses the internet of things, and sends login time 2 point 01 to an internet of things server, and the internet of things server transfers the login information to a device information server.
At this time, the login time is not stored immediately, but it is judged whether the exit instruction of the shower A is received within 20 seconds of the preset time, and if the exit instruction of the shower A is received within 20 seconds of the preset time, the login time is not stored at 2 o' clock 01 minutes.
In step S320, if the logout command is not received within the preset time, the login time is stored.
If the login instruction is not received within the preset time, the login is proved to be one-time login in a normal state, and the login time is stored.
For example, a student can start shower a by scanning a two-dimensional code, at this time, shower a accesses the internet of things, and sends login time 2 point 01 to an internet of things server, and the internet of things server transfers the login information to a device information server.
At this time, the login time is not stored immediately, but it is judged whether a command for the student to exit the shower A is received within 20 seconds of the preset time, and if the command for the student to exit the shower A is not received within 20 seconds of the preset time, the login time is stored in 2 o' clock of 01 minutes.
In the present exemplary embodiment, by determining whether the log-out instruction is received within the preset time, the pressure of the database caused by the log-in the abnormal state, that is, the pressure of the database caused by the frequent log-in log-out can be effectively prevented.
In an alternative embodiment, fig. 4 shows a schematic flow chart of storing login information in a device information processing method, where the device information includes login information, and as shown in fig. 4, the method at least includes the following steps: in step S410, if a plurality of login times for the internet of things device are received, a difference between adjacent login times of the plurality of login times is calculated.
The login time difference is the difference between adjacent login times.
For example, the device information server receives 3 login times about shower a sent from the physical connection server, which are login time B, login time C, and login time D, respectively, wherein the login time B is 2 points 01 minutes 23 seconds, the login time C is 2 points 01 minutes 30 seconds, and the login time D is 2 points 01 minutes 33 seconds.
Based on this, two registration time differences, namely, a registration time difference of 7 seconds between the registration time C and the registration time B, and a registration time difference of 3 seconds between the registration time D and the registration time C, can be calculated.
In step S420, if the difference between the adjacent login times is smaller than the first time threshold, one of the login times is determined as the target login time, so as to store the target login time.
The first time threshold is a critical value defining whether the login is frequent login, and when the login time difference is smaller than the first time threshold, it is determined that the two logins corresponding to the login time difference belong to frequent login.
For example, two registration time differences may be calculated, namely, 7 seconds between the registration time C and the registration time B, 3 seconds between the registration time D and the registration time C, and the first time threshold is 10 seconds.
Obviously, the login corresponding to the login time B, the login corresponding to the login time C, and the login corresponding to the login time D all belong to frequent logins, and further, the login time D is determined as the target login time of the shower a, and the login time D is stored.
In this exemplary embodiment, by calculating the login time difference and comparing the login time difference with the first time threshold, only one login time may be stored under the condition of frequent login, thereby alleviating the storage pressure of the database and reducing unnecessary performance loss.
In an alternative embodiment, fig. 5 shows a schematic flow chart of storing device information in a device information processing method, where the device information includes log-out information, and as shown in fig. 5, the method at least includes the following steps: in step S510, a login time corresponding to the internet of things device is obtained, and a time difference between the login time and the current time is calculated.
After the device information server acquires the login time, a difference between the login time and the current time is calculated at regular time, and the difference is a time difference. The time difference is calculated because the reasons such as power failure, network disconnection and damage may cause abnormality of the internet of things device, in this case, although the internet of things device has been logged out of the internet of things device, the internet of things server may not be able to timely obtain the log-out time of the internet of things device, based on which the time difference is calculated for comparison between the subsequent time threshold and the second time threshold to determine the log-out time of the closest internet of things device out of the internet of things device.
For example, it is determined that the login time of shower a is 2 points 01 minutes 33 seconds, and the time difference between the current time 3 points 23 minutes 00 seconds and the login time2 points 01 minutes 33 seconds is 1 hour 21 minutes 27 seconds.
In step S520, if the time difference is greater than the second time threshold, the current time is determined to be the logout time of the internet of things device, so as to store the logout time.
The internet of things device has an abnormal condition, in this case, the real log-out information of the internet of things device may not be obtained, so the second time threshold is a time threshold for determining the closest real log-out time of the physical device.
For example, the second time threshold is 1 hour and 20 minutes, the time difference is 1 hour and 21 minutes, and when it is obvious that the time difference is greater than the second time threshold, the current time 3 point 23 minutes and 00 seconds is determined as the log-out time of the shower a, and the log-out time is stored.
In the present exemplary embodiment, when the time difference is greater than the second time threshold, the current time is determined to be the log-out time of the internet of things device, so that the situation that the log-out time cannot be stored when the internet of things device is abnormal is effectively avoided, and timely and complete recording of device information is ensured.
In an alternative embodiment, fig. 6 shows a schematic flow chart after storing the log-out time in the device information processing method, and as shown in fig. 6, the method at least includes the following steps: in step S610, receiving a real logout time sent by the internet of things server, and determining a device identifier corresponding to the real logout time; the real log-out time is sent to the Internet of things server after the Internet of things equipment corresponding to the equipment identifier is restored to the normal running state.
When the internet of things device is abnormal, the current time is stored as the log-out time of the internet of things device, however, a certain error may exist between the log-out time and the log-out time of the real internet of things device, and in order to correct the error, the real log-out time needs to be acquired.
It should be noted that, for some internet of things devices, the internet of things device may have a function of reporting a real log-out time of the internet of things device under an abnormal condition, so when the internet of things device resumes a normal running state, the real log-out time may be transmitted to the internet of things server, and then the device information server receives the real log-out time through the internet of things server.
For example, a true logout time of 2 points 22 minutes 01 seconds is received and a device identification corresponding to the true logout time is determined to be a.
In step S620, in the stored log-out information, a target log-out time corresponding to the device identification is searched for to replace the target log-out time with a real log-out time.
The target logout time refers to the logout time of the internet of things device corresponding to the device identifier, which is stored in the database.
For example, it is queried in the database that the internet of things device corresponding to the device identifier a is shower a, and the target log-out time of shower a stored in the database is 3 points 23 minutes 00 seconds, and since the target log-out time is determined when shower a is in an abnormal condition, after receiving the real log-in time 2 points 22 minutes 01 seconds sent out after shower a is restored to a normal state, the target log-out time of shower a is replaced by 3 points 23 minutes 00 seconds to 2 points 22 minutes 01 seconds.
In the present exemplary embodiment, the real logout time is received, and the stored target logout time is replaced by the real logout time, so that accuracy of the logout time of the stored internet of things device is improved, and a more accurate basis is provided for subsequent maintenance, management and control of the internet of things device.
In an alternative embodiment, fig. 7 is a schematic flow chart of adjusting a preset time in a device information processing method, and as shown in fig. 7, the method at least includes the following steps: in step S710, server performance data is acquired, and a performance threshold corresponding to the server performance data is acquired; wherein the server performance data corresponds to a new performance of storing the device information.
The server performance data refers to a storage performance of the storage device information, specifically, may be a storage speed of the storage device information, may be a storage frequency of the storage device information, or may be any data that may represent a storage performance of the storage device information, which is not particularly limited in this exemplary embodiment.
The performance threshold refers to a critical value of storage pressure of the server storing the device information, if the performance data of the server is greater than the performance threshold, the storage pressure of the server storing the device information is excessively high, and correspondingly, if the performance data of the server is less than or equal to the performance threshold, the storage pressure of the server storing the device information can bear on the server.
For example, the server performance data is obtained as 100 pieces/second, and the performance threshold is 90 pieces/second.
In step S720, if the server performance data is greater than the performance threshold, the preset time is extended.
If the server performance data is greater than the performance threshold, the storage pressure of the device information server storing the device information is too high, so that the preset time is required to be expanded to relieve the storage pressure of the device information server.
For example, the server performance data is obtained as 100 pieces/second, and the performance threshold is 90 pieces/second. It is apparent that the server performance data is greater than the performance threshold at this point, the preset time may be extended from 20 seconds to 30 seconds.
In step S730, if the server performance data is less than or equal to the performance threshold, the preset time is reduced.
If the performance data of the server is smaller than or equal to the performance threshold, the storage pressure of the server storing the device information can be born by the server, and based on the storage pressure, the preset time can be shortened to improve the speed of storing the device information.
For example, the server performance data is obtained as 50 pieces/second, and the performance threshold is 90 pieces/second. It is apparent that at this point the server performance data is less than the performance threshold, at which point the preset time may be reduced from 20 seconds to 10 seconds.
In this exemplary embodiment, if the performance of the server is greater than the performance threshold, the preset time is extended to relieve the storage pressure of the storage device information, and if the performance of the server is less than or equal to the performance threshold, the preset time is shortened to increase the speed of storing the device information, based on which the storage performance of the server can be flexibly adjusted, and the logic for controlling the storage performance of the server is further improved.
In step S120, the device information of the internet of things device is counted to obtain a statistics result, and if the statistics result meets the warning condition, a warning message for warning that the internet of things device is abnormal is generated.
In the exemplary embodiment of the present disclosure, the warning condition is a condition for defining whether the generation of the warning information is required, specifically, the warning condition may be a condition for generating the warning information that the internet of things device needs to be maintained, may be a condition for generating the warning information that the internet of things device needs to be managed, or may be a condition for generating the warning information that the internet of things device cannot be controlled, and the exemplary embodiment is not limited thereto.
The statistical result obtained by counting the device information may be a statistical result obtained by counting the login time, a statistical result obtained by counting the login frequency or the login frequency, or a statistical result obtained by counting any device information, which is not particularly limited in this exemplary embodiment.
For example, the difference between the login time and the real login time of the internet of things device is calculated to obtain the login time, the statistics result is that the login time of the login time is longer than 2 hours and has 100 times, at this time, the statistics result meets the warning condition that the internet of things device needs to be maintained, and based on the statistics result, warning information A is generated to inform that the internet of things device may have abnormality and needs to be maintained.
In an alternative embodiment, fig. 8 shows a flow chart of a statistical result obtained by counting device information in a device information processing method, where the statistical result includes a first statistical result, and as shown in fig. 8, the method at least includes the following steps: in step S810, the difference between the real login time and the login time is calculated to obtain the login time, and the login time is compared with a time threshold to obtain a time comparison result.
The statistics result comprises a first statistics result, wherein the first statistics result refers to a result of counting the number of login time lengths of which the login time length is larger than a time length threshold, the login time length is a difference value between the real login time and the login time, and the time length threshold refers to a critical value for limiting whether the login time length is too long so as to influence the equipment function of the internet of things equipment. The time length comparison result is a comparison result obtained by comparing the login time length with a time length threshold value.
For example, the real log-out time is 2 points 01 minutes 00 seconds, the log-in time is 9 points 01 minutes 00 seconds, the log-in time is 5 hours based on the real log-out time, the time length threshold is 3 hours, and the time length comparison result at this time is obviously the comparison result that the log-in time length is larger than the time length threshold.
In step S820, based on the duration comparison result, the number of login durations greater than the duration threshold is counted to obtain a first counted result.
According to the time length comparison result, the number of login time lengths larger than a time length threshold value can be counted, and then a first counting result is obtained.
For example, there are 3 duration comparison results, namely a duration comparison result a, a duration comparison result B, and a duration comparison result C, and specifically, the duration comparison result a is a comparison result that the login duration A1 is greater than the duration threshold, the duration comparison result B is a comparison result that the login duration B1 is greater than the duration threshold, and the duration comparison result C is a comparison result that the login duration C1 is less than the duration threshold. Based on this, the first statistical result is that there are 2 logins with a login time length greater than the time length threshold.
In this exemplary embodiment, the first statistical result is a statistical result obtained from the dimension of the login duration, which is conducive to generating the alarm information according to the relationship between the login duration and the duration threshold, thereby providing a basis for maintenance and management of the internet of things device.
In an alternative embodiment, fig. 9 shows a flow chart of a statistical result obtained by counting device information in a device information processing method, where the statistical result includes a second statistical result, and as shown in fig. 9, the method at least includes the following steps: in step S910, the number of times of login time received in a unit time is counted to obtain a second statistical result.
The statistics result comprises a second statistics result, wherein the second statistics result refers to a result of statistics on the login frequency or the login frequency received in unit time. The unit time may be 1 minute, may be 1 hour, may be half an hour, may be any time range, and the present exemplary embodiment is not particularly limited thereto.
For example, the number of times that the login time of shower A was received within 20 minutes is 2, i.e., the second statistics result is that the login time of shower A was received 2 times within 20 minutes.
In step S920, the number of times of log-out time determined in the unit time is counted to obtain a second statistical result.
The second statistics result may also be a result of counting the number of times of log-out time in a unit time.
For example, the number of times shower A check-out times received within 20 minutes is 1, i.e., the second statistics result is that shower A check-out times of 1 were received within 20 minutes.
In this exemplary embodiment, the second statistical result is a statistical result obtained from the dimension of the login frequency or the login frequency, which is conducive to generating the alarm information according to the login frequency or the login frequency, thereby providing a basis for controlling the internet of things device.
In the present exemplary embodiment, on the one hand, the device information is not stored in the internet of things server any more, so that the situation that the device information is lost due to the fact that the device information cannot be recorded in time in the upgrading or downtime process of the internet of things server is avoided; on the other hand, the equipment information is counted to obtain a counting result, and if the counting result meets the warning condition, warning information is generated, so that the efficiency of maintaining, managing and controlling the Internet of things equipment is improved.
The device information processing method in the embodiment of the present disclosure is described in detail below with reference to an application scenario.
The internet of things device can be a sweeping robot, when a user is connected with the sweeping robot through mobile phone Bluetooth, the internet of things server receives login time A of the sweeping robot and transfers the login time A to the device information server, so that the device information server stores the login time A.
When a user disconnects Bluetooth with the sweeping robot through a mobile phone, the Internet of things server receives the log-out time B sent by the sweeping robot, and transfers the log-out time B to the equipment information server so that the equipment information server stores the log-out time B.
The received log-out time frequency of the sweeping robot is counted to obtain a statistical result, specifically, the statistical result is that the frequency of the log-out time is 50 times/min, and the sweeping robot is obviously logged out frequently at the moment, and the statistical result meets the alarm condition at the moment, so that alarm information for alarming the abnormality of the sweeping robot is generated, and a control signal is not sent to the sweeping robot at the moment.
In the application scene, on one hand, the equipment information is not stored in the Internet of things server any more, so that the situation that the equipment information is lost due to the fact that the equipment information cannot be recorded in time in the upgrading or downtime process of the Internet of things server is avoided; on the other hand, the equipment information is counted to obtain a counting result, and if the counting result meets the warning condition, warning information is generated, so that the efficiency of maintaining, managing and controlling the Internet of things equipment is improved.
Further, in an exemplary embodiment of the present disclosure, there is also provided an apparatus information processing device. Fig. 10 shows a schematic configuration diagram of a device information processing apparatus, and as shown in fig. 10, the device information processing apparatus 1000 may include: a storage module 1010 and a statistics module 1020. Wherein:
A storage module 1010 configured to receive device information transmitted by the internet of things server and store the device information; the device information is sent to the Internet of things server by the Internet of things device; the statistics module 1020 is configured to perform statistics on the equipment information of the internet of things equipment to obtain a statistics result, and if the statistics result meets the warning condition, generate warning information for warning that the internet of things equipment has abnormality.
The specific details of the above device information processing apparatus 1000 have been described in detail in the corresponding device information processing method, and thus are not described here again.
It should be noted that although several modules or units of the device information processing apparatus 1000 are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
An electronic device 1100 according to such an embodiment of the invention is described below with reference to fig. 11. The electronic device 1100 shown in fig. 11 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in fig. 11, the electronic device 1100 is embodied in the form of a general purpose computing device. Components of electronic device 1100 may include, but are not limited to: the at least one processing unit 1110, the at least one memory unit 1120, a bus 1130 connecting the different system components (including the memory unit 1120 and the processing unit 1110), and a display unit 1140.
Wherein the storage unit stores program code that is executable by the processing unit 1110 such that the processing unit 1110 performs steps according to various exemplary embodiments of the present invention described in the above-described "exemplary methods" section of the present specification.
The storage unit 1120 may include a readable medium in the form of a volatile storage unit, such as a Random Access Memory (RAM) 1121 and/or a cache memory 1122, and may further include a Read Only Memory (ROM) 1123.
The storage unit 1120 may also include a program/usage tool 1124 having a set (at least one) of program modules 1125, such program modules 1125 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which may include the reality of a network environment, or some combination thereof.
The bus 1130 may be a local bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a bus using any of a variety of bus architectures.
The electronic device 1100 may also communicate with one or more external devices 1170 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 1100, and/or any device (e.g., router, modem, etc.) that enables the electronic device 1100 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 1150. Also, electronic device 1100 can communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 1160. As shown, network adapter 1160 communicates with other modules of electronic device 1100 via bus 1130. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 1100, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium having stored thereon a program product capable of implementing the method described above in the present specification is also provided. In some possible embodiments, the various aspects of the invention may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the invention as described in the "exemplary methods" section of this specification, when said program product is run on the terminal device.
Referring to fig. 12, a program product 1200 for implementing the above-described method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.