Entries |
Document | Title | Date |
20080201464 | PREVENTION OF FRAUD IN COMPUTER NETWORK - Systems, methods, and computer programming media useful in the identification and prevention of fraudulent activity on computer networks. In various aspects the invention provides methods, systems, and programming for monitoring requests received by network resources for access to data by remote signal sources. Signal source identifiers such as URLs associated with original and referred data requests are checked for satisfaction of one or more trustworthiness criteria. If the network identifier associated with the remote signal source does not satisfy the trustworthiness criteria, data associated with the untrusted signal source is assessed to determine whether it comprises fraudulent or suspicious content. If the data comprises fraudulent or suspicious content, the source of the data can be referred for further investigation or enforcement action, either by the operator or processor assessing the data, or by a network enforcement resource such as network standards or law enforcement agencies. | 08-21-2008 |
20080201465 | Centralized Monitoring of Distributed Systems - A remote server managing multiple client computers at a customer site communicates with a server at a service provider site. A proxy gateway at the remote server allows communications through a network to the server at the service provider site. Remote monitoring of the multiple client computers may be performed at the server at the service provider site through a central monitoring console. | 08-21-2008 |
20080201466 | Web hosting community - An example embodiment of a Web Hosting Community includes at least three members, i.e. a Hosting Provider, a Hosting Customer and a Partner. The Hosting Provider may have one or more Hosting Servers, and create and maintain a Partner Web Site and a Community Web Site. The Partner Web Site and the Community Web Site may provide tools that are tailored for the needs of the Partner and the Hosting Customer, respectively, to participate in the Web Hosting Community. The Partner may provide an application, i.e. software program, to be integrated into the Web Hosting Community and the Hosting Customer may purchase and install the application onto its Hosted Web Site, which is stored on a Hosting Server. | 08-21-2008 |
20080201467 | System and method for event management - An event management system, comprising a server comprising a platform component architecture (PCA) and a software engine, wherein the PCA is configured to provide runtime discovery and display of system components. The system also comprises a data source for storing user define data objects and applications; at least one system component; and at least one client for administering and monitoring user-defined events, wherein the PCA provides a common interface between the server, the data source, and the at least one client. | 08-21-2008 |
20080201468 | Apparatus and method for measuring and using response to SNMP requests to provide real-time network parameter estimates in a network management zone - Method creates Real-Time Estimates (RTE) of network parameters for responsive resources of a network management zone (NMZ) by sending requests in a management protocol and uses those real-time estimates to present a resource map of the NMZ, possibly altering a responsive resource, possibly posting a service schedule request. The invention includes implementation mechanisms and installation packages. The RTE of network parameter is a product of the process. Constructing a quality of service measure from RTE of at least two network parameters. Quality of service measure as a product of the process. The quality of service measure may include or be the Mean Opinion Score. | 08-21-2008 |
20080201469 | SYSTEM AND METHOD FOR AGGREGATING AND EXTENDING PARENTAL CONTROLS AUDITING IN A COMPUTER NETWORK - A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates. | 08-21-2008 |
20080201470 | NETWORK MONITOR PROGRAM EXECUTED IN A COMPUTER OF CLUSTER SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER - A network monitor program operating in each node included in a cluster system, for causing the node to execute: when a response to an existence confirmation message from a relay apparatus, which relays a business request to the node, could not be received, obtaining status data of other nodes included in the cluster system; when the status data of the other nodes represents that one of the other nodes is in a usable state, confirming whether or not the node in the usable state can communicate with the relay apparatus; and when it is confirmed that the node in the usable state can communicate with the relay apparatus, notifying a cluster manager of an occurrence of a communication failure. | 08-21-2008 |
20080209028 | DISCOVERING AND DETERMINING CHARACTERISTICS OF NETWORK PROXIES - A device, system, and method are directed towards determining network information. A network address is determined for a possible proxy. A determination is made whether a port on the possible proxy is open and/or if the port supports an HyperText Transfer Protocol (HTTP) proxy request. A request is sent to the possible proxy over the port, the request being configured to be forwarded to a network device. A type of the possible proxy is determined based in part on a behavior of the network device. The behavior may indicate whether the request is received by the network device, or whether the possible proxy obscures an origin of the request. The proxy type may include whether the possible proxy is a non-proxy, an anonymous-proxy, a controlled-proxy, and/or an open-proxy. Various types of network analysis may then be performed using the possible proxy and the determined proxy type. | 08-28-2008 |
20080209029 | SYSTEM AND METHOD FOR MONITORING BUSINESS PERFORMANCE USING MONITORING ARTIFACTS - A method (and system) of monitoring business performance using a monitoring artifact includes processing an incoming event using the monitoring artifact | 08-28-2008 |
20080209030 | Mining Web Logs to Debug Wide-Area Connectivity Problems - Internet service providers and their clients communicate by transmitting messages across one or more networks and infrastructure components. At various points between the service provider and the clients, inclusively, records may be created of each messages occurrence and status. These records may be read and analyzed to determine the effects of the networks and infrastructure components on the provided quality of service. User-effecting incidents (e.g., failures) occurring at networks may also be identified and described. | 08-28-2008 |
20080209031 | Method of collecting and managing computer device information - A method of collecting and managing computer device information is provided to collect, analyze, and manage device information of a plurality of client computers in a network through a server/client application program. The method includes installing and running a client server application program on client computers in a network and installing and running a server management application program on a server in the network; after each of the client computer is booted, selecting a corresponding data acquisition method according to the type of the operating system of the client computer, so as to perform data acquisition on the device information of the computer in real time; analyzing and summarizing the acquired device information and then sequentially assorting and storing the information; monitoring and recording the changes of the information in real time; and sending the stored information and the changes thereof to the server for statistical analysis and tracking management. | 08-28-2008 |
20080209032 | Alarm method for insufficient storage space of network storage system - An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space. | 08-28-2008 |
20080209033 | Event monitoring and management - Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application. | 08-28-2008 |
20080209034 | Home Network System, Method of Controlling the Same, Method of Setting Residential Gateway For the Same, and Method of Processing Event Protocol For the Same - The present invention relates to a home network system, in which devices constituting a home network can be installed to be provided with home network service, and can be controlled using various terminals, and to a method of controlling the home network system, method of setting a residential gateway and method of processing an event protocol for the home network system. In the home network system, an HNSN ( | 08-28-2008 |
20080209035 | Communications Device and System for Implementing a Management System Remote From Devices - A communication device for implementing a system for remotely managing at least one item of equipment by a management application able to communicate via a telecommunication network with an application embedded in the item of equipment. The device includes a first communication interface allowing implementation of a local communication link with the embedded application, a second communication interface allowing access to the telecommunication network, and a communication management device configured to communicate with the embedded application via the first interface and with the management application via the second interface, serving as communication relay between the embedded application and the management application, and configured to transmit to one of the two applications a message received from the other application, according to predefined transfer rules and as a function of at least one parameter received with the message. | 08-28-2008 |
20080209036 | INFORMATION PROCESSING CONTROL APPARATUS, METHOD OF DELIVERING INFORMATION THROUGH NETWORK, AND PROGRAM FOR IT - An apparatus including a section acquiring the information as to the information processor of the delivery destination in the second network, a section alternatively providing service to an access from the first network by using the acquired information, a section receiving and delivering the information from the first network by using the alternatively supplied service, a section changing the information processor of the delivery destination in the second network to the service providing state, when the apparatus receives the information including the contents from the first network and the information processor of the delivery destination in the second network is not in the service providing state, it is possible to change the information processor of the delivery destination to the service providing state and deliver information including the contents to the information processor of the delivery destination. | 08-28-2008 |
20080215720 | Apparatus and system for lost/stolen data storage device recovery - A recoverable data storage apparatus including a hand-portable housing configured with an input/output (I/O) port presented outwardly therefrom, a data storage means retained within the housing and operatively coupled with the input/output port, and a client agent embodied as device-executable code residing on the data storage device and configured. When executed on a network-linked computing device, the client agent is configured to establish communication with a remote server and receive data indicating a possession status of the data storage apparatus. A device tracking system including a data network means, a hardware portion, and a software portion. The hardware portion includes at least, (1) a server device operatively coupled with the network means, and (2) a data storage device with an externally presented input/output port configured to operatively couple with a host device, and a software portion including. The software portion includes at least, (1) a data storage device tracking means configured to identify a data storage device based upon unique identification-relevant data included in a polling message received via the network means, and (2) a client agent stored as device executable code stored at a memory means operatively coupled with the data storage device, wherein the client agent is configured so operatively when coupled to cause a host device to transmit host device-relevant identifying data via the network means. | 09-04-2008 |
20080215721 | COMMUNICATION MONITORING SYSTEM, COMMUNICATION MONITORING APPARATUS AND COMMUNICATION CONTROL APPARATUS - A communication monitoring apparatus for monitoring communication data which are transmitted among a plurality of nodes on a network, includes a detecting section for detecting whether or not a shellcode is included in communication data transmitted and received between at least two nodes within the plurality of nodes and a storing section for storing communication data transmitted from the two nodes as being starting points during a predetermined time, when the detecting section detected the shellcode in communication data. | 09-04-2008 |
20080215722 | Remote User Computer Control And Monitoring - In a method of computer usage monitoring, a user computer monitors for the input of predetermined keywords or phrases into an application running thereon, the presence of the keywords or phrases in a file received via a computer network, or the launching of one or more predetermined applications or programs. In response detecting the input of one or more of the predetermined keywords or phrases, the presence of one or more of the predetermined keywords or phrases in a file received via the computer network, or the launching of one or more the predetermined applications or programs, the user computer records a digital form of at least one visual image appearing on a video monitor of the user computer. The user computer dispatches the digital form of the recorded image to the server computer via the computer network. | 09-04-2008 |
20080215723 | RELAY SYSTEM, RELAY PROGRAM, AND RELAY METHOD - A technique is provided to dynamically change priority, according to content of communication data, when the communication data is relayed between a client device and a host device. A communication gateway ( | 09-04-2008 |
20080215724 | COMMUNICATION CONTROL METHOD AND COMMUNICATION CONTROL UNIT - A communication control method is provided for an encryption processing unit connected to a connection status acquiring unit which is connected to a circuit that transmits packets on a network and acquires the status of a connection to a network for an encrypting device for encrypting the packet, and connected to an expansion card for connecting to the network, based on the network connection status requested and acquired from the connection status acquiring unit by the expansion card each prescribed period of time, by relaying and acquiring the network connection status from the connection status acquiring unit and forcibly notifying the expansion card that the connection status is connected and/or not connected, according to a requirement/criteria. | 09-04-2008 |
20080215725 | SYSTEMS AND METHODS FOR MANAGING THE PLAYING OF RING TONES AND OTHER MEDIA FILES ON MOBILE DEVICES - Systems, methods, and software applications for managing the playing of ring tones and other media files on mobile devices are provided. In one embodiment, a software application executed by a processor of a mobile device tracks the playing of a media file on the mobile device and reports information regarding the playing of the media file from the mobile device to a server over a wireless network. In another embodiment, the media file is provided on the mobile device as a ring tone file. | 09-04-2008 |
20080215726 | SYSTEM AND METHOD FOR HARDWARE AND SOFTWARE MONITORING WITH INTEGRATED RESOURCE ACQUISITION - A method, system, and network providing hardware and software inventorying and monitoring provide the status of a local network of interconnected information technology devices. A user downloads and installs a local network monitoring software program from an online source onto a host computer system. The local network monitoring software system initiates an inventory of all information technology devices associated with said local network of information technology devices. Also, the local network monitoring software determines the operational status of the information technology devices and the status of software programs installed on the information technology devices. The results of the inventory and status determinations are presented to the host computer system. The presented information permits the user of said host computer system to initiate maintenance and support actions for the information technology devices in response to the operational status and status of software programs using the local network monitoring software. | 09-04-2008 |
20080215727 | REMOTE MONITORING SYSTEM - A method for monitoring and reporting information regarding status of a power supply/management device operated by a user comprises detecting the status of the device using a monitoring device having an application interface configured to communicate over a communication network, generating a status update indication using a self-describing computer language and sending the status update indication over the communication network to a remote computer, and associating the user with the status update information for the remote device using the remote computer. | 09-04-2008 |
20080215728 | Computer Management System and Computer Management Method - A computer management system and a computer management method are provided. The computer management system comprises a management workstation and at least one computer system based on virtualization technology. The computer system comprises a virtual machine monitor, a servo operating system, a management agent module and at least one user operating system. The management workstation comprises a detection/recognition module, an information collection module and a configuration module. The centralized management on the computer system by the management workstation can be realized through the management agent module establishing a network connection and communicating with the management workstation. | 09-04-2008 |
20080215729 | Method and Apparatus for Cross-Tier Management in Multi-Tier Computing System Architecture - Techniques are disclosed for providing cross-tier management in a multi-tier computing system architecture. For example, a method for managing a computing system, wherein the computing system includes a first tier and at least a second tier, wherein the first tier and the second tier are configured to respond to a request received by the computing system, includes the steps of monitoring performance of the second tier from the first tier, and sending one or more management commands from the first tier to the second tier based on the monitored performance. In one embodiment, the first tier may be an application server tier of the computing system, and the second tier may be a database server tier of the computing system. | 09-04-2008 |
20080215730 | Method and system for providing on-demand content delivery for an origin server - An infrastructure “insurance” mechanism enables a Web site to fail over to a content delivery network (CDN) upon a given occurrence at the site. Upon such occurrence, at least some portion of the site's content is served preferentially from the CDN so that end users that desire the content can still get it, even if the content is not then available from the origin site. In operation, content requests are serviced from the site in the usual manner, e.g., by resolving DNS queries to the site's IP address, until detection of the given occurrence. Thereafter, DNS queries are managed by a CDN dynamic DNS-based request routing mechanism so that such queries are resolved to optimal CDN edge servers. After the event that caused the occurrence has passed, control of the site's DNS may be returned from the CDN back to the origin server's DNS mechanism. | 09-04-2008 |
20080222282 | ANALYZING VIRTUAL PRIVATE NETWORK FAILURES - The specification provides information for determining any impacted customers, virtual private networks, circuits, and devices following a path failure. The specification uses an information-gathering component to find system information and uses the system information in determining any impacted units. A report is created that allows a network management system to process the impacted units. If any of the impacted units are customer devices, then the management system calculates the impact on the customer based on a Service Level Agreement. | 09-11-2008 |
20080222283 | Behavioral Networking Systems And Methods For Facilitating Delivery Of Targeted Content - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user. | 09-11-2008 |
20080222284 | Methods of processing and segmenting web usage information - A massive amount of information is collected when tracking statistics such as web site usage data. To simplify the analysis of such data, it is advantageous to process and segment the web site usage data. One proposed method of segmenting the data is to create a reverse sorted associative container for each different web section of a web site. Page-views, c, sessions, and other web viewing metrics may be used as keys in the reverse sorted associative container and web viewer identifiers are used as values associated with the page-view value keys. After creating the reverse sorted associative containers, each reverse sorted associative container is segmented on a percentile basis. | 09-11-2008 |
20080222285 | Configurable network device user interface - Network devices, systems and methods are described that configure a network device user interface. One method includes receiving input to define user-selectable information from among a list of pre-arranged network information presented on a network device display. The method includes configuring the user-selectable information into a particular grouping and presenting the user-selectable information according to the particular grouping. | 09-11-2008 |
20080222286 | Computer Usage Monitoring - The present invention relates to a method of monitoring worker activity in a work group, the work group comprising workers each using a computer on a computer network their method comprising displaying to a work group supervisor, in consolidated form, a label indicating each worker and information indicating the current activity and/or classification determined for each worker. | 09-11-2008 |
20080222287 | Constructing an Inference Graph for a Network - Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components. | 09-11-2008 |
20080222288 | METHOD AND SYSTEM FOR APPLICATION PROFILING FOR PURPOSES OF DEFINING RESOURCE REQUIREMENTS - Disclosed are a method of and system for profiling a computer program. The method comprises the steps of using a utility application to execute the computer program; and on the basis of said execution of the computer program, identifying specific performance requirements of the computer program. A profile of the computer program is determined from said identified performance requirements; and based on said determined profile, resources for the computer program are selected from a grid of computer services. | 09-11-2008 |
20080228910 | METHOD FOR MONITORING USER INTERACTION TO MAXIMIZE INTERNET WEB PAGE REAL ESTATE - A method for rendering Internet Web page content for a client, includes: setting client based policies with a plug-in; monitoring client based Internet Web page usage and interaction with the plug-in or Web page; determining whether a client policy exists for a particular Internet Web page; verifying whether a server-side application is configured for screen management; wherein whenever the server-side application is configured for screen management the plug-in sends the client policy to the server-side application; and in the event the server-side application is returning enhanced content to the client, the enhanced content is altered on the server-side application based on the client policy and then sent to the client. | 09-18-2008 |
20080228911 | Systems and Methods for Script Injection - Systems and methods for script injection are shown and described. The method can include intercepting, by a network appliance, a request for a web page from a computing device, transmitting, by the network appliance, the request for a web page to a web server, and intercepting, by the network appliance, a response from the web server, the response including at least a portion of the requested web page. The method can also include injecting, by the network appliance, a script having instructions that when executed by the computing device registers to be notified of the occurrence of a web page event thereby creating a modified response and transmitting the modified response to the computing device that requested the web page. | 09-18-2008 |
20080228912 | Enhanced Quality Reporting for Transmission Sessions - This invention relates to methods, computer program products, clients, servers, systems and protocols in the context of reporting a quality of a transmission session according to one or more metrics, inter alia to adapt quality reporting to a switching of content within the transmission session and to allow faster session startup. | 09-18-2008 |
20080228913 | Network response time measurements in an asymmetric routing environment - In one embodiment, a method can include: (i) receiving flow records from a plurality of network devices on asymmetric paths; (ii) reconstructing a network transaction from the received flow records; and (iii) deriving response times using the reconstructed network transaction. | 09-18-2008 |
20080228914 | System and method for attributing a portion of a response time to an element of a virtual network - A system and method for evaluating a portion of a response time of an application that is attributable to an element on a virtual IP network. | 09-18-2008 |
20080228915 | EVENT NOTIFICATION DEVICE AND EVENT NOTIFICATION METHOD - An event notification device notifies event information via a network. A storage unit stores therein event-transmission determination information. An event monitoring monitors whether an event occurs. A determining unit determines based on the event-transmission determination information whether event information of occurred event is to be transmitted to only a target communication device from among communication devices that have requested to be notified of the event information. An event notifying unit notifies the target communication device or all the communication devices of the event information by using the WS-Eventing protocol according to a result of the determination. | 09-18-2008 |
20080228916 | Method and System for Automatic Skill-Gap Evaluation - A system for automatic user skill-gap evaluation using a proxy server or a proxy application. The proxy server or application receives a user input from a user and analyzes the user input to determine whether the user input falls below an acceptable user skill threshold level. The user input consists of user activity within an application and the user activity is recorded in a user action log. To determine whether the user input falls below the acceptable user skill threshold level, the proxy server or application compares the user activity recorded in the user action log with user skill-gap behavior patterns created by a subject matter expert. In response to determining that the user activity recorded in the user action log falls below the acceptable user skill threshold level, the proxy server or application sends a specific training module to the user based on an identified user skill-gap. | 09-18-2008 |
20080228917 | Method and system for importing an application and server map to a business systems manager display - An automated system displays enables a user to observe the activities in a system based on information in the display. From this display, the user can quickly identify the source of problems for the purpose of troubleshooting without the need to manually determine the source and nature of the problem. In this system, data about the system is gathered through a plurality of agents positioned throughout the network. This data is analyzed and a system monitor deployment configuration is developed. This monitor deployment information along with information about the various devices in the system and any relationships of devices in the system are imported to the display system. The display system then displays this information showing the present relationships of the devices in the system. | 09-18-2008 |
20080235364 | Method and apparatus for using dynamic workload characteristics to control CPU frequency and voltage scaling - Some embodiments involve determining a processor performance characteristic associated with a workload, determining a workload characteristic associated with the workload, and determining a processor performance state for the workload based on the performance characteristic and the workload characteristic. Other embodiments are disclosed and claimed. | 09-25-2008 |
20080235365 | AUTOMATIC ROOT CAUSE ANALYSIS OF PERFORMANCE PROBLEMS USING AUTO-BASELINING ON AGGREGATED PERFORMANCE METRICS - Anomalous behavior in a distributed system is automatically detected. Metrics are gathered for transactions, subsystems and/or components of the subsystems. The metrics can identify response times, error counts and/or CPU loads, for instance. Baseline metrics and associated deviation ranges are automatically determined and can be periodically updated. Metrics from specific transactions are compared to the baseline metrics to determine if an anomaly has occurred. A drill down approach can be used so that metrics for a subsystem are not examined unless the metrics for an associated transaction indicate an anomaly. Further, metrics for a component, application which includes one or more components, or process which includes one or more applications, are not examined unless the metrics for an associated subsystem indicate an anomaly. Multiple subsystems can report the metrics to a central manager, which can correlate the metrics to transactions using transaction identifiers or other transaction context data. | 09-25-2008 |
20080235366 | METHOD AND SYSTEM FOR MONITORING MESSAGES PASSED OVER A NETWORK - A method for performing a monitoring function for an application that passes messages between two or more endpoints, comprising: receiving a message including transaction data, the transaction data including data relating to transport of the transaction data; storing the message and transaction data in respective message data and transaction data buffers in a data store; storing status and semantic information associated with the message in the data store; receiving a signal selecting one or more module instances to define the monitoring function, each module instance for independently performing a respective aspect of the monitoring function, each module instance having related module instance data stored in a respective module instance data buffer in the data store, each module instance having a respective service access point for accessing the data store, each service access point having related service access point data stored in a respective service access point data buffer in the data store, each module instance independently accessing one or more of the message, transaction, module instance, and service access point data buffers to process data contained therein to perform its aspect of the monitoring function; and, initiating operation of the one or more module instances in accordance with a schedule defined by one or more routing rules, the one or more routing rules for routing a pointer to the message, as stored in the message data buffer, between the one or more module instances to thereby perform the monitoring function. | 09-25-2008 |
20080235367 | METHOD AND APPARATUS FOR UPDATING USER STATUS IN AN INSTANT MESSAGING SYSTEM - A computer implemented method, apparatus and computer usable program code for managing user status. A number of active conversations present for a user of an instant messaging service is identified. The user status for the user is changed based on a policy using the number of active conversations. | 09-25-2008 |
20080235368 | SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC - Described herein are systems and methods for matching clicks of links on a webpage with page views by a user. The method may comprise identifying a link on a webpage requested by a client device, generating a link identifier for the link and attaching the link identifier to the link. Upon receiving a request for data associated with the link, the link identifier is stored in a log file. | 09-25-2008 |
20080235369 | Distributing replication assignments among nodes - Replication in distributed systems may be based on a determination of the number of connections to a node to be replicated. When a new user is adding a node in a distributed system, the number of connections between nodes connected to the new node is determined. In addition, the change in relationships among nodes directly influence the changes in their respective connections. A ranking based on the number of connections is developed and data associated with a node is replicated based on its ranking. | 09-25-2008 |
20080235370 | Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares - A method and a system for controlling a network traffic of P2P and instant messenger softwares are disclosed. In accordance with the method and the system, both a header and a payload of a packet generated by an instant messenger software or a P2P software are monitored to terminate a session by transmitting a termination signal to a receiver and a transmitter when required, thereby blocking the exchange of the attached file and storing the content of the conversation. | 09-25-2008 |
20080235371 | SYSTEM, COMPUTER PRODUCT AND METHOD FOR EVENT MONITORING WITH DATA CENTRE - A system, computer product and method for monitoring and disseminating data form a plurality of electronic devices via the Internet is provided. The plurality of electronic devices, or further electronic devices connected to the plurality of electronic devices, generate signal data. A computer product of the present invention is loaded on the electronic devices such that the signal data is collected via the Internet at a remote web server. The web server stores this data in a database such that a client can monitor its signal data by means of the web server, via the Internet. The present invention also permits the client to disseminate the signal data, including signal data meeting alarm parameters, based on business rules established by the client. A method for deploying the system of the present invention across a plurality of electronic devices, including electronic devices across a plurality of locations is also provided. | 09-25-2008 |
20080235372 | METHOD AND SYSTEM FOR MEASURING STATUS AND STATE OF REMOTELY EXECUTING PROGRAMS - A system and method for providing attestation and/or integrity of a server execution environment are described. One or more parts of a server environment are selected for measurement. The one or more parts in a server execution environment are measured, and the measurements result in a unique fingerprint for each respective selected part. The unique fingerprints are aggregated by an aggregation function to create an aggregated value, which is determinative of running programs in the server environment. A measurement parameter may include the unique fingerprints, the aggregated value or a base system value and may be sent over a network interface to indicate the server environment status or state. | 09-25-2008 |
20080235373 | SYSTEM AND METHOD FOR DETECTING STATUS CHANGES IN A NETWORK USING VIRTUAL COORDINATE MAPPING - A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network. | 09-25-2008 |
20080235374 | Electronic device monitoring method, electronic device computer and program thereof - Processing relating to maintenance of a monitoring subject device is performed by detecting by a computer an IP address of an electronic device connected to a LAN, automatically referring to communication protocol specification data indicating a communication protocol with the electronic device indicated in remote maintenance management data provided in advance or obtained from the electronic device, and performing a communication with the electronic device by using said communication protocol and the IP address indicated by the communication protocol specification data. | 09-25-2008 |
20080244060 | ELECTRONIC DEVICE PROFILE MIGRATION - A network comprising a first electronic device associated with a first profile that uniquely identifies the first electronic device on the network. The network also comprises a second electronic device coupled to the first electronic device. The first profile is migrated to the second electronic device such that the first electronic device is no longer associated with the first profile and such that the first profile uniquely identifies the second electronic device on the network. | 10-02-2008 |
20080244061 | METHOD FOR MANAGING RESOURCES - The present disclosure provides a method for managing resources. According to one exemplary embodiment, the method may include establishing a resources threshold, the resources threshold indicative of a maximum level of recommended resource consumption for a particular client. The method may further include monitoring a level of activity at the client and notifying the client if the level of activity is approaching the resources threshold. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment. | 10-02-2008 |
20080244062 | Scenario based performance testing - A framework for simulating user scenarios is provided in which actions defined by a script are automated and sent to a remote application in a terminal services environment. The scenarios may be created, modified, reused, or extended to a particular use case (i.e., a description of events used to achieve a product design goal) by reflecting different types of users, a combination of applications employed by such users, and characteristics associated with actions of the users. An automation engine is provided that interacts with one or more productivity applications through an object model. A scripting engine parses actions described by script (e.g., an XML (extensible Markup Language) script) and maps them to instructions sent to a corresponding component in the automation engine to be implemented through an interface with the application. The script establishes a profile schema that expresses the scenario. | 10-02-2008 |
20080244063 | Automatically detecting managed servers in a network - A group of managed servers may be monitored by initially querying the network to determine which servers are present. The present servers may be identified by a universal unique identifier and their Internet Protocol address. A table may be maintained to correlate the Internet Protocol address and the universal unique identifier. | 10-02-2008 |
20080244064 | VERIFYING METHOD FOR IMPLEMENTING MANAGEMENT SOFTWARE - A verifying method for implementing management software at a client end is provided herein. The management software works for collecting, managing, and analyzing data of a plurality of peripheral hosts. In the verifying method, a management system fitting the requirements of the management software is established at a service end first. The management system includes a management host and a plurality of first peripheral hosts, and the management host is connected to each of the first peripheral hosts through a network, and the management software is installed in the management host. One or more verifying scenarios are provided herein for testing configuration and performance of the management software at a simulated environment of the client end. Each of the scenarios for testing may consider that a request form the client computer is validated through multiple authorization points and finally a valid and complete response to the client's request is returned. | 10-02-2008 |
20080244065 | CHRONOLOGY DISPLAY AND FEATURE FOR ONLINE PRESENTATIONS AND WEB PAGES - A chronology display is generated for use with a web presentation or other form of network presentation. The chronology display may include a plurality of intervals, with each interval representative of a period of time. In an embodiment, some of the intervals may indicate a number of content items provided on the network presentation during the time period that corresponds to each particular interval. The indication may be provided by a characteristic, such as for example, a color or shading that represents the number of content items provided on the network presentation. | 10-02-2008 |
20080244066 | NETWORK CONTROL APPARATUS, NETWORK CONTROL METHOD, STORAGE MEDIUM - A network control apparatus forming a network with a plurality of image-processing apparatuses acquires attribute information about images stored in each image-processing apparatus from the plurality of image-processing apparatuses, arranges a display order of the images based on the attribute information, detects a change in the configuration of the image-processing apparatuses on the network, and rearranges the display order if a change in the configuration of the image-processing apparatuses on the network is detected. | 10-02-2008 |
20080244067 | Contents distribution system and information processing method thereof, as well as contents management apparatus and recording medium on which program thereof is recorded - To appropriately adjust a number of contents data which are transmitted and received among terminal apparatus, in a peer-to-peer type contents distribution system including a plurality of terminal apparatus mutually connected via a network. | 10-02-2008 |
20080244068 | COMPUTER PRODUCT, OPERATION MANAGEMENT METHOD, AND OPERATION MANAGEMENT APPARATUS - A resource coordinator manager automatically sets a LAN and a SAN for a server to be add according to an increase in load. An ASCC satellite executes a boot script to boot up a user application on the server. The ASCC satellite executes a stop script to stop a user application executed on a server to be returned to a server pool according to a decrease in load. The resource coordinator manager automatically releases a LAN and a SAN set for the server to be returned. | 10-02-2008 |
20080244069 | METHOD AND APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING - Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic. Dormant mode with paging is implemented in a protocol that supports dormant functionality and paging functionality but does not itself provide methods or standards for implementing such functionality, such as the IEEE 802.11. The methods and apparatuses disclosed herein provide the methods needed to implement dormant mode with paging in such a protocol. Generally, the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device. | 10-02-2008 |
20080250135 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR MANAGING APPLICATION PERFORMANCE ON A NETWORK - Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment. | 10-09-2008 |
20080250136 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 10-09-2008 |
20080250137 | SYSTEM AND METHOD FOR INTRUSION PREVENTION HIGH AVAILABILITY FAIL OVER - A system and method for intrusion prevention high availability fail over. The system includes a network infrastructure which comprises a first sensor and at least one back-up sensor. The first sensor and the at least one back-up sensor are in line with a network path. The first sensor and the at least one back-up sensor are configured to share connection and session information via a communication link. | 10-09-2008 |
20080250138 | Multiple displays of large dynamic alarm windows - A GUI for a Network Management System client is provided. The GUI presents network alarms in more than one alarm window. Each alarm window includes a drop-down menu for selecting an alarm filter and a pause button for halting display of new alarms. Alarm filters may be retrieved from a database accessible from a number of NMS clients, thereby allowing public filters to be created by a supervisor. A method of automatically populating the “additional text” field of alarms in a way specified manually after installation of the NMS, which provides additional means of filtering alarms. The invention provides an improved interface by which network administrators can manage network alarms, the interface being particularly advantageous during floods of large numbers of network alarms. | 10-09-2008 |
20080250139 | FACILITATING MONITORING AND SIMULTANEOUSLY ANALYZING OF NETWORK EVENTS OF MULTIPLE HOSTS VIA A SINGLE NETWORK INTERFACE - The substantially simultaneous tracing/monitoring of a plurality of sets of events via a single network interface. The plurality of events can be traced and/or monitored for one host or for a plurality of hosts coupled via the same network interface. The sets of events to be traced/monitored for a host are defined by the host and maintained in one or more configuration files. The configuration files may be dynamically updated. | 10-09-2008 |
20080250140 | MONITORING APPARATUS, PROCESSING METHOD, PROGRAM FOR IMPLEMENTING THE PROCESSING METHOD, AND MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND PROGRAM FOR IMPLEMENTING THE MANAGEMENT METHOD - There is provided a monitoring apparatus which is capable of efficiently notifying an external host of completion of installation of the monitoring apparatus for image forming apparatuses, and completion of operations carried out for the image forming apparatuses. The monitoring apparatus is connected to a management apparatus for communication therewith. The monitoring apparatus acquires maintenance information from the image forming apparatuses, and sends the acquired maintenance information to the management apparatus. The monitoring apparatus carries out one of management of completion of installation of the monitoring apparatus and central management of completion of operations carried out for the image forming apparatuses. | 10-09-2008 |
20080250141 | MONITORING SERVICE WITH INTER-ENTERPRISE CONTEXTUAL ANALYSIS - Methods and apparatuses for receiving data associated with one or more system metrics, contextually analyzing that data in view of prior received data of other computer systems of different subscriber enterprises, determining, based at least in part on the results of the contextual analysis, if an alert needs to be sent, and sending or causing to be sent an alert, are described herein. In various embodiments, the methods and apparatuses are further for managing computer systems of subscriber enterprises, including providing updated operating images. Other embodiments may also be disclosed. | 10-09-2008 |
20080256229 | Detecting Machine Utilization Activity - Detecting machine utilization activity may be provided. Client machine activity within a computer network may be monitored to determine if the client machine is available for use, or if the computer is already engaged in one or more activities. During a predetermined receive period, machine activity information for a given client machine. The machine activity information for the client machine is compared to previously stored machine activity information to determine if an activity state for the client machine has changed. If the activity state of the client machine has changed, the activity state for the machine is updated. Machine activity information for all computers in the computer network may be used to track and optimize resources with the computer network. | 10-16-2008 |
20080256230 | METHOD AND SYSTEM FOR DETECTING AN ANOMALOUS NETWORKED DEVICE - Methods and systems for detecting one or more anomalous devices are disclosed. For each of a plurality of devices, semi-structured data may be received from the device. For each pair of devices, of the plurality of devices, a similarity measurement may be determined between semi-structured data from a first device of the pair of devices and semi-structured data from a second device of the pair of devices. One or more anomalous devices may then be identified and one or more remedial actions may be performed for the one or more identified anomalous devices. | 10-16-2008 |
20080256231 | METHOD FOR MAINTAINING STATE CONSISTENCY AMONG MULTIPLE STATE-DRIVEN FILE SYSTEM ENTITIES WHEN ENTITIES BECOME DISCONNECTED - A computer implemented method, data processing system, and computer program product for maintaining state consistency among multiple state-driven file system entities when the file system entities become disconnected. Responsive to a distributed file system server being disconnected from a distributed file system client, a monitor is registered with the configuration management framework (CMF) for a file system. When the CMF detects access to a file in the file system, the CMF notifies the monitor of the access to the file, and the monitor stores information about state of the file. When the distributed file system server is reconnected to the distributed file system client, information about state of the file stored in the monitor is provided to the distributed file system client. | 10-16-2008 |
20080256232 | Service Discovery Aggregation Method In a Local Area Network and Device Implementing the Method - The invention enables a standard client according to the DVB-IPI phase | 10-16-2008 |
20080256233 | SYSTEM AND METHOD FOR TRACKING THE NETWORK VIRAL SPREAD OF A DIGITAL MEDIA CONTENT ITEM - Systems and methods are provided to track viral marketing. The resulting user interfaces can include a map that tracks propagation via a node tree or a geographic map that shows where media was viewed. The information may also be displayed as a cumulative or absolute tracking graph, which is based on various parameters, such as number of views, number of transmissions, rewards earned, etc. The systems and methods can track viral propagation through, e.g., email, social networking service or site messages or postings, and instant messages. Data used by the invention include URLs as received from a media transmission page form, the URLs pertaining to both the propagator and the recipient, time stamps at which the media was propagated and viewed, and so on. | 10-16-2008 |
20080256234 | Data flow control - A system and method for managing content data in a gaming environment to control the flow of information is provided wherein the method includes initiating a game configured to receive content data from at least one of a plurality of content servers, identifying at least one preferred content server from the plurality of content servers, operating the game to receive the content data from the at least one preferred content server, associating the content data with a content map based upon at least one characteristic, monitoring the content map to identify changed content data and adjusting content data based upon the changed content data. | 10-16-2008 |
20080256235 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 10-16-2008 |
20080263193 | System and Method for Automatically Providing a Web Resource for a Broken Web Link - A system and method for automatically providing a Web site resource for a broken Web link are provided. Mechanisms are provided for locating Web site resources that have been moved to a new location in a Web site structure in response to receiving a request directed to an old location of the Web site resource, such as via a broken link. Index data structures of Web site structures are used to identify the structure of the Web site at various times. The index data structures are compared to determine how the Web site structure has been changed and these changes are stored as entries in a differences data structure. The differences data structure is then used to locate a moved Web site resource in the event that a request directed to an old location of the Web site resource is received, such as by selection of a broken link. | 10-23-2008 |
20080263194 | METHOD AND SYSTEM FOR OPTIMAL BINDING SELECTION FOR SERVICE ORIENTED ARCHITECTURES - A method for selecting a best performing binding for a server and a client in a service-oriented architecture includes: discovering configuration information about the service and the operating environment of the server and the client; selecting the best performing binding between the client and the server based on the discovered information; enabling the selected binding in a binding proxy for communication between the client and the server. | 10-23-2008 |
20080263195 | Performance Monitoring - Real-time data is extracted from a log file for at least one monitored process on each of a plurality of servers. For each monitored process, extracted real-time data is inserted into object variables of an object. The object variable data is processed to generate performance statistics for the monitored processes and to determine whether to trigger an alarm. A database is updated with object variable data and performance statistics when an event associated with a monitored process takes place. Historical performance statistics from the database are compared with current performance statistics to determine a performance trend. | 10-23-2008 |
20080263196 | Programming techniques for distributed multi-party networks - Architecture for programming in a distributed computing environment where different components of a system are owned or controlled by different entities and heterogeneous in terms of resource availability and a willingness to share. Multiple devices can be programmed when a task requires human intervention. Method are described for using a tolerance level provided by the application developer to control the execution of the application instructions at multiple devices with varying resources, and for using an involvement level provided by the sensor or computing device owner for the purpose of automatically adapting the execution of application code at multiple devices to suit the individual owner's willingness to share resources, and the capabilities of resources available with that owner. Code distribution allows an application developed by one entity to be distributed to multiple devices owned by multiple entities, where each of the entities has varying connectivity, resource availability, and sharing willingness. | 10-23-2008 |
20080263197 | Passively attributing anonymous network events to their associated users - Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event. | 10-23-2008 |
20080263198 | Device and method using non-cycle accurate measurements for discovering emulated clients - A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier. | 10-23-2008 |
20080263199 | SYSTEM FOR SEARCHING DEVICE ON NETWORK - There is disclosed a network system in which the position, attribute, and status of a desired device on a network can visually comprehensibly be grasped. A server manages location information indicating information on the device position in a hierarchical manner and attribute information from the device. Each device holds a plurality of status information (icon information) in accordance with various statuses of the device. A client holds map information corresponding to each class of the location information, and overlaps and outputs (display output) device status information obtained by communication by a polling system with the device detected by search in the server, and map information corresponding to the location information of the device. | 10-23-2008 |
20080263200 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 10-23-2008 |
20080263201 | METHOD FOR REAL-TIME MONITORING A REMOTE CONTROL PROCESS BY A THIRD PARTY AND SYSTEM THEREOF - The invention relates to a remote monitor technique. In particular, the present invention relates to a method for real-time monitoring a remote control process by a third party and a system thereof, which are able to third-party monitor a control terminal and a controlled terminal in the remote control process. The method comprises steps of establishing a connection between a control terminal and a third party monitoring terminal; arranging the control terminal, the controlled terminal and the third party monitoring terminal in one and the same session based on the connection; the controlled terminal sending its desktop video to the third party monitoring terminal via a virtual display driver; and the third party monitoring terminal sending a predetermined control strategy to the controlled terminal. | 10-23-2008 |
20080263202 | METHOD AND APPARATUS FOR REDUCING SPAM ON PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content). | 10-23-2008 |
20080263203 | METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS - METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS ABSTRACT One embodiment of the present method and apparatus for delegating responses to conditions in computing systems includes acknowledging (e.g., at a systems management component in the computing system) a condition, and delegating responsibility for a strategy for a response to the condition to another component. In further embodiments, the present method and apparatus for delegating responses to conditions in computing systems includes receiving (e.g., at a computing system component) an assignment from another computing system component (e.g., a systems management component), where the assignment assigns responsibility for a strategy for a response to a condition, and determining whether and how to respond to the condition. | 10-23-2008 |
20080270593 | Method and Devices for Distributing Management Information in a Management Network of a Communications System - A method for distributing management information in a management network for monitoring and controlling a communications system, whereby the management network comprises managers “NMC” and agents “OMC | 10-30-2008 |
20080270594 | METHOD AND SYSTEM OF SEPARATE FILE STORAGE LOCATIONS AS UNIFIED FILE STORAGE - Methods and systems of separate file storage locations as unified file storage. At least some of the illustrative embodiments are systems comprising a computer system coupled to a network, a first server coupled to the network (the first server provides a first file storage location), and a second server coupled to the network (the second server provides a second file storage location). The first server is configured to present the first file storage location and second file storage location as a unified storage location accessible through the first server. | 10-30-2008 |
20080270595 | SYSTEM AND METHOD FOR GENERATING SYNTHETIC WORKLOAD TRACES - A method comprises receiving a pattern of resource demands in a workload trace. The method further comprises identifying a plurality of occurrences of the determined pattern in the workload trace, and analyzing the occurrences to determine a trend of the workload trace. The method further comprises generating at least one synthetic workload trace representative of expected resource demands of the received workload trace accounting for the determined trend. | 10-30-2008 |
20080270596 | System and method for validating directory replication - A distributed information processing system comprising a collection of servers providing a directory service is augmented with the ability to validate whether replication is occurring between these directory servers. | 10-30-2008 |
20080270597 | End user control configuration system with dynamic user interface - An end user control configuration (EUC) system with dynamic user interface provides a user friendly tool for consumers to self-provision and manage network services such as Voice over Internet Protocol (VoIP) services. The EUC system dynamically generates graphical user interface (GUI) renderings that assist users in the completion of tasks related to provisioning, and managing network services. The EUC system allows telecommunication service providers to effectively hide the complexity of operational support systems (OSS) and the network elements that deliver the network services. The EUC system solves the technical problems of reducing the cycle-time to self-provision network services, assisting users to complete the tasks required to activate, and manage network services, and actually activating and managing the network services. | 10-30-2008 |
20080270598 | Methods and Apparatus for Sampling Usage Information From a Pool of Terminals in a Data Network - Methods and apparatus for sampling usage information from a pool of terminals in a data network. In an aspect, a method is provided that includes determining a designated set of terminals, and transmitting tracking parameters to the designated set of terminals, wherein the tracking parameters identify at least one upload window. In an aspect, an apparatus is provided that includes provisioning logic configured to determine one or more tracking parameters that identify at least one upload window, and targeting logic configured to determine a designated set of terminals, and to transmit tracking parameters to the designated set of terminals. In another aspect, a method is provided for performing usage tracking. The method includes receiving tracking parameters that identify at least one upload window, performing usage tracking according to the tracking parameters to produce a tracking log, and transmitting the tracking log during the at least one upload window. | 10-30-2008 |
20080270599 | METHOD AND SYSTEM FOR CONFIGURING A PLURALITY OF NETWORK INTERFACES THAT SHARE A PHYSICAL INTERFACE - Certain aspects of a method and system for configuring a plurality of network interfaces that share a physical interface (PHY) may include a system comprising one or more physical network interface controllers (NICs) and two or more virtual NICs. One or more drivers associated with each of the virtual NICs that share one or more Ethernet ports associated with the physical NICs may be synchronized based on controlling one or more parameters associated with one or more Ethernet ports. One or more wake on LAN (WoL) patterns associated with each of the drivers may be detected at one or more Ethernet ports. A wake up signal may be communicated to one or more drivers associated with the detected WoL patterns. One of the drivers may be appointed to be a port master driver. If a failure of the appointed port master driver is detected, another driver may be appointed to be the port master driver. | 10-30-2008 |
20080270600 | Method for Connection Leak Detection and Prevention - A method, system and machine readable medium for connection leak detection and prevention collect metadata about the connection on a request by an enterprise component and on connection release or transaction completion. If the enterprise component is server managed, the connection gets automatically released by the server at the end of the call to the enterprise component. If the enterprise component is not server managed, the collected metadata is stored and displayed in a user readable manner allowing an administrator to identify the erroneous behaving enterprise component which is causing the connection leak. | 10-30-2008 |
20080270601 | SYSTEM METHOD AND APPARATUS FOR SERVICE ATTACK DETECTION ON A NETWORK - Embodiments of the invention are directed to a detection system, method and apparatus that identifies and eradicates fraudulent requests on a network. Embodiments of the detection system comprise at least one router, a server, and an activity monitoring system. The activity monitoring system comprises a route arbiter and a traffic analyzer, wherein the route arbiter monitors the activity on the router. The route arbiter continuously monitors the router and firewall device to determine if abnormal activity or traffic patterns are emerging. If a determination is made that abnormal activity or abnormal traffic patterns exist, the activity monitoring system responds by blocking the activity or redirecting the traffic. | 10-30-2008 |
20080270602 | Electronic Device Client and Server System and Method - An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers. | 10-30-2008 |
20080270603 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM - A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications. | 10-30-2008 |
20080270604 | Timing Module for Regulating Hits by a Spidering Engine - A method and system for retrieving web-site based information by a spider engine at a target bandwidth is described. A target band width is received from the spider engine. A wait time is calculated by a timing module. Data retrieval from a web site is delayed by the calculated wait time so that data is retrieved at the desired target bandwidth. | 10-30-2008 |
20080270605 | Distributing and Geographically Load Balancing Location Aware Communication Device Client-Proxy Applications - A method and system for balancing server work load for cellular phone client-proxy applications in an environment where the clients change position within a given geographic area is disclosed. The method comprises the steps of mapping, monitoring, automatically re-mapping the system when required, updating a map address book, and updating a client address book. The system has a mapping system and a communication system connected to a plurality of servers, proxy servers and applications by an internal network. The proxy servers are connected to a plurality of clients by the Internet. If a threshold is exceeded, the monitoring program sends a message to a mapping program. Upon receipt of the message, the mapping program uses a rules engine to calculate a new map graph to remove load from an overloaded server (or servers) and to adjust communication requirements for data by reconfiguring partitions. | 10-30-2008 |
20080275980 | METHOD AND SYSTEM FOR TESTING VARIATIONS OF WEBSITE CONTENT - The invention is a method and system for testing variations of website content useful to optimize website visitor conversions. The invention includes integrating test variations of website content with web analytics platforms so that website variations can be tracking and analyzed within web analytics reporting systems. The invention helps website operators create content variations, and then scientifically test and measure the impact of those variations on conversion rates. The invention includes a method of using a reverse proxy server to introduce page variations on existing website content without needing to modify the existing web server. Using the reverse proxy server, the invention automatically injects values, associated with website variations, into web page tags used with web analytics platforms. The invention makes it possible to test any number of website variations and access such data from within web analytics platforms. The invention also provides a method to automatically transform web page tags of a first web analytics platform to web page tags of a second web analytics platform to easily try new third party web analytics solutions. | 11-06-2008 |
20080275981 | CLIENT SERVER SYSTEM AND METHOD FOR EXECUTING AN APPLICATION UTILIZING DISTRIBUTED OBJECTS - A client connected to a communication network performs an access request to an object. An application server performs an application by an actual object according to the client request. An object pool connected to the client and the application server pools a proxy object corresponding to the actual object and holds the actual object management information. The application server notifies the object pool of an event according to the status change of the application. The object pool automatically updates the actual object management information according to the notification of the event from the application server. | 11-06-2008 |
20080275982 | SYSTEM AND PROGRAM PRODUCT FOR TRACKING WEB USER SESSIONS - The present invention provides a solution for efficiently tracking web user sessions. Specifically, under the present invention, web user sessions are tracked on an analytics system based upon a unique identifier assigned to a requested web page and a session cookie that identifies a particular web user session. By tracking web user sessions in this manner, web page data transmitted during a particular web user session can be efficiently and accurately correlated for analysis. | 11-06-2008 |
20080275983 | Method and system for network management providing access to application bandwidth usage calculations - A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time. | 11-06-2008 |
20080275984 | Method and system for network management providing access to application bandwidth usage calculations - A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time. | 11-06-2008 |
20080275985 | Systems, Methods and Computer Programs for Monitoring Distributed Resources in a Data Processing Environment - Methods, apparatus and computer programs are described for monitoring resources within a data processing network. Monitoring entities can be selected, and a set of active monitoring functions can be modified, based on the requirements of consumers of monitored data. A first method involves monitoring resources on behalf of consumer entities within the network. A description of the consumer entity's monitoring requirements are published by the consumer entity and stored in a repository. The monitoring requirements of the consumer entity are compared with the monitoring capabilities of a plurality of monitoring entities, to identify a monitoring entity capable of satisfying the monitoring requirements of the consumer entity. An identified monitoring entity is selected, and a connection is established between the selected monitoring entity and the consumer entity. A second method involves modifying an active set of monitoring functions in response to changes to monitoring requirements of a currently active set of consumer entities. | 11-06-2008 |
20080275986 | Method to Update Status on Multiple Voice and Text Systems from a Single Device - A method for updating a message on a plurality of devices from a single device comprising a Configuration Program (CP), an Audio Device Update Program (ADUP), and a Text Device Update Program (TDUP). Using the CP, the user may enable and disable the present invention, add or delete devices, create and save messages, select existing messages to play to callers or display to senders, enable automated status updates, enable multiple message levels, or enable availability updates. The automated status update automatically creates messages from the user's calendar. The multiple message levels are a hierarchy of messages in which the message sent to a caller or sender based on their identity. The availability update communicates the user's next available time to the caller or sender. The ADUP and TDUP select the appropriate message to play or send based on whether automated status updates, multiple message levels, and availability updates are enabled. | 11-06-2008 |
20080275987 | METHODS AND APPARATUS FOR INTEGRATING SERVICES FOR ACCESSING THE WORLD WIDE WEB - Web pages retrieved by a browser core are translated into user interface component definitions and page information. The definitions and page information are transmitted to a user device which recomposes the definitions and page information into a format for presentation to a user on a user device. Transmitting the definitions and page information includes translation of the definitions and page information into a format appropriate for both the particular communications media on which the information is transmitted, and the device to which the information is transmitted. The device includes a browser client which performs the recomposition. The browser client also receives user input, and may respond by altering the information locally at the user device, and sending information related to the user selection back to the browser core for further processing. The browser core also tracks user sessions, thus allowing a user to access the network from several devices, and capture session information for each access from each device. This allows users to switch devices, and start a new session at the point where a previous session ended. | 11-06-2008 |
20080275988 | Method And System For Lawful Interception In Next Generation Networks - A method and system for lawful interception by Law Enforcement Agency (LEA) in next generation networks. The system includes a Delivery Function | 11-06-2008 |
20080281957 | DEFERRED INVOCATION OF COMMUNICATION SERVICES - In one embodiment, a network device determines one or more conditions for invoking one or more real applications to the network device for a session. This determination may be made at the initiation of the session, such as when a SIP INVITE message is received. The one or more conditions allow real applications to be invoked when a future event satisfies the condition. When it is determined that a condition is satisfied, a real application associated with the condition is then invoked. Accordingly, conditions may be set for real applications that may be tested against future events that have not yet occurred. This allows deferred invocation of real applications. Accordingly, if real applications are not needed for a session, then they are not invoked. But, when a real application is needed, it can be invoked. | 11-13-2008 |
20080281958 | Unified Console For System and Workload Management - Disclosed are systems and methods for implementing a unified console for managing computing-based devices. Described is a unified management solution to efficiently manage one or more workloads or a plurality of tasks performed by a user for managing the resources of applications in a computer network that includes the computing-based devices. The system can be implemented by providing a combined functionality that includes features of monitoring and update services, in a single console. | 11-13-2008 |
20080281959 | MANAGING ADDITION AND REMOVAL OF NODES IN A NETWORK - Systems and methods for managing a networked computing environment. The method comprising determining a change in status of a first computing system in a network according to status information communicated from the first computing system to a monitor system over a dedicated connection formed between the first computing system and the monitor system, wherein the dedicated connection is independent of network communication lines connecting the first computing system to other computing systems in the network. | 11-13-2008 |
20080281960 | Traffic supervision system - A method and a computer system for monitoring traffic, the computer system comprising an information handling server ( | 11-13-2008 |
20080281961 | NETWORK DELAY ANALYSIS INCLUDING PARALLEL DELAY EFFECTS - A multi-functional graphical user interface facilitates the analysis and assessment of application delays, including delays that occur on multiple paths. A trace file of an application's network events is processed to categorize the causes of delays incurred in the propagation and processing of these events. The system identifies the amount of delay (‘component delay’) that can be eliminated by eliminating each of the components of delay individually, as well as the amount of delay (‘parallel delay’) that can be eliminated by eliminating combinations of the delay components. A user interface displays the amount of reduction that can be achieved by eliminating each component delay individually and the amount of reduction that can be achieved by eliminating combinations of the individual component delays. To facilitate the analysis and assessment of these potential reductions, the interface allows the user to ‘drill down’ to view the individual delay components contained in each combination forming the parallel delays. In this manner, the user is provided a view of each of the delay components that would need to be addressed, either individually or in combination, to improve the overall application delay. | 11-13-2008 |
20080281962 | INFORMATION ASSET MANAGEMENT SYSTEM, LOG ANALYSIS SERVER, LOG ANALYSIS PROGRAM, AND PORTABLE MEDIUM - An information asset management system in a network environment includes a monitoring program | 11-13-2008 |
20080281963 | DISTRIBUTED REMOTE MANAGEMENT (DRMON) FOR NETWORKS - A method and apparatus for the distributed monitoring of network traffic deploys end system agents to collect traffic statistics at distributed points in the network. These statistics are forwarded to collectors which compile the statistics to create higher level pictures of network performance. A collector may act as a proxy for a prior art standalone network probe and may interact with network management software as though it were a standalone network probe. The invention is designed to work in accordance with a variety of standard network management protocols including SNMP, RMON, and RMON | 11-13-2008 |
20080281964 | Server discovery, spawning collector threads to collect information from servers, and reporting information - Server discovery, spawning collector threads to collect information from servers, and reporting such information, is disclosed. A method of one embodiment determines a number of servers communicatively coupled to a network. For each server, a collector thread is spawned to collect information regarding the server by sending requests to the server and receiving responses from the server. The collector threads can be spawned by and run on a computing device other than the number of servers, such that no computer-executable code is installed on the servers for collecting the information. Upon completion of the collector thread for each server, the information regarding the server as collected is stored to a database by one or more writer threads. The information may include dynamic load-oriented and function-oriented information regarding the servers, as well as static configuration information, from which server utilization-oriented statistics may be distilled to identify candidate servers for server consolidation. | 11-13-2008 |
20080281965 | METHOD AND SYSTEM FOR REPORTING DEVICE CAPABILITY UPDATE INFORMATION - A method and system for reporting device capability update information, which allows a client to selectively update and report their capabilities, thereby reducing the traffic between the client and a server as well as alleviating the burden on the server. In the present invention, the mechanism of subscription/notification is added to the updating and reporting of device capabilities, and the server subscribes to only the client's capabilities related to the service provided the server. With the function of managing the subscription, a single client may accept subscriptions from a plurality of servers, with each server requesting one or more subscriptions. Once the service provided by the server has been changed, the server again initiates a subscription flow. | 11-13-2008 |
20080288628 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MONITORING COMMUNICATIONS AND TAKING A RESPONSIVE ACTION - Exemplary embodiments include a device for monitoring communications and taking a responsive action including: a receiver operable for receiving an input signal from a user; a transmitter operable for transmitting an output signal to a communications network and a command signal to a secondary device; and a processor in operable communication with the receiver and the transmitter. The processor is operable for monitoring the input signal for an event and responsively instructing the transmitter to transmit the command to the secondary device. | 11-20-2008 |
20080288629 | METHODS, MEDIA, AND SYSTEMS FOR TRACKING CONTENT USAGE OVER A NETWORK - A content management system distributes items of media content to groups of users. The media is fingerprinted and tracked for reporting purposes. The system uses an algorithm to compensate for multiple content owners. The system can also be configured to provide content while still providing anonymity for actual use. | 11-20-2008 |
20080288630 | DEVICE MANAGEMENT - A device, such as a mobile phone, comprises a management tree store ( | 11-20-2008 |
20080288631 | STANDARD BASED DETECTION AND LAUNCH OF CLIENT APPLICATIONS - The claimed subject matter provides a system and/or method that detects, installs and launches applications on client machines. The disclosed system can include a component that receives a request to launch or install a client application. The component detects whether an application is present in a client machine by scrutinizing the received request and extracting an agent string associated with the client application. Based at least in part on the agent string, a server in receipt of the request can distribute a formatted document affiliated with the client application and thereafter initiate the application to execute on the client machine through MIME-type association. | 11-20-2008 |
20080288632 | METHOD AND SYSTEM FOR UNDERSTANDING SOCIAL ORGANIZATION IN A DESIGN AND DEVELOPMENT PROCESS - A method and system constructs a socio-technical network representing design and development processes. In one aspect, a network of inter-personal interactions comprising at least a plurality of nodes representing actors in design and development process is established; an artifacts network comprising at least a plurality of nodes representing a plurality of heterogeneous artifact types is established; one or more relationships between the nodes in the network of inter-personal interactions are determined; one or more relationships between the nodes of the artifacts network are determined; and one or more relationships between the nodes in the network of inter-personal interactions and the nodes of the artifacts network are determined. | 11-20-2008 |
20080288633 | NETWORK DEVICE TRACKING USING A NETWORK DEVICE SERVER - Systems and methods for tracking devices that are connected to physical communication ports of a network device server. In one example embodiment, a method includes detecting the connection of a device to a physical communication port of a device server; determining whether the device has been assigned an NCC; if the device has not been assigned an NCC, assigning an unassigned NCC to the device; and mapping the device's assigned NCC to the physical communication port. | 11-20-2008 |
20080288634 | Real-time monitoring of operations support, business service management and network operations management systems - The invention relates to a system and method for monitoring the availability and performance of an organisation's Business/Operational Support System (B/OSS) and Business Service Management Systems (BSM) which are referred to as a target platform. The invention gathers data from that monitored OSS/BSS/BSM arising from a distinct knowledge of the OSS/BSS/BSM's anatomy including its behaviour, log messages, configuration and public APIs and analyses that data to determine the OSS/BSS/BSM's run and configuration state, and performance, so as to report on these and other system events detected. This will allow the operational impact of the monitored OSS/BSS/BSM to be ascertained. | 11-20-2008 |
20080288635 | System and method for associating a client identity between servers - A client identity is associated between servers by establishing an identity for the client at a first sever utilizing a cookie transmitted to the client by the first server and transmitting to the client by the first server a URL, wherein the URL includes the identity established at the first server and information identifying the first server, and wherein the URL is transmitted by the client to the second server. | 11-20-2008 |
20080288636 | SENSOR NETWORK SYSTEM AND DATA RETRIEVAL METHOD FOR SENSING DATA - A sensor network system, including: a model list that stores preset model names; an event table that stores monitoring conditions of data transmitted from sensor nodes; an event generator that receives data corresponding to the model names from the sensor nodes, and notifies an occurrence of an event when receiving data satisfying the monitoring conditions from the sensor nodes; and an event-action controller including an action executer that executes processing previously specified when the occurrence of an event is indicated from the event generator. | 11-20-2008 |
20080294767 | Ubiquitous Wireless Network System, Node Module, and Operation Method of the Node Module - A ubiquitous wireless network system, node module, and operation method of the node module are disclosed. The present invention allows a display unit to display detected information or received information when the information corresponds to its own node module as an arrival destination. Therefore, the present invention enables users to ascertain the surrounding physical context around the corresponding node module or the information inputted by the administrator. | 11-27-2008 |
20080294768 | HOT WITHIN MY COMMUNITIES - Embodiments of the invention are directed to identifying network resources or other topics that are of interest to members of multiple online communities to which a user belongs. Online communities include blogs, websites, games, e-commerce systems, messaging systems, wikis, etc. For each online community, click activity or other client behaviors are tracked and analyzed to determine statistical metrics about community activity, such as which articles, links, services, or other network resources are popular in the online community. At least some of the tracking or analysis can be performed by clients that access the online communities, by a server of each online community, and/or by a central tracking system. The results for each community may be further analyzed relative to each other. The results are provided for all communities with which a given user is associated. For example, a list of the most popular links in the user's selected online communities. | 11-27-2008 |
20080294769 | Efficient synchronization of agents starting a task where the agents poll a server to learn the task start time - A server sets a task start time equal to a next polling time by a last agent that has most recently polled the server. In response to each of a number of agents, including the last agent, polling the server, the server provides the task start time. At each agent, a task is started at the task start time, such that all the agents start the task at a same time. As such, all the agents except for the last agent have to wait for the task start time to start the task after polling the server, whereas the last agent starts the task immediately after polling the server. The server may also determine a polling interval time based on a number of the agents that have polled the server, where the polling interval time indicates how long each agent waits between successive pollings of the servers. | 11-27-2008 |
20080294770 | SYSTEM AND METHOD FOR MANAGING COMPUTER NETWORKS - A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts. | 11-27-2008 |
20080294771 | ASSET MONITOR FOR FIELDBUS DEVICES - A software product and method of monitoring a field device in an enterprise having an industrial process. A subscription to the OPC DA server for diagnostic data from the field device is made and a subscription to an OPC AE server for event notifications from the OPC AE server is made. The subscription to the OPC AE server is activated, but the subscription to the OPC DA server is not activated. When an event notification is received from the OPC AE server, the subscription to the OPC DA server is activated. Diagnostic data from the field device is received and device health information from the diagnostic data is generated. The device health information is displayed on a viewing monitor. The subscription to the OPC DA server is then deactivated. | 11-27-2008 |
20080294772 | AUTOMATICALLY INFERING AND UPDATING AN AVAILABILITY STATUS OF USER - A system, system, and program for automatically inferring and updating an availability status of a user are provided. At least one current activity of a user is detected, where the current activity includes at least one system level event within a computer environment accessible to the user. A current availability status for a particular communication request is inferred from the current activity of the user in view of multiple availability rules, where the multiple availability rules map current activity to multiple possible availability statuses. In addition, inference of the current availability status is determined based on the identity of the requester of communication with the user, where the multiple availability rules map the requester identity in combination with the current activity to multiple availability rules. Output of the current availability status is controlled, such that the requester of the particular communication request is notified of an availability of the user to respond to the particular communication request. | 11-27-2008 |
20080301279 | Specifying Associations among Attributes of Entities in - Specifying associations among attributes of entities in a data center, the data center comprising a facility that houses computers and equipment supporting computer operations, the entities including the computers and the equipment, some attributes associated with a resource domain, the resource domain composed of a physical characteristic shared by some of the computers and equipment, including inducing, by a management module within the data center, a change in a value of a first attribute of a first entity; monitoring, by the management module within the data center, a change in a value of a second attribute of a second entity; determining whether the monitored change in the second attribute correlates with the induced change in the first attribute; and, if the monitored change in the second attribute correlates with the induced change in the first attribute, specifying an association among the first attribute, the second attribute, and the resource domain. | 12-04-2008 |
20080301280 | WEB MEDIA ASSET IDENTIFICATION SYSTEM AND METHOD - Methods of dynamically identifying a server provided media asset on a client device are provided herein. | 12-04-2008 |
20080301281 | Search Ranger System and Double-Funnel Model for Search Spam Analyses and Browser Protection - An exemplary method for defeating server-side click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. An exemplary method for investigating client-side cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script. Other methods, systems, etc., are also disclosed. | 12-04-2008 |
20080301282 | Systems and Methods for Storing Interaction Data - A method for storing customer center communications data includes receiving communications data at a host, wherein the communications data corresponds to a communication involving a customer center agent at a customer center located remotely from the host, storing the communications data at the host, and providing the communications data to a device located at the customer center. | 12-04-2008 |
20080301283 | Website-controllable warning message broadcasting system - A website-controllable warning message broadcasting system includes a first network linking apparatus and a plurality of second network linking apparatus linked to one another via a central server. When a first alarm unit connected to the first network linking apparatus is triggered, users at the second network linking apparatus may use respective second display unit thereat to view images captured by a first image capture unit connected to the first network linking apparatus, and broadcast a warning to deter any invader or to help the user at the first network linking apparatus. | 12-04-2008 |
20080301284 | Systems and methods for capture of electronic evidence - Systems and methods are provided for capturing electronic evidence. One or more agents are deployed to one or more sources of electronic evidence over a communications network, wherein the one or more deployed agents are undetectable by the one or more sources. One or more instructions are transmitted to the one or more deployed agents to capture electronic evidence from at least one service control point, wherein the one or more deployed agents are inactive unless the one or more instructions are received. Upon receipt of the one or more instructions by the one or more deployed agents from the at least of service control point, electronic evidence is captured from the one or more sources of electronic evidence. The use of resources of the one or more sources by the one or more deployed agents is monitored. | 12-04-2008 |
20080301285 | Methods, apparatus and systems for analyzing data carried by a plurality of data tributaries, wherein the analysis is based on a mapping of the data tributaries to one or more tributary sets - In one embodiment, data carried by a plurality of data tributaries is received. As the data is received, a stored mapping of data tributaries to one or more tributary sets is accessed, and common data tags are assigned to the data carried by ones of the data tributaries mapped to common ones of the one or more tributary sets. The data based on the common data tags is filtered; the filtered data is analyzed; and a result of the analysis is output. Other embodiments are also disclosed. | 12-04-2008 |
20080301286 | Persistent message store - A method and apparatus for using a persistent message store in a distributed computing system having a service oriented architecture. A message is detected that is transmitted from a message producer to a message consumer in the distributed computing system having the service oriented architecture. A determination is made as to whether the message should be copied based on at least one predetermined criterion. A copy of the message is generated if the message is to be copied. The copy of the message is stored in the persistent message store. | 12-04-2008 |
20080301287 | Managing Partitioning in a Cluster of Nodes - For managing partitioning in a cluster of nodes, each node is assigned a prime number for use in determining which partition should be activated following partitioning of the cluster. The cluster is monitored for partitioning. If partitioning is detected, a partition value is calculated from the product of the prime numbers assigned to each node in each partition. A node is activated only if it is within the partition having the greatest partition value. | 12-04-2008 |
20080301288 | METHOD AND DEVICE FOR MONITORING A TRANSACTION - A device for detecting a timeout event during a transaction between a user and a host includes a memory storing a set of predetermined threshold values in association with corresponding operations. A timing control unit that is operative to provide timing information. A controller is operative to detect a timeout event based on the timing information provided thereto and on the predetermined threshold vale of a corresponding operation. Activation of the device is conditional upon a signal received from a host. In another example embodiment, a device for detecting a timeout event during a transaction between a user and a host based on timing information and the predetermined threshold values includes means to access external power from the host. | 12-04-2008 |
20080301289 | METHOD AND APPARATUS FOR SEARCHING FOR UPNP DEVICE - Provided is a method of searching for a Universal Plug and Play (UPnP) device in a UPnP network. Accordingly, a control point inserts attribute information on a device designated by a user in addition to information on a device type, a service type, or the like into a search message that is multicasted to search for a UPnP message, and a UPnP device which receives the search message determines whether or not the received attribute information corresponds to an attribute of the UPnP device with reference to a device description and a service description, and transmits a response message according to a result of the determining. Therefore, network traffic that occurs in an operation of searching for a UPnP device can be reduced, and a user can easily and rapidly search for a desired UPnP device. | 12-04-2008 |
20080301290 | METHOD AND APPARATUS FOR MANAGEMENT OF COMMON SIDE INFORMATION - The invention is directed at a method of managing side information, used during interactive compression, common to a server and one of multiple devices. In order to manage common side information, a global common side information table including entries for the side information is maintained. The entries store characteristics of the common side information and include a reserve counter whereby entries can be reserved so that they are not erroneously deleted from the server. | 12-04-2008 |
20080301291 | PORTABLE HOST-PLUGGABLE APPLIANCE TRACKING SYSTEM - A recoverable data storage apparatus includes a hand-portable housing configured with an input/output (I/O) port presented outwardly therefrom, a data storage means retained within the housing and operatively coupled with the input/output port, and a client agent embodied as device-executable code residing on the data storage device and configured. When executed on a network-linked host computing device, the client agent is configured to establish communication with a remote server and receive data indicating a possession status of the data storage apparatus. A device tracking system includes a data network means, a hardware portion, and a software portion. The hardware portion includes at least, (1) a server device operatively coupled with the network means, and (2) a data storage device with an externally presented input/output port configured to operatively couple with a host device. The software portion includes at least, (1) a data storage device tracking means configured to identify a data storage device based upon unique identification-relevant data included in a polling message received via the network means, and (2) a client agent configured as device executable code stored at a memory means operatively coupled with the data storage device, wherein the client agent is configured so operatively when coupled with a host device to cause the host device to transmit host device-relevant identifying data via the network means. | 12-04-2008 |
20080301292 | POWER MANAGEMENT OF NETWORK ATTACHED DEVICE - Power management of one or more network-attached devices connected to a plurality of computer units is disclosed. In an exemplary arrangement, each computer unit as one computer unit, in response to a command for shutdown of the one computer unit, determines whether or not at least one remaining computer unit has been placed in a shutdown state, and the one computer unit, in response to a determination that the at least one remaining computer unit has been placed in a shutdown state, transmits a terminate-command signal to the one or more network-attached devices via the network for termination of the one or more network-attached devices. | 12-04-2008 |
20080301293 | Method and apparatus for discovering universal plug and play device using resource information - Provided are a method and apparatus for discovering a Universal Plug and Play (UPnP) device by using resource information. The method includes: multicasting a search message including resource request information, which requests a resource to the device, to a network complying with the predetermined standard; receiving at least one response message regarding the search message; and discovering a device corresponding with the resource request information based on the received response message. Accordingly, available information of the resource can be obtained in a discovery process, and as a result, a trial and error during the search and control can be avoided. Also, unnecessary waste of resources, such as network traffic, can be prevented, and thus efficiency of a communication protocol is improved. | 12-04-2008 |
20080301294 | Method and Apparatus for Operating an Open API Network Having a Proxy - A telecommunication system, method, apparatus, and computer readable media that implements an open application program interface (API) system in which open API servers pass and receive API commands to applications through a novel proxy. The proxy assists implementing various management functions, such as assigning open API servers to application and monitoring the overall system, and service contract control, all beneficially in a transparent manner. The proxy enables the telecommunication system to handle geographically diverse applications and open API servers. All API command can, but need not, pass through the proxy. | 12-04-2008 |
20080301295 | SYSTEM AND METHOD FOR USAGE-BASED MISINFORMATION DETECTION AND RESPONSE - Methods of detecting, and providing a notification of, the existence of misinformation using usage patterns of a network service enable an organization to respond to the misinformation. The method includes establishing common usage patterns of the network service, identifying an irregular usage pattern, determining that the irregular usage pattern was caused by misinformation, and responding to the misinformation. | 12-04-2008 |
20080307087 | PROTECTION OF INDUSTRIAL EQUIPMENT FROM NETWORK STORMS EMANATING FROM A NETWORK SYSTEM - A method of protecting a networked industrial controller from network storms is disclosed in the specification. The networked industrial controller has a real-time operating system and communication components performing communication exchanges with connected networks. The method comprises steps of: | 12-11-2008 |
20080307088 | Performance Monitoring Web Console for Distributed Transaction Service - A computer-implemented system to support performance monitoring of distributed transaction service can comprise one or more distributive transaction monitoring infrastructures, wherein each distributive transaction monitoring infrastructure contains at least one local monitor server that receiving monitoring data from one or more distributive transaction monitoring processes; a central monitor server that accepts monitoring data from one or more distributive transaction monitoring infrastructures and stores monitoring data into a database; and a web application that communicates with the central monitor server and provides interaction with a user. | 12-11-2008 |
20080307089 | COMPUTER NETWORK SOFTWARE AND HARDWARE EVENT MONITORING AND REPORTING SYSTEM AND METHOD - A method, system, and network for providing a method, system, and network, for network and device event monitoring and reporting. The disclosed subject matter associates with a host computer, a local network of information technology devices, a community of network users, and a global information technology community. The present disclosure initiates an inventory of a plurality of information technology devices associated with a local network of information technology devices. The method, system and apparatus determine change in the operational status of the plurality of the information technology devices associated with the local network. Then, the present disclosure monitors for changes in the operational status of the plurality of the information technology devices associated with the local network. The disclosed subject matter then presents to the host computer information relating changes in the operational status of the information technology devices associated with the local network. The present method and system associate changes to the operational status with a plurality of products from a set of product vendors, and those changes to the operational status with a plurality of advertisements presented in association with plurality of products. | 12-11-2008 |
20080313322 | Asynchronous Network Stack Operation in an Operating System Independent Environment - Techniques for operation of an asynchronous stack in a pre-boot environment. A token-based stack design may be used to support communications between network stack layers. | 12-18-2008 |
20080313323 | Methods, Systems, And Computer Program Products For Monitoring Transaction Status With A Presence Tuple - Methods and systems are described for monitoring transaction status with a presence tuple. A transaction having a multi-stage life-cycle and having a transaction participant is detected. A presentity is provided for tracking a status associated with a stage of the life-cycle and for publishing the status to a presence tuple associated with the presentity in response to the detection of a transition of the life-cycle to the stage. A subscription to the presence tuple is established for the transaction participant based on information determined from the transaction. At a presence server, a message is received including presence status associated with a stage of a transaction and transaction participant information. The presence information is processed for creating a presence tuple for tracking the transaction. A subscription to the presence tuple is established for the transaction participant based on the transaction participant information received in association with the message. | 12-18-2008 |
20080313324 | REDUNDANT PILE OF INEXPENSIVE DRIVERS (RPID) - The claimed subject matter provides a system and/or method that manages storage media associated with a plurality of disparate devices. The disclosed system can include a network of disparate devices wherein each device in the network can be associated with storage media. Additionally, the disclosed system can also include a component that identifies each device in the network, associates a likelihood that the device will periodically leave or rejoin the network, and utilizes the associated likelihood to construct a logical redundant pile of inexpensive disks comprising the storage media associated with the disparate devices. | 12-18-2008 |
20080313325 | COMPUTER NETWORK SOFTWARE AND HARDWARE ASSET CONFIGURATION AND DISCOVERY SYSTEM AND METHOD - A method, system, and network for interfacing the work-flow monitoring and reporting of a host computer, a local network of information technology devices, a community of network users, and a global information technology community. This includes the processes and system features for initiating an inventory of a plurality of information technology devices associated with the local network of information technology devices. The present disclosure further includes determining needs of the local network of information technology and associating the needs to similar needs of the community of network users, and solution product and services of the global information technology community. The system directs the host computer to research and purchase resources similar in temperament of the needs of the local network of the information technology devices, and drive the global information technology community advertisements of the needs of the local network to the user of the host computer. | 12-18-2008 |
20080313326 | Information Processor and Information Processing System - The information processor includes a device communication performance management module. The device communication performance management module includes: a communication performance evaluation unit that measures and evaluates the communication performance with respect to a device to be used when it is used by a device-use application; a device naming rule management unit that manages a naming rule for incorporating the communication performance evaluated by the communication performance evaluation unit into the name of the device file for a device as the target of evaluation; and a device file management unit that creates a device file for a device as the target of evaluation in accordance with the naming rule based on the result of communication performance evaluation. The result of communication performance evaluation by the communication performance evaluation unit is incorporated into the name of a device file and the evaluation result is thereby provided to a device-use application. | 12-18-2008 |
20080313327 | COLLECTING INDIVIDUALIZED NETWORK USAGE DATA - A method for collecting individualized network usage data includes routing Internet communications between a plurality of local clients and a plurality of remote servers over a common data link between a router device and the Internet. For each of the plurality of clients, characteristics of that client's communications routed over the data link are monitored at the router device. A collection of statistics reflecting the monitored characteristics are maintained. From the router device, the collection of statistics are periodically communicated over the data link to an interested server. | 12-18-2008 |
20080313328 | METHOD AND SYSTEM FOR BACKGROUND REPLICATION OF DATA OBJECTS - In an embodiment, a system and method may manage network resources to provide a near zero-cost background replication of data. Such a system may be inhibited from causing interference with foreground data flows. Such a system may also utilize a large fraction of spare network bandwidth. A system configured to implement such a method may include one or more servers and at least one client in communication via a to network. Additionally the system may include a hint server, a monitor and/or a front-end application between a demand server and the network. | 12-18-2008 |
20080313329 | PRESENCE SERVICE ACCESS DEVICE, PRESENCE SERVICE SYSTEM AND METHOD FOR PUBLISHING AND ACQUIRING PRESENCE INFORMATION - A presence service access device is disclosed for a presentity to publish presence information and transmit said information to the presence server, the device comprising a presentity communication module and a service scheduling control module. Further disclosed is a presence service system using the presence service access device, comprising a presentity, a presence service access device, a presence server, and a watcher client. Also disclosed is a method of publishing and acquiring presence information comprising steps of: 1. a presentity which publishes presence information; 2. the presence service access device which receives the presence information published by the presentity and forwards the same to a presence server; and 3. the presence server which distributes the presence information to corresponding watcher client. According to the present invention, various presentities provide presence information to watcher clients by connecting presence servers through a presence service access device. | 12-18-2008 |
20080320121 | SYSTEM, COMPUTER PROGRAM PRODUCT AND METHOD OF DYNAMICALLY ADDING BEST SUITED SERVERS INTO CLUSTERS OF APPLICATION SERVERS - A system, computer program product and computer-implemented method of dynamically adding a best suited application server to a cluster of application servers are provided. To do so, a history of quality of service (QoS) of a plurality of application servers is maintained. Using the history of QoS, an application server is dynamically selected and added to the cluster when the cluster is under a heavy workload. The selected application server is one that has the most historically favorable QoS and a heavy workload is one that exceeds a user-configurable threshold. | 12-25-2008 |
20080320122 | METHOD AND APPARATUS FOR MANAGEMENT OF VIRTUALIZED PROCESS COLLECTIONS - A management software approach to automatic and dynamic migration of applications running within virtualized process collections while retaining state during the migration operation. Performance metrics are received for a virtualized process collection running in a first logical partition. A threshold value is calculated for the performance metrics. A performance state analysis of the performance metrics is executed to determine whether the calculated threshold value of the performance metrics exceed a maximum or minimum threshold specified in a stack tier policy for the virtualized process collection. A stack tier analysis of the performance metrics is executed to identify any trigger violations and determine a migration action to be taken for the virtualized process collection. Responsive to a determination that the number of identified trigger violations exceeds a trigger violation count, a migration event is generated to migrate the virtualized process collection to a second logical partition. | 12-25-2008 |
20080320123 | PROCESS AND METHODOLOGY FOR GENERIC ANALYSIS OF METRICS RELATED TO RESOURCE UTILIZATION AND PERFORMANCE - A generic algorithm for analysis of resource metrics. A threshold is calculated in a stack tier policy for the performance state of a metric in a virtualized process collection (VPC). Responsive to determining that the metric is a critical metric, a weighted average of all metrics in the VPC is determined. Responsive to determining that the weighted average exceeds the threshold in the stack tier policy, if the value of the metric is determined to be higher than values for all recorded metrics, the value of the metric is stored as a highest value. A weighted average performance state of all metrics is calculated as the weight property of the performance metric divided by the weight factor total. Responsive to determining that the highest value is higher than the weighted average performance state of all metrics, the highest value is used as the performance state of the VPC. | 12-25-2008 |
20080320124 | DATA-ASSISTED CONTENT PROGRAMMING - Methods, systems, and apparatuses for data-assisted content programming are described. Link access data for a website is collected, such as numbers and times of views and clicks for links of the website, and link generated revenue information. The link access data is optionally stored. A link performance measure is generated for a link based on the link access data. An indication of the calculated link performance measure for the link is graphically displayed in a content scheduler. The indication may be based on an actual click through rate for the link, on an average click through rate for links in a module in which the link resides, link user engagement information, revenue generated by the link, or on other link access data. The content scheduler may display a website content schedule timeline or a webpage preview that includes the graphical indication. | 12-25-2008 |
20080320125 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page. | 12-25-2008 |
20080320126 | ENVIRONMENT SENSING FOR INTERACTIVE ENTERTAINMENT - The claimed subject matter relates to an architecture that can facilitate an enhanced entertainment experience based upon interactivity between entertainment medium or content and a content consumer's environment. In one aspect, based upon features or condition of a content consumer's environment, entertainment content can be interactively selected or modified. In another aspect, based upon features included in the entertainment content, components or conditions extant in the environment can be interactively updated or modified. | 12-25-2008 |
20080320127 | SECURE PUBLISHING OF DATA TO DMZ USING VIRTUAL HARD DRIVES - A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is disclosed. The mechanism may include the transference of virtual hard disk files between the internal network and the DMZ host computer. The DMZ host computer may be configured with two network interface cards (“NICs”). One NIC may be connected to the DMZ network. The other NIC may be connected to the internal network. The virtual machines are connected only to the DMZ NIC. The physical host communicates only with the internal network NIC. When it is necessary to publish data to the DMZ-resident computer, a virtual hard disk file may be copied to the DMZ host over the internal network NIC. The DMZ resident virtual computer simply detects the presence of the new drive and mounts it. | 12-25-2008 |
20080320128 | Method, system and service for structured data filtering, aggregation, and dissemination - A system and method of processing data, including identifying a first data processing criteria, communicating the first data processing criteria from a data processing application to a network element, receiving sensor data from a plurality of sensors at the network element, operating on the sensor data at the network element to process the data according to the identified first data processing criteria, resulting in a first processed data result, transmitting the first processed data result from the network element to the data processing application, and processing the first processed data result at the data processing application resulting in a second processed data result. The criteria can be dynamically updated. | 12-25-2008 |
20080320129 | METHOD OF SPECIFYING A MONITORING CRITERION FOR A PARAMETER OF AN OBJECT IN AN OPERATIONAL MANAGEMENT SYSTEM - The invention relates to a method of specifying a monitoring criterion for a parameter of an object in an operational management system. The method in accordance with the invention comprises the step of assigning first information to the parameter, wherein the first information is associated with a first priority. In a further step, the first information is employed as monitoring criterion for the parameter if no further information associated with a priority higher than the first priority is assigned to the parameter. | 12-25-2008 |
20080320130 | VISIBILITY AND CONTROL OF WIRELESS SENSOR NETWORKS - A computer implemented technique framework, prototype tool and associated methods that provide a high degree of visibility and control over the in-field execution of software in a minimally intrusive manner wherein developer-defined correctness tests and validation logic are embedded into the sensor node itself, making in-field software testing autonomous without necessitating continuous developer participation. | 12-25-2008 |
20080320131 | Method, Apparatus or Software for Managing Propagation of the Performance of a Node in a Network - A method, apparatus and software are disclosed for managing a network of nodes in a manner that enables the effect of the performance of one node on its neighbouring nodes in the network to be controlled. | 12-25-2008 |
20080320132 | METHOD FOR COMMUNICATION WITH INTERCEPTION OF CONTROL MESSAGES - A connection-oriented communication method between at least two communicating entities, to with a sending entity and a recipient entity connected via a telecommunication network said method comprising the following steps:
| 12-25-2008 |
20080320133 | Method for determining the dynamics of a logical network - A method for determining the dynamics of a logical network, said network comprising a plurality of communication nodes ( | 12-25-2008 |
20080320134 | Methods and Apparatus for Implementing Virtualization of Storage within a Storage Area Network - Methods and apparatus for implementing storage virtualization on a network device of a storage area network are disclosed. A frame or packet is received at a port of the network device. It is then determined that the frame or packet pertains to access of a virtual storage location of a virtual storage unit representing one or more physical storage locations on one or more physical storage units of the storage area network. A virtual-physical mapping between the one or more physical storage locations and the virtual storage location is then obtained. A new or modified frame or packet is then sent to an initiator or a target specified by the virtual-physical mapping. | 12-25-2008 |
20080320135 | METHOD AND SYSTEM FOR ESTABLISHING NETWORK CONNECTIONS - A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network. | 12-25-2008 |
20080320136 | System and method for consolidating, securing and automating out-of-band access to nodes in a data network - A system and method for out-of-band network management is provided wherein one or more different management interfaces are converted into a common format management data. The system may encrypt the common format management data. The system may also authenticate each user that attempts to access the management interfaces. | 12-25-2008 |
20090006605 | EXTENDED WRITE COMBINING USING A WRITE CONTINUATION HINT FLAG - A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage. | 01-01-2009 |
20090006606 | COMMAND QUEUE LOADING - A data storage system and associated method are provided wherein a policy engine continuously collects qualitative information about a network load to the data storage system in order to dynamically characterize the load and continuously correlates the load characterization to a command queue depth of data transfer requests. | 01-01-2009 |
20090006607 | SCALABLE METHODS FOR DETECTING SIGNIFICANT TRAFFIC PATTERNS IN A DATA NETWORK - Methods and apparatuses are provided for detecting traffic patterns in a data network. A sequential hashing scheme can be utilized that has D hash arrays. Each hash array i, wherein 1≦i≦D, includes M | 01-01-2009 |
20090006608 | DYNAMICALLY ENHANCING MEETING PARTICIPATION THROUGH COMPILATION OF DATA - Meeting attendees can have the resources available to participate in an efficient meeting regardless of where the attendees are located (e.g., across from each other or thousands of miles apart). Information can be gathered that relates to the attendees, the subject matter of the meeting or other information. In addition, relationships between attendees, if any, can be determined and displayed to the attendees to show the interrelatedness of the group. Various aspects during the meeting can also be observed and analyzed to allow the attendees to become more aware of the dynamics between individuals as well as the entire team. | 01-01-2009 |
20090006609 | MEDIA CONTENT DISTRIBUTION INDICATOR - A method includes providing an expandable element associated with a message transmit key of a device. An outer border of the expandable element moves or expands to reflect a number of recipients of a message to be sent from the device. The message transmit key of the device is contacted to cause the initiation of the message transmitted to each of the recipients, and a size of an inner region within the outer border is expanded to reflect a state of the message transmission to each of the recipients, wherein the size of the inner regions expands to fill an area within the outer border in order to send the message to each recipient. | 01-01-2009 |
20090006610 | Event driven plugin architecture for importing scanned image data into a production workflow - Systems and methods are described that facilitate importing scanned image data into a production workflow, in accordance with various features described herein. A plurality of loosely-coupled, dynamically loaded plugins can be defined in a configuration file for a given production scanning job. The plugins can be invoked in response to a trigger with which each plugin is associated, and triggers can be associated with different phases of the production workflow, such as image data acquisition (importation), data filtering (pre-scanning), image analysis (scanning), and metadata processing (post-scanning). In this manner, the overarching scanning architecture need not have direct knowledge of which plugins are triggered, or even present, and custom plugins as well as standard plugins can be provided for each production scanning job. | 01-01-2009 |
20090006611 | COMMUNICATION NETWORK ANALYSIS SYSTEM IN MULTI-LAYERED COMMUNICATION SYSTEM - The present invention relates to a communication network analysis apparatus in a multi-layered communication system and a method using the apparatus, and more specifically, to a communication network analysis apparatus in a building automation and control system, a communication method using the apparatus, and a protocol conversion method. | 01-01-2009 |
20090006612 | COMMUNICATION SYSTEM, PROXY SERVER, METHOD OF CONTROLLING SAME AND CONTROL PROGRAM THEREFOR - It is arranged so that the history of access to a web page at a terminal device that does not have a unique IP address can be determined. To achieve this, a proxy server generates identification data of the terminal device upon accepting a request for a web page from the terminal device the first time. A link destination URL included in the web page conforming to the request is changed by the proxy server and a web page in which the URL after the change has been embedded is displayed on the terminal device. If the proxy server is requested for the web page having the URL after the change, the URL is restored by the proxy server to the URL that prevailed before the change and the web server is requested for the web page having the URL that prevailed before the change. Since the URL after the change is one that only the terminal device of the generated identification data can ascertain, the history of access by the terminal device can be determined by storing the URL, which prevailed before the change, of the requested web page in correspondence with the identification data. | 01-01-2009 |
20090006613 | System and a method for updating a user presence status on a terminal by aggregating multisource information - A method of updating a user presence status at at least one terminal connected to a telecommunications network, on the basis of presence status information provided by at least one status source of said terminal. The presence status is determined during an aggregation step comprising collecting a plurality of unit presence probability values provided by a plurality of status sources associated with said terminal; and calculating an aggregated presence status probability resulting from a linear combination of said unit presence probability values. | 01-01-2009 |
20090006614 | Monitoring Web Service Transactions - Systems and methods for monitoring web service transactions include a monitoring server that is configured to monitor a web service transaction. The monitoring server allows a user to describe a sequence of web service requests that in combination define a web service transaction. The monitoring server sends out the web service requests in sequence to remote agents that are deployed in geographically diverse locations. The agents send the requests to the target web service and the results are provided back to the monitoring server. The monitoring server receives the results and then dynamically constructs the next request in the series based on the sequence of requests from the user and data from the response to a prior request. The dynamically constructed next request is then sent to remote agents for execution and the results are provided to the monitoring server. | 01-01-2009 |
20090006615 | METHOD AND APPARATUS FOR EXTRACTING AND VISUALIZING EXECUTION PATTERNS FROM WEB SERVICES - One embodiment of the present method and apparatus for extracting and visualizing execution patterns from Web Services collects data relating to one or more transactions executed in accordance with one or more Web Services-based applications (e.g., messaging systems or other services). One or more patterns is then extracted from the collected data, where the patterns are representative transactions commonly executed in accordance with the Web Services configuration under analysis. | 01-01-2009 |
20090006616 | END-TO-END PERFORMANCE TOOL AND METHOD FOR MONITORING ELECTRONIC-COMMERCE TRANSACTIONS - A method and apparatus for monitoring electronic commerce transactions. A network delay agent, coupled to the access point for the electronic commerce provider's system is operable to send and receive communications to a designated customer's site for measuring network transport latency. Application test latency is also determined. An application monitor agent that is coupled to the electronic commerce provider's access point sends application tests that correspond to tasks performed during a typical electronic commerce transaction, to the electronic commerce provider's system. The time required for the electronic commerce provider's system to perform the indicated tasks and return a response to the application monitor agent is recorded as application test latency. Network transport latency and application test latency are displayed to indicate the delays that are experienced by a user in executing an electronic commerce order. | 01-01-2009 |
20090006617 | System And Method For Transmitting Pollution Information Over An Integrated Wireless Network - A pollution information message system provides a system and method for generating and transmitting pollution information messages. In one embodiment, the pollution information message system employs a transceiver network with a plurality transceivers coupled to monitoring devices. Control room operators receive a pollution information message from an identifiable transceiver. The transceiver, identified by an identification code, indicates a location and the nature of the detected pollution. | 01-01-2009 |
20090013068 | SYSTEMS AND PROCESSES FOR EVALUATING WEBPAGES - Systems and methods may manage webpages in a set of webpages. The set of webpages may include webpages in an intranet and/or an extranet of an enterprise. Queries may be performed on the webpages and a list of results determined based at least in part on query terms and webpage scores. Webpage scores may be based on ratings of webpages and/or metrics of change. A metric of change of a webpage may be based at least in part on changes in text, images, and/or ratings of the webpage. | 01-08-2009 |
20090013069 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSOR, SERVER, INFORMATION PROCESSING METHOD AND PROGRAM - An information processor ( | 01-08-2009 |
20090013070 | SYSTEM AND METHOD FOR PROVIDING NETWORK APPLICATION PERFORMANCE MANAGEMENT IN A NETWORK - The present invention relates to a system and method for network performance management for monitoring performance of network applications. The system comprises a transmitter for sending one or more types of probe packets to the network, a receiver for receiving the one or more network probe packets from the network and for receiving one or more network application performance queries from one or more network applications, a processor connected to the transmitter and the receiver and operable to process network probe packets received by the receiver to generate network performance statistics for each type of probe packet and to look up the network application performance requirements of the one or more network applications and compare the network application performance requirements with the corresponding network performance statistics to determine whether the network application should access the network. Network performance statistics may be obtained using lean packet probes, using real traffic test streams or obtaining network performance statistics from a service provider. Thus by providing a probe, lookup, feedback methodology, network parameters, or network application requirements, may be adjusted to meet performance requirements of one or more network applications. | 01-08-2009 |
20090013071 | Provision Information Notification Apparatus, Provision Information Notification Method and Software Program - An apparatus and method is provided which enable a user using a plurality of terminals to obtain information in a convenient manner compared to conventional systems. An image forming apparatus includes a notification setting database | 01-08-2009 |
20090013072 | NETWORK APPARATUS TEST SYSTEM AND NETWORK APPARATUS TEST METHOD - An object of the present invention is to provide a network apparatus test system capable of highly efficiently performing a test of a network apparatus, wherein the host server includes a first control unit which transmits a test signal to a monitoring server, the monitoring server includes a second control unit which detects a test request signal and transmits the detected test request signal to a setting server, and which transmits the test signal to the network apparatus, and the setting server includes a storage unit which stores a plurality of IP addresses, and a third control unit which is configured, each time the test request signal is received, to assign one of the plurality of IP addresses to the network apparatus, and to perform processing for generating identification information, and is configured to make the first control unit transmit and the second control unit transmit the test signal. | 01-08-2009 |
20090013073 | METHOD AND SYSTEM FOR DETECTING WIRELESS ACCESS DEVICES OPERABLY COUPLED TO COMPUTER LOCAL AREA NETWORKS AND RELATED METHODS - A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices | 01-08-2009 |
20090013074 | SYSTEM AND METHOD FOR DISTRIBUTED NETWORK MONITORING FOR STEGANOGRAPHIC MESSAGES - This invention relates to distributed monitoring of networks for steganographically encrypted or encoded messages. Terrorists or criminal groups may use stenography to encode or hide messages in image data or other encrypted data. Law enforcement agencies seek to monitor the distributed networks for the hidden information. However, the size of the Internet exceeds the capacity of law enforcement resources. A method and system are described that use various computational devices distributed about the network to individually monitor network locations. Suspect data is documented on a set of servers. These servers then alert analysts to the presence of suspicious data. In one exemplary embodiment, a common interpreted programming language is used to program a set of instructions that may be performed by various devices distributed about the Internet to monitor network locations for encoded or hidden communications. | 01-08-2009 |
20090013075 | Monitoring apparatus, executive program, and information processing system - The present invention has: a data deriving section | 01-08-2009 |
20090019145 | Internet connection terminal apparatus and internet connection status determining method - In order to provide an Internet connection terminal apparatus which is capable of correctly determining the Internet connection status without the influences of a DNS cache or the like, an Internet printer ( | 01-15-2009 |
20090019146 | ASSOCIATING AND EVALUATING STATUS INFORMATION FOR A PRIMARY INPUT PARAMETER VALUE FROM A PROFIBUS DEVICE - A method and system are disclosed for managing Profibus device information in a distributed control system. After receiving input parameter data originating from a Profibus device message, the I/O module assembly performs steps for processing, maintaining and providing the input parameter data to a requesting control processor. The processing step includes extracting input parameter values from a received Profibus device message. The extracted input parameters are then deposited in a repository on the I/O module assembly, such that for a primary input parameter, the I/O module assembly stores at least: (1) a measured value, and (2) a status value. Furthermore, the I/O module assembly maintains a reference linking the first status parameter to the first input parameter. The I/O module assembly provides a data status value with the measured value for the first input parameter in accordance with an I/O read operation. The data status value is based on the status value for the first status parameter. | 01-15-2009 |
20090019147 | NETWORK METRIC REPORTING SYSTEM - A tool for monitoring the use of devices in an interconnected network. Desired network information, such as the use of browsers on the networked devices, the use of other applications hosted on the networked devices, and the speed and volume of data traffic to and within the network, may be collected by one or more network management tools operating within the network, and then provided to an outside reporting server. In response, the reporting server then organizes and reports the collected information to one or more authorized parties associated with the network. The reporting server may send the collected network information directly to the authorized parties via electronic mail, or provide access to the collected network information by posting it on a secured Web site. | 01-15-2009 |
20090019148 | Method and apparatus for internet traffic monitoring by third parties using monitoring implements - Disclosed is an internet traffic monitoring method that includes a network service provider analyzing an HTTP transaction involving an internet user client. The network service provider responds to the HTTP transaction by forwarding, to the internet user client, an interstitial web page including a monitoring implement. After forwarding the interstitial web page to the internet user client, the network service provider forwards web content, originally associated with the HTTP transaction, to the internet user client. | 01-15-2009 |
20090019149 | CONTENT DISTRIBUTION AND TRACKING - A computer-implemented method for tracking multimedia content includes generating a first feature vector of a first multimedia object, extracting a second multimedia object from a transmission of digital traffic, generating a second feature vector of the second multimedia object, and determining a similarity of the second feature vector to the first feature vector. Responsively to the similarity, the second multimedia object is identified as an instance of the first multimedia object. | 01-15-2009 |
20090019150 | TECHNIQUES FOR CHOOSING AND BROADCASTING RECEIVER BEAMFORMING VECTORS IN PEER-TO-PEER (P2P) NETWORKS - One feature provides for establishing an ad hoc peer-to-peer network over an existing channel allocation for another network. To mitigate interference between multiple peer-to-peer devices, a plurality of receiver chains in a receiver device may be configured with beamforming coefficients so as to focus reception in the direction of an intended signal from a transmitter device while minimizing reception from other directions. Similarly, the receiver device may also use a plurality of antennas and a transmitter chain to beamform in the direction of the transmitter device, thereby focusing its transmission toward the transmitter device. The receiver device may also notify nearby devices that it is employing a plurality of receive antennas. This information can be used by the nearby devices to more intelligently perform transmitter yielding. By utilizing beamforming information to make the transmitter and/or receiver yielding decision, better interference mitigation may be achieved. | 01-15-2009 |
20090019151 | METHOD FOR MEDIA DISCOVERY - A method including receiving a request for a web page; communicating with a content server by receiving content associated with the requested web page; determining whether the content includes particular content requiring plug-in support; initiating a native plug-in to handle the particular content; receiving a request for additional content from the native plug-in; retrieving the additional content for the native plug-in; monitoring the additional content to determine whether the additional content includes media content; and updating the content for the requested web page based on the monitoring. | 01-15-2009 |
20090019152 | Apparatus and Method for Real-Time Monitoring and Controlling of Networked Appliances Using an Intermediate Server - A method and an apparatus for real-time monitoring and controlling of networked appliances over both a wide-area network (WAN) and a local-area network (LAN) using a Device State and Location Server (DSLS) as an intermediate server are disclosed. The DSLS is configured to either receive beacons from networked appliances periodically or poll networked appliances to update current activity status of each networked appliance. A unified user interface on a commanding device is configured to monitor the current activity status of each networked appliance by simply receiving updated data from the DSLS, thereby offloading a cumbersome task of tracking all networked appliances over the WAN and the LAN on its own. A color coding scheme and different icon shapes are used for ease of monitoring of the networked appliances. An orbital user interface software further helps to visualize location and current activity status of each networked appliance. | 01-15-2009 |
20090019153 | METHODS AND SYSTEMS FOR PERFORMING A PREFETCH ABORT OPERATION - The present invention relates to systems, apparatus, and methods of determining whether to abort a prefetch operation. The method includes receiving a prefetched object downloaded from a content server, and checking the prefetched object to determine the prefetched object's size. The method further includes determining a probability of use of the prefetched object, checking a link between a server and a client to determine the link's bandwidth, and checking the link between the server and the client to determine the link's latency. In addition, the method includes, based on at least one of the size of the prefetched object, the probability of use of the prefetched object, the bandwidth of the link, and the latency of the link, determining whether to forward the prefetched object to the client. | 01-15-2009 |
20090019154 | ENABLING RENT/BUY REDIRECTION IN INVITATION TO AN ONLINE SERVICE - A system and method are directed towards enabling a user to access a client service such as a client game program that interacts with an online service such as a multiplayer game. A client probe detects execution of the client service on a first client device, and sends an instant message with address information to a second client device. A messaging service on the second client device, displays a presence of the first client and provides a selectable button to initiate the client service. If not already installed, the messaging service requests the client service from a remote online service such as a portal that may be independent from the online game service. The remote online service may provide options to freely try, rent, or buy the client service. The second client device downloads the client service and uses the address to connect to the same online multiplayer game. | 01-15-2009 |
20090024733 | Apparatus for Mediation between Measurement, Biometric, and Monitoring Devices and a Server - The present invention is a mediation apparatus between a server on a communication network and measurement, biometric, and monitoring devices, which, on their own, may or may not be capable to originate connections. Additionally, the mediation apparatus of the present invention can serve as an intermediate buffer for the data acquired from devices and as a source of control or processing data for devices. The present invention may be implemented either as a standalone device or built-in to a measurement device. Measurement devices may be of almost any type: biometric access control devices, security monitoring devices, physical access monitoring devices, various measurement devices, etc. The main function of mediation apparatus is a connection of measurement devices to the server through a communications network. In this arrangement the central server doesn't need to connect to devices directly. Instead, it periodically tries to connect to the server or constantly polls the server. | 01-22-2009 |
20090024734 | Automatically Adjusting Scheduled Inventory of Switched Fabrics - A mechanism is provided in a storage management application that automatically reconfigures agents and scheduled probes of agents in cases where the agents do not automatically reconfigure themselves to manage a newly formed fabric after fragment segmentation. The solution does not burden the storage administrator to reconfigure agents or to reconfigure regularly scheduled inventory probes through storage management applications. | 01-22-2009 |
20090024735 | METHOD AND SYSTEM OF CONTROLLING COMMUNICATIONS DELIVERY TO A USER - A method of controlling communications delivery to a user includes generating an internet protocol address space of internet protocol addresses for each of one or more communications networks operable to transmit marketing communications for delivery to the user; assigning an integrity value to an integrity rating associated with each communications network; assigning a user controllable selection to a set of receiving options associated with the communications networks; and filtering communications received from the communications networks in accordance with respective integrity values and the selection. | 01-22-2009 |
20090024736 | NETWORK PERFORMANCE ASSESSMENT APPARATUS, SYSTEMS, AND METHODS - Various embodiments of network performance assessment apparatus, systems and processes collect performance information pertaining to a current capacity utilization of a network, identify an occurrence of a capacity constraint on a portion of the network that is communicating the program to at least one presentation device, select one of a plurality of paths coupling the receiving device and the presentation device, and modify the program to a format compatible with the selected path. | 01-22-2009 |
20090024737 | WEBSITE MONITORING AND COOKIE SETTING - A method and apparatus for setting cookies on client devices | 01-22-2009 |
20090024738 | REMOTE RADIO SPECTRUM INFORMATION ACQUISITION - A scanner system provides real-time remote acquisition of a scanner's audio signals and visual display, and real-time remote control of scanner operations, including settings and functions. The scanner system may be used to gather information in a regional market by listening to geographically distant broadcasts available on radio spectrum frequencies. By synchronizing multi-spectrum monitoring, audio delivery, visual cueing, and control of spectrum reception, geographically independent persons can process scanner information as if they were physically present in the market. Thus, operators can gather information from public agencies and radio broadcasts from a remote market as if they were present in the market. The scanner audio signals may be used to produce traffic reports. | 01-22-2009 |
20090031018 | Web based fault detection architecture - A remote analysis system for equipment condition monitoring and the like, using a data acquisition device operable at the remote site of monitored equipment, a wide area network for communication of data to an analysis server, and an empirical model for analyzing operational performance based on data from the device. An information processor such as a personal computer (PC) or an embedded processor application is coupled to the data acquisition device for collecting signals indicative of the monitored machine or process. A communications network, such as a wireless or telephony network, or a wide area network application such as an intranet or the Internet, facilitates communications to an analysis server for conveying the collected signals to an application service provider (ASP) for analysis of the remotely monitored site. A communications server may also be used for facilitating communications via a number of different communications networks. A notification server is provided responsive to the analysis server for completing a notification procedure for a customer subscribing to the ASP services for remote analysis with the data acquisition device at the process-monitoring site. The customer may be notified through a variety of electronic or telephonic communication methods, including, e-mail, facsimile, telephone calls, or subscriber dial-up and the like. | 01-29-2009 |
20090031019 | Technique for Graphically Displaying Application Processing Time Distributions in Real-Time - A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times. | 01-29-2009 |
20090031020 | APPARATUS AND METHOD FOR MONITORING USE OF RESOURCES BY HEALTHCARE EMPLOYEES - A system that monitors use of resources by healthcare employees includes a plurality of resource identification devices located adjacent different resources, such as pieces of plumbing fixture, medical equipment, documents and hospital rooms. Each resource identification device emits a wireless signal containing a resource identifier. A plurality of healthcare employees carry separate data acquisition devices which receive the wireless signal when nearby a resource identification device. Upon receiving a wireless signal, the data acquisition device records the date and time of day and the resource identifier carried by the wireless signal. The information stored in each data acquisition device along with an employee identifier are employed to monitor the activity and use of resources by employees, and create reports about activity and use of the resources by the healthcare employees. | 01-29-2009 |
20090031021 | TRANSMITTING/RECEIVING METHOD OF SVC FILE AND APPARATUS THEREOF - In the conventional content, a minimum access unit of the random access information is one frame unit. In the case of SVC video content, one frame consists of a plurality of scalable layers. The SVC data can be used for each salable layer only when the data is accessible for each scalable layer. The present invention provides a method and apparatus for transmitting and receiving an SVC file for each scalable layer wherein the SVC file can be accessed for each scalable layer by allowing metadata to contain a layer descriptor in a network abstraction layer unit (NALU) or in a byte unit. | 01-29-2009 |
20090031022 | Multi-Hierarchy Latency Measurement in Data Centers - A method for monitoring performance of a data center that includes: (a) a performance monitor analyzing packets that flow between a client and a web or application server; (b) assigning packets to contexts where a context is a request-reply entity; (c) determining one or more of application, network, and back-end latency measures wherein: (i) the application latency measure is a time it takes for an application to respond to a request, (ii) the network latency measure is a time that it takes for packets to go through a network between the client and the web or application server, and (iii) the back-end latency is a time required for a back-end system to execute a request and respond to the application server. | 01-29-2009 |
20090031023 | Digital File Path Tracker (DFPT) Technology for Tracking Comsumption of Digital Content - Digital File Path Tracker (DF′PT) technology for tracking consumption of digital content for business information purposes, digital content distribution purposes, online multiplayer gaming environments, and the like. Tracking consumption of digital content is achieved by provisioning digital files with a so-called DF′PT for including consumption information regarding their Server consumption, and providing a DFTP mechanism for iteratively updating DFPTs. | 01-29-2009 |
20090031024 | Method and System for Monitoring Server Events in a Node Configuration by Using Direct Communication Between Servers - In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur. | 01-29-2009 |
20090031025 | Load optimization - Methods, computer code, and means are described that can control load in a network. In some applications, the monetary cost of operating the network can be reduced. Utilization of links in the network can be monitored. A degree of suboptimality with respect to some criteria can be assessed. In some instances, the criteria could be based at least partly one or more monetary billing structures of some subset of two or more links. A subset of the forwarding decisions of one or more forwarding nodes in the network can be adjusted automatically, based at least partly on the assessing. The adjustment can attempt to reduce the degree of suboptimality. | 01-29-2009 |
20090037569 | SYSTEM AND METHOD FOR PROVIDING A DISTRIBUTED WORKFLOW THROUGH A PLURALITY OF HANDHELD DEVICES - A system which provides workflow management includes a central server which is configured to communicate with two or more handheld computing devices to effect a delivery of specific work tasks to users of the respective handheld devices. By maintaining an interface with the handheld devices it is possible to coordinate and control performance of specific tasks within the workflow environment. A related method is also described. | 02-05-2009 |
20090037570 | Method and Apparatus for Resource Assignment in a Sensor Network - Resources are assigned in a network of sensor nodes by a first sensor node of the network detecting an event and collecting data samples for the event, exchanging messages with other sensor nodes of the network that detect the event to form a community of sensor nodes. Based on information exchanged, the total data samples collected for the event is calculated and the community sends a help message to other sensor nodes. The other sensor nodes are assigned to cover the event if the potential marginal gain if they were to cover the event exceeds a threshold. The potential marginal gain comprises the expected change in a utility function that is dependent upon the total data samples collected for the event by the community. The utility function is a concave function of the total data samples and may be dependent upon an importance level of the event. | 02-05-2009 |
20090037571 | Dynamic Agent Formation For Efficient Data Provisioning - Methods and apparatus, including computer program products, are provided for monitoring one or more computers in a distributed computing system. In one aspect, there is provided a computer-implemented method. The method may include determining, at a node, a first quantity of first agents reporting to the node and limiting the quantity of first agents to not exceed a predetermined threshold. The first agents configured to directly report to the node a first information corresponding to systems being monitored by the first agents. A second quantity of second agents may also be determined. The second agents report to the node through the first agents. The second agents report a second information corresponding to systems being monitored by the second agents. The first agents may be notified to report to the node the first information corresponding to systems being monitored by the first agents. The second agents may be notified to report to at least one of the first agents the second information corresponding to systems being monitored by the second agents. Related apparatus, systems, methods, and articles are also described. | 02-05-2009 |
20090037572 | Adaptation Of Clusters To Virtualization Technologies - Methods and apparatus, including computer program products, are provided for adapting processing in a distributed computing system based on automatically detected changes caused by virtualization. In one aspect, the computer-implemented method includes detecting whether one or more changes occur at a cluster of a distributed computing system. The one or more changes may be caused by a virtualization system. Moreover, the one or more changes may correspond to at least one of a quantity of processors at the cluster, a quantity of memory at the cluster, a quantity of bandwidth among nodes of the cluster, and a storage speed. The cluster may be adapted based on the detected changes. Related apparatus, systems, methods, and articles are also described. | 02-05-2009 |
20090037573 | SYSTEM AND METHOD OF HEALTH MONITORING AND FAULT MONITORING IN A NETWORK SYSTEM - A method of monitoring a network is disclosed and includes receiving an enrollment message at a heartbeat manager from a heartbeat agent associated with a first application stored at a first network entity. The method also includes automatically associating a heartbeat interval with the first application based at least partially on the enrollment message. In another embodiment, a system of monitoring a network is disclosed and includes a network entity having processing logic and memory accessible to the processing logic. The memory stores an application including a heartbeat agent portion having instructions executable by the processing logic to enroll with a heartbeat management server communicating with the network entity and including a heartbeat monitor including instructions to subscribe to notifications indicating an operational status of an application residing at a second network entity. | 02-05-2009 |
20090037574 | Autonomous Handling Management System, Autonomous Handling Management Method, and Program - An autonomous handling management system performing autonomously system handling management based on handling management policies. Determination means ( | 02-05-2009 |
20090037575 | RESEARCH DATA GATHERING WITH A PORTABLE MONITOR AND A STATIONARY DEVICE - Methods of gathering data concerning a location of an audience member proximate to a content presentation are provided. A stationary device is proximate to the content presentation. A portable monitor is carried by or with the person of an audience member. Location data is obtained by communicating data from the portable monitor to the stationary device, or from the stationary device to the portable monitor, or by comparing data gathered by both the stationary device and the portable monitor. | 02-05-2009 |
20090037576 | DATA ANALYZING SYSTEM AND DATA ANALYZING METHOD - A data analyzing system includes an input-output device, a plurality of local analyzing devices, a center analyzing device and a connecting device which connects between the input-output device, the local analyzing devices, and the center analyzing device. The connecting device may receive and execute a forwarding setting command from the input-output device to select and set one or more devices, to which the command from the input-output device should be forwarded, from the local analyzing devices and the center analyzing device and forward a command different from the forwarding setting command transmitted from the input-output device to the devices, in which forwarding is set, and forward data or command transmitted from the local analyzing devices and the center analyzing device, in accordance with destinations described in the data or the command. | 02-05-2009 |
20090037577 | DATA LISTENERS FOR TYPE DEPENDENCY PROCESSING - A method and apparatus for data listeners for type dependency processing. An embodiment of a method for dependency processing of computer files includes receiving a data stream input at a scanner component, where the data stream input represents program elements of one or more computer files. A data stream of type definitions and type usages is generated, and the data type definitions and data type usages are provided as an input to a listening component. The listening component performs a listening function of filtering the type definition and type usage data, aggregating the type usage data, or echoing the data stream output, and an output is generated from the listening component. | 02-05-2009 |
20090037578 | DATA PROCESSING APPARATUS AND NETWORK SYSTEM THAT OUTPUTS QUALITY OF SERVICE INFORMATION TO A USER - In each of the information processing apparatuses connected to each other via a network, there is arranged a quality of service (QOS) table to which functions and performance thereof are registered. When an information processing apparatus is additionally linked with the network, a QOS table thereof is automatically registered to a local directory of the network such that an agent converts the contents of the QOS table into service information to be supplied via a user interface to the user. Thanks to the operation, information of functions and performance of each information processing apparatus connected to the network is converted into service information for the user. Consequently, the user can much more directly receive necessary services. | 02-05-2009 |
20090037579 | Page Grouping For Site Traffic Analysis Reports - Website administrators can specify page groups and/or single pages as checkpoint nodes for site analysis reporting purposes, and can configure the system of the invention to provide information as to a particular visitation path through the checkpoints. Any group of pages can be designed as a single checkpoint node for website traffic analysis and reporting purposes. Page groups can be used in place of or in addition to individual web pages in any context where site traffic analysis is being presented or performed. | 02-05-2009 |
20090037580 | Method to Identify Transactions and Manage the Capacity to Support the Transaction - A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage. | 02-05-2009 |
20090037581 | REMOTE COMMUNICATION SYSTEM AND METHOD IMPLEMENTING A SESSION SERVER AND ONE OR MORE OBJECT SERVERS - A remote communication system and method are disclosed. An environment is identified defining a plurality of parameters communicated between a first and a second computer as part of a remote session (i.e., the first computer remotely controlling the second computer via the remote session), with each parameter defining an action associated with the remote session. A first application, via a unidirectional communication with the environment, modifies at least one parameter associated with the environment (e.g., modifying keyboard scan codes, cursor position, mouse position, clipboard data, screen resolution, or channel administration), wherein the modified parameter is extracted by an interceptor associated with the second computer and, the interceptor, based on a look-up, executes a pre-defined action affecting the remote session, wherein the pre-defined action being different than the modified parameter's associated action. | 02-05-2009 |
20090043880 | CREDIT DEPLETION NOTIFICATION FOR TRANSMITTING FRAMES BETWEEN A PORT PAIR - Provided are a method, system, and article of manufacture for credit depletion notification for transmitting frames between a port pair. Credits indicate a number of outstanding frames a first device may transmit to a second device. The credits are decremented in response to transmitting a frame to the second device. The credits are incremented in response to receiving a ready code from the second device indicating that the second device processed the transmitted frame. A determination is made as to whether additional credits are needed for communicating frames from the first device to the second device. A credit depletion notification is sent to the second device in response to determining that the additional credits are needed for communication with the second device. | 02-12-2009 |
20090043881 | CACHE EXPIRY IN MULTIPLE-SERVER ENVIRONMENT - In a multiple-server or multiple-process environment where each server has a local cache, data in one cache may become obsolete because of changes to a data store performed by another server or entity. The present invention provides techniques for efficiently notifying servers as to cache expiry indications that indicate that their local cache data is out of date and should not be used. A cache expiry manager receives cache expiry indications from servers, and sends cache expiry indications to servers in conjunction with client requests or in response to certain trigger events. The need for broadcasting cache expiry notifications to all servers is eliminated, as servers can be informed of cache expiry indications the next time a server is being given a client request that relates to the cache in question. Extraneous and duplicative cache expiry notifications are reduced or eliminated. | 02-12-2009 |
20090043882 | Systems and methods for consolidated service level agreements - An embodiment relates providing collaborative support for a service portal. The method includes providing a plurality of products on the service portal, where each product is associated with a respective vendor. The method also includes receiving a set of selection of products based on the plurality of products and determining a set of support resources for the set of selection of products. The method further includes applying a single service level agreement to the set of selection of products, where a first product is associated with a first vendor and a second product is associated with a second vendor. | 02-12-2009 |
20090043883 | Method for Monitoring a Technical Appliance - There is described a method and a device which is suitable for carrying out said method. Said method monitors a technical device, wherein a communication connection is established or can be established between the technical device and a device for supporting the monitoring. Data communication with the device for supporting monitoring is carried out by means of the communication connection. The technical device is monitored in a flexible manner possible. The monitoring of the technical device can be configured in such a way that modifications of a monitoring configuration can be transmitted from the device to the monitoring support on the technical device. The internet is used, in particular, for transmission, and the device for supporting monitoring is a webserver. | 02-12-2009 |
20090043884 | Recording Method and Recording System of Log - The present invention provides a recording method and recording system of log, the method comprising the steps of: generating an IP log, the content recorded by the IP log comprising at least an IP address and the operation being performed; finding the IP address in the IP log; replacing the found IP address with a user's information to obtain the ID log. With the present invention, the IP log is converted into ID log, in this way, the true user of the computer may be directly obtained through the ID log, the log information may provide the administrator of the system with very useful information on what is hazardous to the safety, which is significantly advantageous to the secret and security of the network of a company or an enterprise. | 02-12-2009 |
20090043885 | System and Method for Maintenance Support - System and method for maintenance support for electronically actuated and/or monitored appliances implemented within an electronically networked automation system, having a central monitoring unit processing present operating parameters for appliances for establishing the servicing state of the appliances using comparison operating parameters, where an external SSIS server logically combines the servicing request established by the monitoring unit with appliance-specific servicing performance information stored in a database and forwards these data to electronic mobile terminals of the servicing personnel in order to perform the servicing. | 02-12-2009 |
20090043886 | OPTIMIZING VIRTUAL INTERFACE ARCHITECTURE (VIA) ON MULTIPROCESSOR SERVERS AND PHYSICALLY INDEPENDENT CONSOLIDATED VICs - Optimization of the Virtual Interface Architecture (VIA) on Multiprocessor Servers using Physically Independent Consolidated NICs (Network Interface Cards) allows for improved throughput, increased resiliency and transparent fail-over; and also by hiding the actual NICs involved in particular data transactions, enables operations with substantially unmodified applications software. | 02-12-2009 |
20090043887 | Heartbeat mechanism for cluster systems - A heartbeat system and method is provided for a cluster system. In one embodiment, a heartbeat mechanism includes a quorum file for receiving heartbeat messages from the plurality of nodes. A network controller connects the quorum file to the plurality of nodes with a serial bus that establishes peer-to-peer and point-to-point device communication. A node map maintained by the network controller identifies active nodes based on signals from the serial bus. A status logic for determining a status of a node from the plurality of nodes by comparing heartbeat messages in the quorum file written by the node and the node map. | 02-12-2009 |
20090049167 | PORT MONITORING - The invention is directed to the transparent allocation of a unique per user /tmp file system. A method for monitoring a port in accordance with an embodiment of the present invention includes: obtaining a current uptime of a network switch; obtaining a status of a port of the network switch; in the case that the port of the network switch is idle: comparing the uptime of the network switch to a last used time of the port; and determining that the network switch has been rebooted since the port was last used, in the case that the uptime of the network switch is less than the last used time of the port. | 02-19-2009 |
20090049168 | Managing a Communication Availability Status - In response to a first user becoming active on a communication device, a first availability status can be automatically established as a current availability of the first user. A first time period can be automatically identified. During the first time period, the first availability status can be maintained as the current availability of the first user to at least a second user. In response to the first time period elapsing, a second availability status can be automatically established as the current availability of the first user to the second user. | 02-19-2009 |
20090049169 | Adaptively Processing Client Requests to a Network Server - In a computer network environment, a server protocol is provided to process read requests from clients. Rather than all read requests being processed synchronously or all read requests being processed asynchronously, an attempt is first made to perform a synchronous read. If the synchronous read is unsuccessful, the connection through which the request was received by the server is registered with a monitoring service. When the data is ready to be read, an appropriate callback is called and the data transmitted. An optional delay may be imposed before the synchronous read is attempted to increase the likelihood that the attempt will be successful. A series of delays/read attempts may also be employed in order to increase the likelihood still further that an attempt will be successful. | 02-19-2009 |
20090049170 | Connectivity Service-Level Guarantee Monitoring and Claim Validation Systems and Methods - A system monitors performance in a network that includes several network resources. The system obtains a list of targets in the network. The targets include selected ones of the resources. The system sends a request to the targets, receives responses from the targets, and determines a status of the targets based on the received responses or a lack of responses from the targets. The system then analyzes the status of the targets to determine compliance with the service-level guarantee. | 02-19-2009 |
20090049171 | SYSTEM AND COMPUTER-READABLE MEDIUM FOR CONTROLLING ACCESS IN A DISTRIBUTED DATA PROCESSING SYSTEM - Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent. | 02-19-2009 |
20090055522 | WEBSITE LOAD TESTING USING A PLURALITY OF REMOTELY OPERATING AGENTS DISTRIBUTED OVER A WIDE AREA - Website load testing using agents is disclosed. An address of a website and a window of time in which to perform a load test are received. The address and the window of time are distributed to a plurality of remotely operating agents, distributed over a wide area. Each agent in the plurality is to access the website at the received address during the window of time to load test the website. Data from the plurality of agents is received upon passage of the window of time, describing a load placed upon the website by the plurality of agents. The received data describing the load placed upon the website is presented. Alternatively, a script may be used to load test a website, the script a series of commands to be executed across the website as a simulation of a transaction, the script to be executed in the window of time. | 02-26-2009 |
20090055523 | IDENTIFYING AND RECOMMENDING POTENTIAL COMMUNICATION STATES BASED ON PATTERNS OF USE - Techniques for identifying potential communication uses of various systems are disclosed. Identifying potential communication uses of a computing system can improve the manner in which the computing system is used by allowing more intelligent decisions and better choices to be made regarding its communication use. By way of example, communication applications (or tasks or services) that are likely (or more likely) to be used by a person in a particular situation can be identified as potential communication use of a particular device. Such potential uses can, for example, be made more assessable (or more readily available) and/or effectively recommended (or automatically initiated), thereby allowing a person to more conveniently use the device. By way of example, identifying communication applications or tasks that are likely to be used by a person in a particular situation for various reasons (e.g., preferences and/or habits of a person in a particular situation) as potential communication use of a system (e.g., computing and/or communication device) allows making the communications applications, tasks, or services more assessable and/or effectively recommending them for use in a particular situation. | 02-26-2009 |
20090055524 | NETWORK SYSTEM - A network system suitable for remote monitoring or remote control of equipments is provided. When an execution of a server-side object is requested from a client terminal device to a server, the server requests an execution of an equipment-side object to the equipment(s). The execution request of the server-side object from the client terminal device is performed by use of a first identifier assigned to the server-side object, and the execution request of the equipment-side object is performed by use of a second identifier assigned to the equipment-side object. Since the server has an identifier setting function of setting a correspondence relation between the first identifier and the second identifier, it is possible to reduce burden on the client terminal device, and flexibly cope with cases of exchanging and increasing the equipment(s) in the network system without considering specific identification information of the equipments such as IP address. | 02-26-2009 |
20090055525 | System for Remote Configuration, Control, and Monitoring of Devices Over Computer Network Using Central Server - Devices, systems and methods are disclosed that relate to the control of devices over a network from a central controller. A computer server can control, monitor and affect devices which include a controller and a network interface for communicating information between the device and the server. The device and central controller communicate using a predefined communications protocol for either remote configuration, control, or monitoring of the device and the protocol allows the central server to recognize the device as a hierarchical tree of contexts including data elements and metadata describing each said data element. | 02-26-2009 |
20090055526 | Information terminal, server apparatus, and information processing method - An information terminal that reduces the effort of presence input is provided. The information terminal is connected via a network to a server for disclosing a presence that is a present state of each user or each object, and includes: a display unit for displaying a presence input screen that is a screen for inputting the presence; a storage unit storing a terminal identifier that differs from one user terminal to another and information on the presence input screen; and a control unit that causes the presence input screen to be displayed on the display unit upon receiving a presence input request signal that is a signal for requesting input of the presence from another information terminal via the network, and when the presence is inputted via an operating unit, transmits the terminal identifier together with the presence to the server. | 02-26-2009 |
20090055527 | SECTION IDENTIFICATION AND DISTRIBUTION SYSTEM MONITORING SYSTEM, METHOD AND PROGRAM PRODUCT - A system is provided for specifying arbitrary nodes and identifying a section between them on a system diagram of a distribution system. It comprises a system diagram information management portion for managing information on each of nodes and spans constituting the system diagram and ID information given to each of the nodes, an input portion for receiving an input specifying the nodes, a search portion for creating a search condition using the ID information based on the node specification and searching the span between the specified nodes so as to identify the section constituted by the searched span, and an output portion for display-outputting the system diagram visually indicating the section identified by the search portion. | 02-26-2009 |
20090055528 | Method for Providing Status Information to a Device Attached to an Information Infrastructure - A method for providing status information to a device on a computer network is disclosed. Data initiated by a communication initiation device within a computer network are monitored by a device. A determination is made by a device monitoring application within the device whether or not the data includes a message signature. In response to the data includes a message signature, a status message is generated and sent to a system administrator for the computer network. | 02-26-2009 |
20090055529 | METHOD OF COLLECTING DESCRIPTIONS OF STREAMS PERTAINING TO STREAMS RELATING TO AT LEAST ONE CLIENT NETWORK ATTACHED TO AN INTERCONNECTION NETWORK - A method for collection of flow descriptions for flows relating to at least one client network, the client network being attached to an interconnection network. The method receives flow descriptions for flows coming from the client network, aggregates the flow descriptions for the flows coming from the client network as a function of an aggregation criterion, transmits the aggregated flow descriptions to a collection device, analyzes the flow descriptions for the flows coming from the client network to determine at least one flow characteristic specific to the client network, receives flow descriptions for flows coming from the interconnection network, filters the flow descriptions for the flows coming from the interconnection network, in which the flow descriptions for flows lacking the at least one determined flow characteristic specific to the client network are eliminated, and transmits the filtered flow descriptions to the collection equipment. | 02-26-2009 |
20090055530 | Re-Direction of Streaming Multimedia in Wireless Communication Devices - A wireless communication device ( | 02-26-2009 |
20090063671 | METHOD, DEVICE, SOFTWARE FOR DETERMINING A NEED - The present invention relates to a method, a client device (CL) and a computer program product for determining the need for requesting network configuration information from a network. The client device includes memories (M | 03-05-2009 |
20090063672 | MONITORING OF COMPUTER NETWORK RESOURCES HAVING SERVICE LEVEL OBJECTIVES - In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described. | 03-05-2009 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090063674 | METHOD AND SYSTEM FOR MONITORING AND INSTANTLY IDENTIFYING FAULTS IN DATA COMMUNICATION CABLES - A method and an associated system for monitoring and instantly identifying faults in a data communication cable are disclosed. A fault monitoring program learns a reference data traffic pattern communicated through the data communication cable by reading inputs from a sensor. The reference data traffic pattern is stored and is used for determining normalcy of data traffic through the data communication cable. The fault monitoring program monitors for a fault in a data traffic, and, if a fault is detected, activates a fault indicator sending out fault signals to notify users of the fault. If the fault is not recovered within a predefined recovery period, the fault monitoring program deactivates the fault indicator and shuts down a power source for later use of the data communication cable. | 03-05-2009 |
20090063675 | Internet-based method of and system for monitoring space-time coordinate information - An Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object moving along a course through the space-time continuum. The Internet-based system comprise a wireless GSU-enabled client network device affixed to the body of an animate object. The wireless device includes a global synchronization unit (GSU) for automatically generating time and space (TS) coordinate information corresponding to the time and space coordinate of the animate object with respect to a globally referenced coordinate system, as the animate object moves along a course through the space time continuum. The device also includes biophysiological state sensor affixed to the body of the animate object, for automatically sensing the biophysiological state of the animate object and generating biophysiological state information indicative of the sensed biophysiological state of the animate object along its course. The wireless device also includes a wireless date transmitter for transmitting the TS coordinate information and the biophysiological state information through free-space. A TS-stamping based tracking server receives the TS coordinate information and the biophysiological state information through in a wireless manner, and stores the same as the animate object moves along its course. An Internet information server serves Internet-based documents containing the collected TS coordinate and biophysiological state information. An Internet-enabled client system enables authorized persons to view the served Internet-based documents and monitor the collected TS coordinate and biophysiological state information, for various purposes. | 03-05-2009 |
20090063676 | METHOD AND APPARATUS FOR PROVIDING STATUS INFORMATION BY UTILIZING PRESENCE SERVICE AND METHOD AND APPARATUS FOR GENERATING CONTENT STATUS INFORMATION BY UTILIZING PRESENCE SERVICE - A method of and apparatus for providing status information by using presence information data, and a method of and apparatus for generating content status information are provided. The method of providing status information on a second user to a first user terminal which is used by a first user includes: inserting additional data into the status information on the second user requested by the first user terminal; and transmitting the status information on the second user into which the additional data is inserted to the first user terminal. | 03-05-2009 |
20090063677 | Systems and Media For Updating An Instant Messaging System - Systems and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based oh receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments, include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc. | 03-05-2009 |
20090063678 | EQUIPMENT SET GENERATION SUPPORT APPARATUS AND METHOD - An equipment set generation support apparatus (a) acquires, from a plurality of equipments connected to a network, state change event information notifying a state change of each equipment and an occurrence time and date of the state change, (b) sets a detection condition including a start time and an end time of a detection period, (c) selects state change event information whose occurrence time and date of the state change falling within the detection period from the state change event information acquired, and (d) detects, from the plurality of equipments, a set of equipments whose states change in the detection period and a set of state values after the state change of each equipment based on the state change event information selected. | 03-05-2009 |
20090063679 | NETWORK RELAY APPARATUS - A network relay apparatus which conducts data transfer by using a plurality of network LSIS includes a transfer engine unit having at least two network LSIs and a central control unit which controls the operation state of the network relay apparatus. The transfer engine unit includes the network LSIs capable of changing over at least one of a clock and an operation which differ every function block, a load judgment unit for judging a load laid upon each of function blocks in the network LSI, and a frequency voltage control unit for individually changing over at least one of the clock and operation voltage supplied to each function block on the basis of the load judged by the load judgment unit. | 03-05-2009 |
20090063680 | Connection Locator in a Power Aggregation System for Distributed Electric Resources - Systems and methods are described for a power aggregation system. In one implementation, a method includes charging an electric resource over a power connection to an electric network, obtaining a unique identifier of a device over the power connection, and determining an electric network location of the electric resource from the unique identifier. | 03-05-2009 |
20090070454 | Allocating access across shared communication medium - A method of providing network access across a shared communications medium between competing users ( | 03-12-2009 |
20090070455 | APPARATUS, SYSTEM, AND METHOD FOR VISUAL LOG ANALYSIS - An apparatus, system, and method are disclosed for visual log analysis. The apparatus for visual log analysis is provided with a plurality of modules configured to functionally execute the necessary steps of retrieving log entries from a plurality of devices on a network, parsing the log entries to determine an execution flow of commands executed of the network, and displaying a graphical representation of such execution on the network. These modules in the described embodiments include a log consolidation module, a parsing module, and a display module. | 03-12-2009 |
20090070456 | PROTOCOL FOR ENABLING DYNAMIC AND SCALABLE FEDERATION OF ENTERPRISE SERVICE BUSES - In a method and system for creating a federation of a plurality of enterprise service buses (ESBs), a plurality of ESB nodes provide connectivity to one or more services. According to a protocol, at least a portion of the ESB nodes transmit policy-based service advertisement messages to other ESB nodes, wherein the policy-based service advertisement messages include service state information. In response to receiving the policy-based service advertisement messages, each of the ESB nodes stores the service state information received from other ESB nodes in respective distributed registries to create a local view of routable service endpoints in the federation. Each of the ESB nodes then uses its respective distributed registry to make routing decisions when routing service requests. | 03-12-2009 |
20090070457 | Intelligent Performance Monitoring of a Clustered Environment - A method, system and computer-usable medium for selectively monitoring transactions in a cluster computing environment are disclosed. A transaction is received by a load balancer. A transaction monitoring manager determines if the received transaction is a candidate for monitoring. If it is, then the resource thresholds defined in the transaction's corresponding TMP are determined. The load balancer is then interrogated to determine which application server instance is assigned to process the transaction. Once determined, resource usage information is collected from the target application server instance and provided to the transaction monitoring manager. The collected resource information is compared to the transaction's corresponding TMP. If resource usage exceeds resource threshold values contained in the TPM, then the transaction is monitored. Otherwise it is not. | 03-12-2009 |
20090070458 | SERVER DEVICE, INFORMATION REPORT METHOD, AND INFORMATION REPORT SYSTEM - A server device including a management unit for receiving and managing a status of equipment or a user operating the equipment as status information and detecting a load status of the server device from receiving situation of the status information, a notification request receiving unit for receiving a notification request message that requests notification of the status information from a reference person terminal; a notification response transmitting unit for transmitting a notification respond message that responds to the received notification request message; and a status notification transmitting unit for transmitting an information notification message including the status information received by the management unit to the reference person terminal according to the load status. The server device can precisely transmit information from a user device, and the like, to the reference person terminal when the server device is in an overload state. | 03-12-2009 |
20090070459 | High-Performance Context-Free Parser for Polymorphic Malware Detection - The invention provides a method and apparatus for advanced network intrusion detection. The system uses deep packet inspection that can recognize languages described by context-free grammars. The system combines deep packet inspection with one or more grammar parsers ( | 03-12-2009 |
20090070460 | METHOD AND SYSTEM FOR SOCIAL NETWORK ANALYSIS - Methods and system for social network analysis are described. In one embodiment, a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed. A social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. The social strength of the social network for the time period may be utilized for analysis of the social network. The strongly connected component value may have a greatest weight and the disconnected component value may have the lowest weight in the combining. | 03-12-2009 |
20090070461 | DISTRIBUTED FILE SYSTEM AND METHOD OF REPLACING CACHE DATA IN THE DISTRIBUTED FILE SYSTEM - Provided are a distributed file system and a method of replacing cache data in a distributed file system capable of replacing cache data based on the degree of network instability between a server and a client. The method includes monitoring network instability between the first apparatus and the second apparatus, determining whether an empty space exists in a storage space of the second apparatus if the second apparatus needs data of the first apparatus, if an empty space does not exist in the storage space, deleting at least one cache data item already stored in the second apparatus according to the monitored network instability, and storing data obtained from the first apparatus in the empty space generated by deleting the cache data. | 03-12-2009 |
20090070462 | SYSTEM AND COMPUTER PROGRAM FOR MONITORING PERFORMANCE OF APPLICATIONS IN A DISTRIBUTED ENVIRONMENT - A system and computer program for monitoring the performance of applications running on a server in a distributed computing environment includes prompting the user to select information for monitoring, monitoring application performance in accordance with the selected information, and making the monitored performance information available to the user. | 03-12-2009 |
20090070463 | Preliminary Classification of Events to Facilitate Cause-Based Analysis - The present invention provides methods and systems for performing preliminary cause-based classification of events in a computer or networked computer system. Methods are provided in which, based on an event message, cause-based preliminary classification of an associated event is performed. The result of the preliminary classification is used to facilitate subsequent cause-based analysis, such as root cause analysis, relating to the event. Methods are provided in which preliminary classification is performed using a database including a catalog associating event messages with appropriate preliminary classifications of events associated with the event messages. | 03-12-2009 |
20090070464 | Autonomic Content Load Balancing - Techniques are disclosed for providing autonomic content load balancing. A programmatic selection is made from among alternative content versions based upon current conditions. Preferably, the alternative selectable versions specify content to be used in a Web page, and a version is selected responsive to receiving a request for the Web page. The selectable version may comprise the Web page, or a component of a Web page may have selectable versions. Optionally, the Web page may include more than one component with dynamically-selectable content. In this case, the versions may be selectable independently of one another. | 03-12-2009 |
20090070465 | Method and Device for Making Clients Rapidly Access to the Peer-to-Peer Network - A method and device for making clients rapidly access to the peer-to-peer network comprise that the accessed clients, which are separated into one or more normal state groups; the clients that intend to log in are separated into one or more login groups; and the required contents, the variant of the contents or the content-related information are selectively transmitted to the members of the login groups immediately. After a certain login group becomes stable, the normal state groups which the login groups intend to be added into are selected and each member of the login groups is added into the selected normal state groups. In this invention, there is no need to frequently send notification individually when each client loges in, rather than send group notification, thus it can reduce network dithering, at the same time the user can receive the content or the related variant of the content immediately and watch the playing of the content without any wait when accessing to the network. | 03-12-2009 |
20090077220 | SYSTEM AND METHOD FOR IDENTIFYING MUSIC CONTENT IN A P2P REAL TIME RECOMMENDATION NETWORK - A peer-to-peer (P2P) network for providing real time media recommendations is provided. The media recommendations may be song recommendations or video recommendations. Each time a media presentation is played by a peer device, the peer device provides a recommendation identifying the media presentation to other peer devices in the P2P network. A peer device having received recommendations from the other peer devices in the P2P network then programmatically, or automatically, selects a next media presentation to play from the media presentations recently played by the other peer devices and one or more locally stored media presentations. If the selected media presentation is not stored locally by the peer device, the peer device may obtain the selected media presentation from a subscription based service enabling streaming or download of the selected media presentation, an e-commerce service enabling purchase and download of the selected media presentation, or another peer device. | 03-19-2009 |
20090077221 | SYSTEM FOR ANALYZING AND VISUALIZING ACCESS STATISTICS FOR A WEB SITE - A method for monitoring and visualizing user access made to a web site is disclosed. The method comprises: embedding in a web page to be monitored code to request a thumbnail image from a site when the page is loaded into a browser. The embedded code also includes a user-activateable link to a page within the system server. At the system server, the requested thumbnail image is returned to the web browser, and the IP address from which the thumbnail was requested is recorded. For each recorded IP address, the server determines a corresponding geographical location. The server creates and stores an image that is a geographical representation of the geographical distribution of the recorded IP addresses, and a thumbnail representation of that image. Upon activation of the user-activateable link, the linked page within the system server that includes the image previously created is retrieved by the browser. The thumbnail image requested by the embedded code is the thumbnail image created in this step. A number of threshold, updating, clustering, storage and archiving routines are deployed to ensure large scalability. | 03-19-2009 |
20090077222 | KVM SWITCH AND MULTI-COMPUTER SYSTEM INCORPORATING THE SAME - The invention discloses KVM switches comprising a body, a data transceiver, a micro control unit, and a display disposed on the body. The data transceiver receives data from a plurality of computers. The micro control unit analyzes and operates the received data to generate an image. The image may show data from all computers in chorus. The display displays the image. The data provided by the computers are generated by application programs of the computers. The application program may retrieve system information of the corresponding computer as the data, retrieve discs of the corresponding computer to get the data, or download information from the internet as the data. | 03-19-2009 |
20090077223 | METHODS AND SYSTEMS INVOLVING MONITORING WEBSITE CONTENT - An exemplary embodiment of a system for monitoring website content, including, a browser client operative to send a first request for content to a first website server, the content stored on a second website server, an intermediate server, operative to receive a URL associated with the content, from the first website sever, the URL comprising an address of the intermediate server, an address of the content, and an address for threshold data stored on the intermediate server associated with the content, the threshold data including a plurality of thresholds, the intermediate server further configured to send a second request for the content to the second website server, receive the content, determine whether the content exceeds the plurality of thresholds associated with the content, deny the first request for content, responsive to determining that the content exceeds one of the plurality thresholds associated with the content. | 03-19-2009 |
20090077224 | METHOD AND APPARATUS FOR PROPAGATING ACCELERATED EVENTS IN A NETWORK MANAGEMENT SYSTEM - This invention relates to a method, system and computer program product for a network management system comprising: | 03-19-2009 |
20090077225 | METHOD AND APPARATUS FOR DISTRIBUTING AND ACTIVATING SECURITY PARAMETERS - An apparatus and method for distributing and activating a new security parameter in a computer network in a non-disruptive manner includes transmitting a new security parameter to the an element in the network, instructing the element to place the new security element in a pending database of the element and activating the new security parameter. The present invention also determines possible conflicts in the computer network. | 03-19-2009 |
20090077226 | METHOD AND SYSTEM OF AUTO-MONITORING NETWORK PORTS - A method of auto-monitoring network ports includes the steps of: receiving at least one path of an application program; detecting whether or not the application program represented by the received path needs at least one network port; notifying a router to open the relative network port required by the application program if the detecting result indicates that the application program needs the network port; and notifying the router to close the relative network port required by the application program if the detecting result indicates that the application program no longer needs the network port. Hence, the present invention can achieve the purpose of exempting users from a mandatory setup of network ports for the router according to different application programs. | 03-19-2009 |
20090077227 | System and method for monitoring network communications originating in monitored jurisdictions - A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer network based on predetermined criteria. The computer network includes at least one monitored jurisdiction and at least one unmonitored jurisdiction. A database is queried to identify at least one communication identifier associated with the monitored jurisdiction. The method also includes a step of storing a list including the at least one communication identifier. Only network communication having communication identifiers included in the list are monitored. | 03-19-2009 |
20090077228 | Behavioral classification of communication sessions using active session initiation - A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is identified using the behavioral characteristics, such that the sessions in the subset are suspected of using a target communication protocol. A candidate session is selected from the subset. A trial communication session is initiated with a node of the communication network, which participates in the candidate session, using the target communication protocol. Responsively to receiving a positive response from the node to initiation of the trial communication session, it is determined that one or more further sessions in the plurality are using the target communication protocol. The one or more further sessions are controlled responsively to a predetermined control criterion that is applicable to the target communication protocol. | 03-19-2009 |
20090077229 | PROCEDURES AND MODELS FOR DATA COLLECTION AND EVENT REPORTING ON REMOTE DEVICES AND THE CONFIGURATION THEREOF - Systems and methods are disclosed to monitoring a remote object with a remote client to receive a configuration file directing the remote client to capture events of interest specified by one or more rules; a wireless network to communicate events of interest captured by the remote client; and a server coupled to the remote client over the wireless network, the server receiving events of interest from the remote client and generating a report on the events of interest. | 03-19-2009 |
20090077230 | CALL PROCESSING SYSTEM AND METHOD - A call processing system ( | 03-19-2009 |
20090077231 | DEVICE INFORMATION MANAGEMENT APPARATUS, DEVICE INFORMATION MANAGEMENT METHOD, AND STORAGE MEDIUM - A device information management apparatus for processing a report from a device management client during a failure of a transaction system is disclosed. The device information management apparatus includes a reception unit configured to receive the report from the device management client; a determining unit configured to determine whether to process the report based on an importance level of the report and a load (workload) level of the device information management apparatus; a processing unit configured to process the report if the determining unit determines to process the report; and a discarding unit configured to discard the report if the determining unit determines not to process the report. | 03-19-2009 |
20090077232 | REMOTE ACTIVITY MONITORING - A computer readable medium and system for remotely monitoring activity includes generating first server heartbeat information at a first server at a local site, and storing the first server heartbeat information in a first primary site disk at the local site. The method also includes sending the first server heartbeat information from the first primary site disk, to a first secondary site disk at a remote site. The method further includes receiving information from a 10 second secondary site disk at the local site, and determining if the information received from the second secondary site disk includes updated heartbeat information. | 03-19-2009 |
20090077233 | Load Control Device and Method Thereof - The number of response-waiting requests which are already sent to a server ( | 03-19-2009 |
20090083411 | SYSTEM AND METHOD FOR REMOTE CONTROL OF MULTIPLE DEVICES - The present invention is a system and method for operating multiple devices using a new remote control method. The following new techniques are illustrated for operating multiple devices using the remote control method of the present invention comprising the steps of operating multiple devices simultaneously; and performing an operation checked on one device on multiple other devices. In addition, the system and method of the present invention has four new concepts ideas for improving operation on multiple devices transmitting to multiple devices simultaneously; detecting differences in the result screens and displaying the differences in a different color; checking on one device on multiple other devices; and automatically detecting unexpected operation results and stopping the operation. | 03-26-2009 |
20090083412 | ILLUSTRATION SUPPORTED P2P MEDIA CONTENT STREAMING - A system and method for Peer-to-Peer (P2P) media content streaming are provided. In one embodiment, prior to streaming desired original media content, a playback agent of a first peer playback device downloads illustration media content, which is a derivate light-weight version of the original media content. The playback agent then initiates streaming of the original media content from one or more other peer playback devices hosting the original media content or a segment thereof. The playback agent monitors a quality of the network connection to the other peer playback devices streaming the original media content to the playback agent. If the quality of the network connection falls below a defined threshold, the playback agent switches playback to the illustration media content. Once the quality of the network connection improves or a new connection is established, the playback agent switches playback back to the streaming original media content. | 03-26-2009 |
20090083413 | Distributed frequency data collection via DNS - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 03-26-2009 |
20090083414 | Method and System for Monitoring and Analyzing Peer-to-Peer Users' Activities over a Data Network - The present invention relates to a method and system for monitoring peer-to-peer traffic over a data network, comprising (a) file identifier unit ( | 03-26-2009 |
20090083415 | UNOBTRUSIVE METHODS AND SYSTEMS FOR COLLECTING INFORMATION TRANSMITTED OVER A NETWORK - The present invention relates generally to unobtrusive methods and systems for collecting information transmitted over a network utilizing a data collection system residing between an originator system and a responding system. In one embodiment the Originator System can be a web browser and the Responding System can be a web server. In another embodiment the Originator System can be a local computer and the Responding System can be another computer on the network. Both these and other configurations are considered to be within the domain of this invention. The Data Collection System acts in a hybrid peer-to-peer/client-server manner in responding to the Originating System as a Responding System while acting as an Originating System to the Responding System. This configuration enables real-time acquisition and storage of network traffic information in a completely unobtrusive manner without requiring any server- or client-side code. | 03-26-2009 |
20090083416 | METHODS TO VERIFY WIRELESS NODE PLACEMENT FOR RELIABLE COMMUNICATION IN WIRELESS SENSOR CONTROL NETWORKS - In one exemplary embodiment, a method of verifying placement of automation components configured for use within a building automation system is disclosed. The method includes determining a wireless communication channel for use within a building automation system, polling a plurality of automation components deployed within the building automation system, wherein each of the plurality of automation components utilizes the wireless communication channel for communication, determining communication parameters associated with each of the plurality of automation components, and adjusting the deployment of at least one of the plurality of automation components in response to the determined communication parameters. | 03-26-2009 |
20090083417 | METHOD AND APPARATUS FOR TRACING USERS OF ONLINE VIDEO WEB SITES - The method and/or apparatus monitors and records the times when a user interacts with a network video player, e.g. a web video player, while watching an online video clip. Specifically, a data collection agent (DCA) is loaded to the player or to a web page that displays the video clip. The DCA collects detailed viewing information and periodically sends this information to a central server. The viewing information is processed by the central server to generate at least one of: a viewership attention span report, a viewership demographics report, and a viewership geographic report. | 03-26-2009 |
20090083418 | METHOD AND APPARATUS FOR PROVIDING REAL FRIENDS COUNT - A method and apparatus for tracking communications in a network are disclosed. For example, the method receives a subscription from a customer for a service to track at least one variable associated with a plurality of communicants of the customer. The method identifies a plurality of members of a social network of the customer, and gathers communication data associated with the plurality of members for tracking the at least one variable. The method then displays at least one result derived from the communication data to the customer. | 03-26-2009 |
20090083419 | SYSTEM, APPARATUS AND METHOD FOR MAINTAINING PRESENCE INFORMATION OF PUBLIC GROUP MEMBERS - A system for maintaining presence information of public group members is provided, which includes a presence server and a group list management server, and further includes a presence group server, connected to the presence server and the group list management server and adapted to obtain information of the public group members from the group list management server according to a received subscription request for the presence information of the public group members, subscribe for the presence information of the public group members from the presence server, and save the presence information of the public group members. A presence group server and a method for maintaining presence information of public group members are also provided, which can reduce the stress on a resource list server and a presence server in terms of performance and resource occupation. | 03-26-2009 |
20090083420 | Method and Apparatus for Automatically Conducting Hardware Inventories of Computers in a Network - A method, apparatus, and computer instructions for conducting an inventory of a data processing system. When a basic input output system (BIOS) is launched during a boot process for the data processing system, the basic input output system creates a hardware report of the data processing system. This report is sent to a remote data processing system on the network. | 03-26-2009 |
20090083421 | Internet Website Traffic Flow Analysis - An Internet-based analysis tool follows, in real-time, the flow of traffic through a website. For every website page requested by a website visitor, the state of the visitor's browser is recorded and data relating to the path visitors take through the website is collected and studied. The state of the visitor's browser path is maintained in a traffic analysis cookie that is passed between a website file server and the visitor browser with every page requested for viewing. The cookie is maintained in a size that can be passed from server to browser and back again without negatively impacting server performance and without negatively impacting browser performance. The data in the cookie can follow the visitor browser through independent file servers, regardless of how the pages of a website might be distributed in storage. | 03-26-2009 |
20090089414 | REPORTING MULTIPLE EVENTS IN A TRAP MESSAGE - A method for reporting events relating to objects of a network element manageable by a network management device, using a network management protocol, and devices, a network, and computer-readable storage medium storing control logic, that operate in accordance with the method. Events for each object are detected, event information is generated for detected events, generated event information for multiple events is packaged into a trap message for each object type, the trap message is communicated from the network element to the network management device, and the event information from the communicated trap message is unpacked at the network management device. In this manner, network congestion and processor overload at the network management device can be reduced. | 04-02-2009 |
20090089415 | SYSTEM AND METHOD FOR KEYBOARD NAVIGATION IN A SEARCH RESULTS PAGE - The present invention is directed towards systems, methods and computer program products for providing keyboard navigation between components within a content item. The method of the present invention comprises receiving the content item from a server and receiving a signal indicating keyboard utilization by the user to determine a specific key that the user presses. A determination is made as to whether the specific key is from a monitored set of keys and if the specific key is from a monitored set of keys, performing an action associated with the specific key. | 04-02-2009 |
20090089416 | SYSTEM AND METHOD FOR NON-LETTER KEY FUNCTIONALITY IN A SEARCH CONTROL - The present invention is directed towards systems, methods and computer program products for providing keyboard navigation within a search box that a search engine presents in a content item. The method of the present invention comprises presenting a search control to a user and determining if the search control receives focus. A signal indicating keyboard utilization by the user to determine a specific key that the user presses may then be received and a determination is made as to whether the specific key is from a monitored set of keys. If the specific key is from a monitored set of keys, an action associated with the specific key is performed. | 04-02-2009 |
20090089417 | DIALOGUE ANALYZER CONFIGURED TO IDENTIFY PREDATORY BEHAVIOR - A dialogue analyzer configured to identify online communications relating to lewd, predatory, hostile, and/or otherwise inappropriate subject matter is disclosed. Identified communications include those occurring via social networks, instant messaging, online chat rooms, computer in-game chat, email and the like. The communications of a monitored computer user are scanned to identify those communications that match predetermined lexical rules. The rules comprise sets of word-concepts that may be associated based on spelling, sound, meaning, appearance or probability of appearance in a text string, etc. Various numbers and configurations of word concepts may be implemented in a rule in order to more accurately scan the online communication data for a potential match. When a match is found, a copy of the communication, along with contextual information, is presented to a parent or guardian user. This information is presented at a central website and via an email notification to the parent or guardian. Various embodiments are described. | 04-02-2009 |
20090089418 | METHOD AND SYSTEM TO DETECT A NETWORK DEFICIENCY - A system to detect a network deficiency, in one example embodiment, comprises a receiving module to receive utilization metrics of at least one network resource, wherein the utilization metrics are collected and made available at a network level, an aggregator to aggregate the utilization metrics of at least one network resource with the utilization metrics of a plurality of the network resources, a processing module to determine a level of aggregated utilization metrics of the network resources, and a detecting module to detect a precursor indicative of a network traffic deterioration based on the level of the aggregated utilization metrics. | 04-02-2009 |
20090089419 | METHOD AND SYSTEM FOR INTELLIGENT REQUEST REFUSAL IN RESPONSE TO A NETWORK DEFICIENCY DETECTION - A system for intelligent request refusal in response to a network deficiency detection, in one example embodiment, comprises an aggregator to aggregate revenue generated by a requesting entity with a revenue generated by requesting entities homogenous to the requesting entity, and a filtering module to filter a response to a service request when an aggregated revenue-to-network-resource-utilization ratio is below a second threshold unless utilization of a plurality of network resources drops below a first threshold. | 04-02-2009 |
20090089420 | Flash tracking system and method - A system, method and computer readable medium configured to track Internet users as they browse web-sites when cookies are disabled or deleted. One aspect of the present invention includes the realization that cookies are not adequate to track Internet web users as cookies are limited and size, and easily deleted by users. A web-site receives a request for content from the computing-device. After obtaining information about the computing-device, the tracking-server assesses the request for content from the computing-device. If the computing-device has an available flash plug-in, the tracking-server transmits a flash applet to the computing-device. The flash applet is configured to: determine whether a unique flash identifier has been assigned to the computing-device, generate the unique flash identifier if no unique flash identifier has already been assigned to the computing-device, transmit the unique flash identifier to a tracking server, and store the unique flash identifier in local flash storage. The process also stores a cookie at the computing-device when no flash plug-in is available. | 04-02-2009 |
20090089421 | Method and System for Visualizing Distributed Systems - Monitoring distributed systems includes receiving availability parameters for distributed systems. A distributed system corresponds to at least one distributed system group. A status of at least one distributed system is determined according to the availability parameters. Grid map image data is generated that is operable to initiate display of a grid map. The grid map includes one or more areas. An area corresponds to a distributed system group. An area includes one or more cells. A cell has a status indicator indicating the status of at least one distributed system. A cell also has a display size indicating a relative importance of at least one distributed system. The grid map image data is transmitted to a client in order to display the grid map. | 04-02-2009 |
20090089422 | Automated Media Delivery System - An automatic graphics delivery system that operates in parallel with an existing Web site infrastructure is provided. The system streamlines the post-production process by automating the production of media through content generation procedures controlled by proprietary tags placed by an author within URLs embedded within Web documents. | 04-02-2009 |
20090089423 | INFORMATION PROCESSING DEVICE, AND METHOD AND COMPUTER READABLE MEDIUM FOR THE SAME - There is provided an information processing device comprising: an image processing unit including at least one of an image reading function and a print function; a historical information acquisition unit to acquire a plurality of pieces of historical information, each of the plurality of pieces of historical information concerning execution of at least one of the image reading and print functions; a historical information transmission unit to transmit the historical information to the client device; a request reception unit to receive from the client device a request for data corresponding to a selected piece of historical information selected from the plurality of pieces of historical information through the client device, the data concerning a job executed by at least one of the image reading function and the print function; and a data obtaining unit configured to obtain the data corresponding to the request received by the request reception unit. | 04-02-2009 |
20090089424 | DYNAMICALLY UPDATING SUBCOMPONENTS IN A TIERED REMOTE MONITORING SYSTEM - Various approaches for updating system monitoring policy parameters. In one approach, updates to the monitoring policy parameters are transmitted to an event server via an event report. The event server transmits the event report to a subcomponent manager executing on the monitored system. The subcomponent manager determines to which of a plurality of monitoring subcomponents the update is to be applied. The subcomponent manager then suspends the execution thread of the monitoring subcomponents, updates monitoring policy parameters of the subcomponent with data from the event report, and thereafter resumes the execution thread of the subcomponents. The subcomponent then operates with the updated monitoring policy parameters. | 04-02-2009 |
20090094357 | ROGUE ROUTER HUNTER - A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing. | 04-09-2009 |
20090094358 | Data Bridge Maintenance Utilizing Data Traffic Log Change - Data traffic, through a data bridge that couples two entities, is monitored and logged in a data traffic log. If the size of the data traffic log does not change within a pre-determined period of time, the data bridge is automatically reset. | 04-09-2009 |
20090094359 | Local Area Network Management - There is provided a method for managing a Local Area Network (LAN) having at least one video server in signal communication with a plurality of clients. In one embodiment of the present invention, the method includes providing a lossless Transmission Control Protocol/Internet Protocol (TCP/IP) Virtual Local Area Network (VLAN) fabric within the LAN. The method further includes providing a shared file system on the at least one video server. Moreover, the method includes deterministically managing isochronous access to the shared file system on the at least one video server by the plurality of clients, over the VLAN fabric, utilizing at least one Internet Small Computer System Interface (ISCSI) block protocol, to provide lossless delivery of video applications from the at least one video server to any of the plurality of clients without invoking TCP error recovery mechanisms. | 04-09-2009 |
20090094360 | Multi-Source Broadcasting in Peer-to-Peer Network - A computer-implemented method for broadcasting over a network using peer-to-peer technology including commencing a broadcast over a peer-to-peer network, wherein a control computer selects at least one of multiple computers in the peer-to-peer network as an originating source of the broadcast; and changing the originating source of the broadcast, during the broadcast and as indicated by the control computer, from the at least one of the multiple computers to at least another of the multiple computers. | 04-09-2009 |
20090094361 | SESSION INITIATION PROTOCOL REGISTRATION WITH PING - Systems and methodologies are described that facilitate improving session initiation protocol based registration of a mobile device and an IP multimedia subsystem in wireless communications. The mobile device discovers one or more SIP servers (e.g., proxy call session control functions) that are available. The mobile device issues a ping message to each discovered server in parallel to determine reachability. Based at least in part on measured round trip times associated with the ping messages, the mobile device initiates registration procedures with at least one server. | 04-09-2009 |
20090094362 | Method and system for managing quality of service in a network - According to embodiments, the present invention comprises a method and system for managing support of quality of service requirements for various clients of a telecommunications network at a server level. Servers assigned to the various clients may include quality of service descriptors that identify relative priorities of the clients. In the event of a failure or reduced performance of a server, for example, an assignment of respective servers to respective clients may be changed based on the relative priorities of the respective clients. | 04-09-2009 |
20090094363 | METHOD, SYSTEM, CLIENT AND SERVER FOR LOCATING OPERATION NODES IN COMMUNICATION SYSTEM - The present disclosure relates to the field of mobile communication technologies, and provides a method for locating operation nodes in a communication system. The method includes using an identifier in the received message to obtain an adjusted path from the root node of the management tree of the client to the standard management object corresponding to the identifier, using the message to obtain a relative path between the target operation node and the root node of the standard management object on the management tree, concatenating the adjusted path with the relative path, and locating the target operation node according to the concatenated path. The present disclosure also provides a system for locating operation nodes, a client for locating operation nodes in a communication system, and a server for performing management operations for clients. | 04-09-2009 |
20090100168 | AUTOMATIC LOCATION DETECTION IN A COMPUTING ENVIRONMENT - Automatic position location detection, such as satellite position information is used along with a computer to enhance an operation over a remote information channel or a network. This may be used over the Internet to enhance an Internet transaction by determining the origin of the transaction and determining if that origin is authorized. It can also be used for determining a person's location and seeing if the person has moved more than a specified amount in the specified time. It can be used for a biometric scan to determine certain characteristics about the person. Another aspect uses automatic position location to detect handwriting. Yet another application is an automatically determining the source of a request for information from a website, and returning information from that website. This system can also be used in chat room environment. | 04-16-2009 |
20090100169 | NETWORK BOOKMARKING BASED ON NETWORK TRAFFIC - A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass through the network element; detecting network resource identifiers within the data packets; forming network resource identifier report messages that carry the network resource identifiers; forwarding the network resource identifier report messages to a bookmark processing server; storing records of each of the network resource identifiers carried therein; storing counters that identify numbers of times that associated network resource identifiers were requested; determining interesting network resource identifiers based on the records and decision steps; generating and providing a report of the interesting network resource identifiers. As one result, interesting network resource identifiers can be automatically found in network traffic and provided to a social bookmarking site. | 04-16-2009 |
20090100170 | APPARATUS, METHOD, COMPUTER PROGRAM PRODUCT AND SYSTEM FOR REQUESTING ACKNOWLEDGMENT OF TRANSMITTED DATA PACKETS - An apparatus, method, computer program product and system are provided for initiating a request for acknowledgment of successfully, or unsuccessfully, transmitted data packets, wherein the request is initiated in response to the detection of a potential overload situation or an upcoming resource limitation. In particular, a transmitter may monitor certain resources associated with the transmitter, such as memory consumption or processing capacity, and automatically request that a receiver transmit an acknowledgement when a potential overload of one or more of the resources is detected. This may occur, for example, when it is determined that memory consumption has exceeded a predefined threshold or that the processing capacity has been substantially exhausted, to name a few. | 04-16-2009 |
20090100171 | PROVIDING A USER OF AN INSTANT MESSAGE CLIENT WITH AN OVER-SHOULDER STATUS - In an instant message (IM) method and system, a user of an IM client is provided with an over-shoulder status indicating the user has a visitor. The method and system further include receiving a preference setting for an over-shoulder status for defining an over-shoulder status toggle input. Mouse and keyboard strokes entered into the IM client by the user are then monitored in real-time. In response to any of the mouse and keyboard strokes matching the toggle input, the over-shoulder status is automatically toggled, whereby the over-shoulder status is updated in a contact list of at least one other IM client, such that activation of the over-shoulder status serves as a warning that the user has a visitor. | 04-16-2009 |
20090100172 | METHOD AND APPARATUS FOR MONITORING WEB SERVICES RESOURCE UTILIZATION - A method for dynamically adjusting resources among a plurality of co-existing applications comprises the steps of: building a relation model between a request number and resource consumption of said plurality of applications; obtaining at multiple sampling moments a request number and resource consumption of each of said plurality of applications; calculating resource consumption ratio of each of said plurality of applications; and analyzing resource consumption of a plurality of currently co-existing applications. | 04-16-2009 |
20090100173 | COMMUNICATION MANAGEMENT SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND COMMUNICATION CONTROL DEVICE - The present invention provides a technique for managing P2P communication appropriately. | 04-16-2009 |
20090100174 | Method and system for automatic polling of multiple device types - A common poller polls multiple network devices of a communication network regardless of device type. A device personality service associates information corresponding to each of the devices with unique identifiers thereof. The common poller provides information resulting from polling the devices to network management systems (“NMS”) that request status and health information thereof. A poller client interface isolates the NMS from a common datastore coupled to the common poller and processes the information between the datastore and the NMS so the datastore is not directly exposed to the NMS. A scheduled poller causes the common poller to poll each network device according to a predetermined schedule. An on-demand poller may poll the devices between scheduled polling events. If a predetermined period as not passed since previous scheduled polling, the poller client interface forwards previously stored information from the common datastore to an NMS requesting status for a given device. | 04-16-2009 |
20090100175 | Location of Unidirectional Handover Relationships - A management system includes a first management device storing information regarding: objects monitored by the first management device, objects monitored by a second management device and relationships between objects monitored by the first management device and objects monitored by the second management device. The first management device requests such information from the second management device. Using the information stored by the first management device and the information requested from the second management device, the first management device ascertains at least one relationship between at least one object monitored by the first management device and at least one object monitored by the second management device and which is stored either just by the first management device or just by the second management device. | 04-16-2009 |
20090100176 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A MULTIMEDIA APPLICATIONS GATEWAY - Methods, systems, and computer program products for providing application services to an end user domain are disclosed. A method includes providing a multimedia applications gateway that is connected to an access gateway for the end user domain of the application services or a multimedia applications gateway that includes an integrated access gateway function. The access gateway is communicatively coupled to end user devices at the end user domain. The method also includes configuring the multimedia applications gateway to convert network communications of a selected application service that is downloaded to the access gateway and transmitted from the access gateway to an end user device into communications having an open standards protocol recognized by each of the end user devices. The method further includes executing the selected application service via a virtual machine operating on an operating system of the multimedia applications gateway, and monitoring activities occurring in response to execution of the selected application service. | 04-16-2009 |
20090100177 | CONDITION DEPENDENT DATA MAINTENANCE SYSTEM FOR A PLURALITY OF FUNCTIONAL ENTITIES - The present invention is directed to a server system for supplying differing amounts of data into a database, wherein the system comprises the database and a data tracker device, wherein the data tracker receives data sent by a plurality of functional entities, preferably office machines and in particular devices with a printer, wherein the data tracker device is prepared to transmit data asynchronously to an intermediate buffer storage device with a queue structure, the intermediate buffer storage device storing the data sequentially and transmitting the data sequentially to the database to be stored. | 04-16-2009 |
20090106413 | Method and apparatus for detecting click fraud - Detecting click fraud at a user device involves detecting a event targeted to a network service that is rated based on the number of individuals who access the network service. The event is of a type associated with user interface selections. It is determined whether the user device is in a low-power state contemporaneously with the detection of the event. The event is caused to be disregarded for the purposes of rating the network service based on a determination that the user device was in the low power state contemporaneously with the detection of the event. | 04-23-2009 |
20090106414 | Digital Living Network Alliance (DLNA) Enabled Portable Electronic Devices, DLNA Management Consoles and Related Methods of Operating DLNA Enabled Portable Electronic Devices - Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided. | 04-23-2009 |
20090106415 | Display of Person Based Information Including Person Notes - Among other disclosures, a method may include collecting historical communication data and personal data relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include generating a profile based on the collected historical communication data and personal data. The method may include receiving user input and incorporating the user input into the profile. The method may include presenting the profile including the user input in response to user behavior. | 04-23-2009 |
20090106416 | Shared Groups Rostering System - Information about all current members of a group is stored. Instructions are received from at least one current member to invite at least one prospective member to join the group and the invitation to join the group is sent to the prospective member. In the event that an affirmative response is received, the prospective member is added to the current members of the group and automatically updated services are provided to current members of the group. | 04-23-2009 |
20090106417 | Method and apparatus for packet analysis in a network - A method and system for monitoring traffic in a data communication network and for extracting useful statistics and information is disclosed. | 04-23-2009 |
20090106418 | AGENT DEVICE, IMAGE-FORMING-DEVICE MANAGEMENT SYSTEM, IMAGE-FORMING-DEVICE MANAGEMENT METHOD, IMAGE-FORMING-DEVICE MANAGEMENT PROGRAM AND STORAGE MEDIUM - An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming devices in the local network through the Internet. The agent device includes a command receiving unit which starts connection with the management device and receives a management command from the management device via the firewall, the command being sent by the management device in response to the connection. An image-forming-device communication unit receives device-state information of a corresponding one of the image-forming devices according to the management command. A command response transmitting unit transmits the device-state information to the management device through the Internet. | 04-23-2009 |
20090106419 | Methods to Test Multimedia Devices on Computer Systems - The described embodiments relate to testing streaming media capture devices and/or computer systems. One exemplary method enumerates and tests multiple streaming media capture device which are operably associated with a computer. The method simultaneously exercises said computer's display and power states. | 04-23-2009 |
20090106420 | GHOST AGENTS FOR APPLICATION DOMAINS WITHIN A GRID ENVIRONMENT - A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object. | 04-23-2009 |
20090106421 | Network Monitoring System - Methods and systems consistent with the present invention solve the limitations of current monitoring systems by automatically and completely monitoring various networks devices and services. Specifically, a network monitoring system monitors all services and conditions on various networks. Moreover, the network monitoring system may provide an advance warning of potential failures and may diagnose an problems that may surface. | 04-23-2009 |
20090113036 | System and Method for Logging Communications - A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device. | 04-30-2009 |
20090113037 | INTEROPERABLE NETWORK PROGRAMMABLE CONTROLLER GENERATION SYSTEM - An interoperable controller operation system having a command module or processor, and input and output interfaces. The command module may have an application that is fixed, configurable or programmable. The module may be changeable on the fly. The input and/or output interfaces may be changeable on the fly. The module or processor may have a memory or be connected to one. The processor and/or memory may contain a function block engine. | 04-30-2009 |
20090113038 | Systems and Methods for Monitoring Performance of Field Assets - A system and method for monitoring performance of field assets are disclosed. A method may include transmitting packets on a shared bus located in a field asset may be captured. The captured packets may be analyzed to determine one or more operational parameters associated with one or more peripheral devices coupled to the shared bus. The one or more operational parameters may be analyzed to determine an operational efficiency of the field asset. | 04-30-2009 |
20090113039 | METHOD AND SYSTEM FOR CONTENT HANDLING - Methods and systems for content handling mapping are described. A client profile may be accessed. The client profile may include a general usage pattern of an access device. A current usage pattern of the access device may be accessed. The current usage pattern may be based on a plurality of interactions between the access device and a network server during a current time period. A determination may be made of whether the current usage pattern is in accordance with the client profile. A throttle instruction may be provided to a networked device to throttle at least one additional interaction of a plurality of additional interactions between the access device and the network server based on the determining. The networked device may be on an access network with the access device and the network server. | 04-30-2009 |
20090113040 | COMMUNITY BASED MODERATION IN ON-LINE SESSIONS - Methods, apparatuses, and techniques for moderating activity in an online community are described. Aspects include a triggering mechanism being activated by a community member in response to inappropriate activity by another community member. Receiving a time based history of community members activity around a time of the triggering mechanism being activated. Recreating the community activity from the time based history. Evaluating activities of the community members to determine if there was inappropriate activity and if there is inappropriate activity by an offending community member taking appropriate action against the offending community member. | 04-30-2009 |
20090113041 | SYSTEM AND METHOD FOR PROVIDING AN INTELLIGENT WIRELESS NETWORK - A system and method is for identifying where an employee is located and which network services node, such as a printer, is near him/her through a access point. The system uses the connection between the access point to identify the location of the user and which printer he/she can use. The main network server transmits the information to the wireless router providing the network access to the user and updates the database with the user and localization. | 04-30-2009 |
20090113042 | METHOD FOR CORRELATING PERIODICALLY AGGREGATED DATA IN DISTRIBUTED SYSTEMS - A computer-implemented method for computing distributed component lag times includes: determining a transaction path for groups of transactions in a plurality of transactions to be processed; determining a distribution of elapsed times from a start of work at each component to an end of work at each component for the plurality of work processing components in the transaction path; determining a distribution of the offsets between the completion of work at the last component of the transaction path and the time of reporting the work at the last component of the transaction path; and combining the distributions of component elapsed times and the distribution of component offsets to calculate the transaction lag for each component in the transaction path. | 04-30-2009 |
20090113043 | NETWORK LOCATION SERVICE - A method is provided for a network location service in which one or more packet forwarding devices in the network collect and maintain location data for the devices/users currently connected to a network. The data is maintained locally in each packet forwarding device and may be provided on demand to a network/business application, such as emergency 911 services or a location-based security or personalization system. The location data is provided in real-time or near real-time using an in-band channel communication and/or over the Internet using a standard transport protocol, such as HTTP/S and SOAP web services. | 04-30-2009 |
20090113044 | SYSTEM AND METHOD OF CONFIGURING A NETWORK - Methods and systems for configuring a network are provided. A method may include monitoring properties of a connection between a computing device and a network. The method may also include detecting a change in the properties of the connection. The may also include verifying the connection to the network is provided by a service provider when the change in the properties is detected and providing network configuration options based on the change. | 04-30-2009 |
20090113045 | System and method for an integrated DSL/cable modem performance test - A modem, method, and system is presented for performing a data communications speed test or line speed test between a network node and a customer premises. The modem may be configured to perform calculations for determining the data communications speed without interference of network elements or overhead modules that cause data communications to be inaccurate or otherwise affected. | 04-30-2009 |
20090113046 | INFORMATION PROCESSING APPARATUS FOR UPDATING ENVIRONMENT INFORMATION - According to an aspect of an embodiment, a server apparatus connected to a plurality of client apparatuses capable of sending out a message containing environment information to the server apparatus, the server apparatus has a storage for storing environment information in association with each of the client apparatuses and a processor for receiving a message including updated environment information indicative of addition of an interface device connected to the client apparatus from the client apparatus and for updating the environment information in the storage with the updated environment information. | 04-30-2009 |
20090113047 | METHOD AND APPARATUS FOR LAST MESSAGE NOTIFICATION - An agent for generating a last message notification in an asynchronous message delivery environment, wherein messages received by a messaging server are routable to a messaging client through an API binding protocol, the agent comprising: a monitoring component for monitoring a message store to determine if there is a message stored for delivery to a message listener; and a message notification component for generating a message indicating that there are no further messages in the message store for routing to the messaging listener, in response to a negative determination by the monitoring component. | 04-30-2009 |
20090113048 | METHOD AND PROGRAM FOR MANAGING THE QUANTITY OF DATA TRANSMITTED BY A TRANSMISSION DEVICE OVER A TELECOMMUNICATION NETWORK - The invention relates to a method of managing the quantity of data transmitted by a transmission device over a telecommunication network, characterized in that the method comprises the steps, carried out by the transmission device, of:
| 04-30-2009 |
20090113049 | SYSTEMS AND METHODS FOR REAL-TIME FORECASTING AND PREDICTING OF ELECTRICAL PEAKS AND MANAGING THE ENERGY, HEALTH, RELIABILITY, AND PERFORMANCE OF ELECTRICAL POWER SYSTEMS BASED ON AN ARTIFICIAL ADAPTIVE NEURAL NETWORK - A system for utilizing a neural network to make real-time predictions about the health, reliability, and performance of a monitored system are disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a virtual system modeling engine, an analytics engine, an adaptive prediction engine. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The adaptive prediction engine can be configured to forecast an aspect of the monitored system using a neural network algorithm. The adaptive prediction engine is further configured to process the real-time data output and automatically optimize the neural network algorithm by minimizing a measure of error between the real-time data output and an estimated data output predicted by the neural network algorithm. | 04-30-2009 |
20090113050 | METHOD AND SYSTEM FOR AUTOMATED SESSION RESOURCE CLEAN-UP IN A DISTRIBUTED CLIENT-SERVER ENVIRONMENT - A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. A session may terminate naturally because a program which is using the resource (such as a database) has completed its operation and ended normally. A session may also terminate unnaturally, e.g., because the connection between the client and the server has been broken for some reason or because a program has aborted or become hung in an inoperative state. Because such unnatural terminations do not normally provide a farewell message from the client to the server—only silence, from the lack of further processing messages—there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client. | 04-30-2009 |
20090119399 | Intelligent graph walking - An apparatus, and corresponding method, for performing a search for a match of at least one expression in an input stream is presented. A graph including a number of interconnected nodes is generated. A compiler may assign at least one starting node and at least one ending node. The starting node includes a location table with node position information of an ending node and a sub-string value associated with the ending node. Using the node position information and a string comparison function, intermediate nodes located between the starting and ending nodes may be bypassed. The node bypassing may reduce the number of memory accesses required to read the graph. | 05-07-2009 |
20090119400 | Presence Management System - According to one embodiment a presence management system including: a first presence server that controls a first network; a plurality of presentities that belong to the first network; a second presence server that controls a second network, the second network connected to the first network via a communication channel; and a plurality of watchers belonging to the second network; wherein the first presence server includes: a first watcher list that registers a given presentity under the first network associated with one of the watchers that requests presence information of the given presentity; and an external notification section that sends the presence information of the given presentity to the second presence server, and wherein the second presence server includes: a second watcher list that registers the one of watchers associated with the given presentity; and an internal notification section that sends the presence information to the one of watchers registered correspondingly to the given presentity. | 05-07-2009 |
20090119401 | CONTENT PROVIDING SYSTEM, MONITORING SERVER, AND SIP PROXY SERVER - A content providing system that provides content to a user terminal via a network includes a content providing server that is connected to the network and provides content, an SIP proxy server that is connected to the network and relays transmission and reception between the user terminal and the content providing server, and a monitoring server that is connected to the network and stores monitoring information regarding transmission and reception between the user terminal and the content providing server, the monitoring information being transmitted from the SIP proxy server. | 05-07-2009 |
20090119402 | DOMAIN NAME OWNERSHIP VALIDATION - Embodiments of the invention provide systems and methods for validating ownership of a domain name. According to one embodiment, a validating ownership of a domain name can comprise retrieving one or more domain name ownership records. For example, the one or more domain name ownership records comprise Who Is records. Validity of the one or more domain name records can be confirmed with a designated domain manager. According to one embodiment, confirming validity of the one or more domain name records with the designated domain manager can comprise authenticating the designated domain manager based on a certificate provided by the designated domain manager. | 05-07-2009 |
20090119403 | Composite Resource Models - A mechanism and model are provided for representing and managing composite resource models. When a resource monitor is deployed for a resource, the resource monitor scans for information that indicates that the resource under monitoring is part of a cluster, grid, or other composite configuration. The resource monitor then determines whether monitoring information for the resource should be reported differently because of the composite configuration. If monitoring information for the resource is to be reported differently, the resource monitor alters the reporting format to reflect the composite resource model. The resource manager may then receive the monitoring information and apply this information to individual resources and aggregates the monitoring information for composite resources. | 05-07-2009 |
20090125622 | SYSTEM AND METHOD FOR PROVIDING SERVER STATUS AWARENESS - A method including analyzing one or more network interactions of a user. One or more servers associated with the one or more network interaction may be identified. A listing of at least a portion of the one or more servers may be rendered. | 05-14-2009 |
20090125623 | DATA VALIDATION USING SIGNATURES AND SAMPLING - Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process. | 05-14-2009 |
20090132694 | BANDWIDTH CONSTRAINT CONSTRUCTION FOR OVERLAPPED LOGICAL CHANNELS - In one embodiment, a technique determines whether configured logical bandwidth allotments for logical channels are supported by maximum available physical bandwidths of physical channels assigned to those logical channels. The technique establishes a bandwidth-constraint directed acyclic graph (DAG) or “BCD” based on novel relationship rules between vertexes of the BCD that represent logical channels or unions of logical channels as well as the underlying physical channels and their maximum available bandwidth constraints. Once the BCD is established, the vertexes of the BCD may be traversed (e.g., from in-neighbor vertexes to out-neighbor vertexes) to determine whether their constraints are met. | 05-21-2009 |
20090132695 | Calculation of the degree of participation of a server in a cluster using half-life decay - A method and apparatus for calculating a degree of participation of a server in a group of servers is disclosed. In one embodiment, a memory stores timestamps for each access to the server. A processor weights the timestamps to treat more recent accesses as more important than older accesses, wherein older accesses decay in importance exponentially using a half-life constant. | 05-21-2009 |
20090132696 | Facilitating DHCP diagnostics in telecommunication networks - A computer-implemented method for facilitating DHCP diagnostic functionality comprises a plurality of operation. An operation is performed for identifying misconfigurations to a DHCP option configuration of a DHCP agent between a DHCP server and a client of the DHCP server. An operation is performed for confirming proper address concentration configuration with respect to the DHCP agent. An operation is performed for snooping on address assignments from the DHCP server to the client of the DHCP server to determine unauthorized ones of the address assignments. | 05-21-2009 |
20090132697 | INTEGRATION OF PASSENGER AND FLIGHT OPERATION COMMUNICATIONS - A communications device is provided for permitting internet access on an aircraft. A first computer on the aircraft is in communication with the communications device. A second computer on the aircraft is also in communication with the same communications device. Access to the first computer is provided to a passenger. Access to the second computer is provided to a second person. The passenger is prevented from obtaining access to the second computer. | 05-21-2009 |
20090132698 | System and Method for Automatic Configuration and Management of Home Network Devices - Embodiments of a method and system for automatically installing and managing consumer devices in a home network environment are described. A system implements automated configuration and maintenance of devices and their peripherals that connect to the home network, in particular the establishment of a distributed system that serves as a service platform which facilitates automated discovery and initial and ongoing deployment of a home networks and the devices that may interact with or connect to their network automatically or through manual means. An embodiment is directed to a distributed system and method for facilitated automatic configuration, maintenance, and diagnostics of a local area network that in parallel provides for the interoperability of connected intelligent independent computing devices using physical layer, network layer and application layer programmatic interfaces. This distributed system provides a generalized aggregated interface that is a programmatic resource for representing a continuous and historic reference of a local network and connected devices. | 05-21-2009 |
20090132699 | Data Center Synthesis - A data center is designed by determining a compute description that describes computer resources to be used in the system from design requirements and models of the computer resources. A facility description that describes facilities to be used in the data center is determined from the compute description and models of the facilities. An integrated system describing the design of the data center is determined from the facility and compute descriptions. | 05-21-2009 |
20090132700 | NETWORK-CONNECTABLE DEVICE AND METHOD FOR MANAGING POWER THEREOF - A network-connectable device is configured to communicate with one or more computer-related devices via a network. The network-connectable device includes a list management unit and a shutdown unit. When the list management unit receives a start command signal instructing an activation of the network-connectable device which is transmitted from a computer-related device, the list management unit registers the computer-related device on a list. When the computer-related device registered on the list is switched to or is to be switched to a disconnected state disconnected from the network-connectable device, the list management unit deletes the computer-related device from the list. The shutdown unit shuts down power to a part of the network-connectable device when none of the computer-related devices is registered on the list. | 05-21-2009 |
20090132701 | DUPLICATE ADDRESS DISCOVERY AND ACTION - A duplicate address discovery process detects duplicate MAC addresses or duplicate unique port identifiers within the network, alerts attached devices of the duplicates, and takes action to avoid data corruption that might be caused by such duplicate addresses. | 05-21-2009 |
20090132702 | Generic Method for Resource Monitoring Configuration in Provisioning Systems - A generic mechanism and model are provided to capture and store configuration profiles for resource monitors such that monitors can be flexibly deployed, configured, modified, and removed using appropriate sets of parameters and values. As an integral part of resource provisioning, this generic mechanism will require only a generic set of workflows and a generic data model to provision monitors. The provisioning system of the present invention captures and stores response parameters and values from monitors created during initial deployment such that these parameters can be used for later modification and removal of these monitors. | 05-21-2009 |
20090132703 | VERIFYING RESOURCE FUNCTIONALITY BEFORE USE BY A GRID JOB SUBMITTED TO A GRID ENVIRONMENT - A method, system, and program for verifying resource functionality before use by a grid job submitted to a grid environment are provided. When a new resource is allocated to a particular execution environment within a grid environment managed by a grid management system, then a grid verification service automatically selects and runs at least one functionality test on the new resource as controlled by the grid management system. Responsive to a result of the functionality test, the grid verification system verifies whether the result meets an expected result before enabling routing of the grid job to the new resource, such that the functionality of the new resource is automatically verified before access to the new resource is allowed to maintain quality of service in processing grid jobs. | 05-21-2009 |
20090132704 | Federated Transaction Path and Service Level Agreement Monitoring Across Service Oriented Application Partner Domains - Computer implemented method, system and computer usable program code for monitoring a transaction that crosses an enterprise boundary in a composite application. A computer implemented method for monitoring a transaction that crosses an enterprise boundary in a composite application includes a provider enterprise of the transaction receiving a request to provide monitoring data regarding the transaction to a requester enterprise of the transaction. The received request includes a correlation token identifying the monitoring data to be provided and the requester enterprise as being authorized to receive the monitoring data. The transaction monitoring data is then provided to the requester enterprise. The provided transaction monitoring data may be analyzed by the requester enterprise to provide analysis results regarding transaction delivery performance. | 05-21-2009 |
20090138588 | METHOD OF PERFORMING ETHERNET GATEWAY SWITCH TROUBLE DIAGNOSTICS - A service provider unit automatically diagnoses problems in an Ethernet network that are associated with layers 1, 2, and/or 3 and determines whether there is a problem associated with an Ethernet gateway switch EGS. Further diagnostics can be performed to determine the layer, type, and/or location of the problem(s) based on whether there is a problem with the EGS. The diagnostic process followed depends on the types of problem(s) in the network. Once the problems have been diagnosed, an operator can be notified of the location and/or type of problem. | 05-28-2009 |
20090138589 | SYSTEM AND METHOD FOR ACTIVE BUSINESS CONFIGURED WEBSITE MONITORING - The website performance monitoring systems and methods of the present invention are implemented via a website monitoring tool that includes a website canvas and a plurality of web page objects configured to be dragged and dropped onto the generic website canvas to facilitate creation of a website model. The monitoring tool also includes a graphic interface which may be utilized to define and associate performance operational rules of a website being modified or created. The performance operational rules include website performance thresholds and rules associated with alerts which may be delivered in response to a website achieving or falling below defined performance alert levels. The monitoring tool also includes a pixel module which may be engaged to assign a plurality of attributes to a pixel associated with a page within the website model. The graphic interface of the monitoring tool also includes a plurality of web page objects that are configured to be selected, dragged and dropped onto the generic website canvas to facilitate creation of a website model that illustrates the process flow of pages within the website model. | 05-28-2009 |
20090138590 | APPARATUS AND METHOD FOR DETECTING ANOMALOUS TRAFFIC - An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced. | 05-28-2009 |
20090138591 | Method for the display of visual sequencing of message communications between application portlets and task page relationship information in a web-base environment - A display portlet is incorporated into a portal page in a web-based environment. This display portlet presents the message communication information between the portlets that are currently running on that portal page. The displayed message communication information indicates the portlet that is the source of a transmitted message and displays one or more portlets that receive the message. The visual representations can be of various formats such as a spacial display or a tree representation. Each communicated message has a stored record identifying the transmitting portlet and any portlet that receives the message. | 05-28-2009 |
20090138592 | METHOD AND APPARATUS FOR DETECTION OF INFORMATION TRANSMISSION ABNORMALITIES - In one embodiment, a method for securing a network application is described. The method for securing a network application includes receiving network information within a network application and assigning a probability value to an independent aspect of the network information. The probability value is based on a verification of the independent aspect of the information against a profile of acceptable behavior. The method for securing a network application also includes aggregating the probability values of the independent aspects of the network information to determine the probability of the entire network traffic. In addition, the method for securing a network application includes determining whether the probability value of the entire network information is above or below a threshold probability value. The entire network information is screened out based on the probability value of the entire message with respect to the threshold probability value. | 05-28-2009 |
20090138593 | SYSTEM AND METHOD FOR COLLECTING, REPORTING AND ANALYZING DATA ON APPLICATION-LEVEL ACTIVITY AND OTHER USER INFORMATION ON A MOBILE DATA NETWORK - System and method for collecting and analyzing information on application-level activity and other user information on a mobile data network. A platform non-intrusively and transparently monitors data activity on a mobile data network in real-time so that user-level information can be reported to an operator. The platform comprises a plurality of collectors, a data manager, and a report manager. The collectors communicate with network routers to almost all network data. The collectors inspect the data for IP addresses and correlate them to user mobile phone numbers. The data manager receives the data and augments it with information obtained by querying carrier information. The data manager stores the data and monitors it to see if it satisfies a set of defined real-time reports. The report manager then works with the data manager to develop and test new reports based on operator instructions for a specific report. | 05-28-2009 |
20090138594 | COORDINATING THE MONITORING, MANAGEMENT, AND PREDICTION OF UNINTENDED CHANGES WITHIN A GRID ENVIRONMENT - A method, system, and program for coordinating the monitoring, management, and prediction of unintended changes within a grid environment are provided. A grid change controller within a particular grid environment detects an unintended change within that grid environment. In particular, grid change controller monitors potential change indicators received from multiple disparate resource managers across the grid environment, where each resource manage manages a selection of resources within the grid environment. The grid change controller then determines a necessary response to the unintended change within the grid environment and communicates with at least one independent manager within the grid environment to resolve the unintended change, such that the grid change controller facilitates recovery from the unintended change within the grid environment to maintain performance requirements within the grid environment. | 05-28-2009 |
20090138595 | TECHNIQUE TO GENERICALLY MANAGE EXTENSIBLE CORRELATION DATA - A technique to generically manage extensible correlation data is provided for correlating a series of events. The technique employs a global unique identifier (GUID) for identifying an event and uses the GUID as a key to associate one or more extensible correlators of correlation data. A transport correlator may be configured to transport the GUID for associating with a GUID of a second event such that a small and fixed amount of data is passed by the communications layer providing the transport, minimally impacting communications. An arbitrary amount of data may be logged and keyed with the GUID, providing optimization and flexibility. | 05-28-2009 |
20090144408 | Detecting relayed communications - Methods, apparatus and computer readable code for determining whether a potential relay device is a relay device are provided herein. In some embodiments, first and second information elements are received from a potential relay device, which is an original source of the second information element. In order to determine whether the potential relay device is a relay device, it is determined whether a feature of an original source of the first information element and a feature of the potential relay device are features unlikely to relate to a single device, wherein a positive result of the determining is indicative that the potential relay device is a relay device. In an exemplary embodiment, a disclosed system includes an information element receiver and a feature incompatibility analyzer. Optionally, the disclosed system includes a feature discovery module, a parameter obtainer and a feature database. | 06-04-2009 |
20090144409 | METHOD FOR USING DYNAMICALLY SCHEDULED SYNTHETIC TRANSACTIONS TO MONITOR PERFORMANCE AND AVAILABILITY OF E-BUSINESS SYSTEMS - A method and apparatus is provided for monitoring operations of a specified transaction server that has an associated network topology. One embodiment comprises the steps of defining a plurality of zones within the network topology, and assigning one or more monitoring agents to each of the zones, wherein each agent is adapted to selectively run synthetic transactions with the specified server. The method further comprises monitoring results of successive synthetic transactions carried out by the agents, in order to detect any errors associated with the successive transactions. In response to detecting a performance or an availability problem, selectively, that is associated with a particular synthetic transaction run by a particular one of the agents, one or more agents is dynamically scheduled to run synthetic transactions, wherein each scheduled transaction has a specified relationship with the particular transaction. | 06-04-2009 |
20090144410 | MONITORING NETWORK TRAFFIC BY TRACKING DATA PACKETS ON A PER PROCESS BASIS - Methods, apparatus, systems, and articles of manufacture directed to the monitoring and visualizing of network traffic are disclosed. The network monitoring can include tracking data packets on a per process basis. As a data packet traverses a communications interface, it can be correlated with the process responsible for that data packet and a local process address can be logged providing a record of the packet and an associated source, destination, and process identifier. The visualizing can include generating a visual representation of network traffic and packet-process correlations. | 06-04-2009 |
20090144411 | METHOD AND SYSTEM FOR EVALUATING AND SELECTING TRACEROUTES TO BE USED IN DETERMINING THE GEOGRAPHIC LOCATION OF A NETWORK BLOCK - Described herein are a method and system for evaluating and selecting traceroutes to be used in determining the geographic location of a network block. A particular embodiment of the system includes a set of traceroute feature vector extractors, each traceroute feature vector extractor being associated with at least one of a plurality of traceroutes, each traceroute feature vector extractor being configured to generate a traceroute feature vector for at least one of the plurality of traceroutes; a set of traceroute classifiers each coupled to at least one of the traceroute feature vector extractors, each traceroute classifier being associated with at least one of the plurality of traceroutes, each traceroute classifier being configured to generate at least one traceroute classification and/or regression based on at least one of the traceroute feature vectors; and a traceroute geolocation determining engine to determine a geographic location of a network block based on the at least one traceroute classification and/or regression generated by the set of traceroute classifiers. | 06-04-2009 |
20090144412 | METHOD AND APPARATUS FOR THE DELIVERY OF DIGITAL DATA - A method and apparatus for the delivery of digital data to an end user ( | 06-04-2009 |
20090144413 | Communications enterprise server monitor - A system includes one or more wireless handheld devices, one or more enterprise servers in communication with the one or more wireless handheld devices, and an enterprise server monitor in communication with the one or more enterprise servers to collect communications performance data from one or more of the one or more enterprise servers in communication with one or more of the one or more wireless handheld devices associated with a select group of users, and to generate one or more alerts if the collected communications performance data match one or more alert conditions, the one or more alert conditions being indicative of one or more levels of potential communication failures. | 06-04-2009 |
20090144414 | Method for summarizing flow information from network devices - A method for aggregating network flow information within a relational database relates to by maximizing concurrency between insertion and analysis of database records. In particular, data is generally stored according to the network devices associated with the flow records. Then, the flow records for the separate devices may be aggregated at certain time intervals and separately organized. In this way, contention is decreased as analysis can occur on the aggregated flow records, while new flow records are stored. In another embodiment, the aggregated data can be reaggregated again at a second, larger time interval. | 06-04-2009 |
20090144415 | Detecting automation cheating in online applications - In general, in one aspect, a method is described that includes monitoring data received from input devices. The received data from the input devices associated with an application is copied when the application is active. The data is converted to user commands. Commands used to update the application are received from the application. The converted user commands are compared to the commands from the application. Mismatching commands are reported to a remote server. | 06-04-2009 |
20090144416 | METHOD AND SYSTEM FOR DETERMINING AN OPTIMALLY LOCATED STORAGE NODE IN A COMMUNICATIONS NETWORK - A method for locating an optimum storage node for serving a data file request received via a communications network, includes: receiving a file request from a user device coupled to the communications network; determining a geocode value based on a communications network address associated with the user device, wherein the geocode value is indicative of a geographic location of the user device; selecting a storage node from a plurality of storage nodes coupled to the communications network to serve the file request, wherein the storage node is selected based at least in part on the geocode value; and redirecting the file request to the selected storage node for handling. | 06-04-2009 |
20090144417 | RESILIENT SERVICE QUALITY IN A MANAGED MULTIMEDIA DELIVERY NETWORK - A managed multimedia delivery network ( | 06-04-2009 |
20090144418 | METHODS AND SYSTEMS FOR ENABLING ANALYSIS OF COMMUNICATION CONTENT WHILE PRESERVING CONFIDENTIALITY - Disclosed are methods and systems for enabling analysis of communication content while preserving confidentiality. In one embodiment, communication content is processed to increase the similarity of superficially dissimilar instances of communication content and/or to increase the distinctiveness of superficially similar instances of communications content. In this embodiment at least part of the processed communication content is hashed to obscure the actual communication content. In one embodiment, social network analysis is performed on the communication content after hashing, and visualization of the social network analysis includes thread graphs and/or circular graphs. | 06-04-2009 |
20090144419 | IP NETWORK MANAGEMENT - Methods and apparatus are provided for managing an IP network interconnecting a plurality of network hosts ( | 06-04-2009 |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20090144421 | System and Method for User Behavioral Management in a Computing Environment - A system and method for user behavioral management in a computing environment are disclosed. In one embodiment, the system includes a computer having computing resources including, for example, a plurality of applications installed thereon. A monitoring module is associated with the computer in order to monitor a plurality of utilization parametrics to determine the utilization of the computing resources by a user and provide to the user a substantially realtime, visible indication of the utilization of the computing resources. The data captured relative to the utilization parametrics enables, at the management level, enterprise-wide administration of the computing resources and, at the user level, self-directed behavioral modification with respect to computing resource management. | 06-04-2009 |
20090150536 | Application layer congestion control - A method of managing congestion within a request-response system is disclosed. The method includes determining a response time that is directly or indirectly indicative of how long it takes a back end system to process a request received from a front end system and return a corresponding response. The response time is compared to a threshold criterion. A determination is made, based at least in part on the comparison, that the back end system is becoming congested with requests from the front end system. The front end system is adjusted so as to at least temporarily reduce the number of requests provided to the back end system by the front end system. | 06-11-2009 |
20090150537 | Data communication method for a set of hard-real time applications within a network - A data communication method for a set of hard real-time applications with an associated set of predefined network requirements (PNR) is provided. The method comprises configuring the physical layer of the network with a set of static modulation parameters (SMPs) to guarantee the PNRs are met at worst-case operating conditions for the network. The method further comprises measuring the current network performance within the network based on a given network performance monitoring schedule and, whenever the current network performance exceeds the PNRs by predefined amounts, adjusting the physical layer of the network by selecting a set of dynamic modulation parameters (DMP's) to increase the bandwidth availability within the network. Advantageously, the invention further allows for the allocation of the excess bandwidth to a set of non-hard real-time applications, whenever the current network performance exceeds the PNR. | 06-11-2009 |
20090150538 | Method and system for monitoring virtual wires - In general, the invention relates to a method for monitoring virtual wires. The method includes selecting a first virtual wire to monitor, wherein the first virtual wire connects a first virtual network interface card (VNIC) located on a first computer to a second VNIC located on a second computer, where the first computer and the second computer are connected to a chassis, and where the first virtual wire is implemented by the chassis. The method further includes collecting usage statistics associated with the first virtual wire, and performing a first action using the collected usage statistics associated with the first virtual wire. | 06-11-2009 |
20090150539 | Webpage domain monitoring - Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified and a counter is incremented, respectively, for each identified domain. When the counter for a respective said domain exceeds a threshold, a notification is output by the client that indicates that the respective said domain has a likelihood of tracking the client. | 06-11-2009 |
20090150540 | Method for identifying components in a network - A method of identifying components in a network path by defining a role for a component from a rule governing another component or the network path, and identifying an instance of such first component from a data base listing instances of the component and associations of such component with other components in the path. | 06-11-2009 |
20090150541 | System and method for dynamically generating user interfaces for network client devices - A system and method for dynamically generating user interfaces for client devices in an electronic network includes a network server and a network of client devices. Each of the client devices monitors and compiles client statistics regarding usage characteristics for various elements of corresponding user interfaces. A recommendation engine of the network server accesses and analyzes the client statistics to thereby generate individual user interface recommendations for the various client devices. The client devices may then dynamically update their respective user interfaces in accordance with respective individual user interface recommendations. | 06-11-2009 |
20090150542 | MANAGEMENT COMPUTER, COMPUTER SYSTEM AND METHOD FOR MONITORING PERFORMANCE OF A STORAGE SYSTEM - To solve a problem in that reliable detection of a performance problem caused by a configuration change needs detailed performance information, which is costly to keep and analyze, a management computer which manages a computer system having a host computer and a storage system is provided. The management computer is configured to: store performance information obtained from resources that belong to paths at first time intervals until a predetermined length of time elapses since the detection of an addition or removal of the resources to the paths; store performance information obtained from the resources that belong to the paths at second time intervals, which are longer than the first time intervals, without storing performance information obtained from the resources that belong to the paths at the first time intervals after the predetermined length of time elapses since the detection of the addition or removal of the resources to the paths. | 06-11-2009 |
20090150543 | Communication System and Communication Device - A communication system includes a communication device and a communication network configured to communicate with the communication device. The communication network includes a storage unit configured to store first communication information related to a communication to the communication device that is generated when communications with the communication device are unattainable; and a notifying unit configured to send the first communication information stored in the storage unit to the communication device when communications with the communication device become attainable. The communication device is configured to receive the first communication information sent from the notifying unit, and includes a restraining unit configured to restrain function of a local device based on the first communication information. | 06-11-2009 |
20090150544 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - An information processing device and an information processing method are provided which can provide services to all clients (users) at a certain service level while preventing a server from being overloaded by reducing concentration of access from some clients without requiring special processing on the client side. The server monitors requests sent from clients and does not execute business logic as an error when receiving intervals of requests do not exceed a threshold. Also, timing of a request being resent from a client next time is controlled by controlling return timing when an error response is returned to the client. | 06-11-2009 |
20090150545 | AUTOMATIC COLLECTION AND UPDATING OF APPLICATION USAGE - A method and system providing automatic collection and updating of application usage on a large number of electronic devices without user intervention. The electronic devices may be a palm-sized computer systems, personal digital assistants (PDAs), or wireless telephones. On an electronic device, application usage statistics, for example, the number of times a user uses an application, are gathered and stored. Once gathered and stored, the usage statistics are transferred to a host computer, and subsequently to a server (alternatively, the electronic device can send the gathered statistics directly to a server). The server tabulates usage statistics gathered from a plurality of electronic devices and publishes the results. The users of the electronic devices that gather usage statistics can be compensated in a variety of ways (e.g., monetary, chances in a raffle, discounts on purchases etc.). | 06-11-2009 |
20090150546 | Protecting Encrypted Files Transmitted over a Network - An improved system and approaches for protecting secured files when being used by an application (e.g., network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e.g., the Internet) to unauthorized destinations. In one embodiment, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner. | 06-11-2009 |
20090157864 | GRID COMPUTING CONTROL METHOD FOR TESTING APPLICATION PROGRAM CAPACITY OF SERVER AND SERVICE METHOD THEREOF - Disclosed is a grid computing control method for testing the application program capacity of a server and a method for providing a service based on the same. The grid computing control method includes the steps of providing a number of user clients with a capacity measurement program by a capacity measurement server; selecting user clients capable of capacity measurement from the user clients, the capacity measurement program having been installed in the user clients, by the capacity measurement server; transmitting a capacity measurement script to the selected user clients by the capacity measurement server; executing the capacity measurement script so as to create capacity measurement data by the selected user clients; transmitting the created capacity measurement data to the capacity measurement server by the selected user clients; and collecting the transmitted capacity measurement data and composing a capacity measurement result report by the capacity measurement server. | 06-18-2009 |
20090157865 | SYSTEM AND METHOD OF MANAGING NETWORK CONNECTIONS USING A LINK POLICY - A system and method of managing network connections using a link policy is disclosed. In one form, a network link management system can include a link control logic module operable to alter a first link data rate of a first link operable to communicate network traffic. The network link management system can also include a link manager coupled to the link control logic module. In one form, the link manager can be configured to initiate altering the first link data rate to a second link data rate value in response to a first link rate policy entry of the first link. The network link management system can also include a link rate policy accessible to the link manager and operable to store the link rate policy entry of the first link. | 06-18-2009 |
20090157866 | TRANSPARENT AUTO-DISCOVERY OF NETWORK DEVICES LOGICALLY LOCATED BETWEEN A CLIENT AND SERVER - Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake. | 06-18-2009 |
20090157867 | SYSTEM AND METHOD FOR REAL-TIME GRAPHIC MONITORING OF DIFFERING GRAPHICS RESOLUTIONS USING A SINGLE GRAPHICS BUFFER - A system and method automatically scale the resolution of video output of a selected workstation blade so that an administrator can view the video output by the selected workstation blade in the same format as it is displayed at the user terminal associated with the selected workstation blade. The video is automatically scaled to the administrator's VGA resolution while maintaining the same end-user DVI resolution and displaying the video so that the administrator may see the video output regardless of display format at the end user. This system and method allows the administrator to see the entire display. | 06-18-2009 |
20090157868 | METHOD AND APPARATUS FOR CHECKING THE HEALTH OF A CONNECTION BETWEEN A SUPPLEMENTAL SERVICE PROVIDER AND A USER DEVICE OF A PRIMARY SERVICE PROVIDER - A system and method for communicating between a secondary content provider and a user device includes a user device locator module and a primary service provider providing primary service content to the user device. The user device communicates a user device identifier, an IP address and a port number to the user device locator module. A secondary service content provider in communication with the user device locator module provider has a healthcheck module receiving the IP address and the port number from the user device locator module. The healthcheck module communicates a healthcheck signal to the user device using the port number and the IP address of the user device through a network. The secondary service content provider communicates secondary content to the user device through the network. | 06-18-2009 |
20090157869 | Tracking Content in Communication Networks - The present invention relates to methods of, and systems for, tracking content in communication networks by collecting content transmission information from the network. The collected content transmission is examined to identify discrete content items, and these are compared to predetermined content items. The result of the comparison is stored on a database, and if an identified discrete content item is the same as or substantially similar to a predetermined content item and/or if an identified discrete content item has been previously sent to or received by a subscriber or application, an event signal is triggered. | 06-18-2009 |
20090157870 | RESOURCE-AMOUNT CALCULATION SYSTEM, AND METHOD AND PROGRAM THEREOF - A response-time-difference calculation/request-number converting means ( | 06-18-2009 |
20090157871 | Information Processing Apparatus and Wireless Connection Service Availability Notification Method - According to one embodiment, an information processing apparatus includes a display device, an operation button, a wireless modem, and a control module. The control module determines, when the operation button is operated, wireless connection service availability in accordance with whether or not the wireless modem allows communication with a base station which forms a wireless connection service area and accommodates a mobile station within the wireless connection service area in a network, and displays the determination result on the display device. | 06-18-2009 |
20090157872 | Model-based composite application platform - Embodiments provide an architecture to enable composite, autonomous composite applications and services to be built and deployed. In addition, an infrastructure is provided to enable communication between and amongst distributed applications and services. In one or more embodiments, an example architecture includes or otherwise leverages five logical modules including connectivity services, process services, identity services, lifecycle services and tools. | 06-18-2009 |
20090157873 | Verifiable online usage monitoring - In the present invention, observed online CPD or CE activities must be within a designated envelope of acceptable behaviour for accredited activity to be recorded in a session log for that user. When a watcher program detects one or more loss of user focus on the activity, it alerts the user and gives them a short opportunity to rectify the situation, otherwise a session timer is stopped and no further credits are added or verified to the user's session log. When a session is ended by a user or the watcher program, only the verified activity that can be accredited to CPD is itemised and catalogued cumulatively in the user's session log. | 06-18-2009 |
20090157874 | MONITORING AND REPORTING SYSTEM AND METHOD OF OPERATING THE SAME - A monitoring and reporting system for use with an embedded computer of a hosted system and method of operating the same. In one embodiment, the monitoring and reporting system includes a device driver configured to monitor a status of a user subsystem of the embedded computer and generate a status signal therefrom. The monitoring and reporting system also includes a modem configured to send a short message to an external device as a function of the status signal. The modem employs a low amount of overhead to send the short message expeditiously. | 06-18-2009 |
20090157875 | METHOD AND APPARATUS FOR ASYMMETRIC INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, copied packets that are based on original packets sent from a user client are monitored for a web content request meeting certain monitoring selection criteria. Upon detection of a copied packet having a web content request meeting the selection criteria, a replacement packet is forwarded to the user client such that the user client receives the replacement packet before receiving a response packet from a target server of the corresponding original packet, wherein the replacement packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement. | 06-18-2009 |
20090164621 | METHOD AND SYSTEM FOR MONITORING REST WEB SERVICES - Generally, the present invention provides a method and computerized system for monitoring REST web services including generating a REST based web service client call operative to be used for monitoring web service activities. The web service client call is then deployed. The method and computerized system further includes monitoring the web service activities via the call invocation and a response analysis. The method and computerized system further includes receiving a plurality of feedback results from the monitoring of the web service functionality and thereupon adjusting the web service parameters based on the aggregated feedback. | 06-25-2009 |
20090164622 | Monitoring Instant Messaging Usage - A method of monitoring instant messaging usage can include identifying an instant messaging session between a plurality of participants, selecting a participant in the instant messaging session, identifying at least one attribute of the instant messaging session, and identifying at least one attribute of the selected participant. The method further can include determining an instant messaging usage metric for the selected participant according to the at least one attribute of the instant messaging session and the at least one attribute of the selected participant and outputting the instant messaging usage metric of the selected participant. | 06-25-2009 |
20090164623 | METHODS AND SYSTEMS FOR TRACKING EVENT LOSS - Systems and methods for tracking event loss are set forth in this disclosure. More specifically, systems and methods for tracking event loss within a first time period and second time period are set forth in this disclosure. | 06-25-2009 |
20090164624 | Method and Apparatus for Acquiring Content-Based Capital Via A Sharing Technology | 06-25-2009 |
20090164625 | METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI. | 06-25-2009 |
20090164626 | METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI. | 06-25-2009 |
20090164627 | DATA TRANSMISSION/RECEPTION APPARATUS AND METHOD FOR INSERTING AND EXTRACTING MAINTENANCE MANAGEMENT DATA - A data transmission/reception apparatus including a network layer device section for performing a process corresponding to a physical layer of an OSI reference model is provided. The apparatus includes a maintenance management data insertion/extraction section for inserting maintenance management data into data to be transmitted, transmitting the data to be transmitted, and extracting the maintenance management data from received data, wherein the maintenance management data insertion/extraction section performs the insertion and extraction of the maintenance management data with respect to the network layer device section. | 06-25-2009 |
20090164628 | CIRCUIT AND METHOD FOR SETTING DATA AND THEIR APPLICATION TO INTEGRATED CIRCUIT - An integrated circuit is disclosed, including at least one configuration pin, an interface circuit, a detecting circuit, a determining circuit and a storage unit. A physical layer circuit of the invention not only increases the flexibility of setting PHY addresses, but also reduces the number of configuration pins. | 06-25-2009 |
20090164629 | UTILIZING A SINGLE AGENT ON A NON-ORIGIN NODE FOR MEASURING THE ROUNDTRIP RESPONSE TIME OF WEB PAGES WITH EMBEDDED HTML FRAMES - A computer-based system and article of manufacture utilizing a single response time monitor, located on a non-origin node of a public or private network, for measuring the total roundtrip response time of a set of requests resulting from an original request having embedded HTML frames. The response time monitor builds a relationship tree for the original request and its embedded HTML frames. For each request from the set of requests resulting from the original request, including requests for the embedded HTML frames, the method uses the response time monitor to detect a start time and end time of each component of the request's roundtrip response time in order to calculate each component's duration. Later, the response time monitor calculates the total roundtrip response time by adding together the duration of all components of the original request and all its additional requests that have the same network address and port number. | 06-25-2009 |
20090172146 | Media Playlist Construction for Virtual Environments - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 07-02-2009 |
20090172147 | BALANCED MANAGEMENT OF SCALABILITY AND SERVER LOADABILITY FOR INTERNET PROTOCOL (IP) AUDIO CONFERENCING BASED UPON MONITORED RESOURCE CONSUMPTION - Embodiments of the present invention address deficiencies of the art in respect to audio stream management in an audio conferencing server and provide a method, system and computer program product for balancing audio server loadability and audio server scalability based upon monitored resource consumption. In an embodiment of the invention, a method for balancing audio server loadability and audio server scalability based upon monitored resource consumption can be provided. The method can include monitoring computing conditions in an audio conferencing server receiving encoded audio packets from coupled Internet Protocol (IP) audio clients and routing the encoded audio packets as audio streams to the IP audio clients, and responsive to detecting deteriorating computing conditions in the audio conferencing server, reducing a number of the audio streams forwarded to the IP audio clients by the audio conferencing server. | 07-02-2009 |
20090172148 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF IP NETWORKS ELEMENTS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network. | 07-02-2009 |
20090172149 | REAL-TIME INFORMATION TECHNOLOGY ENVIRONMENTS - Real-time data of business applications of an Information Technology environment is monitored to obtain information to be used in managing the environment. A business application includes processing collectively performed by a plurality of components of the environment. A component includes one or more resources, and therefore, in one example, the real-time data being monitored is associated with those resources. | 07-02-2009 |
20090172150 | COORDINATED DEEP TAGGING OF MEDIA CONTENT WITH COMMUNITY CHAT POSTINGS - Embodiments of the present invention address deficiencies of the art in respect to deep tagging of media content and provide a method, system and computer program product for coordinating deep tagging of media content with chat postings. In an embodiment of the invention, a method for coordinating deep tagging of media content with chat postings can be provided. The method can include monitoring a group chat of participants co-browsing media content, identifying a token in the group chat appearing a threshold number of times within a temporal window, and creating a deep tag in the media content in association with a portion of the media content played back concurrently with the temporal window. | 07-02-2009 |
20090172151 | DYNAMIC NETWORK CONFIGURATION - In one embodiment, determining a default gateway of a network, determining a MAC address and an IP address associated with the default gateway of the network, updating a table of one or more MAC addresses and corresponding one or more IP addresses based on the detected MAC address and the IP address of the default gateway, detecting in the table of one or more MAC addresses and the corresponding one or more IP addresses, a further MAC address associated with the IP address of the default gateway, determining a port associated with the further MAC address and with the IP address of the default gateway, and disabling the port, are provided | 07-02-2009 |
20090172152 | REAL-TIME MONITORING OF A ROUTING SERVER - Calculating the roundtrip delay between first and second computers due to the latency of a routing server. The first computer receives an incoming message from the second computer via the routing server. The incoming message includes incoming time information indicative of processing time at the second computer and outgoing time information indicative of a time when a first outgoing message was sent by the first computer. The first computer calculates an observed roundtrip time indicating the routing server latency for a first outgoing message and the incoming message as a function of a time when the first computer received the incoming message, the outgoing time information, and the incoming time information. | 07-02-2009 |
20090172153 | HETEROGENEOUS TWO-PHASE COMMIT TEST ENGINE - A computer-implemented method, information processing system, and computer program storage product validate a two-phase commit process. First information is received that indicates a plurality of web services to be tested. Each of the web services are associated with a different resource manager. Second information is received that indicates a plurality of application servers for performing the web services. A global transaction is created that includes a plurality of transactions based on the first information that was received. A two-phase commit process is initiated at one of the application servers for performing the global transaction. After the two-phase commit process has ended, results of the global transaction that include information regarding each of the transactions within the global transaction are displayed. | 07-02-2009 |
20090172154 | METHOD FOR AUTONOMIC DETECTION AND REPAIR OF BROKEN LINKS IN WEB ENVIRONMENTS - A method for implementing autonomic detection and repair of broken links in Web environments includes receiving a request for additional Web content in a server in response to a link present in an originating Web content held on a host server; determining the present state of the received link; wherein the server performs in response to the received link: returns the requested additional Web content to a user; returns a Web content not found notification to a user; returns a Web content has moved notification with a valid link; wherein the notifications are digitally signed by the server; wherein in response to the returned notifications, the user's browser sends the notifications to the host server; and wherein in response to the reception of the notifications the host server notifies a content manager of the link state, stores the notification in a database, and repairs the link. | 07-02-2009 |
20090172155 | METHOD AND SYSTEM FOR MONITORING, COMMUNICATING, AND HANDLING A DEGRADED ENTERPRISE INFORMATION SYSTEM - A system and method in accordance with the present invention provides a 3-phase commit client-server protocol that allows the EIS server to detect the sick-but-not-dead situations, identify the resources involved, determine its degraded level, take the actions if needed, and send out a degraded status information message to the client. In a system and method in accordance with the present invention an internal availability monitor analyzes the resources that have not been externalized, such as storage pools, control blocks, etc, and are therefore not available to external monitors. | 07-02-2009 |
20090172156 | ADDRESS SECURITY IN A ROUTED ACCESS NETWORK - In one embodiment, providing multi-layer address security incorporating Layer 2 Media Access Control (MAC) addresses and corresponding Layer 3 Internet Protocol (IP) addresses for host machines on a routed access network is provided. | 07-02-2009 |
20090172157 | Method and Device for Content Transmission on P2P Network - This invention discloses a method and device for content transmission on P | 07-02-2009 |
20090172158 | MEMORY MANAGEMENT SYSTEM AND METHOD FOR OPEN PLATFORM - The present invention relates to a memory management system and method for open platform. The memory management system and method of the present invention utilizes the main spirit of sharing service in open platform. When the used memory in local open platform exceeds an upper limit, the standard service bundle access interface is used for accessing the standard service bundle in remote open platform. Therefore, the standard service bundle in local open platform can be off-loaded to release the memory space so as to resolve the memory shortage problem. The stability of the whole system can be maintained. | 07-02-2009 |
20090172159 | Web Page Link-Tracking System - A link-tracking server receives a request for a Web page or an image and stores link-tracking information in one or more link-tracking files to create a record of link-tracking information. The link tracking files may later be accessed by a link-tracking subscriber, such as by logging onto the link-tracking server. A content provider embeds link-tracking code in each Web page where link-tracking information is desired to be captured. Such Web pages embedded with such link-tracking code are then stored in a content provider server, which then serves such tracking-enabled Web pages to users on the network. When a user requests a tracking-enabled page, the link-tracking code sends one or more requests to a link-tracking server to record link-tracking information. | 07-02-2009 |
20090177766 | REMOTE ACTIVE WINDOW SENSING AND REPORTING FEATURE - A system and method is provided for remote active window sensing of a display in a computing device and reporting of the same. The system includes a tool comprising a remote monitoring and reporting component configured to monitor active windows of one or more remote devices and provide a report to a presenter as to whether the active windows of the one or more remote devices are associated with a presentation of the presenter. | 07-09-2009 |
20090177767 | Local Web Server Based Controller - A system for monitoring parameters related to a product in a storage tank is provided. The system includes a monitor operably coupled to the storage tank, an internet protocol (IP) enabled electronic device, and an internet protocol enabled controller. The controller is in communication with the monitor and the electronic device. The controller and the electronic device communicate through an internet regarding information observed by the monitor. | 07-09-2009 |
20090177768 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR EXTRACTING PORT-LEVEL INFORMATION OF WEB SERVICES WITH FLOW-BASED NETWORK MONITORING - Systems, methods, and computer program products for extracting port-level information of Web services with flow-based network monitoring. Exemplary embodiments include a method for extracting port-level information of Web services with flow-based network monitoring, the method including identifying a registry machine, coupling the registry machine to a traffic meter and flow monitor dynamically configuring the traffic meter, including exporting a first n bytes of a traffic payload exporting a sub-second traffic flow start and end times, extracting service provider information from traffic flow exports, including analyzing the exported n bytes of the traffic payload to extract port-level information at the flow monitor, extracting a value of an access point element, mapping a logical service provider address to a physical address and inserting the service into a Web Service Provider Registry within the flow meter, thereby populating the Web Service Provider Registry. | 07-09-2009 |
20090177769 | DETERMINING ONLINE STATUS OF A MEDICAL DEVICE - Methods and systems of patient treatment are disclosed. The methods and systems include use of medical device informatics to modify and validate therapies and drugs used in those therapies. In certain embodiments, a medical device, such as a medical infusion pump, interfaces with a server to administer the patient treatments. In one aspect, a method of determining the on-line status of a medical device is disclosed. The method includes expecting communication from the medical device within a predetermined period, and determining whether a message has been received from the medical device within the predetermined period. The method further includes establishing an on-line status for the medical device based on the determining step. | 07-09-2009 |
20090177770 | DOMAIN MANAGING METHOD, DOMAIN EXTENDING METHOD AND REFERENCE POINT CONTROLLER ELECTING METHOD - A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request for authenticating a reference point controller from a reference point controller candidate; invalidating a membership of the stored reference point controller; generating a unique reference point controller membership for verifying that the reference point controller candidate is a new reference point controller; and transmitting the generated reference point controller membership to the reference point controller candidate. Accordingly, even when an error occurs in the reference point controller, the function of the reference point controller can be rapidly replaced by using the reference point controller candidate. | 07-09-2009 |
20090177771 | METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, a first packet, sent from a user client, having a web content request meeting certain monitoring selection criteria is detected. Upon detection of the first packet, a second packet is forwarded to the user client. The second packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement. | 07-09-2009 |
20090177772 | METHOD, SYSTEM AND DEVICE FOR ESTABLISHING A PEER TO PEER CONNECTION IN A P2P NETWORK - A method and system for establishing a peer to peer connection in a P2P network and a peer device in the P2P network, wherein the method comprises of the following: (1) a management node in the P2P network receives a resource request; (2) the management node selects one or more peers which meet the demand from a resource list established previously according to the logon information of the other peers in the P2P network to return it to a resource request peer; (3) the connection is established between the said resource request peer and the said peers which meet the demand. | 07-09-2009 |
20090182863 | CENTRALIZED SOCIAL NETWORK RESPONSE TRACKING - Embodiments of the present invention address deficiencies of the art in respect to response subscriptions and provide a method, system and computer program product for centralized response tracking across social networks. In one embodiment of the invention, a social networking response tracking method can be provided. The method can include associating subscribers with a user or a group of users based upon a posting by the user or a user in the group of users within a centralized response tracking system, aggregating different postings from the user to correspondingly different forums disposed about a global computer communications network within the centralized response tracking system, and, notifying the subscribers of the aggregated postings from the centralized response tracking system. | 07-16-2009 |
20090182864 | Method and apparatus for fingerprinting systems and operating systems in a network - A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers. Generally, the internet protocol packet that is analyzing will be captured from an aggregation point in the carrier network. | 07-16-2009 |
20090182865 | SMART COMPONENT MONITORING - One embodiment of the present invention provides a system that automatic discovers and monitors enterprise components. During operation, the system scans an enterprise environment for an item of meta-data. Next, the system analyzes the item of meta-data to determine a monitoring instruction for a corresponding enterprise component. Finally, the system performs the monitoring instruction for the corresponding enterprise component. | 07-16-2009 |
20090182866 | Method of setting and managing performance monitoring conditions and computer system using the method - In order to change a policy while alarm-monitoring a production environment, during a production-environment operation, a method of controlling a computer system is provided, in which a policy is temporarily changed, thereby performing setting change. An agent transmits a monitoring result based on a first monitoring condition. A management unit generates a second monitoring condition based on a received change request. The agent transmits a monitoring result based on the second monitoring condition. The management unit holds information for correlating the first and second monitoring conditions with each other. Upon reception of a confirmation request for confirming the second monitoring condition, the management unit specifies the first monitoring condition correlated with the second monitoring condition based on the information. The agent which has received the deletion request stops the transmission of the monitoring result based on the first monitoring condition. | 07-16-2009 |
20090182867 | METHOD AND APPARATUS FOR IDENTIFYING A PACKET - A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network. | 07-16-2009 |
20090182868 | Automated network infrastructure test and diagnostic system and method therefor - A testing system provides automated testing of one or more network infrastructures. The testing system may automatically reconfigure one or more devices within a network infrastructure and then conduct testing on the newly configured network infrastructure. Test results may be used to diagnose network anomalies and to compare performance or other characteristics of various network configurations. In one embodiment, the testing system tests a communication channel between a front-end and back-end mechanism where data traffic is encoded between the front-end and back-end mechanism. | 07-16-2009 |
20090182869 | VIEWING EFFECT MEASURING SYSTEM, AND MEASURING METHOD AND MEASURING TERMINAL THEREOF - A viewing effect measuring system is provided. A user terminal performs a content output process for receiving content from a content delivery apparatus and outputting the content, a Web site displaying process for accepting a request to access a Web site, while the content are outputted, accessing the Web site via the network, and displaying the Web site in such a manner as available for browsing, and a measurement information sending process for establishing an association between Web site specifying information which identifies the Web site as to which the access is requested, and content specifying information which identifies the content being outputted when the access is performed, and sending information of the association as viewing information to a measuring server. The measuring server receives the viewing information from the user terminal and sends the information to a Web server of the Web site as measurement information. | 07-16-2009 |
20090182870 | METHOD AND COMMUNICATION SYSTEM FOR MANAGING A COMMUNICATION NETWORK - Communication networks are automatically tested from a superordinate producer-independently managing network management center, such as when subordinate, producer-specific operation and maintenance centers (OMCs) are not occupied. Producer-dependent information is transmitted when an alarm report is sent and producer-specific hardware tests are automatically generated in the network management center (NMC). It is unnecessary for producer-specific object classes to be completely defined in the information model of the OMC-NMC interface. The tests automatically generated in the network management center can be triggered in response to errors, e.g. for a particular hardware board, or preventively, for example for the entire hardware of a network unit. | 07-16-2009 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 07-16-2009 |
20090182872 | Method and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community - A method of detecting events in a computer-implemented online community includes providing a computer-implemented event processor, providing the computer-implemented event processor with a description of at least one event to be detected, automatically analyzing messages of the online community with the computer-implemented event processor to detect the at least one event, and issuing a notification of a detected event. Also an apparatus for carrying out the method. | 07-16-2009 |
20090187650 | Method and system for determining probability for availability in an instant message system - This invention provides a method or a system to track, query, and display an accurate time for the availability of other users in an instant messaging environment. The solution provides an advantage over the known solutions by providing an accurate estimation of the time for the user to be online, thus avoiding waiting for the person to log on during a timeframe where the person typically does not log on. This is a common occurrence where team members are located on the other side of the world. | 07-23-2009 |
20090187651 | Information technology remote services management environment - An apparatus for providing remote services to an integrated information technology environment. The information technology environment comprises a services appliance. The services appliance provides agent-less monitoring of information handling systems within the information technology environment. The apparatus comprises a remote management platform. The remote management platform is configured to receive services information from the services appliance. The remote management platform analyzes the services information and determines a response based upon the services information. The remote management platform initiating the response by the remote management platform based upon the services information. | 07-23-2009 |
20090187652 | Inferred Discovery Of Devices Of A Data Communications Network - Methods, apparatus, and products for inferred discovery of devices of a data communications network are described. In embodiments of the present invention the data communications network includes a plurality of data communications devices connecting a plurality of routers, each data communications device having a device address, each router having one or more network interfaces. Embodiments of the present invention also include querying each router for connection data, the connection data associating interfaces of the router with device addresses; identifying for each router in dependence upon the connection data an interface of the router connected to a data communications device including identifying a device address associated with the interface; and creating, in dependence upon the identified device addresses for all routers, a representation of the data communications network in a network model. | 07-23-2009 |
20090187653 | SYSTEMS AND PROCESSES OF IDENTIFYING P2P APPLICATIONS BASED ON BEHAVIORAL SIGNATURES - Disclosed are a system and a process for identifying P2P applications and specific P2P software as well from an original mixed packet trace based on behavioral-signatures. The behavioral-signature based system and process according to the invention is mainly to check whether the application has these specific periodic behaviors or not. The process of this invention comprises the steps of filtering out all irrelative packets; translating the filtered packet trace into discrete-time sequences; processing the sequences to obtain frequency-domain characteristics of original packet trace; and analyzing the frequency-domain characteristics and determining the identification. | 07-23-2009 |
20090187654 | SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm. | 07-23-2009 |
20090187655 | Secure platform management device - A platform management device configured to control the functionality of a provisioned electronic device is disclosed. The platform management device includes a processor operative to execute commands. A memory maintains a series of instructions that when executed by the processor, causes the processor to: ( | 07-23-2009 |
20090187656 | METHOD, SYSTEM, AND APPARATUS FOR SCHEDULING PATTERN BASED WEB SERVICES - A method of scheduling a request for a plurality of Web services can include providing service activation rules. Each service activation rule can specify a trigger condition and a state condition for causing a watcher to invoke a particular Web service. The method also can include receiving an event indicating a change in a common memory, wherein each event specifies trigger information, comparing the trigger conditions of the service activation rules with the trigger information of the event, adding the service activation rules that match the event to a trigger list, and comparing the state conditions of service activation rules in the trigger list with a state of the common memory. The service activation rules of the trigger list that match the state of the common memory can be selected thereby causing the invocation of at least one watcher and corresponding Web service. | 07-23-2009 |
20090193111 | METHOD FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels. | 07-30-2009 |
20090193112 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels. | 07-30-2009 |
20090193113 | SYSTEMS AND METHODS FOR GRID-BASED DATA SCANNING - A computing grid for performing scanning operations on electronic data in a networked computing environment. The data scanning operations may include scanning data for viruses or other malicious software code. The computing grid for performing data scanning operations may include one or more event detectors to detect data scanning events and one or more grid scanning elements to perform the data scanning operations. The computing grid may also include a grid coordinator to monitor the grid configuration, perform necessary updates to the grid, and to take pre-determined actions based on the results of the data scans. | 07-30-2009 |
20090193114 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ANALYZING DATA FROM NETWORK-BASED STRUCTURED MESSAGE STREAM - A system, method and computer program product for analyzing data from a message stream, are disclosed. Data in a structured format is captured from a message stream. The captured data is processed to conform to a data model format so that one or more events can be identified from an analysis of the processed data. Once an event has been identified, the message stream is monitored to detect the identified event. When detected, the event is exported via a network. | 07-30-2009 |
20090193115 | Monitoring/analyzing apparatus, monitoring/analyzing method and program - A receiving unit receives data of a specific protocol, transmitted from a server to a client. An extraction unit extracts status codes from the received data. A classification unit classifies the extracted status codes, into first-type status codes and second-type status codes. A judgment unit finds a receiving rate of first-type status codes and a receiving rate of second-type status codes and compares the receiving rate of first-type status codes against a threshold value thereof, and the receiving rate of second-type status codes against a threshold value thereof. From results of comparison, the judgment unit then determines whether an increase in server load has resulted from a normal traffic or an abnormal traffic. | 07-30-2009 |
20090193116 | DATA CAPTURE SYSTEM AND METHOD - A computer-implemented data capture system and method for capturing inputs made at a client system are disclosed. The data capture system | 07-30-2009 |
20090193117 | SYSTEM AND METHOD FOR PRESENCE SUBSCRIPTION DELEGATION - A system and method for presence subscription delegation in a multi-domain environment in an SIP-based presence system are provided, in which a watcher transmits a presence subscription delegation request to a presence subscription delegation handler of a delegating user, the presence subscription delegation handler performs delegation authorization for the received presence subscription delegation request according to a presence delegation authorization rule of the delegating user being authorization information about presence subscription delegation, and a presence server of a presentity receives the presence subscription delegation request from the presence subscription delegation handler, performs presence authorization according to a presence authorization rule of the presentity, and transmits presence information about the presentity to the watcher via the presence subscription delegation handler. | 07-30-2009 |
20090193118 | Non-centralized network device management using console communications apparatus - A apparatus for the management of one or more wide area or local area network connected devices by a collocated managing device. The managing device includes communications connectivity to each of the managed devices via a console connection and optionally via shared local area network connections. Additionally, the managing device includes a control system and a database. The device is designed to operate securely and operate autonomously or coupled with an external device, for example a management system, or a user. | 07-30-2009 |
20090193119 | Methods and Systems for Reducing the Spread of Files on a Network - Methods and systems can reduce the spread of computer files or data on a network by obtaining and tracking times of arrival for chunks of data transmitted on the network. The times of arrival for a node can be transformed into time-series and periodograms computed from the time-series. Successive periodograms can be compared to determine changes in the strongest peaks of the periodograms. If a new peak is identified, a search for the occurrence of the peak in previous periodograms can be conducted. If no peak having a matching frequency is found, a search for the peak in the periodograms for neighboring nodes can be performed. If matching peaks are found, the associated data stream can be classified. Predictions of the timing and length of associated data packets can be used to randomly interrupt transmission of associated data packets resulting in reducing the spread of the classified data stream. | 07-30-2009 |
20090198813 | SERVER APPARATUS AND COMPUTER READABLE RECORDING MEDIUM - Prior to a request from an integrated system | 08-06-2009 |
20090198814 | Monitoring device, monitoring system, monitoring method, and program - Diverting condition storage unit | 08-06-2009 |
20090204700 | COORDINATED PEER-TO-PEER (P2P) REPLICATED BACKUP AND VERSIONING - Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy. | 08-13-2009 |
20090204701 | NODE MONITOR CLIENT CACHE SYNCHRONIZATION FOR MOBILE DEVICE MANAGEMENT - A stateful cache layer is created at a mobile device client that tracks the state on both the mobile device and management service. The states are synchronized between the mobile device and the management service on every management session. Through the statefulness of the cache layer, unauthorized changes on the mobile device are detected and accordingly handled such as internal correction or reporting to the management service for actionable instructions. A cache layer on the management server is configured to identify organizational policy changes that affect specific devices and initiate unsolicited immediate management sessions to update the configuration to the specific devices. | 08-13-2009 |
20090204702 | SYSTEM AND METHOD FOR NETWORK MANAGEMENT USING SELF-DISCOVERING THIN AGENTS - In one embodiment, a computer-implemented method of managing a computer network includes installing an agent in each of a plurality of network nodes in the network. The agent may be configured to identify one or more types of network resources attached to a particular node with which the agent is associated. One or more roles may be assigned to or by the agent based, at least in part, upon the one or more types of network resources identified by the agent. Functions associated with the identified roles may be executed. Monitoring the status of each agent may also be carried out. In another embodiment, a network management system includes an agent executing within an associated network node of the network. The agent may be configured to operate so as to identify one or more types of resources attached to the network node. The agent may be assigned one or more roles based, at least in part, on an inference based upon the one or more types of attached resources identified by the agent. | 08-13-2009 |
20090204703 | AUTOMATED DOCUMENT CLASSIFIER TUNING - Subject matter disclosed herein relates to document classification and/or automated document classifier tuning. | 08-13-2009 |
20090204704 | SYSTEM AND METHOD FOR TRACKING UNIQUE VISITORS TO A WEBSITE - A system and method for analyzing traffic to a website is provided that is based on log files and that uses both server-side and client-side information channeled through one source to create a more complete picture of activity to a website. In one preferred embodiment, a sensor code is embedded in a requested web page, and sends information back to the web server where the website resides. This additional information is logged along with normal requests. | 08-13-2009 |
20090204705 | On Demand File Virtualization for Server Configuration Management with Limited Interruption - Inserting a file virtualization appliance into a storage network involves configuring a global namespace of a virtualization appliance to match a global namespace exported by a distributed filesystem (DFS) server and updating the distributed filesystem server to redirect client requests associated with the global namespace to the virtualization appliance. Removing the file virtualization appliance involves sending a global namespace from the virtualization appliance to the distributed filesystem server and configuring the virtualization appliance to not respond to any new client connection requests received by the virtualization appliance. | 08-13-2009 |
20090204706 | BEHAVIORAL NETWORKING SYSTEMS AND METHODS FOR FACILITATING DELIVERY OF TARGETED CONTENT - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user. | 08-13-2009 |
20090204707 | BANDWIDTH CONTROL SERVER, COMPUTER READABLE RECORD MEDIUM ON WHICH BANDWIDTH CONTROL PROGRAM IS RECORDED, AND MONITORING SYSTEM - A bandwidth control server, a bandwidth control program recorded on a computer readable record medium, and a monitoring system that control the sending of image data obtained by cameras in accordance with priority corresponding to a situation. A setting information storage section stores setting information regarding a camera installed at each point. When disaster information is acquired, a disaster detection section extracts a disaster type and a disaster area from the disaster information. A priority determination section searches the setting information on the basis of the disaster type and the disaster area and extracts setting information corresponding to the disaster type. Then the priority determination section determines priority for sending image data obtained by cameras installed in the disaster area on the basis of the extracted setting information. A bandwidth control section ensures bandwidths which can be used for sending the image data in descending order of the priority on the basis of the priority and bandwidth information acquired by a network monitoring section. | 08-13-2009 |
20090204708 | MANAGING A NETWORKED STORAGE CONFIGURATION - Managing a networked storage system having a host operable to connect through a network fabric to storage apparatus comprises: a configuration component for inputting a configuration change into the networked storage system responsive to change instructions; a monitoring component operable in communication with the host and the network fabric to monitor I/O activity associated with elements of the networked storage system; an activity data storage component responsive to the monitoring component for storing a record of a monitored I/O activity; an analysis component, responsive to the configuration component for inputting configuration changes, for analysing the record of a monitored I/O activity for a recent activity; and an alert component, responsive to the analysis component detecting a recent activity, for alerting the configuration component. | 08-13-2009 |
20090204709 | System, method and computer program product for monitoring and controlling network connections from a supervisory operating system - A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system. | 08-13-2009 |
20090210525 | Method for Detection of the Activity of a Device In a Network of Distributed Stations, as Well as a Network Station for Carrying Out the Method - The invention relates to the technical field of local data transmission networks, in particular domestic networks. In networks such as these, the network stations log on in connection to the network. On disconnection, the network station which is leaving the network logs off in an appropriate manner. In the situation in which the user disconnects a network station simply by pulling out the network cable from the network, it is physically impossible to transmit the logging-off message. The invention is now concerned with the problem of how reliably an inactive network station can be identified, also taking account of the disconnection of the network station simply by pulling out the network plug. The invention solves the problem by regular transmission of a search request to the stations in the network. If a search request remains unanswered by one network station, an HTTP access is additionally attempted to, for example, the device description of the network station in question, or a control request. The network station is identified as being inactive only if this access/control request also fails. In the case of a UPnP network, the search request is made using the unprotected SSDP protocol, so that the lack of any response to the search request does not in its own right reliably indicate that the network station has logged off. The supposition that the network station which did not respond to the search request is inactive is confirmed by means of the HTTP access, which takes place on an error-protected basis. | 08-20-2009 |
20090210526 | DOMAIN NAME CACHE CONTROL - Domain name caching is controlled by adding a nonce to a domain name to force propagation of lookup to an authoritative server or service. Desired caching behavior is dictated by controlling when a new and unique nonce-bearing name is created. For example, caching can be completely eliminated by generating a new nonce-bearing name for every request. While a nonce can simply correspond to a random or pseudo random value, it can also be time based. Furthermore, nonces can be phase or time shifted to limit authoritative server load as well as improve response time. | 08-20-2009 |
20090210527 | Virtual Machine Management Apparatus, and Virtual Machine Management Method and Program - A virtual machine management apparatus connected to a plurality of server devices via a network generates a new virtual machine on a server device in accordance with a request from a management terminal. At that time, for one or more server devices to which a new virtual machine can be allocated, the virtual machine management apparatus refers to an allocation rule table for storing a score for each of combinations of types of virtual machines. The score indicates appropriateness of a condition that each combination of types of virtual machines is to be allocated to the same server device. Thus, the virtual machine management apparatus computes an index value indicative of appropriateness of a condition that the new virtual machine is to be allocated to the server device. Then the virtual machine management apparatus determines an allocation target for the new virtual machine with reference to the computed index value. | 08-20-2009 |
20090210528 | METHOD FOR DETERMINING METRICS OF A CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK - A method for determining metrics of a content delivery and global traffic management network provides service metric probes that determine the service availability and metric measurements of types of services provided by a content delivery machine. Latency probes are also provided for determining the latency of various servers within a network. Service metric probes consult a configuration file containing each DNS name in its area and the set of services. Each server in the network has a metric test associated with each service supported by the server which the service metric probes periodically performs metric tests on and records the metric test results which are periodically sent to all of the DNS servers in the network. DNS servers use the test result updates to determine the best server to return for a given DNS name. The latency probe calculates the latency from its location to a client's location using the round trip time for sending a packet to the client to obtain the latency value for that client. The latency probe updates the DNS servers with the clients' latency data. The DNS server uses the latency test data updates to determine the closest server to a client. | 08-20-2009 |
20090216872 | METHOD AND DEVICE FOR TRANSMITTING FILES VIA A NETWORK - A method for transmitting files via a network is proposed. In a first step, the size of a file to be transmitted is transmitted. Following this, the value of a maximum permitted data traffic is calculated from the size of the file and a factor X. Finally, the transmission process of a file is stopped as soon as the data volume transmitted exceeds the maximum permitted data traffic. | 08-27-2009 |
20090216873 | Communication of Offline Status Between Computer Systems - A method for communication of offline status between nodes includes detecting an impending deactivation of a physical port and sending a message from a sending node to a receiving node notifying the receiving node of the impending deactivation of the physical port. The method further includes deactivating the report of any error for the physical port and sending a response from the sending node to the receiving node verifying that deactivation of the physical port. | 08-27-2009 |
20090216874 | MONITORING ASYNCHRONOUS TRANSACTIONS WITHIN SERVICE ORIENTED ARCHITECTURE - A monitoring system is used to monitor extended business transactions comprised of asynchronous messages. Each message may be a request or a response of an application transaction request-response pair and may be identified with a unique identifier. The unique identifier may be used to identify two or more asynchronous messages, where each extended business transaction may be associated with one or more unique identifiers to identify messages that comprise the business transaction. The extended business transactions are completed over an extended period of time and implemented over several different machines which may or may not be in communication with each other are monitored. Alerts are generated when messages of the extended business transaction do not satisfy a threshold or other criteria, such as a time period for occurring. A user interface or other mechanism may be used to configure the transactions and provide information regarding the status of the transactions and alerts generated for uncompleted portions of the transaction. | 08-27-2009 |
20090216875 | FILTERING SECURE NETWORK MESSAGES WITHOUT CRYPTOGRAPHIC PROCESSES METHOD - A network filtering system and method without requiring cryptographic processing of secure message transmissions. The method provides for determining target node ID associations corresponding to domain names of filtered node DNS requests and corresponding network address and address duration data determined according to a corresponding DNS responses. The method also provides for comparing a destination address of a current message transmission corresponding to a filtered node with the determined target node ID associations, and conducting filtering processing of the current message transmission. | 08-27-2009 |
20090216876 | SMART ENDPOINT AND SMART MONITORING SYSTEM HAVING THE SAME - A smart endpoint and a smart monitoring system having the smart endpoint are provided. The smart endpoint includes a central processing unit (CPU), an interface module, a digital signal processing unit, and a memory module. The interface module is coupled to the CPU for receiving a plurality of heterogeneous monitoring signals and an identification code. The digital signal processing unit is coupled to the CPU for integrally considering the monitoring signals and the identification code to determine an abnormal event, and generate an abnormal event data thereby. The memory module is coupled to the CPU for recording the abnormal event data. As such, the present invention is adapted to determine an occurrence of an abnormal event, by which the passive monitoring can be upgraded to an active monitoring and analyzing, and thus achieving a smart monitoring. | 08-27-2009 |
20090216877 | Network monitoring system with common storage medium and a method thereof - A network monitoring system with common storage medium includes at least one monitor, a network communication path, a monitoring host, a network memory, and a display screen. The monitoring host assigns a different IP address to each of the monitors. When the network monitoring system is started, the monitoring host controls each of the monitors to obtain the monitor data according to the IP address. Next, the monitoring host uses the data serial stream transmission technology to obtain the monitor data from the monitors via the network communication path. Finally, the monitoring host stores the monitor data and transmits the monitor data to the display screen and display it. Thereby, the resource is shared, and the network monitor is achieved. | 08-27-2009 |
20090216878 | Method and System for Providing A Self-Populating Database for the Network Collection of Meter Data - The invention provides a method and a system for collection of meter readings from the field and for providing a self-populating database for storing and retrieving the meter data. A network data collection computer operating according to a stored computer program reads in data from the receivers and detects the meter reading devices that are sending data through a respective receiver. If not previously detected, the network data collection computer allocates space in the database for the data and stores the meter data and indexes it by the receiver and meter reading device from which it was received, and by the date and time of reception at the network data collection system. This data can then be retrieved and displayed or printed out by these parameters in database reports. | 08-27-2009 |
20090216879 | ELEMENT MANAGEMENT SYSTEM WITH FUNCTION TO TRANSFER DATABASE - An element management system which allows a client to monitor and control elements on a network through element management servers includes a unit configured to manage a transfer state separately for each element when management information regarding an element accommodated in a first element management server is to be transferred to a second element management server, and a unit configured to cause the management information at the second element management server to reflect a differential between the management information at the first element management server and the management information at the second element management server upon creation of the differential that is created by the client upon controlling an element for which the transfer state indicates uncompleted transfer, wherein an accommodated element is transferred in real time between the first and second element management servers without suspending monitor and control performed by the first and second element management servers. | 08-27-2009 |
20090216880 | Methods and Systems for Dynamic Transport Selection Based on Last Mile Network Detection - The present invention relates to systems, apparatus, and methods of dynamic transport selection. The method includes determining link characteristics for a network connection between a client and a server. The link characteristics include a transport type and a connection type. The method further includes, based on the link characteristics, dynamically determining an optimal transport type, changing the transport type to the optimal transport type, and transmitting data between the client and the server using the optimal transport type. | 08-27-2009 |
20090216881 | METHOD AND APPARATUS FOR MAINTAINING THE STATUS OF OBJECTS IN COMPUTER NETWORKS USING VIRTUAL STATE MACHINES - A network appliance for monitoring, diagnosing and documenting problems among a plurality of devices and processes (objects) coupled to a computer network utilizes periodic polling and collection of object-generated trap data to monitor the status of objects on the computer network. The status of a multitude of objects is maintained in memory utilizing virtual state machines which contain a small amount of persistent data but which are modeled after one of a plurality of finite state machines. The memory further maintains dependency data related to each object which identifies parent/child relationships with other objects at the same or different layers of the OSI network protocol model. A decision engine verifies through on-demand polling that a device is down. A root cause analysis module utilizes status and dependency data to locate the highest object in the parent/child relationship tree that is affected to determine the root cause of a problem. Once a problem has been verified, a “case” is opened and notification alerts may be sent out to one or more devices. A user interface allows all objects within the network to be displayed with their respective status and their respective parent/child dependency objects in various formats. | 08-27-2009 |
20090216882 | METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS TRANSMITTED VIA PIGGYBACKING HTTP TRANSACTIONS - Disclosed is an internet traffic monitoring method that includes a network service provider analyzing an HTTP transaction involving an internet user client. The network service provider responds to the HTTP transaction by forwarding, to the internet user client, a modified web object including a monitoring implement. After forwarding the modified web object to the internet user client, the network service provider forwards a web object, originally associated with the HTTP transaction, to the internet user client. | 08-27-2009 |
20090216883 | MANAGING ESCALATING RESOURCE NEEDS WITHIN A GRID ENVIRONMENT - A method, system, and program for managing escalating resource needs within a grid environment are provided. A job is submitted into a first selection of resources in a grid environment from among a hierarchy of discrete sets of resources accessible in the grid environment. Discrete sets of resources may include locally accessible resources, enterprise accessible resources, capacity on demand resources, and grid resources. The performance of the first selection of resources is monitored and compared with a required performance level for the job. If the required performance level is not met, then the discrete sets of resources are queried for available resources to meet the required performance level in an order designated by said hierarchy. Available resources in a next discrete set of resource from the hierarchy of discrete sets of resources are added to a virtual organization of resources handling the job within the grid environment. In particular, the virtual organization of resources may include the first selection of resources and the added resources which are distributed across heterogeneous systems. If capacity on demand resources are allocated and added to the virtual organization, then the capacity on demand resources are deallocated when no longer needed. | 08-27-2009 |
20090222549 | CORRELATING PERFORMANCE DATA OF MULTIPLE COMPUTING DEVICES - Systems, products, and methods are disclosed for facilitating the correlation of performance data associated with multiple computing devices. An illustrative method includes referencing a time as indicated by a computer and referencing a start time indication that identifies a time to begin monitoring computer performance. Thereafter, the time indicated by the computer and the start time indication are utilized to determine an initial monitoring delay. Upon determining an initial monitoring delay, an initial monitoring of the computer performance is delayed until the initial monitoring delay has lapsed. In one embodiment, computer performance data collected upon the lapse of the initial monitoring delay can be correlated with performance data associated with other computing devices. | 09-03-2009 |
20090222550 | MEASUREMENT OF THE EFFECTIVENESS OF ADVERTISEMENT DISPLAYED ON WEB PAGES - A method to determine user attentiveness to an information item included in a web page comprising: displaying an image representing a first web page that includes a first information item to a first individuals; determining a baseline time that represents a typical amount of time that respective first individuals look at the first information item; sending a first web page over a network to first user devices; and sending a second web page over a network to second user devices; wherein the second web page appears substantially the same as the first web page except with a second information item instead of the first information item; obtaining first time measurements of an amount of time that first users of the first user devices typically spend looking at the first web page; obtaining second time measurements of an amount of time that respective second users of the second user devices typically spend looking at the second web page; determining a comparative time measure that is indicative of a difference in time respective first and second users typically spend looking at the first and second web pages; using the baseline time and the comparative time measure to determine an amount of time that a typical user is likely to spend looking at the second information item included in the second web page. | 09-03-2009 |
20090222551 | METHOD AND SYSTEM FOR QUALIFYING USER ENGAGEMENT WITH A WEBSITE - A system and a method of identifying information characterizing use of a website is provided. A plurality of user profiles are analyzed. A user profile includes information associated with an interaction by a user with the website. A plurality of user comments associated with the website are analyzed. Characteristic information associated with use of the website is determined based on the analyzed user profiles and the analyzed user comments. The determined characteristic information is presented to a user. | 09-03-2009 |
20090222552 | HUMAN-COMPUTER PRODUCTIVITY MANAGEMENT SYSTEM AND METHOD - The invention is a human-computer productivity management system with both processes and data systems designed to monitor the interactions between humans and computer systems, log the interactions, securely transmit the data to a centralized server, archive the data, process the data into highly efficient database, analyze the data to calculate productivity metrics, distill the data into key business intelligence reports and control the use of the computer systems. | 09-03-2009 |
20090222553 | Monitoring network performance to identify sources of network performance degradation - A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation. | 09-03-2009 |
20090222554 | Statistics for online advertising - An apparatus and a method for collecting online advertisement statistics is described. In one embodiment, a web browser of a client requests from a server, a web page having an advertisement banner. The web browser receives the web page and a JavaScript program. The browser loads the webpage and the JavaScript program which polls the browser of one or more property of an HTML image object included in the advertisement banner of the web page. The JavaScript program reports out the one or more property of the HTML image object. | 09-03-2009 |
20090222555 | Network performance monitor - A network performance monitor for a computer. The performance monitor maintains a baseline for communication paths between a networked computer and other networked computers connected. The network performance baseline is established and maintained by measuring and updating network performance parameters of the communication paths. The network performance parameters are updated using values obtained during time intervals when the communication path consumed a bandwidth approximately equal to its estimated bandwidth. If congestion is detected on the network or the network is underutilized, values of the network performance parameters obtained during that interval are not used to update the network performance parameters. Some performance parameters in the baseline, such as minimum and maximum bandwidth values may be updated by computing a moving average of each parameter. Asymmetric weight values for updating the moving average may be selected based on a direction of change of a value of a network parameter. | 09-03-2009 |
20090222556 | Monitoring Network Usage - A method of determining whether a user has complied with a service level agreement (SLA) with a network operator, comprising collecting a set of data values representative of the user's service usage and comparing the set of data values to the service level agreement. The data values collected provide the operator with sufficient information so that it can determine whether a SLA is being complied with and to plan provision of network services. A method of monitoring a user's usage of a network service and a service usage indicator is also disclosed. | 09-03-2009 |
20090222557 | ANALYSIS SYSTEM, INFORMATION PROCESSING APPARATUS, ACTIVITY ANALYSIS METHOD AND PROGRAM PRODUCT - An analysis system, information processing apparatus, activity analysis method, and program for analyzing activities of an information source on a network. The system and apparatus include an attribute extraction block for extracting, an information propagation graph acquisition block for searching action history data, and a characteristic user calculation block for calculating an amount characteristic. The method and program product include the steps of extracting an information characteristic value, searching action history data, registering the information, calculating an amount characteristic, and integrating the amount characteristic. | 09-03-2009 |
20090222558 | Managing Network Data Transfers in a Virtual Computer System - A method for protecting a virtual computer system which may be susceptible to adverse effects from a Denial of Service attack is described. The virtual computer system includes a plurality of VMs. In the method, data that is transferred between the virtual computer system and the computer network is monitored for an indication of a possible Denial of Service attack. If an indication of a possible Denial of Service attack is detected, one or more of the VMs is suspended, to reduce the risk of adverse effects on one or more other VMs. | 09-03-2009 |
20090228579 | Unified Service Management - The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc. | 09-10-2009 |
20090240797 | An On Demand Message Based Financial Network Integration Middleware - The present invention relates to distributed networking, and in particularly to a message-based networking environment. More particularly, it relates to business applications ( | 09-24-2009 |
20090240798 | Resource Equalization for Inter- and Intra- Data Center Operations - An exemplary component for managing requests for resources in a data center includes a service request module for receiving requests for resources from a plurality of services and a resource module to monitor resources in a data center and to match received requests to resources. Such a component optionally includes an application programming interface (API) that provides for sending information in response to an API call made by a service. Other methods, devices and systems are also disclosed. | 09-24-2009 |
20090240799 | INTERACTIVE DNS FOR CONTROLLING PARTY - A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information. | 09-24-2009 |
20090240800 | REMOTE MONITORING OF USER INPUT DEVICES - A precision data capture recorder/security device non-intrusively and precisely captures and records information from computerized input devices (e.g., computer keyboards and mouses). Information collected by a data capture recorder co-located with a client can be precisely date and time tag user input to a user interface (e.g., keyboard) and transmitted to a base collection station for archiving and analysis. Archived information provides accurate history logs for regulatory audit compliance, data security, and system administrative troubleshooting. Analysis can help determine whether user data input patterns at the user interface are authorized. | 09-24-2009 |
20090240801 | Computer data network filter - An electronic device which connects a network (e.g. the internet) to a subnet (e.g. a home network) for the purpose of filtering the data that moves through the device in order to prevent computers on the subnet from accessing material on the network which may be deemed inappropriate (e.g. pornography). The device contains advanced algorithms that analyze the network traffic to determine the proper configuration of the network device, without the aid of any external peer- or server-based configuration protocols (e.g. Dynamic Host Control Protocol, or DHCP). The device also contains advanced algorithms to determine, apply and update the filter rules with no direct operator authorization or intervention. | 09-24-2009 |
20090240802 | METHOD AND APPARATUS FOR SELF TUNING NETWORK STACK - A method and apparatus for tuning a computer network by detecting different workload patterns. One embodiment of the method provides a system configuration analyzer to collect data regarding network configuration and tuning parameters, a workload analyzer to collect and store data relating to tuning such as network traffic information, a system tuner to determine whether there is a change in workload and whether tuning is necessary. Another embodiment of the method provides tuning policies that would instruct the system tuner to perform certain actions if the system tuner determines that tuning is necessary. | 09-24-2009 |
20090240803 | METHOD FOR COPYING SESSION INFORMATION, CALL CONTROL SERVER FOR EXECUTING THE SAME, AND COMPUTER PRODUCT - The method is executed by a call control server that establishes a media session for sending and receiving media data between a calling terminal and a called terminal. The method includes exchanging messages with calling terminal and called terminal for establishing the media session, generating a session information necessary for establishing the media session based on the messages exchanged with the calling terminal and/or the called terminal, monitoring a media information included in the messages, the media information containing a definition specifying a way of exchanging the media data, determining, based on the monitoring result, whether the media session has been established, and transferring the session information to at least one other call control server different from the call control server if the media session has been established. | 09-24-2009 |
20090240804 | METHOD AND APPARATUS FOR PREVENTING IGMP PACKET ATTACK - A method for preventing IGMP packet attacks includes two levels of anti-attack steps: anti-attacking on the basis of the source IP address of an IGMP packet; and anti-attacking on the basis of the multicast group IP address of the IGMP packet. Moreover, an apparatus for preventing IGMP packet attacks is disclosed herein. In the embodiments of the present disclosure, the attacks are prevented hierarchically in light of the source address and multicast group IP of the IGMP packet, thus effectively solving network exceptions caused by malicious IGMP packets which surge in a short time. | 09-24-2009 |
20090240805 | Isolating Local Performance Variation in Website Monitoring - Systems and methods are provided for isolating performance variation in website monitoring. A set of geographically diverse monitoring agents are identified and a subset of baseline agents is selected from these monitoring agents. The baseline agents are those agents that are geographically close to the target website or otherwise enjoy reliable communications with the target website and are therefore less affected by network latencies. The frequency at which a target website is monitored is weighted in favor of the baseline agents in order to get an accurate baseline metric for the target website while also obtaining information regarding global accessibility of the website from the geographically disperse monitoring agents. The variations in sample frequency can be optimized for each particular set of baseline agents. The set of baseline agents can be pre-assigned or dynamically identified based on an analysis of the performance variation from each of the monitoring agents. | 09-24-2009 |
20090248850 | WAIT FOR READY STATE - Automation of actions on a server system (e.g., web server, FTP server) is facilitated by a server system that is ready for actions to be performed upon it. Because there are scenarios when a server system is not in a state to be acted upon (e.g., web page changed due to navigation, script execution, asynchronous request through dynamic web extensions), an automated action needs to be synchronized to when then server system is in a ready state for that action to occur. A wait-for-ready state can be initiated that detects when a server system is ready for a next action. | 10-01-2009 |
20090248851 | DEPLOYING ANALYTIC FUNCTIONS - A method, system, and computer usable program product for deploying analytic functions are provided in the illustrative embodiments. A resource is identified in an analytic function specification. A set of input time series is identified for the analytic function specification. An analytic function instance corresponding to the analytic function specification is instantiated in relation to an object of the resource. Each input time series in the set of time series is located in relation to the object. The analytic function instance is associated with each input time series in the set of time series. An analysis is performed using the set of input time series and an analytic function described in the analytic function specification. The analytic function instance is instantiated if both the object and the set of data sources are present in an object graph where the analytic function instance is to be instantiated. | 10-01-2009 |
20090248852 | Evaluating Entities Associations with their Respective Environments - A method comprising representing an association between a first entity and a first environment as a first edge that connects a first node to a second node, wherein the first node and the second node respectively represent said first entity and said first environment; and assigning a first weight value or type to the first edge based on an association level detected between the first entity and the first environment. | 10-01-2009 |
20090248853 | REAL TIME CONTROL AND MANAGEMENT OF SECURITY "BUDDY" SYSTEM OVER MSO LAN - An inventive system and method for a buddy security system is presented. The system and method enable the buddy security system in which messages can be exchanged between two distinct security systems. The inventive system is operable on a network having dynamic IP addresses using a centralized database of real time IP addresses. An MSO maintains the centralized database including basic information for connecting the control panels of the security systems to each other. The first and second security systems each have a control panel having a dynamic IP address; the control panel of the second system provides information to and can be controlled by the control panel of the first system. The dynamically IP address of each control panel is obtained from the centralized database. | 10-01-2009 |
20090248854 | METHOD AND SYSTEM FOR ENERGY EFFICIENT ROUTING AND NETWORK SERVICES - A method and system of an embodiment may include identifying a power source used by a network element, determining a carbon footprint of a unit of power usage from the power source, identifying one or more components associated with the network element used for a network operation performed by the network element, determining the power usage of the one or more identified components during the process, and calculating the carbon footprint of the process performed by the network element. | 10-01-2009 |
20090248855 | METHOD FOR MONITORING WEB PAGE STATISTICS - A method includes, at a web server: receiving a request from a web browser for a page; requesting the page from a web application; receiving the requested page from the web application; generating a monitoring script after receiving the request from the web browser for the page, wherein the monitoring script is hardcoded with a reference to the web application; adding the generated monitoring script to the page; sending the page with the script to the web browser, the script executing on a system hosting the web browser for generating statistics; receiving the statistics generated by the script; receiving the reference to the web application with the statistics; and storing the statistics and the reference and an association of the reference with the statistics. | 10-01-2009 |
20090248856 | Staged Integration Of Distributed System And Publishing Of Remote Services - A method, computer program product, and system for the staged integration of a remote entity and the simultaneous publishing of services is provided. The integration of the distributed remote entities is broken into five stages, with appropriate events published after each stage. Each of the five stages is initiated only if the previous stage completed successfully. The first stage is the initiate discovery phase. The first event is the discovery start event. The second stage is the discovery completed phase. The second event is the discovery completed event. The third stage is the basic software services verified phase. The third event is the basic software verification completed event. The fourth stage is the basic hardware services verified phase. The fourth event is the basic hardware verification completed event. The fifth stage is the extended hardware services verified phase. The fifth event is the full integration of disturbed entity event. | 10-01-2009 |
20090248857 | SESSION MANAGEMENT METHOD FOR COMPUTER SYSTEM - There is provided a session management method for a computer system including an initiator, and a storage system coupled to the initiator via a network. The initiator includes an interface coupled to the network, a processor and a memory. The storage system includes an interface coupled to the network, a memory and a processor. The session management method comprising the steps of: executing, by the initiator, health check for diagnosing a status of a session established between the initiator and the storage system in the case of which no data is input/output to/from the storage device for a first predetermined period; and cutting off and re-establishing, by the initiator, the session with the storage system at a timing of executing the health check in the case of which no data is input/output to/from the storage system for a second predetermined period. | 10-01-2009 |
20090248858 | CONTENT MANAGEMENT - A system and method for management and processing of resource requests is provided. A content delivery network service provider determines a class associated with a set of client computing devices and monitors resources requests for the determined class. The content delivery network service provider then identifies at least one cache component for providing additional content, such as advertisement content or other additional content provided in anticipation of future resource requests, to client computing devices as a function of the determined class. In other embodiments, instead of cache components, the content delivery network service provider identifies a second set of client computing devices as a function of the determined class for providing the additional content information. | 10-01-2009 |
20090248859 | ELECTRONIC DEVICE AND METHOD FOR MONITORING COMMUNICATION WITHIN A NETWORK - The present invention relates to an electronic device ( | 10-01-2009 |
20090248860 | SYSTEM AND METHOD FOR USING VIRTUAL IP ADDRESSES IN A MULTI-USER SERVER SYSTEM - A method of handling network access in a multi-user server system is disclosed. In the disclose system, a virtual network adapter is created for each user session on the multi-user server system. Each virtual network adapter receives its own independent IP address such that each individual user session appears to be a unique network node to other systems on the computer network. | 10-01-2009 |
20090248861 | DEVICE MANAGER AND DEVICE MANAGEMENT PROGRAM - A device manager and a computer readable medium storing a device management program are provided. The device manager includes a transmission unit that transmits, to devices connected to a network, a broadcast command which requests management information that is stored in and unique to each device for use in communication using a first communication protocol that enables communication using authenticated and encrypted data; a determination unit that determines whether the devices are devices to be managed, on the basis of the management information received in response to the broadcast command; and an information acquisition unit that transmits, using the first communication protocol, to the devices determined by the determination unit to be devices to be managed among the plurality of devices, read data for reading information about the device in order to acquire information about the device. | 10-01-2009 |
20090248862 | Device and Computer Readable Medium - A device and a computer readable medium having a computer program stored thereon are provided. The device includes: a detecting unit configured to detect one or more host computers accessible from the device and operational states of the respective host computers; and a restricting unit configured to restrict a function of the device based on the operational states of the host computers detected by the detecting unit. | 10-01-2009 |
20090248863 | ANALYSIS APPARATUS, ANALYSIS METHOD AND RECORDING MEDIUM FOR RECORDING ANALYSIS PROGRAM - An analysis apparatus includes a history analysis part analyzing the trend based on the access log and deriving the latent trait to an access destination, a principal components analysis part analyzing principal components of the frequency distribution of the access, a classification part classifying the correlation of the principal components into plural classes, an event recording part recording the events to induce to the access destination, a first generating part generating a latent trait principal component table; a second generating part generating a class construction ratio table stored the class as the result of classification,a third generating part generating an event classification table stored the class and the contents of the event, and an analysis result recording part recording the latent trait principal component table, the class construction ratio table and the event classification table, as an event feature model of the effect on the execution of the event. | 10-01-2009 |
20090248864 | SYSTEM AND METHOD FOR TRACKING PERFORMANCE AND SERVICE LEVEL AGREEMENT COMPLIANCE FOR MULTIPOINT PACKET SERVICES - A system and method for measuring compliance with a service level agreement (SLA) for communications. A committed information rate operable to avoid contention is set. A determination is made that there is frame loss on the network. A determination is made if the CIR is exceeded in response to the determined frame loss. A determination is made that a service is noncompliant with the SLA in response to determining the CIR has not been exceeded. Noncompliance of the service with the SLA is logged. | 10-01-2009 |
20090248865 | LOAD DISTRIBUTION METHOD, LOAD DISTRIBUTION DEVICE, AND SYSTEM INCLUDING LOAD DISTRIBUTION DEVICE - A load distribution device that receives processing requests from terminals and that allocates and transfers the processing requests to at least one of a plurality of servers. The load distribution device includes a monitoring unit, a request receiving unit, an update server determining unit, a distribution ratio setting unit, a load distribution unit, a notification unit and an update completion detecting unit, whereupon receipt of a notification that the update of the server to be updated is completed, the update server determining unit determines that the update to the server to be updated is completed, determines a new server to be updated and a new server to be updated next, and instructs the distribution ratio setting unit to set the distribution ratios. | 10-01-2009 |
20090248866 | CONNECTION CONTROL METHOD AND CONNECTION SYSTEM - A connection control method includes: a transmitting step of transmitting a request for provision of a function by a transmitting unit; a first storing step of storing a task involving information having a disclosure restriction set thereon, and the site of a support device that provides a function to support execution of the task by processing the information, the task being associated with the site of the support device; a first retrieving step of retrieving the site of the support device stored in the first storing step associated with the task to be supported in response to the request; and a controlling step of restricting connections with other devices by controlling the transmitting unit to transmit the request to the support device located at the site retrieved in the first retrieving step and not to transmit the request to the other devices when the request transmitted in the transmitting step is a request for a support for execution of the task. | 10-01-2009 |
20090248867 | NETWORK SYSTEM, DEVICE, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A network system capable of autonomously changing a management configuration of a management device and managed devices in the network system. One of a plurality of devices connected to a network operates as a parent device that collects data from the other devices, and the remaining devices operate as child devices that transmit data to the parent device. When the load of the parent device becomes high, at least one of the child devices is selected and upgraded to a parent device. When the load of the original parent device decreases, the device upgraded to the parent device is automatically returned to the child device. | 10-01-2009 |
20090248868 | Contact Management in a Serverless Peer-to-Peer System - Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example. | 10-01-2009 |
20090254649 | HIGH AVAILABILITY OF INTERNET PROTOCOL ADDRESSES WITHIN A CLUSTER - A method, information processing system, and computer program storage product manage network layer addresses in a cluster multi-processing environment. Network address assignment in a cluster multi-processing environment is monitored. A network address currently assigned to a first network interface is determined, in response to monitoring network address assignment, to have been assigned to a second network interface. The first network interface is triggered to send an update message to at least one computing node communicatively coupled to the first network interface triggering in response to determining that a network address currently assigned to a first network interface has been assigned to a second network interface. The update message informs the computing node to transmit data associated with the network address to the first network interface. | 10-08-2009 |
20090254650 | TRAFFIC ANALYSIS FOR A LAWFUL INTERCEPTION SYSTEM - Methods, systems, and computer-readable media provide for analyzing data traffic captured by a lawful interception system. A first record, one or more intermediate records, and a second record are received. Each of the records contains a record of test traffic, such as a website, transmitted across a broadband network. The first record, the one or more intermediate records, and the second record are reassembled to form various versions of the website. The various versions of the website are displayed so that a visual comparison can be made to verify the operation of the lawful interception system. | 10-08-2009 |
20090254651 | VERIFYING A LAWFUL INTERCEPTION SYSTEM - Methods, systems, and computer-readable media provide for verifying a lawful interception system. A first file and a second file are received. The first file is formed by recording data traffic at a computer as the data traffic generated at the computer is transmitted from the computer to a remote network via a broadband remote access server (BRAS), saving the recorded data traffic as a first packet capture and flat file export (PCAP) file, and exporting packet summary lines from the first PCAP file. The second file is formed by intercepting the data traffic as the data traffic egresses from a mediation system to a law enforcement agency (LEA) system, saving the intercepted data traffic as a second PCAP file, and exporting packet summary lines from the second PCAP file. The first file is compared with the second file to verify an accuracy of the mediation system | 10-08-2009 |
20090254652 | RESOURCE CORRELATION PREDICTION - Embodiments of the present invention address deficiencies of the art in respect to resource mapping in a change configuration and systems monitoring solution and provide a novel and non-obvious method, system and computer program product for predictively mapping automatically discovered resources in a monitored system with a manually specified resource for the monitored system. In an embodiment of the invention, a resource mapping method for application dependency and discovery can be provided. The method can include automatically discovering resources in a monitored system, manually specifying a resource in the monitored system, filtering the automatically discovered resources to a set of resources likely to match the manually specified resource, and mapping the manually specified resource to a resource in the filtered set of resources. | 10-08-2009 |
20090254653 | Service utilization route output system, management server, service utilization route output method, and service utilization route output program - A service utilization route output system wherein an integrated search system comprises: a search execution history table storing, in a memory part, access information included in a request sent from a client PC to a search system cluster being service providing servers; a utilization route extracting part extracting a service accessed by the client on the basis of the access information and a service utilization route which is the sequence of the concerned service; a statistical information extracting part computing the number of times of extraction of service utilization routes that are the same as the service utilization route extracted with the utilization route extracting part; and a utilization route display data generating part associating the service utilization route and the number of times of extraction, and generating output information. | 10-08-2009 |
20090254654 | COMPUTER NETWORK - A peer-to-peer network operating in accordance with a service-oriented architecture is disclosed. The peers in the network request services from one another and each keep a record of the quality of service they receive from the other peers. The peers can operate in two modes of service provider selection. In a first mode, the selection is so as to favour service providers which have provided the peer with good service in the past. In a second mode, the selection is probabilistic and can therefore select service providers other than those that have provided good service in the past. Each device keeps track of the relative success of adopting the second mode of selection. By occasionally using the second mode of selection and adopting the second mode of selection more frequently should the relative success of adopting the second mode of selection rise, a more rapid adjustment by the network to changing network conditions is enabled. This leads to a better utilisation of the resources of the computers of the network than has hitherto been achieved. The invention finds particular application in distributed applications which dynamically select a Web Service to perform a function at run-time. | 10-08-2009 |
20090254655 | Generation and Control of Network Events and Conversion to SCADA Protocol Data Types - A system and method is disclosed for receiving a network event in a network format, mapping the network event into a format expected by a central monitoring system, and communicating the mapped network event to the central monitoring system. The system may employ a variety of communication protocols and physical architectures. The system may include an access controller that may connect a plurality of intelligent electronic devices and may be the primary interface with an information system or central monitoring system. The access controller may include a programmable logic engine in compliance with the IEC-61131-3 standard. The access controller may further be configured to implement rules designed to govern actions taken as a result of network information. | 10-08-2009 |
20090254656 | METHOD AND APPARATUS FOR CUSTODIAL MONITORING, FILTERING, AND APPROVING OF CONTENT - The system provides a method and apparatus for a parent or other custodian or guardian to monitor, filter, and approve of content to be accessed by a child or children on a network. In one embodiment, the system logs all activity on a network by a child and sends regular historical reports to the parent for review. The parent can set certain triggers that will provide more immediate feedback when certain events occur or when certain types of data are accessed, or an attempt is made by the child for such access. The system allows the parent to control the filters and options from a variety of sources, including via the child's computer, texting, instant messaging, cell phone, other web enabled computers, PDA's, etc. | 10-08-2009 |
20090254657 | Adaptive Bitrate Management for Streaming Media Over Packet Networks - A method including providing pseudo-streaming media data to a terminal; receiving a transport control protocol (TCP) acknowledgement from the terminal; estimating one or more network conditions of a network based at least in part on the TCP acknowledgement; determining an optimal session bitrate based on the estimated one or more network conditions; and providing pseudo-streaming media data to the terminal based on the optimal session bitrate. | 10-08-2009 |
20090259743 | DYNAMICALLY CALCULATING AN INBOUND BLOCKING FACTOR USING OPERATING-SYSTEM-LEVEL CONDITIONS - A current value of a changing operating-system-level condition can be determined, wherein the operating-system level condition is a condition of a host related to an operating system resource utilization or an operating system experienced latency. The operating-system level condition can be a condition of a layer of the OSI model above the Data Link Layer. An inbound blocking factor algorithm can execute that uses the determined current value as a variable. A value for an inbound blocking factor can be generated as a result of executing the inbound blocking factor algorithm. The generated value can be utilized as the inbound blocking factor to determine a manner in which incoming messages are to be conveyed from a network adaptor, through an adaptor interface boundary, to an operating system of the host. | 10-15-2009 |
20090259744 | System and Method for Running a Web-Based Application while Offline - A system and a method for executing a web-based application on a client computer system without a network connection to an application server that hosts the web-based application is presented. In these embodiments, the web-based application can provide functionality substantially similar to the functionality of the web-based application when the client computer system has a network connection to the application server. A system and method for synchronizing and resolving conflicts between an online and an offline web-based application is also presented. | 10-15-2009 |
20090259745 | METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - Methods and apparatus for nonintrusive monitoring of web browser usage are disclosed. An example method for monitoring web browsing disclosed herein comprises obtaining a video signal from a video output of a device implementing a web browser, processing a video image obtained from the video signal to identify a region of the video image displaying at least a portion of the web browser, determining textual information displayed by the web browser in the identified region of the video image, and using the textual information to record usage of the web browser. | 10-15-2009 |
20090259746 | NETWORK MANAGEMENT APPARATUS, NETWORK MANAGEMENT METHOD, AND MONITORING SYSTEM - A network management apparatus includes: an information acquisition section obtaining path information and link quality information from a plurality of wireless terminals operating in an ad hoc mode; and a display-information generation section generating a network configuration diagram showing a link state between the wireless terminals from the obtained path information, and changing an attribute of a display showing an established link in accordance with the link quality information. | 10-15-2009 |
20090259747 | INFORMATION COLLECTING SYSTEM - A method for connecting a storage device to an information generating device includes transferring an identifying message from the storage device to a control server via a computer network. The identifying message includes a unique identifier uniquely identifying the storage device, matching a registered information generating system to the unique identifier, and identifying at least one information generating device included in the matched information generating system. A configuration message is transferred from the control server to the storage device, and the configuration message includes an address to the identified at least one information generating device and instructions of interaction. The instructions of interaction are arranged to define how the transfer of generated information is to be performed. | 10-15-2009 |
20090259748 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 10-15-2009 |
20090259749 | COMPUTER SYSTEM INPUT/OUTPUT MANAGEMENT - The collection of performance data at multiple servers in a SAN and forwarding that data to a centralized server for analysis is disclosed. Remote agents and a central server application collect specific interesting negative event data to enable a picture of the operational health of the SAN to be determined. The agents are placed in servers having HBAs acting as initiators. The agents interact with the HBAs through a driver stack to collect event data. Because of the initiator function they perform, HBAs have visibility to parts of the network that other entities do not have access to, and thus are ideal locations for gathering event data. A SAN diagnostics manager then pulls the collected data from each agent so that a “picture” of the SAN can be developed. In addition to collecting initiator data, the agents also collect errors and performance data from the OS of the servers. | 10-15-2009 |
20090259750 | METHOD OF AND APPARATUS FOR COMMUNICATING DATA STRUCTURES BETWEEN DEVICES IN A NETWORKING ENVIRONMENT - The invention is an architecture, a system and a method for monitoring data structures over an IEEE 1394-1995 serial bus network. The data structures are portions of entries that are posted and stored to a descriptor mechanism. Preferably, the entries are schedule entries posted and stored to an AV/C resource schedule bulletin board subunit. According to the invention, a resource request is submitted by a requesting control device to the AV/C resource schedule bulletin board subunit, where request data is stored and posted as a schedule entry. The requesting control device also submits a corresponding notify command data frame to the AV/C bulletin board subunit. The notify command frame instructs the bulletin board subunit to monitor a specified data structure within the schedule entry. Preferably, the notify command frame also specifies the type of access activity that is monitored. When a competing control device performs the specified type of access activity on the specified data structure, the bulletin board subunit sends a notify response frame to the original requesting control device. The notify response frame provides an alert to the original requesting control device that the specified access activity has been performed on the specified data structure by a competing control device. The original requesting control device can then review that accessing activity performed on the data structure and any modifications made to the data structure to determine whether further scheduling is required. Preferably, the access activity of the competing device and modifications made to the schedule entry are stored within the memory unit of the bulletin board subunit to provide a detailed history of the schedule entry. | 10-15-2009 |
20090259751 | METHODS AND APPARATUS FOR MONITORING AND/OR CONTROL OF PROCESS CONTROL APPARATUS - A system for process control comprises a server digital data processor and a client digital data processor that are coupled by a network, such as the Internet or an Intranet. The server digital data processor, which is additionally coupled to a control/sensing device and any associated interface equipment (collectively, referred to as “process control apparatus”), includes a command processor that transfers information between the network and the process control apparatus. The client digital data processor includes an information client (e.g., a so-called Internet web browser) capable of requesting and receiving an applet from the server digital data processor. The information client, further, defines a hardware-independent and operating system-independent virtual machine environment within the client digital data processor. The client digital data processor executes, within that virtual machine environment, an applet for configuring the client digital data processor as a “process controller” that establishes communications over the network with the command processor and that monitors and/or controls the process control apparatus via those communications. | 10-15-2009 |
20090265456 | Method and system to manage multimedia sessions, allowing control over the set-up of communication channels - Managing multimedia sessions including surveying anomalies representing illicit uses of a determined signalling protocol, determining reactions in relation to the identified anomaly, collecting all requests exchanged between a client terminal and a proxy server, analysing collected requests for detection of anomalies, through the use of a plurality of indicators each associated with one of the identified anomalies, and in the event of the detection of at least one anomaly, triggering by the proxy server of a reaction corresponding to the detected anomaly, the reaction including real-time action during the communication concerned by the message containing the anomaly. The method therefore allows the real-time detection and filtering of hidden channels utilised in a signalling protocol such as SIP. | 10-22-2009 |
20090265457 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, AND DISPLAY METHOD FOR THE SAME - The device configuration of a communication system capable of wireless data communication between a plurality of terminal apparatuses is confirmed, together with the operating condition of each of the terminal apparatuses and the channel condition of wireless data communication. Whether a service that can be provided as a communication system is executable is identifiably displayed on a display based on the confirmation results. | 10-22-2009 |
20090265458 | DYNAMIC SERVER FLOW CONTROL IN A HYBRID PEER-TO-PEER NETWORK - Technologies are described herein for providing dynamic flow control of requests to a server in a hybrid peer-to-peer network. The server collects a number of metrics related to its current stability and the throughput of requests from peer-to-peer devices. These metrics, along with associated trend data, are used by the server to calculate a current stability rating and a current throughput rating. The server then imposes flow control on a proportional number of the peer-to-peer devices based upon the current ratings. This operation is run periodically, with ratings re-calculated from current metrics, and new flow control measures imposed in each cycle. | 10-22-2009 |
20090265459 | PROVIDING APPARATUS OF SERVICE INFORMATION AND PROVIDING METHOD THEREOF - A providing apparatus of service information provided over a network collects service information and/or service components provided over a network and is triggered by setting of a scenario (such as content such as a combination of service components or service information) to extract available service components for the scenario from the service information or the service components to generate integrated service information with the use of the service components based on the scenario. A scenario and a policy (selection criteria of service components) are set and the service components conforming to the policy are selected to create the integrated service information based on the scenario. | 10-22-2009 |
20090265460 | SYSTEM AND METHOD FOR TRACKING USER IDENTITY AND/OR ACTIVITY ACROSS MULTIPLE WEBSITES - A method of tracking a user and the user's activities on a telecommunications network. The method includes receiving a notification from a first web server that the user has accessed a first webpage on a first website, wherein the notification is received via a user tracking server operated by a tracking coordinator, setting a session cookie including a user tracking ID on the user's computer and/or web browser to track the user's activities on the network and storing tracking data for the user in a database associated with the user tracking server, receiving an indication from a second web server that the user has accessed a second webpage on a second website, wherein the second webpage comprises a confirmation webpage that includes transaction data for the user, retrieving the user tracking ID from the session cookie and associating the user tracking ID retrieved from the cookie with the transaction data obtained from the second webpage, and reporting the user tracking data to the first web server. | 10-22-2009 |
20090265461 | METHOD AND SYSTEM FOR CHARACTERIZATION OF ONLINE BEHAVIOR - Data about computer network traffic is collected as user website visit recording sessions. The data captured is analyzed and organized with sufficient level of detail or granularity to determine a single request from a server. Each data request is analyzed to determine if it comes from a server with which an ongoing end user interaction or open site visit is occurring. If not, a new site visit is created as a general proposition. If the data request is part of an open site visit, then the time is compared to the time of the last interaction and if the interval is sufficiently small, the data request is treated as a continuation of the visit. If the interval is large, a new site visit is created. | 10-22-2009 |
20090265462 | MONITORING APPARATUS AND STORAGE METHOD - A monitoring apparatus receives information about a storage condition of monitoring data from a management apparatus via a network, and acquires at least one of image data and audio data as the monitoring data. The monitoring apparatus detects a communication state with the management apparatus, and performs control to store the monitoring data which is determined to satisfy the storage condition into a storage device that is other than the management apparatus according to the detected communication state. | 10-22-2009 |
20090265463 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others. | 10-22-2009 |
20090265464 | System and method for alerting on open file-share sessions assosciated with a device - A method and system for detecting an active file-share session on a monitored device associated with a client device, alerting the user of the client device, and enabling them to terminate the file-share session, are disclosed. In accordance with the disclosed method and system, when a remote device (e.g., on a network, the internet, etc.) connects to a shared file or folder on a monitored device (e.g., a personal computer, network area storage, a game console, a storage area network, a smart telephone, etc.) the user of the client device receives an immediate, automatic alert with the specifics of the file-sharing session and data affected. The user is then presented with an option of whether to OK the file-sharing session (i.e. allow data access to proceed), or to disconnect the file-share session (i.e. cause the remote user to lose access to the monitored device's shared data). | 10-22-2009 |
20090265465 | FOOTPRINT-PROVIDING DEVICE AND FOOTPRINT-PROVIDING SYSTEM - A footprint-providing device which can put footprints on Web pages provided by various Web servers. The footprint-providing device is connected via a network to a client terminal that views a Web page with a browser. The footprint-providing device sends footprint data, which can be written on one part of the Web page that has been received by the browser of client terminal, to the browser receiving the Web page from a Web server as a response to a request that is made asynchronously with a view-request for the Web page by the browser. | 10-22-2009 |
20090271507 | SYSTEM AND METHOD FOR ASSISTED ADMINISTRATION OF REMOTE DEVICE UPDATES - The subject application is directed to a system and method for assisted administration of remote device updates. Device data is first received for each networked document processing device that includes data representing the current state of the hardware and software associated with each of the networked document processing devices. Update data is then received including the identity and availability of revised software. A comparison of the update data with the device data is performed. The compatibility of the received update data is determined based upon the comparison, and a display is generated representing each of the compatible devices. Selection data is then received corresponding to each displayed document processing device. The revised software is thereafter communicated to each document processing device identified by the selection data. The revised software is then installed on each device to which it was communicated. | 10-29-2009 |
20090271508 | METHOD AND APPARATUS FOR PROVIDING A MEASUREMENT OF PERFORMANCE FOR A NETWORK - A method and an apparatus for providing a measurement of performance for a network are disclosed. For example, the method sends a plurality of multi-objective probes on a path, and receives one or more of said plurality of multi-objective probes for the path. The method then determines a plurality of performance measurements. | 10-29-2009 |
20090271509 | PROBABILISTIC AGGREGATION OVER DISTRIBUTED DATA STREAMS - In one embodiment, a method of monitoring a network. The method includes, at each node of a set, constructing a corresponding vector of M components based on a stream of data packets received at the node during a time period, the set including a plurality of nodes of the network, M being greater than 1; and estimating a value of a byte traffic produced by a part of the packets based on the constructed vectors, the part being the packets received by every node of the set. The constructing includes updating a component of the vector corresponding to one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting a component of the vector to be updated by hashing a property of the received data packet. | 10-29-2009 |
20090271510 | NETWORK STATE PLATFORM - A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement. | 10-29-2009 |
20090271511 | AUTOMATIC CONTEXT-BASED BASELINING FOR TRANSACTIONS - Application health is determined by calculating baseline deviation for one or more transactions based on past data having the same context as current data being examined. The performance data is generated in response to monitoring one or more applications that perform transactions during a time period. The performance data may include transaction metric data and the context data describing conditions under which one or more transactions were performed. A baseline is determined by predicting current or recent transaction performance data values using past transaction performance data associated with the same context. Based on the comparison of the actual and predicted data with the same or similar context, a deviation from the baseline value is determined for the transaction and reported, for example to a user through an interface. | 10-29-2009 |
20090271512 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE - A packet-centric wireless point to multi-point telecommunications system includes: a wireless base station communicating via a packet-centric protocol to a first data network; one or more host workstations communicating via the packet-centric protocol to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via the packet-centric protocol over a wireless medium; and one or more subscriber workstations coupled via the packet-centric protocol to each of the subscriber CPE stations over a second network. The packet-centric protocol can be transmission control protocol/internet protocol (TCP/IP). The packet-centric protocol can be a user datagram protocol/internet protocol (UDP/IP). The system can include a resource allocation means for allocating shared bandwidth among the subscriber CPE stations. The resource allocation is performed to optimize end-user quality of service (QoS). The wireless communication medium can include at least one of: a radio frequency (RF) communications medium; a cable communications medium; and a satellite communications medium. The wireless communication medium can further include a telecommunications access method including at least one of: a time division multiple access (TDMA) access method; a time division multiple access/time division duplex (TDMA/TDD) access method; a code division multiple access (CDMA) access method; and a frequency division multiple access (FDMA) access method. | 10-29-2009 |
20090271513 | Method and system for adaptive data transfer over packet networks - There is provided a method for adaptive data transfer over packet networks. The method comprises selecting a first communication path for transferring the data to the second computer, starting to transfer the data over the first communication path to the second computer, monitoring transfer characteristics of the first communication path related to the data transfer, storing the transfer characteristics associated with the first communication path in a database, comparing the transfer characteristics against one or more previously stored transfer characteristics related to one or more prior data transfers, and determining whether to alter a transfer algorithm being utilized for transferring the data to the second computer based on the comparing. | 10-29-2009 |
20090271514 | SYSTEM AND METHOD FOR MONITORING USER INTERACTION WITH WEB PAGES - Systems and methods for monitoring usage of an electronic device are disclosed herein. A client component in stalled in a client device is operative to monitor usage of the client device in accordance with a monitoring profile, and to generate corresponding usage data. The monitoring profile typically includes information specifying which features of which application programs are to be disabled on the client device. A server component, installed on a server device in communication with the client device, provides the monitoring profile to the client device and receives the usage data from the client device. | 10-29-2009 |
20090276516 | DOWNLOAD AND DATA TRANSFER GAMING SYSTEM - A download and data transfer gaming system utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The system redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This system is much more redundant by eliminating the possibility of a client missing a download broadcast. The system alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience. | 11-05-2009 |
20090276517 | DOWNLOAD AND DATA TRANSFER GAMING METHOD - A download and data transfer gaming method utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The method redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This method is much more redundant by eliminating the possibility of a client missing a download broadcast. The method alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience. | 11-05-2009 |
20090276518 | TECHNIQUE FOR REGULATING LINK TRAFFIC - A system which regulates communication with a server is described. During operation, the system determines a retransmission rate of data packets during a first set of conversations between a group of users and the server via a peering link. Next, the system compares the retransmission rate and an historical retransmission rate of data packets during a second set of conversations between a second group of users and the server via the peering link. The system then adjusts a target acceptance rate of the server to requests to initiate conversations with additional users via the peering link based on the comparison of the retransmission rate and the historical retransmission rate. Additionally, the system accepts or rejects a request to initiate a conversation between another user and the server via the peering link based on an actual acceptance rate of the server to requests to initiate the conversations and the target acceptance rate. | 11-05-2009 |
20090276519 | Method and System for Achieving Better Efficiency in a Client Grid Using Node Resource Usage and Tracking - A system, method and computer program product for distributing task assignments on a computer network comprising a client grid having at least one server coupled to at least one client node and a plurality of client computers coupled to the client node through a plurality of monitoring agents. Each monitoring agent collects data regarding the resources a particular client computer makes available to the grid and transmits the data to the grid server when the client computer requests a grid task. The system generates a resource probability distribution based on the historical computing resource data and employs a scheduling algorithm to distribute grid tasks to the client computers using at least the probability distribution. | 11-05-2009 |
20090276520 | METHOD AND APPARATUS FOR SERVER ELECTION, DISCOVERY AND SELECTION IN MOBILE AD HOC NETWORKS - A method and apparatus for server election, discovery and selection in mobile ad hoc communication networks is disclosed. The server election method may include a server node that may elect itself as a server in network if the received server capabilities, network server lists and network specific parameters allow its election as a server in the network. A client node may discover and select a server in the network by transmitting a server discovery request to a plurality of nodes in the network, receiving advertisements from one or more servers in the network in response to the server discovery request, and selecting a server based on the received stability and connectivity information for each server from which advertisements are received. | 11-05-2009 |
20090276521 | JUDICIAL MONITORING ON PEER-TO-PEER NETWORKS - The invention relates to a procedure for judicial monitoring in peer-to-peer networks, in which participants to be monitored are marked, and in which furthermore upon setting up a peer-to-peer communication with a marked participant the connection is diverted via a monitoring server and access to the communication data takes place with an appropriate monitoring server service. This realizes the requirement for judicial monitoring in a simple way. | 11-05-2009 |
20090276522 | COOPERATIVE MONITORING OF PEER-TO-PEER NETWORK ACTIVITY - Particular embodiments include cooperative monitoring of peer-to-peer activity on a network including maintaining communication between a local monitoring process and a network monitoring process such that a process can use both network monitoring and local monitoring. The cooperative monitoring includes monitoring a local peer using local monitoring of a point in the network by monitoring packets passing through the point, monitoring the network using network monitoring by a monitoring system or agent coupled to the network, and analyzing the result of network monitoring and local monitoring to determine at least one file transfer association with the local peer. | 11-05-2009 |
20090276523 | EXPRESSION-BASED WEB LOGGER FOR USAGE AND NAVIGATIONAL BEHAVIOR TRACKING - Configurably storing data in a plurality of files based on expressions and conditions associated with the data. Logging software enables tracking of the navigation pattern of users for selected network properties under specified conditions. The logging software is configurable such that most current and future logging specifications may be fulfilled without any code changes to the logging software. | 11-05-2009 |
20090276524 | THIN CLIENT TERMINAL, OPERATION PROGRAM AND METHOD THEREOF, AND THIN CLIENT SYSTEM - A thin client terminal | 11-05-2009 |
20090276525 | METHOD AND APPARATUS FOR INTEGRATING HETEROGENEOUS SENSOR DATA IN UBIQUITOUS SENSOR NETWORK - Provided is an apparatus and method for integrating heterogeneous sensor data in a ubiquitous sensor network. The method includes steps of receiving an integrated query for heterogeneous sensor networks from a sensor network management system, disintegrating the received integrated query to be suitable for each sensor network and transmitting the disintegrated queries to each corresponding sensor network. The method further includes steps of generating responses as integrated sensor data and storing the integrated sensor data into an integrated database, when receiving responses to respective queries from each of the sensor networks, and converting the integrated sensor data stored in the integrated database into a preset data format and transmitting the converted sensor data to the sensor network management system. | 11-05-2009 |
20090282143 | TESTING OPERATION OF PROCESSORS SETUP TO OPERATE IN DIFFERENT MODES - Testing operation of processors setup to operate in different modes. In an embodiment, each tester system includes a processor setup to operate in a corresponding mode. A user sends a test request to a scheduler system indicating the mode of the processor sought to be tested, and the scheduler system forwards the test request to one of the tester systems with a processor setup to test the requested configuration. The scheduler system may maintain configuration information indicating which processors are setup to test which modes of interest, and also status information indicating which tester systems are presently available for testing. The configuration information and status information is used in determining a specific suitable tester system to which a test request is to be forwarded. | 11-12-2009 |
20090282144 | SYSTEM FOR TARGETING THIRD PARTY CONTENT TO USERS BASED ON SOCIAL NETWORKS - A method and system of providing Internet content to a user utilizing social networks is disclosed. The method comprises providing Internet usage data for a plurality of users, determining which users belong to the same social network, and providing at least one of the users access to Internet usage data for those other users who are in the same social network. | 11-12-2009 |
20090282145 | NETWORK DEVICE, METHOD FOR SPECIFYING INSTALLATION POSITION OF NETWORK DEVICE, AND NOTIFICATION DEVICE - A network device, method for specifying installation position of network device, and notification device are provided. The network device includes: a loop detecting unit configured to detect a loop caused by the network device; and a location notifying unit configured to allow the network device itself to indicate a location of the network device in response to a detection of the loop. | 11-12-2009 |
20090282146 | EQUIPMENT MANAGEMENT DEVICE, EQUIPMENT MANAGEMENT SYSTEM, EQUIPMENT MANAGEMENT METHOD, AND RECORDING MEDIUM - An equipment management device manages one or more pieces of equipment which are connected to the equipment management device via a network. The equipment management device includes a determining unit which determines whether a non-authenticated software item exists in each of the one or more pieces of equipment, and a license management unit which performs license management of one or more software items installed in each of the one or more pieces of equipment, based on a result of the determination by the determining unit. | 11-12-2009 |
20090282147 | System And Method For Harmonizing Changes In User Activities, Device Capabilities And Presence Information - A method and system utilizes presence information for a device. The method and system comprise receiving a communication indicating a change to a user activity from a first device operated by a user. The existing presence status of the user to the presence status associated with the user activity for the user of a second device is automatically changed in response to the received change to the user activity. The second device is informed of the changing of the existing presence status for the second device to automatically alter a capability of the second device based on the changing of the existing presence status and based on a stored indication from the user on how the capability is to be altered. | 11-12-2009 |
20090287811 | Configuration of network's nodes in a telecommunication system - The idea of the present invention providing a solution for configuration problems of a node is based on the following components. A problem recognition system, which analyses performance indicators and identifies root causes, so that signatures can be attached to a found problems. Furthermore there is a signature based filtering system, which looks for transactions satisfying signatures. A customer identification system labels the transactions with the subscriber identify. A solution feedback system generates feedback event to the end node according to the rule of the signature. | 11-19-2009 |
20090287812 | Network Connection Switching Unit and Network Station - The invention relates to the field of data transmission in a network of distributed stations. One problem, particularly in a UPnP based network, is that the UPNP devices need to be constantly switched on in order to be available in the network. The invention intervenes at this point and describes ways in which unused network stations can be switched off but continue to be identified as devices in the network. If a device which is switched off is needed, it is automatically switched on. This allows a considerable power saving to be achieved in the network. The invention provides for a network connection switching unit to contain “communication maintenance means” which maintain the communication for an inactivated network station at least to a restricted extent instead of the inactivated network station. A network station matched thereto is also proposed. | 11-19-2009 |
20090287813 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR ANALYZING COMMUNICATION RELATIONSHIPS - An apparatus may include a processor configured to store a record of communications with a remote device. The processor may be further configured to calculate one or more values representative of a communication relationship with the remote device over a period of time based at least in part upon the stored record of communications. The processor may be additionally configured to determine a communication relationship pattern based upon the one or more calculated values. | 11-19-2009 |
20090287814 | VISUALIZATION OF STREAMING REAL-TIME DATA - A system facilitates dynamic data visualizations. The system includes an analysis component that periodically processes one or more incoming data streams to determine a visualization form from a plurality of visualization forms. A visualization component dynamically generates the visualization form based in part on the processing of the incoming data streams. | 11-19-2009 |
20090287815 | Systems and Methods for Monitoring A Remote Network - One embodiment relates to a method for monitoring a remote network over the Internet. In the method, a monitoring request from a client is received from over the Internet at a server. The server transmits a relayed monitoring request over the Internet to a remote network monitor. The remote network monitor is adapted to passively monitor the remote network based on the monitoring request, thereby detecting whether an unfavorable communication condition is met the remote network. | 11-19-2009 |
20090287816 | LINK LAYER THROUGHPUT TESTING - A technique for testing a network path involves making use of feedback enabling parameters. Values for the feedback enabling parameters can be generated from a measurement of path performance. The technique can be implemented for wireless paths. The technique can also be implemented for multi-hop paths. | 11-19-2009 |
20090287817 | Network Device - A network device to be connected to a server via a network comprises: a cable connecting unit connected to a network cable for connection to the network; a network controller for sending/receiving signals to/from the cable connecting unit and for detecting whether the network cable is connected to the cable connecting unit; a CPU for recognizing a server connected to the network; and a signal transmission line for transmission of a detection signal indicating that the network cable is connected to the cable connecting unit. When the CPU receives an interrupt signal from the network controller, the CPU performs a process to recognize the server connected to the network. This makes it possible for the CPU (hence the network device) to automatically recognize the server immediately after the network cable is connected to the cable connecting unit without requiring a user to spend time and labor for the server recognition. | 11-19-2009 |
20090287818 | MONITORING APPARATUS AND MONITORING METHOD - A monitoring apparatus for monitoring communication configurations of a plurality of client devices connected to a server, the monitoring apparatus includes: a processor for controlling the communications between the client devices and the server in accordance with a process including: receiving from each of the client devices communication condition information and storing latest communication condition information of each of the client devices; determining at a time interval whether any of client devices became incapable of communication with the server by checking the latest communication condition information of each of client devices; and upon detection of at least one of the client devices for which obsolete communication condition information is stored, issuing a notice indicating that the at least one of the client devices are incapable of communication with the server. | 11-19-2009 |
20090292803 | Method for measuring web visitors - An apparatus and a method for tracking the number of hits to a web page is described. In one embodiment, a web browser of a client requests from a server a web page. The server redirects the web browser to a cookie counting web page, where the cookie counting web page provides a tracking cookie to the web browser. The server computes the number of unique hits to the web page without cookies based on the number of hits to the cookie counting web page without tracking cookies, the number of unique hits to the cookie counting web page with tracking cookies, the number of all hits to the cookie counting web page with tracking cookies. | 11-26-2009 |
20090292804 | CONTENT TRANSMISSION APPARATUS, CONTENT RECEPTION APPARATUS, AND CONTENT UPLOAD METHOD - According to one embodiment, a content transmission apparatus includes a data acquisition module configured to get a content item and metadata having a plurality of items for explaining details of the content, a notification module configured to notify an upload destination apparatus for the content of the metadata, a transmission module configured to encode the content and transmits the encoded content as a body of an upload request based on an HTTP POST request to an entry point created by a content reception apparatus on the basis of the metadata, a detection module configured to detect a change in metadata notified to the content reception apparatus relative to metadata newly got by the data acquisition module, and a posterior notification module configured to notify the content reception apparatus of posterior metadata containing at least a changed item in the metadata, when the detection module detects a change in the metadata. | 11-26-2009 |
20090292805 | SYSTEM AND METHOD FOR NETWORK MONITORING OF INTERNET PROTOCOL (IP) NETWORKS - A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding. | 11-26-2009 |
20090300161 | Method and system for using feedback in accessing network services - A method and system for providing or utilizing feedback information in accessing network services. In one embodiment, a client requests a set of one or more service locations for service providers from a directory service. The directory service provides the set. The client then selects a service provider and initiates a transaction. Feedback data regarding the transaction is then collected for use in providing or selecting service providers, or in improving the directory service processes. | 12-03-2009 |
20090300162 | System and method for performing mobile services, in particular push services in a wireless communication - An intermediate component is intermediate between mobile terminals requesting a service, such as a push service, and a service-providing server, such as an HTTP server. The intermediate component is a connection machine or hub that is able to open a session the first time it receives a request from a mobile terminal, by instantiating a communication channel for performing the communications with the mobile terminal and storing the data regarding the open session in a connection table. Then, the connection hub generates a request to a service-providing server, including connection data, and manages the communication with the service-providing server. The connection data are inserted in every communication between the connection hub and the mobile terminal and between the connection hub and the service-providing server. From that moment on, all the data (messages, requests) exchanged between the terminal and the service-providing server are routed on the instantiated channel, thus in a fast and efficient way. | 12-03-2009 |
20090300163 | SYSTEMS AND METHODS FOR AUTOMATIC SUBMISSION OF FORMS ON A WEB PAGE - Systems and methods for automatically submitting data entered into a web page in the event the user shifts focus away from the form may include displaying a web page to a user, the web page containing a form; receiving, from the user, at least some input corresponding to the form; detecting that the form has lost user focus; and submitting, in response to the detection, the form. | 12-03-2009 |
20090300164 | SYSTEMS AND METHODS FOR SOFTWARE APPLIANCE MANAGEMENT USING BROADCAST MECHANISM - Embodiments relate to systems and methods for managing software appliances using a broadcast mechanism. Embodiments incorporate a centralized appliance monitor that collects software appliance state information from a community of clients having software appliance installations. Software appliances can comprise a reduced-component operating system combined with pre-configured application(s), for instance distributed via optical disc or Web download. When a software appliance instantiates on a client in the network or at other times, the identity and execution state of the application is broadcast to an appliance monitor. The appliance monitor aggregates the appliance state information for all clients in the network, and manages their deployment and execution on the network. The appliance monitor can for example transmit an appliance control instruction to a client to terminate or otherwise manage an uncertified or unapproved appliance, or take other network management action. | 12-03-2009 |
20090300165 | Message Monitor, Analyzer, Recorder and Viewer in a Publisher-Subscriber Environment - A method of performing a sequence-of-events analysis in a power monitoring system includes the acts of monitoring, receiving, analyzing, and storing. The act of monitoring includes monitoring messages published by multiple power monitors over a peer-to-peer communications network. The messages include electrical power monitoring parameters. The act of receiving includes receiving the published messages in a subscriber intelligent electronic device in the power monitoring system. The act of analyzing includes analyzing at least a portion of the received messages, performing statistical analysis and/or continuously scanning for an event of interest. The act of storing includes storing at least one record including at least one of statistical data or event of interest data. | 12-03-2009 |
20090300166 | MECHANISM FOR ADAPTIVE PROFILING FOR PERFORMANCE ANALYSIS - Adaptive profiling for performance analysis of a computer system controls one or more agents to monitor a plurality of events occurring in a target computer system based on an adaptive logic. Collected data may be filtered and analyzed to determine one or more contributor events that attribute to performance of the target computer system. One or more patterns are observed or detected in said collected data, behavior of said one or more agents are adjusted based on said detected one or more patterns. The adaptive logic may be further reconfigured based on said detected one or more patterns. | 12-03-2009 |
20090300167 | NETWORKED IMAGE VISUALIZATION IMAGE QUALITY ENHANCEMENT METHOD AND SYSTEM - A method for managing medical image data transmission between computing devices is disclosed. In one embodiment, the method includes monitoring a plurality of parameters of a computer network that includes a server and a client. The plurality of parameters may include a client resource parameter, a server resource parameter, and a network operating parameter. The disclosed method may also include automatically determining a desired compression level at which to send medical image data to the client based at least in part on the client resource parameter, the server resource parameter, and the network operating parameter. Further, in one embodiment the method may include communicating the medical image data from the server to the client at the desired compression level in response to a client request for the image data. Various other methods, systems, and manufactures are also disclosed. | 12-03-2009 |
20090300168 | DEVICE-SPECIFIC IDENTITY - A device identifier (ID) is used across enterprise boundaries. A user can use the device ID to publish a device for sharing with other remote users. The remote users can discover devices that are shared by other users based on device IDs, connect to a selected device, and then verify that they have connected to the correct device based on its device ID. An account authority service may be used to manage the publication and/or discovery of the shared devices and their device IDs. | 12-03-2009 |
20090300169 | SYNCHRONIZATION THROTTLING BASED ON USER ACTIVITY - Synchronization of data across multiple endpoints in a mesh network that supports a data sharing service is throttled responsively to user activity in the network by monitoring the activity using a component in a mesh operating environment (“MOE”) runtime that is instantiated on each endpoint. The monitoring may include the collection of data that can be used to infer user activity, as well as data that explicitly indicates activity. State information is maintained so that data can be synchronized across the endpoints even when a user goes offline from the service. When the user logs on to the service, makes changes to a shared file, or the endpoint device starts up upon connection to a mesh network, throttling is performed by prioritizing work items associated with synchronization operations so that resources on the endpoint are not excessively consumed which could reduce the quality of the user experience. | 12-03-2009 |
20090300170 | TEST AND MONITORING DEVICE MANAGEMENT WITH MULTI-FACETED COMMUNICATION CAPABILITY - A routing/hub device and a data management system are provided to managing test and monitoring devices such as portable test and monitoring devices in healthcare. The routing/hub device interfaces through a variety of communication means with one or more peripheral devices collecting data and configuring those devices based on user input or input from the data management system. Collected data is provided to the data management system for actions such as analysis, reporting, and the like. Alerts and messages may also be provided to designated recipients directly or through the data management system based on predefined rules for collected data. | 12-03-2009 |
20090300171 | REMOTELY MANAGED TEST AND MONITORING DEVICE FUNCTIONALITY WITH MULTI-FACETED COMMUNICATION CAPABILITY - A routing/hub functionality software and associated hardware platforms are provided for managing test and monitoring devices such as portable test and monitoring devices in healthcare. The routing/hub functionality software can be executed on custom or generic computing platforms and interface through a variety of communication means with multiple peripheral devices collecting data. The software may also configure those devices based on user input or input from the data management system. Collected data is provided to the data management system for actions such as analysis, reporting, and peripheral device configuration. Alerts and messages may also be provided to designated recipients directly or through the data management system based on predefined rules for collected data. | 12-03-2009 |
20090300172 | Relay apparatus, relay method, and monitoring apparatus - A relay apparatus receives connection check mail transmitted from a plurality of terminal apparatuses connected to the relay apparatus to a monitoring apparatus when the configuration or settings of the terminal apparatuses changes. The relay apparatus attaches a relay apparatus ID that uniquely identifies the relay apparatus to the header of the connection check mail. The relay apparatus transmits the connection check mail with the relay apparatus ID attached thereto to the monitoring apparatus. When stopping the monitoring of the terminal apparatus under the control of the relay apparatus, the relay apparatus transmits to the monitoring apparatus monitoring stop instruction mail with the relay apparatus ID attached thereto. | 12-03-2009 |
20090300173 | Method, System and Apparatus for Managing, Modeling, Predicting, Allocating and Utilizing Resources and Bottlenecks in a Computer Network - A method and apparatus for managing, modeling, predicting, allocating and utilizing resources and bottlenecks in a computer network managing, predicting and displaying of capacity, allocating and utilizing of resources, as well as actual and potential performance-degrading resource shortages in a computer network, is provided. Specifically, exemplary implementations of the present invention provide a method, system and apparatus for calculating, detecting, predicting, and presenting resource allocation, utilization, capacity bottlenecks and availability information, in a computer network, particularly in a virtualized computer environment. | 12-03-2009 |
20090300174 | SPACE MANAGEMENT SYSTEM AND METHOD - A space management system for analyzing the utilization of a space by one or more persons is provided. The space management system includes a data collector configured to collect information output by an identifier distributed in or around the space. The information indicates presence of the one or more persons in the space. The data collector is further configured to store occupancy data for the space based on the collected information. A data analyzer coupled to the data collector is configured to generate a graphical report or user interface based on the occupancy data. | 12-03-2009 |
20090300175 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM OF STORING COMPUTER PROGRAM TO PERFORM CONTROL METHOD - In a search server, a search request for searching for a device is received from a client PC, the device satisfying a search condition included in the received search request is searched for, and a searched result is transmitted to the client PC. Further, it is judged whether or not an apparatus at a transfer destination to which the search request is transferred has been registered in the search server. If it is judged that the apparatus at the transfer destination has been registered in the search server, the search request is transferred to the registered apparatus at the transfer destination based on the received search request. | 12-03-2009 |
20090300176 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus connected via a network to a plurality of devices and a DHCP server adapted to assign an IP address to each of the devices includes a storage unit that stores device information for each of the devices, a receiving unit that receives from a second information processing apparatus a search request for searching for a device, a search unit that searches for a device in response to the search request received by the receiving unit, a sending unit that sends a search result obtained by the search unit to the second information processing apparatus, and a control unit that updates, when a device is no longer capable of communicating via the network, device information corresponding to the device among the device information stored in the storage unit and that sends a notification for releasing the IP address assigned to the device to the DHCP server. | 12-03-2009 |
20090300177 | System and Method For Detection of Aberrant Network Behavior By Clients of a Network Access Gateway - A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway. | 12-03-2009 |
20090300178 | NETWORK INCLUDING SNOOPING - A computer network including:
| 12-03-2009 |
20090307344 | WEB PAGE RANKING METHOD AND SYSTEM BASED ON USER REFERRALS - A system and method for ranking web pages based on referrals sent from one user to another. Web pages that are sent to other users are tracked and their information is stored in a referral depository coupled to a referral server. Referral messages are also tracked when the recipient accesses the referred web page and when the recipient further refers the web page to another user. A ranking server can respond to a query regarding accessed web pages by accessing the referral depository and analyzing its contents. | 12-10-2009 |
20090307345 | AUTOMATED DIGITAL MEDIA CONTENT FILTRATION BASED ON RELATIONSHIP MONITORING - An apparatus, system, and method are disclosed for automated digital media content filtration based on relationship monitoring. The method determines a plurality of user relationships based at least in part on an online association between a user and a content producer. The method monitors each user relationship with each content producer for a relationship interaction between the user and the content producer. Furthermore, the method also identifies digital media content published by a content producer having a relationship with the user. A determined relevancy may be based on a strength factor derived at least in part on monitored relationship interactions between the user and the content producer that published the digital media content. The digital media content is presented to the user, with that having a greater relevancy weight having a higher priority than other digital media content available to the user from other content producers. | 12-10-2009 |
20090307346 | ADAPTIVE ASSET INFORMATION COLLECTION AND STORAGE - A network management device which registers for any state change notifications from the devices in the network. The network management device updates its status and values of the devices associated with each state change notification by querying the device. In this manner the management device can make a more timely update for a particular device and need not keep querying devices that have not changed, thus eliminating many unnecessary transactions. In certain embodiments polling is still performed. As a result, the management device is both more current in its displayed data and has fewer network transactions. | 12-10-2009 |
20090307347 | Using Transaction Latency Profiles For Characterizing Application Updates - One embodiment is a method that determines transaction latencies occurring at an application server and a database server in a multi-tier architecture. The method then analyzes the transaction latencies at the application server with Central Processing Unit (CPU) utilization during a monitoring window to determine whether a change in transaction performance at the application server results from an update to an application. | 12-10-2009 |
20090307348 | SYSTEMS FOR DISTRIBUTING DATA OVER A COMPUTER NETWORK AND METHODS FOR ARRANGING NODES FOR DISTRIBUTION OF DATA OVER A COMPUTER NETWORK - Various embodiments of the present invention relate to a system for distributing data (e.g., content data) over a computer network and a method of arranging receiver nodes in a computer network such that the capacity of a server is effectively increased (e.g., the capacity of a server may be effectively multiplied many times over; the capacity of the server may be effectively increased exponentially). In one embodiment the present invention may take advantage of the excess capacity many receiver nodes possess, and may use such receiver nodes as repeaters. The distribution system may include node(s) having database(s) which indicate ancestor(s) and/or descendant(s) of the node so that reconfiguration of the distribution network may be accomplished without burdening the system's primary server. An embodiment of the present invention may include a process for configuring a computer information distribution network having a primary server node and user nodes docked in a cascaded relationship, and reconfiguring the network in the event that a user node departs from the network. In one example (which example is intended to be illustrative and not restrictive), the process may include the steps of providing a new user node (or connection requesting user node) with a connection address list of nodes within the network, having the new user node (or connection requesting user node) go to (or attempt to go to) the node at the top of the connection address list, determine whether that node is still part of the distribution network, and connect thereto if it is, and if it is not, to go to (or attempt to go to) the next node on the connection address list. In another example (which example is intended to be illustrative and not restrictive), when a user node departs from the distribution network, a propagation signal may be transmitted to the nodes below it in the network, causing them to move up in the network in a predetermined order. In another example (which example is intended to be illustrative and not restrictive), the present invention may provide a decentralized approach which provides, to each new user node (or connection requesting user node) a path back to the root server. | 12-10-2009 |
20090307349 | SYSTEM AND METHOD FOR COMMUNICATION BASED ON AN AVAILABILITY OF A USER - The present invention provides a system and method for communication based on an availability level of a presence entity in a communication network that includes a first step ( | 12-10-2009 |
20090307350 | IN-KERNAL CONTENT-AWARE SERVICE DIFFERENTIATION - The increasing number of Internet users and innovative new services such as e-commerce are placing new demands on Web servers. It is becoming essential for Web servers to provide performance isolation, have fast recovery times, and provide continuous service during overload at least to preferred customers. The invention describes a kernel-based architecture for content-aware service differentiation that protects Web servers against overload by controlling the amount and rate of work entering the system. We have invented a mechanism that provides admission control and service differentiation based on connection and application level information. The application header-based connection control uses application-level information (such as URIs and cookies for HTTP) to define different service differentiation actions. The present invention provides the kernel mechanisms that are more efficient and scalable than application level controls implemented in current Web servers. | 12-10-2009 |
20090307351 | SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm. | 12-10-2009 |
20090313369 | Network-Assisted Remote Media Listening - Improved approaches for media listening amongst different users are disclosed. For example, methods, systems or computer program code can enable users to have a remote listening experience in real time. Advantageously, a remote user at a remote client device can in effect listen to a particular digital media asset that is being played at a local client device of a local user. Media information and/or user profiles can also be provided about themselves and shared with other users. | 12-17-2009 |
20090313370 | SPACE-TIME CALIBRATION SYSTEM AND METHOD - A space-time calibration system and method implement space-time solutions, in which, in one preferred embodiment, a single node determines its own space-time solutions based on other network nodes with which the single node communicates. In other preferred embodiments, space-time solutions for the node can be generated using other resources in the network. The disclosed system and method enable reliable, precise object positioning particularly for environments where the Global Positioning System (GPS) is blocked or subject to interference such as within the urban core. | 12-17-2009 |
20090313371 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 12-17-2009 |
20090319653 | SERVER CONFIGURATION MANAGEMENT METHOD - A method for monitoring changes in at least two servers, that creates difference results that encapsulate effects of changes applied to file systems of at least two servers. These differences results are defined by predetermined creation rules. The method includes comparing the difference results between the at least two servers to detect differences in the respective difference results. These detected differences are defined in accordance with predetermined comparison rules. The method further includes: analyzing the detected differences in comparison results in accordance with predetermined analysis rules and indicating potential problems from the analyzed and detected differences. | 12-24-2009 |
20090319654 | METHOD AND SYSTEM FOR USER BASED NETWORK ANALYSIS AND PLANNING - A system and method are provided for converting individual technical metrics into a single relevant metric understood and accepted by both technical and non-technical components of a business venture. An example system and/or method includes measuring current technical utilizations and capacities, translating those into a supportable users metric, forecasting future utilization levels, translating those into future network component and/or hardware requirements, and expanding/scaling technical capacity based on those values and the predetermined capacity levels of additional components and/or hardware. | 12-24-2009 |
20090319655 | PRESENCE SYSTEM AND A METHOD FOR PROVIDING A PRESENCE SERVICE - A presence system and method are disclosed. The system comprises, intercommunicated: presentities E | 12-24-2009 |
20090319656 | APPARATUS AND METHOD FOR MANAGING A NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to perform a first query of a network device by way of a wired connection with the network device, perform a second query of the network device by way of a wireless connection with the network device, detect an undesired condition associated with at least one of the network device and the wired connection with the network device based at least in part on the first and second queries, and discern between the undesired condition being associated with the network device and being associated with the wired connection based at least in part on the first and second queries. Other embodiments are disclosed. | 12-24-2009 |
20090319657 | SIP TERMINAL, METHOD AND SYSTEM FOR REPORTING STATUS THEREOF, AND SIP SERVER - A session initiation protocol (SIP) terminal, a method and system for reporting status thereof, and an SIP server are provided. The present invention relates to the field of communications, and is capable of enabling the SIP terminal to initiatively report status information to the SIP server, thereby ensuring a normal connection of an SIP call. The method includes: detecting whether status of the SIP terminal changes; generating status reporting information when the status of the SIP terminal changes; and sending current status of the SIP terminal to the SIP server in the form of the status reporting information. The present invention is mainly applied to the SIP technology. | 12-24-2009 |
20090319658 | METHOD AND SYSTEM TO MONITOR EQUIPMENT OF AN IT INFRASTRUCTURE - The invention relates to a method for monitoring and analyzing IT infrastructures in a telecommunication system, the system comprising a controller node and a plurality of IT infrastructures, the method comprising for the controller node the acts of distributing a monitoring agent to each IT infrastructure through the telecommunication system, the IT agent being adapted to monitor performance parameters of the IT infrastructure and forward performance data corresponding to the performance parameters to the controller node, receiving for at least one of the IT infrastructures the performance data, gathering for at least one performance parameter an IT infrastructure filter and a set of rules, the IT infrastructure filter defining a subset of the performance data, and the set of rules defining computational rules to be applied to the subset of data, and calculating statistics for the at least one performance parameter based on the set of rules applied to the subset of data. | 12-24-2009 |
20090319659 | SOURCE DETECTION DEVICE FOR DETECTING A SOURCE OF SENDING A VIRUS AND/OR A DNS ATTACK LINKED TO AN APPLICATION, METHOD THEREOF, AND PROGRAM THEREOF - An original attacker which has set a computer as a springboard is detected by detecting a source of a virus or a DNS attack linked to an application, which attacks other computers. A source detection device for detecting a source of a virus or a DNS attack captures packets from a network under setting conditions, and extracts required information. The source detection device stores data such as information concerning behaviors and/or features of viruses and/or DNS attacks, and/or logs of respective servers, which are required for an application traceback. Linkage of a virus or a DNS attack is determined from an application traceback processing result stored in a database and from various data, and new conditions are set accordingly. Under the new conditions, source detection is carried out for a virus or a DNS attack. Data is updated and accumulated accordingly, and linkage and a relationship between a behavior of an attack and a virus or a DNS attack is determined, thereby to detect a source of the attack. | 12-24-2009 |
20090327475 | METHOD FOR MANAGING A COUNTER STATUS ALLOCATED TO A PAIR COMPRISING A COMMUNICATION TERMINAL AND A BASE STATION - A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved. | 12-31-2009 |
20090327476 | Dynamic Infrastructure for Monitoring Service Level Agreements - A dynamic infrastructure for monitoring service level agreements (SLAs) is described. In an embodiment, the infrastructure comprises three types of functional elements: probes, metrics and audits and a small number of primitive actions for manipulating these elements. The elements are connected by streams which store data for processing and transport data between functional elements. The primitive actions, which are duplicating and removing functional elements as well as splitting and joining metrics, are arranged such that the functional elements can be optimized dynamically in responses to changes in the service and/or the hardware without losing any data. | 12-31-2009 |
20090327477 | MODULAR INTEGRATED COMPUTING AND STORAGE - A modularized computing system includes a plurality of modular components that are coupled together forming a network. Each modular component includes a standard network interface. The system further includes an initialization module, a monitor module, a storage medium, and a management module. As a module unit is coupled to the network, the initialization module automatically configures the component to an operable state. The monitor module monitors network operations including performance parameters of each modular component based on a plurality of system policies. Based on information gathered by the monitor module, the management module actively modifies network structure and resource allocation to optimize network performance. | 12-31-2009 |
20090327478 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A system that facilitates selecting a sensor from amongst a plurality of sensors from which to request data is described. The system includes a receiver component that receives a value of information for data that corresponds to a segment of a phenomenon model that models a phenomenon. The receiver component also receives user-defined preferences regarding sharing data from at least one sensor. The system further includes a selector component that selects the at least one sensor from amongst a plurality of sensors based at least in part upon the value of information and the preferences. The determination of the value ascribed to sensors may include considerations of the utilitarian benefit of reduction of uncertainty to a population of people. | 12-31-2009 |
20090327479 | USER-BASED WIDE AREA NETWORK OPTIMIZATION - An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer. | 12-31-2009 |
20090327480 | METHOD AND SYSTEM FOR DISCOVERING MANAGED SYSTEMS IN A NETWORK - A method for discovering managed systems in a network including classifying a first managed system associated with a first active Internet Protocol (IP) address in the network using a plurality of network protocols, identifying a set of drivers using the classification, where the set of drivers are configured to obtain first management information about the managed system, obtaining a first set of drivers, populating a data model with the first management information obtain using at least one of the first set of drivers, and managing the first managed system using the data model. | 12-31-2009 |
20090327481 | ADAPTIVE DATA THROTTLING FOR STORAGE CONTROLLERS - A method for minimizing latency of data transfer between the redundant storage controllers in a network-based storage controller system that utilizes adaptive data throttling. Each redundant storage controller monitors latency for round trip communications between the redundant controllers by calculating a time required to mirror a write to the other controller and receive a write acknowledge. An average latency for round trip communications between the redundant controllers during a fixed monitoring period is calculated, and at the end of each fixed monitoring period, the average latency is compared to a fixed latency to access the average time latency for mirroring writes is good, acceptable or unacceptable. If the average time latency is good, the one controller reduces or disables throttling for data transfers between the one controller and the server, and between the one controller and back-end storage, increasing a number of this type of data transfer that can be executed in parallel. If the average time latency is acceptable, the one controller does not adjust throttling for data transfers between the one controller and the server, and between the one controller and back-end storage. If the average time latency is unacceptable, the one controller increases data throttling for data transfers between the one controller and the server, and between the controller and the back-end storage, decreasing a number of this type of data transfer that can be executed in parallel. | 12-31-2009 |
20090327482 | RELIABLE AND ACCURATE USAGE DETECTION OF A SOFTWARE APPLICATION - Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds. | 12-31-2009 |
20090327483 | Web services enabled device and browser gadgets coupled with data storage service and web portal - A method of presenting structured information, via software gadgets, based on monitored data in a utility monitoring system. First monitored data is exposed to a network to produce, via a first web service, first structured data. The first monitored data is indicative of utility characteristics measured by a first IED in the utility monitoring system. The first structured data is received over the network and second structured data is received from a network-accessible data storage service. The data storage service has a second web service that exposes second monitored data to produce the second structured data. The first structured data is manipulated, in at least one of the software gadgets, to produce structured information based on the first monitored data, and the structured information is communicated from the at least one software gadget to a web browser for display in a web page by the web browser. | 12-31-2009 |
20090327484 | SYSTEM AND METHOD FOR ESTABLISHING PERSONAL SOCIAL NETWORK, TRUSTY NETWORK AND SOCIAL NETWORKING SYSTEM - The present invention provides a communication method of a community system, comprising the steps of: receiving a message from a member of a first environment by an apparatus; according to a community descriptive element of the message, examining whether the member of the first environment belongs to a first personal social network corresponding to the message; and if affirmative, providing a service according to the acquirement of the message. | 12-31-2009 |
20090327485 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR COLLECTING SNMP BANDWIDTH DATA - A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file. | 12-31-2009 |
20090327486 | PROVIDING ACCESS BY A CLIENT APPLICATION PROGRAM OVER AN INTERNET PROTOCOL (IP) NETWORK TO A SERVER APPLICATION PROGRAM INSTANCE - A method, apparatus and software is disclosed in which a temporary IP address is assigned to a selected instance of a server application program so as to provide processing continuity for processing with a client application program. | 12-31-2009 |
20090327487 | METHOD AND SYSTEM FOR DISCOVERING DNS RESOLVERS - A system and method for proactively discovering DNS resolvers in a network, comprising: sending IP addresses in the network to a scanning application; directing the scanning application to query each computer that corresponds to each IP address for information indicating whether each computer is a DNS resolver or a non DNS resolver; and identifying each computer as a DNS resolver or a non DNS resolver based on the information. | 12-31-2009 |
20090327488 | Method and System for Implementing Consumer Choice in a Targeted Message Delivery System - Embodiments are directed to a method and system of providing a centralized consumer choice process covering multiple Internet-based content services. The method comprises transmitting a consumer choice notification message to a user, receiving an indication of consumer choice with regard to gathering, storing or sharing of consumer information and activity during user Internet activity, wherein the consumer choice may comprise one of an opt-out or opt-in selection, storing the indicated consumer choice in a customer relationship management module, and setting a protocol in a network routing device to tag network traffic bound for a remote Internet-based content service indicating the user's choice. In one embodiment, reception of the tag indicates to the Internet-based content services that the user has agreed to participate in the gathering, storing, or sharing of defined user information, and the absence of a tag indicates that the user has declined to participate in the gathering, storing, or sharing of defined user information. Alternatively, two different types of tags may be provided to indicate the user's choice with respect to opt-in or opt-out. | 12-31-2009 |
20090327489 | GLOBAL TRAFFIC MANAGEMENT SYSTEM USING IP ANYCAST ROUTING AND DYNAMIC LOAD-BALANCING - A method and apparatus for serving content requests using global and local load balancing techniques is provided. Web site content is cached using two or more point of presences (POPs), wherein each POP has at least one DNS server. Each DNS server is associated with the same anycast IP address. A domain name resolution request is transmitted to the POP in closest network proximity for resolution based on the anycast IP address. Once the domain name resolution request is received at a particular POP, local load balancing techniques are performed to dynamically select the appropriate Web server at the POP for use in resolving the domain name resolution request. Approaches are described for handling bursts of traffic at a particular POP, security, and recovering from the failure of various components of the system. | 12-31-2009 |
20090327490 | DATA PROCESSOR, DATA MONITORING METHOD THEREOF, AND RECORDING MEDIUM STORING DATA MONITORING PROGRAM THEREOF - A data processor in which data processing is managed by an administrator and in which data processing including installation of software by a user is enabled. The data processor includes a processing unit to monitor the data processing executed by the user and to generate an execution history of the data processing, and a recording unit to record the execution history of the data processing. | 12-31-2009 |
20100005166 | NETWORK DEVICE - The present invention discloses a network device which can access a home network system and perform network communication based on a predetermined protocol, by using a minimum number of resources of an embedded microcontroller The network device communicates with at least one electric device through a network. The network device adopts a protocol consisting of an application layer for processing a message for controlling or monitoring the electric device, a network layer for performing network connection to the electric device, a data link layer for accessing a shared transmission medium, and a physical layer for providing a physical interface with the electric device. The application layer further includes an application sublayer for performing a network management function or managing device information. | 01-07-2010 |
20100005167 | JOB PROCESSING APPARATUS, METHOD FOR MANAGING JOB LOG IN THE JOB PROCESSING APPARATUS, AND SYSTEM FOR MANAGING JOB HISTORY - A job processing apparatus connectable to another job processing apparatus via a network, and if an instruction is given to execute a job including a first job and a second job using the job processing apparatus itself and a second job processing apparatus, then the first job is executed and history information on the first job is created by the job processing apparatus itself, and an instruction to execute the second job is given to the second job processing apparatus via the network. Then, if the history information on the second job executed by the second job processing apparatus is received by the job processing apparatus itself via the network, the history information on the first and second jobs are stored in a log database in association. | 01-07-2010 |
20100005168 | SYSTEMS AND METHODS FOR UNIFICATION OF LOCAL AND REMOTE RESOURCES OVER A NETWORK - The system and methods disclosed herein, according to one or more embodiments, utilize locally stored resources in a secure manner within a network-based application, while allowing locally stored resources to be shared over a network. In one embodiment, a system and method for facilitating information transactions over a network include communicating with a user device and one or more distribution channels via the network, installing a local network server on the user device, monitoring user drop events, generating resource mapping of media resources based on the user drop events, and uploading media resources. | 01-07-2010 |
20100005169 | Method and Device for Tracking Interactions of a User with an Electronic Document | 01-07-2010 |
20100011099 | METHOD AND APPARATUS FOR MONITORING AND LOGGING COMMUNICATION SESSIONS - Embodiments of the invention generally provide a method and apparatus for logging and monitoring communication sessions terminating and originating in a home network. One embodiment of a method for monitoring a communication session within a home network includes routing the communication session to a device in the home network via a residential gateway, the residential gateway being equipped with Universal Plug and Play and Session Initiation Protocol capabilities, and storing data related to the communication session in a database coupled to the residential gateway. | 01-14-2010 |
20100011100 | Health Check System, Server Apparatus, Health Check Method, and Storage Medium - According to one embodiment, an information processing apparatus includes a transmission module configured to acquire a status information of a plurality of devices and transmit the status information to a server apparatus via the network. The server apparatus includes a storage module configured to predetermine a condition corresponding to items of status information of the devices or a combination of the items of status information of the plurality of devices and store feedback information defined in correspondence with each condition, and a notification module configured to, when the status information or the combination transmitted by the transmission module matches the predetermined condition, notify, via the network, the information processing apparatus of the feedback information corresponding to the condition and stored in the storage module. | 01-14-2010 |
20100011101 | APPARATUS AND METHOD FOR BIASED AND WEIGHTED SAMPLING OF NETWORK TRAFFIC TO FACILITATE NETWORK MONITORING - An apparatus is described that performs biased and weighted sampling of network traffic to facilitate network monitoring. One embodiment of the apparatus includes a plurality of microcode controlled state machines, and a distribution circuit that routes input data to the plurality of microcode controlled state machines. A first individual microcode controlled state machine applies a first rule to the input data to determine first instructions associated with a first subset of the input data based on first sampling information associated with the first rule. A second individual microcode controlled state machine applies a second rule to the input data to determine second instructions associated with a second subset of the input data based on second sampling information associated with the second rule. The second sampling information differs from the first sampling information. This embodiment further includes a first circuit that generates first routing instructions for the first subset of the input data based on the first instructions, and that generates second routing instructions for the second subset of the input data based on the second instructions. This embodiment further includes a second circuit that routes the input data based on the first routing instructions and the second routing instructions. Advantageously, the apparatus provides an architectural framework well suited to a low cost, high speed, robust implementation of flexible, advanced network security and monitoring features and network traffic analysis. | 01-14-2010 |
20100017506 | SYSTEMS AND METHODS FOR MONITORING DATA AND BANDWIDTH USAGE - Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access). | 01-21-2010 |
20100017507 | METHOD AND APPARATUS OF COMBINING MULTIPLE PACKETS INTO PROTOCOL TRANSACTIONS WITH REQUEST AND RESPONSE DETAIL FOR ENHANCED TROUBLESHOOTING IN A LINE RATE NETWORK MONITORING DEVICE - Multiple packets are combined into protocol transactions with request and response detail for enhanced troubleshooting in a network monitoring device. The analysis may be done at a line rate, in an always on operation mode, providing constant gathering of analysis data and information. | 01-21-2010 |
20100017508 | Method for monitoring events in a communication network - There is described a method for monitoring at a management terminal events of a given type occurring in a communication network. The communication network comprises a plurality of network elements. The management terminal has a browser suitable for supporting a web like management graphic interface. The method comprises: at one of the network elements, providing a monitoring module; at the management terminal, transmitting to the monitoring module a request for monitoring the events of the given type, the request including an access token suitable for obtaining authorization to access a monitoring channel between the monitoring module and the management terminal; at the monitoring module: listening for possible management information relative to the events, each time the management information are received, processing it to generate updating data, using the access token for accessing the monitoring channel and transmitting the updating data to the management terminal through the monitoring channel. | 01-21-2010 |
20100017509 | HANDLING ANNOUNCEMENT MEDIA IN A COMMUNICATION NETWORK ENVIRONMENT - In order to efficiently handle the switch between user media and announcement media, a basic step is to first determine a configuration of the user media. Next, a configuration of the announcement media to be presented is determined based on the determined user media configuration. Subsequently, the announcement media is configured according to the announcement media configuration, and the configured announcement media is finally sent to the intended user. In this way, the overall appearance or sound of the announcement will be virtually the same as or at least similar to the overall appearance or sound of the user media, preferably without distortions. This allows the user to perceive the announcement as clearly as possible. | 01-21-2010 |
20100017510 | MULTI-LAYERED MEASUREMENT MODEL FOR DATA COLLECTION AND METHOD FOR DATA COLLECTION USING SAME - A method and system are described for collecting information from a device in a network at a collection interval. According to an exemplary embodiment, a method for collecting the information includes determining data needed from the device at the collection interval to evaluate the information. A measurement request is defined for collecting the data from the device at the collection interval. The measurement request is merged with other measurement requests for collecting the data from the device at the collection interval into a single merged measurement request at the collection interval. The measurement request is also merged with other measurement requests for collecting the data from the device at different collection intervals having a common integral divisor into a single merged measurement request at a highest of the different collection intervals. | 01-21-2010 |
20100023613 | Managing Pluggable Modules Of A Network Element - Managing pluggable modules of a network element includes receiving an approved pluggable module list for the network element. A pluggable module is received at the network element, and a component identifier of the pluggable module is determined. If the component identifier is on the approved pluggable module list, the pluggable module is approved for operation with the network element. If the component identifier is not on the approved pluggable module list, the pluggable module is rejected for operation with the network element. | 01-28-2010 |
20100023614 | SERVER LOCATION MAPPING - Embodiments of a method for determining locations of computers in a group of computers, which may be performed by a system, are described. During operation, the system receives a location of a first computer in the group of computers. Then, the system determines locations of one or more additional computers in the group of computers relative to the first computer based on vibration spectra associated with the first computer and the one or more additional computers. | 01-28-2010 |
20100023615 | REDIRECTING WEB DOWNLOADS - One or more downloads of web content from one or more web content servers are monitored. A swarm is defined including one or more previous downloaders of the web content from the one or more web content servers. The one or more previous downloaders of the web content include one or more web content caches including at least a portion of the web content. Stored web content within the one or more web content caches of the swarm is tracked. A new downloader of the one or more web content servers is redirected to the one or more web content caches of the swarm. | 01-28-2010 |
20100023616 | Information processing and transmission systems - Disclosed are systems and methods for transmitting information from a remote location to a financial decision system. In certain representative transmission methods machine readable content is generated that is adapted to be received by a financial decision system. The machine readable content is transmitted using a first protocol or standard. The transmission of machine readable content is received and converted from the first protocol to a second protocol or standard. The machine readable content is then transmitted using the second protocol. The first protocol can be a non-packet switched serial protocol, such as RS-232. The second protocol can be a packet-switched Internet Protocol (IP), such as for example, User Datagram Protocol (UDP) or Transmission Control Protocol (TCP). | 01-28-2010 |
20100023617 | Method and Apparatus for Ensuring IPv6 Uniqueness in a Mobile Subnetted Environment - A method and apparatus for ensuring network address uniqueness is described herein. An address manager determines whether any link-local addresses associated with peripheral devices connected to a mobile device would conflict with a network assigned global address. The address manager negotiates with the network to avoid conflicts. | 01-28-2010 |
20100023618 | SYSTEM AND METHOD FOR SUPPLICANT BASED ACCOUNTING AND ACCESS - The method of the present invention comprises initiating a connection to a port on an access device by a supplicant and associating supplicant identification information with the port. The access device may comprise any network connectivity device, including a wireless access point. Data packets transmitted over the port by the supplicant are statistically sampled as they are transmitted, with each of the sample data packets also associated with the supplicant identification information. The sample data packets are stored according to their associated supplicant identification information in order to perform accounting. The sample data packets, with the supplicant identification information, are sent to a network management system where the data is archived and presented in a human readable form, e.g., charts, etc. | 01-28-2010 |
20100023619 | OPERATION MANAGEMENT SYSTEM, MANAGEMENT APPARATUS, MANAGEMENT METHOD AND MANAGEMENT PROGRAM - A management apparatus has a control unit for realizing a management function through a comprehensive process of characteristic information of a storage apparatus, a connecting apparatus and a computer. The management apparatus also has an interface for receiving characteristic information from the storage apparatus, connecting apparatus and computer, depending on the standard protocol among the management apparatus, storage apparatus, connecting apparatus and computer. Moreover, an integrated management apparatus is also provided for integrated management based on the result of realization of a plurality of management functions. This integrated management apparatus includes an interface for receiving the result of realization of the management function from the management apparatus, depending on the standard protocol between the management apparatus and integrated management apparatus. | 01-28-2010 |
20100030887 | SYSTEM AND METHOD OF MANAGING INFORMATION DISTRIBUTION TO MOBILE STATIONS - A system and method for distributing information from a host service in communication with, a computer network to a mobile station in communication with a wireless network is provided. A data item associated with the mobile station is received at the host service. The host service then determines whether a network resource of the wireless network is currently associated with the mobile station. If the network resource of the wireless network is not currently associated with the mobile station, then the host service transmits a resource request message to the mobile station to instruct the mobile station to acquire the network resource. Subsequently to acquiring the network resource, the host service is then able to transmit the data item to the mobile station using the network resource. | 02-04-2010 |
20100030888 | APPARATUS, AND ASSOCIATED METHOD, FOR MONITORING SYSTEM EVENTS - An apparatus, and an associated method, for facilitating monitoring of a system, such as a system formed of an IT infrastructure. A detector detects the occurrence of system events, such as system faults or other anomalies. The detected events are matched with a set of rules, such by correlating attributes of the detected system events, to determine which events are related. Related events are grouped together into a group. An identification of the group is generated and displayed upon a display monitor. The individual events that comprise the group are hidden from view, i.e., collapsed behind the group identification. | 02-04-2010 |
20100030889 | Representing Aggregated Rich Presence Information - Techniques for relaying presence information of an entity to a user, wherein the entity is known to the user via one or more communications networks, are provided. At least one portion of the presence information of the entity is obtained from one or more servers associated with the one or more communications networks. An image is generated in accordance with the at least one portion of the presence information of the entity. The image summarizes the presence information of the entity. Further, the image assists the user in the selection of a communication option when contacting the entity from a plurality of communication options of the entity. | 02-04-2010 |
20100030890 | Provisioning Artifacts For Policy Enforcement Of Service-Oriented Architecture (SOA) Deployments - A system provisions artifacts for policy enforcement of service-oriented architecture (SOA) deployments. The system comprises a computer-executed program code that creates a model of a SOA deployment by collecting information about SOA artifacts and mapping between business-centric applications and underlying SOA artifacts. The system further comprises a computer-executed program code that converts the model into actionable artifacts which are provisioned to SOA policy enforcement points. | 02-04-2010 |
20100030891 | WEB-BASED TRACEBACK SYSTEM AND METHOD USING REVERSE CACHING PROXY - Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients. The web-based traceback system may include a reverse caching proxy server receiving a hypertext transfer protocol (HTTP) packet transmitted to a web server by a client, analyzing the header of the HTTP packet and determining whether the client has attempted to access the web server through an anonymous server based on the results of the analysis; and a web tracking server generating a response page for the HTTP packet upon receiving the results of the determination performed by the reverse caching proxy server, inserting a tracking code in the response page, and providing the response page to the client through the reverse caching proxy server, wherein the tracking code is automatically executed in a web browser of the client and thus provides network information of the client to the web tracking server. | 02-04-2010 |
20100030892 | GIS BASED NETWORK INFORMATION MONITORING-SYSTEM - Disclosed is a GIS based network information monitoring system that intuitively combines GIS based geographic information with traffic information and a security event, expresses the combined geographic information on a display, and does not need position calibration of network information when the traffic information and the security event are expressed. The GIS based network information monitoring system includes: a geographic information processing module receiving network information from an external network device, containing GIS based geographic information, and creating geographic information corresponding to location information in response to the location information; and a network information processing module mapping the network information to geographic information corresponding to the location information to express the mapped network information, connecting an attack site of a packet causing a security problem, an intermediate site, and a target site using lines, and intuitively expressing the network information by varying the widths and colors of the lines according to the attack type and danger level of the packet. | 02-04-2010 |
20100030893 | AUTOMATED DISCOVERY OF A TOPOLOGY OF A DISTRIBUTED COMPUTING ENVIRONMENT - This invention provides an extensible means of defining the mechanism to find one or more type(s) or instance(s) of existing resources (files, databases, repositories, etc.) and automating their linkages to the artifacts to be created, based on the customizable matching rules. | 02-04-2010 |
20100030894 | COMPUTER PROGRAM PRODUCT AND METHOD FOR ESTIMATING INTERNET TRAFFIC - Site metrics are presented in association with search results. The site metrics are derived from site analytics that uses clickstream data collected from a panel of internet users to generate and present internet activity metrics. Data collected from a community of internet users may be augmented by clickstream data store content, third party content, search results, and other sources to form estimates of internet activity, such as traffic, that is structured and analyzed to produce metrics of nearly any internet web site or domain. The data may be further augmented with ratings, such as web site trust ratings, retail deals, and analysis of web site content to form a comprehensive set of data that is mined to formulate various metrics of internet activity about web sites. Metrics of internet activity, a.k.a. site analytics, provides analysis that represents aspects of internet user access to a web site. Such aspects may include activity related to visitors, engagement, growth, trust, deals, and the like. | 02-04-2010 |
20100030895 | SYSTEM FOR REMOTELY MANAGING AND SUPPORTING A PLURALITY OF NETWORKS AND SYSTEMS - Converged network management application and system is provided that delivers a management platform as a service that can view and/or manage all managed networks in the aggregate, or any one of them individually (including individual devices within the managed networks), in a secure and efficient manner, providing continuously available intelligence in real time on the managed networks and systems, and overcoming integration issues including conflicting address schemas, the need to avoid unnecessary infrastructure, and the need acquire all necessary information in real time within applicable memory and bandwidth constraints. | 02-04-2010 |
20100030896 | ESTIMATING LATENCIES FOR QUERY OPTIMIZATION IN DISTRIBUTED STREAM PROCESSING - A “Query Optimizer” provides a cost estimation metric referred to as “Maximum Accumulated Overload” (MAO). MAO is approximately equivalent to maximum system latency in a data stream management system (DSMS). Consequently, MAO is directly relevant for use in optimizing latencies in real-time streaming applications running multiple continuous queries (CQs) over high data-rate event sources. In various embodiments, the Query Optimizer computes MAO given knowledge of original operator statistics, including “operator selectivity” and “cycles/event” in combination with an expected event arrival workload. Beyond use in query optimization to minimize worst-case latency, MAO is useful for addressing problems including admission control, system provisioning, user latency reporting, operator placements (in a multi-node environment), etc. In addition, MAO, as a surrogate for worst-case latency, is generally applicable beyond streaming systems, to any queue-based workflow system with control over the scheduling strategy. | 02-04-2010 |
20100036938 | WEB BROWSER SECURITY - A web browser security system including a network detector configured to detect when a computer attempts to connect to a computer network, and a data protector configured to move any data predefined as being private data from any private data areas that are accessible to a web browser on the computer to a secure data repository that is not accessible to the web browser, where any of the network detector and the data protector are implemented in either of computer hardware and computer software and embodied in a computer-readable medium. | 02-11-2010 |
20100036939 | APPARATUS AND METHOD FOR MANAGING A NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server comprising a controller to monitor a physical layer, a data link layer and a network layer of an Internet Protocol Television (IPTV) network, obtain a plurality of alarm signals from one or more of the physical layer, the data link layer and the network layer that are associated with an undesired condition of the IPTV network, synthesize the plurality of alarm signals to determine a correlation, obtain topology information associated with network devices in the IPTV network, and isolate the undesired condition to a network component in the IPTV network using the correlation and the topology information. Other embodiments are disclosed. | 02-11-2010 |
20100036940 | Data Processing In A Hybrid Computing Environment - Data processing in a hybrid computing environment that includes a host computer and an accelerator, the host and the accelerator adapted to one another for data communications by a system level message passing module and a plurality data communications fabrics of at least two different fabric types, the data processing including: monitoring data communications performance for a plurality of data communications modes; receiving, from an application program on the host computer, a request to transmit data according to a data communications mode from the host computer to the accelerator; determining, in dependence upon the monitored performance, whether to transmit the data according to the requested data communications mode; and if the data is not to be transmitted according to the requested data communications mode: selecting, in dependence upon the monitored performance, another data communications mode for transmitting the data and transmitting the data according to the selected data communications mode. | 02-11-2010 |
20100036941 | PARTIAL SUBSCRIPTION/EVENTING AND EVENT FILTERING IN A HOME NETWORK - In one embodiment, a method for monitoring events in a home network is provided. The method includes receiving a subscription request from a control point, wherein the subscription request indicates one or more event variables to monitor for the control point. Then a change is detected in an event variable. Then, it is determined if the event variable has been indicated by the control point as an event variable to monitor for the control point. If so, then the control point is notified of the change in the event variable. | 02-11-2010 |
20100036942 | METHOD FOR INDICATING A SERVICE INTERRUPTION SOURCE - The present invention relates to a method used to indicate a service interruption source, in a client device of said service comprising an interface to a first network, said device being connected to a remote server by means of a gateway to which said device is connected by means of said first network; comprising the steps for starting up a downloading session from said remote server of a content, the end of the session requiring an acknowledgement from the user, detecting the connection loss between the device and the gateway, detecting the connection recovery between the device and the gateway, sending information (S | 02-11-2010 |
20100036943 | METHOD OF NETWORK MANAGEMENT - A network management system comprises a unit for identifying a node, whose settings are to be modified, from design pattern information about a network to be managed; a unit for finding values of various timers included in the network management system and in the node whose settings are to be modified about the identified node based on a template for timer control; and a unit for causing the found values of the timers to be reflected simultaneously in the network management system and in the node whose settings are to be modified. | 02-11-2010 |
20100036944 | Unified Web Hosting and Content Distribution System and Method for Assuring Predetermined Performance Levels - A service model, integrated system, and method for enabling a service provider to deliver an integrated web hosting and content distribution service offering, which affords assured operational performance service levels, regardless of whether the customer's web site is served by the service provider's hosting center, the service provider's content distribution network (CDN), by a third party web host, or by a third party CDN. A monitoring system of the primary service provider receives detailed capacity and health statistics from any CDN under the operational control of the primary service provider, receives aggregate capacity and health statistics from other CDNs not under the operational control of the primary service provider. A redirection system then decides to which web host, content distribution network, or combination thereof, user requests for content are directed in order that operational performance service levels are maintained. | 02-11-2010 |
20100036945 | Method and system for controlling and auditing content/service systems - An improved interactive network system is provided that allows the Network Operator to control the transfer of information to and from the network end users, the system preferably using triggers or markers embedded within the programming broadcast to users via the network. As a consequence of this system, the Network Operator is able to efficiently garner revenues from third parties transacting business over the network and to control the look and feel of programming offered to network users. Additionally the system can be used as a means of limiting network access, filtering programming, providing on-screen graphics or audible signals for particular programming types or providers, bookmarking programming, profiling network users, targeting advertising, and simplifying network transactions. | 02-11-2010 |
20100042715 | METHOD AND SYSTEMS FOR REDUNDANT SERVER AUTOMATIC FAILOVER - A method and systems for a redundant server automatic fail-over system is provided. The system includes a plurality of client devices communicatively coupled to a network wherein the plurality of client devices each includes an active server identification location. The system also includes a first server system communicatively coupled to the network that is configured to operate as the active server on the network wherein messages sent to the first server system are addressed to the first server system using the active server identification location on each client device. The system further includes a second server system communicatively coupled to the network that is configured to operate as a standby server on the network and is configured to switch to being the active server on the network when it is determined that the first server system is unable to operate as the active server. | 02-18-2010 |
20100042716 | ADAPTIVE CLUSTERING FRAMEWORK IN FREQUENCY-TIME FOR NETWORK MIMO SYSTEMS - A method for wireless communications is provided. The method includes analyzing a set of network parameters and automatically forming a set of network clusters based in part on the network parameters. This includes dynamically selecting at least one network cluster from the set of network clusters to provide wireless service to a subset of user equipment. | 02-18-2010 |
20100042717 | Sharing of Media Using Contact Data - Media sharing using contact data involves identifying contact records on a personal electronic device of a user. Each of the contact records includes a contact address of a person associated with the respective contact record. The contact records are communicated to a media sharing service via a network. Media items of the user are sent to the sharing service. One or more of the contact records are associated with each of the media items. A notification is sent to the persons associated with the one or more contact records. The notification describes sharing of the media items associated with the contact records. The sharing service facilitates access to the media items by the persons associated with the contact records in response to the persons receiving the notification. | 02-18-2010 |
20100042718 | System And Method For Tracking User Activity Related To Network Resources Using A Browser - A method and system are described for tracking user activity related to network resources using a browser. According to an exemplary embodiment, a user-initiated activity related to a network resource is detected in the browser. The detected user-initiated activity is associated with the network resource to form an activity-resource pair. The activity-resource pair is associated with a record in a data store related to the detected activity or the network resource. By associating the activity-resource pair with records in the data store that relate to the network resource and/or the detected activity, the information in the data store can be used to add context to and provide insight into users' browsing activities. | 02-18-2010 |
20100049845 | COMPUTER SYSTEM AND A METHOD FOR MANAGING LOGICAL VOLUMES - A computer system manages logical volumes as operation map including a volume ID of the logical volume and a plurality of pieces of a predetermined operating information (for example, a path setting, main-volume, sub-volume, permanent storage setting, and storage period setting), when an operation is added to the logical volume, corresponding operating information is set to addition and when the operation is released, the information is set to release, and at a time when a predetermined operating information is all set to release, a corresponding logical volume to the volume ID is detected as being deletable, thereby detecting the deletable the logical volume automatically. | 02-25-2010 |
20100049846 | PEER TO PEER NETWORK - Peer-to-peer networks employing simple peers and super peers strike a balance between centralized (client-server based) and entirely flat peer-to-peer approaches. They introduce hierarchy into peer-to-peer networks in the form of super peer nodes, peers which have extra capabilities and duties in the network. There are problems in the identification and election of peers to take the role of super peer: in particular, the need for regular update messages to communicate peer availability across the network significantly impacts discovery times (when a simple peer attempts to advertise a service or requests a service from another peer). A presence server is implemented in the network in order to monitor the availability of each peer. A device called the “super peer elector” subscribes to receive updated availability information from the presence server and assigns super peer status to the most appropriate, and available, simple peer. | 02-25-2010 |
20100049847 | System and Method for Monitoring and Analyzing Internet Traffic - A system and method for monitoring and analyzing Internet traffic is provided that is efficient, completely automated, and fast enough to handle the busiest websites on the Internet, processing data many times faster than existing systems. The system and method of the present invention processes data by reading log files produced by web servers, or by interfacing with the web server in real time, processing the data as it occurs. The system and method of the present invention can be applied to one website or thousands of websites, whether they reside on one server or multiple servers. The multi-site and sub-reporting capabilities of the system and method of the present invention makes it applicable to servers containing thousands of websites and entire on-line communities. In one embodiment, the system and method of the present invention includes e-commerce analysis and reporting functionality, in which data from standard traffic logs is received and merged with data from e-commerce systems. The system and method of the present invention can produce reports showing detailed “return on investment” information, including identifying which banner ads, referrals, domains, etc. are producing specific dollars. | 02-25-2010 |
20100049848 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA INDICATOR EMBEDDED WITH DNS REQUEST - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 02-25-2010 |
20100049849 | System and a Method for Remote Monitoring Customer Security Systems - There is provided a system for remote monitoring a plurality of security systems connected to the Internet, the security systems being assigned dynamic IP addresses, each of the security systems comprising a remote monitoring server module, the system comprising a central alarm monitoring service connected to the Internet for periodically communicating with the plurality of security systems and determining a status thereof to generate an alarm signal as a function of the status, the alarm monitoring service storing a current IP address of the plurality of security systems in an IP address database, and a remote monitoring gateway providing authenticated or unauthenticated dynamic domain name service (DDNS) server functionality to connect a given remote monitoring client to a desired one of the security systems, the gateway being connected to the IP address database and to the Internet. There is further provided a method of remote monitoring a security system. | 02-25-2010 |
20100057902 | Scal-free management networks - Methods and apparatus involve production servers in a data center of an enterprise and management servers arranged in a scale-free manner to monitor, for instance, the health and general service status and availability of the production servers. Representatively, the production servers are first identified and then the management servers are analyzed to see if they can be deployed in a scale-free arrangement therewith. If so, the scale-free arrangement satisfies the proportionality equation P(k)˜k | 03-04-2010 |
20100057903 | NETWORK MONITORING BY USING PACKET HEADER ANALYSIS - A computer method and a system for detecting the file type of an electronic file, the method including the steps of: (a) using a predetermined number of bytes at the beginning of the file to create a list of probable file types; (b) testing the file against a detection rule for each file type in the list until a match is found; if no match is found (c) testing the file against other known detection rules for file types to find a match. | 03-04-2010 |
20100057904 | DEVICE MANAGING APPARATUS, DEVICE MANAGING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM FOR THE DEVICE MANAGING METHOD - A device managing apparatus for monitoring and managing a device connected to a data transmission path includes an obtaining part configured to obtain power consumption status data from the device, the power consumption status data indicating a power consumption status of a communication unit included in the device, a selecting part configured to select a communication method according to the power consumption status data obtained from the obtaining part, and a communicating part configured to perform data communications with the device by using the communication method selected by the selecting part. | 03-04-2010 |
20100057905 | SYSTEM AND METHOD FOR SOFTWARE USAGE DISCOVERY - A method of obtaining information about usage of application executable files and associated software program in a network of computers or on an individual computer is provided. The method involves collecting information about last use of software programs, and associated executable files, on a computer or a set of managed computers from various resources on the computers. The information that is collected includes file name, directory, date and time the executable was last started, a security identifier of the last user, the method of last use, whether the executable was found to be running at the time it was found, and whether the executable is registered to run as a service. From this information, a list is generated regarding software items, and the list is merged such that a given executable has a single software item on the list. Reports are produced detailing information about one or more software items on the list. The reports may be displayed in a graphic user interface designed for that purpose. | 03-04-2010 |
20100057906 | METHOD AND APPLICATION FOR A REACTIVE DEFENSE AGAINST ILLEGAL DISTRIBUTION OF MULTIMEDIA CONTENT IN FILE SHARING NETWORKS - A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content. | 03-04-2010 |
20100057907 | SYSTEM SECURITY AGENT AUTHENTICATION AND ALERT DISTRIBUTION - An aggregation agent may combine and correlate information generated by multiple on-host agents and/or information generated in response to multiple security events. The aggregation agent may transmit the combined information to a security console. The security console may check the identity of the aggregation agent to determine whether to accept the information. The security console may map information to one or more consoles. | 03-04-2010 |
20100064039 | Event monitoring and management - Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application. | 03-11-2010 |
20100064040 | CONTENT RECOMMENDATIONS BASED ON BROWSING INFORMATION - Architecture for dynamically tracking information about a first-time or inactive user to a website and expeditiously presenting targeted content back to the user to maintain the user interest in the website. A visceral connection is created with the user based on immediately relevant content and functionality, and without requiring user-entered profile information about the user. Based on a few pieces of browsing information collected while at the website an action-oriented initial scenario is provided that is interesting to the user, and gets the user invested in the content (e.g., product) as a whole. Services can be recommended to users in the context of a social application or an online service provider, for example. The architecture also facilitates the up-selling, cross-selling of services, features, and products, for example, to users based on the current user browsing activity. | 03-11-2010 |
20100064041 | Linear assets inspection system - The invention provides a graphical user interface implemented on a computer including an information area for displaying to a user at the computer inspection status information in connection with one or more components of a linear asset infrastructure. The graphical user interface also includes a control component operable by the user at the computer to cause the graphical user interface to display additional information on the one or more components of the linear asset infrastructure. | 03-11-2010 |
20100070620 | SYSTEM AND METHOD FOR DETECTING INTERNET BOTS - Apparatuses, methods, and systems directed to detect Internet bots in communication networks. Some embodiments of the present invention allow an agent of a server to periodically record interaction events on a client system. The recorded interaction events are sent to a server and validated by a statistical test. Some embodiments of the present invention may be used to detect bots using server logs. In other embodiments, an agent of a server is able to detect and validate interaction events on a client system and the server periodically polls the agent to determine whether bots are detected on the client system. | 03-18-2010 |
20100070621 | PASSIVE PARAMETER BASED DEMOGRAPHICS GENERATION - A method for characterizing website visitors based on visitor passive parameters and using the characterization to select and/or market website content. The passive visitor parameters include data in the browser agent, time of a website visit, IP address, etc. Such visitor passive parameters are available each time a visitor visits a website. In a first step, a first embodiment of the method anonymously compares the visitor passive parameters with known demographics, for example, at financial websites, to create a statistical mapping between the visitor passive parameters and the demographics. In a second step, the mapping is used to estimate demographics data for future website visitors and then site content provided to the future website visitors is based on the estimated demographics. | 03-18-2010 |
20100070622 | SYSTEM AND METHOD FOR UTILIZING SYSTEM LAG TO SEND FACTS TO AN END USER - A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length. | 03-18-2010 |
20100070623 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND COMPUTER READABLE MEDIUM - An information processing apparatus includes: a detecting unit that detects a change of a real IP address of the information processing apparatus; and a change notification transmitting unit that generates, when the detecting unit detects the change of the real IP address of the information processing apparatus during communication with a communication partner, a change notification packet, and transmits the generated change notification packet to the communication partner. The charge notification packet includes a header portion and a data portion. The real IP address before the change is included as a source IP address in the header portion of the charge notification packet, and a real IP address after the change is included in the data portion of the charge notification packet. | 03-18-2010 |
20100070624 | Arrangement and a Method Relating to Performance Management by Distributed Processing - The present invention relates to an arrangement for performance management in a communication network comprising a managing system and a number of managed systems. The arrangement comprises collecting means for collecting traffic measurement data and primary processing means for primary processing of measurement data. Said primary processing means are adapted to be distributed and comprise first primary processing means provided in the managing system and a number of second primary processing means provided in a number of managed systems. The arrangement also comprises processing control means for controlling at least allocation of primary processing of measurement data to a first or to a second primary processing means. | 03-18-2010 |
20100070625 | Supplying Data Files to Requesting Stations - Data files are supplied to a plurality of requesting stations ( | 03-18-2010 |
20100070626 | Method And System For Resolving Indeterminate or Inconsistent Information For Information Consumers - A method and apparatus for resolution of indeterminate or inconsistent information on behalf of an information consumer, the method using a processor of a middleware component to determine whether information for the information consumer is resolvable; and if the information is determined to be unresolvable, utilizing at least one of rules, policy types and policy values specified by a context to resolve the information. | 03-18-2010 |
20100070627 | MONITORING APPARATUS, MONITORING METHOD, AND STORAGE MEDIUM - A monitoring apparatus which monitors an operating state of a monitored apparatus, the monitoring apparatus includes a signal acquiring unit that acquires signals output from the monitored apparatus; a communication amount acquiring unit that acquires a communication amount by which the monitored apparatus performs communication in a specific time based on information included in the plurality of signals that the signal acquiring unit acquires at a specific time interval; and a state determining unit that determines the operating state of the monitored apparatus based on the communication amount acquired by the communication amount acquiring unit. | 03-18-2010 |
20100070628 | SYSTEMS AND METHODS FOR AUTOMATIC DETECTION AND COORDINATED DELIVERY OF BURDENSOME MEDIA CONTENT - A networked computing system that is capable of detecting and coordinating the distribution of burdensome media content. The networked computing system includes one or more sending devices, one or more receiving devices, and a data communications network capable of facilitating data communications amongst all networked computing devices. In response to a sending or receiving device generating a data transfer request, an automatic determination is made as to whether the media content is burdensome to a portion of the data communications network over which the media content is to be transferred. The automatic determination may be made by a sending device, a receiving device, or another local network resource (such as a gateway). The determining device may then coordinate the media content transfer based on characteristics of the media content and available network resources. | 03-18-2010 |
20100070629 | Management device, management method, and recording medium - A first acquisition unit acquires an event notification from an MFP and updates first device-status information. A transmission unit transmits the event notification and first reference-destination information. A switching unit switches a first access to the first reference-destination information to a second access to second reference-destination information. A second acquisition unit issues an acquisition request at a first interval, issues an acquisition request at a second interval in response to the event notification, acquires the second device-status information, and update the first device-status information. | 03-18-2010 |
20100070630 | SUPPORTING MULTIPLE SERVICE DISCOVERY PROTOCOLS ON A DEVICE - Techniques for supporting multiple service discovery protocols (SDPs) on a network-enabled device (NED) are provided. The NED includes a plurality of SDP services, a plurality of SDP adapters, and a device service management system (DSMS). Each SDP service interfaces with one SDP adapter. Each SDP adapter interfaces with the DSMS. Each SDP adapter translates messages from its corresponding SDP service into a format the DSMS understands, and vice versa. The DSMS manages service metadata information about one or more services hosted (or provided) by the NED. In response to a request, from a client, for metadata of one or more services hosted by the NED, a SDP service requests the metadata from its corresponding SDP adapter. The SDP adapter requests the metadata from the DSMS, which responds to the SDP adapter with the metadata. The SDP adapter sends the metadata to the SDP service, which sends the metadata to the client. | 03-18-2010 |
20100077071 | METHOD AND SYSTEM FOR AUTOMATIC NETWORK CONNECTION ESTABLISHMENT IN CASE OF NETWORK ADDRESS RENEWAL - A method and system for maintaining a connection in a communication network is provided. One implementation involves activating a first network interface for obtaining a first network address for communication over the network; monitoring the network and determining a first lease time for the first network address; activating a second network interface for obtaining a second network address for communication over the network upon approaching end of the lease time, thereby maintaining communication over the network via the second network address; and deactivating the first network interface. | 03-25-2010 |
20100077072 | Test Driven Deployment and Monitoring of Heterogeneous Network Systems - A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly. | 03-25-2010 |
20100077073 | EXECUTING RESOURCE CONSUMPTION CONTROL LIMITS - A resource consumption control execution method and system. The method includes a computing system receiving a resource consumption rate limit value for a portlet/servlet and action data associated with the resource consumption rate limit value from a portlet/servlet. The computing system receives monitor data associated with a resource consumed by the portlet/servlet. The monitor data comprises a resource consumption rate value for the portlet/servlet. The computing system compares the resource consumption rate value to said resource consumption rate limit value. The computing system determines if the resource consumption rate value exceeds the resource consumption rate limit value. The computing system stores data indicating whether the resource consumption rate value exceeds the resource consumption rate limit value. | 03-25-2010 |
20100077074 | TECHNIQUES FOR HIERARCHICAL REPORT TOOL SESSION MANAGEMENT - Techniques are presented for hierarchical report tool session management. A user interacts with a hierarchical reporting tool during a first session and reaches a specific nested level within the tool for a particular hierarchy being accessed by the user. At some point in time the user exits the tool (normally or abnormally). The specific nested level is maintained on behalf of the user. So, when the user initiates a second and subsequent session with the tool, the user is presented with the specific nested level when the tool is started for that subsequent session. | 03-25-2010 |
20100077075 | Network Diagnostic Systems and Methods for Collecting Data From Network Nodes - A system may comprise a network diagnostic device. The network diagnostic device may be configured to instantiate objects of data collection classes. The data collection classes may be configured to collect data from nodes of a network. The data collection classes may, for instance, inherit an interface object from an ancestor data collection class, and the interface object may be configured to use a protocol to collect data from nodes of a network. The network diagnostic device may be configured to automatically detect a node type associated with a node of a network. The network diagnostic device may also be configured to instantiate a node-specific data collection object associated with the detected node type. The node-specific data collection object may be configured to collect data from nodes of the detected node type at intervals less than or equal to fifteen seconds. | 03-25-2010 |
20100077076 | MANAGEMENT APPARATUS AND METHOD THEREOF - A management apparatus determines whether or not another management apparatus exists on a network, and if it is determined that the another management apparatus exists, acquires information on a device searched by the another management apparatus from the another management apparatus. The management apparatus searches a device on the network and determines whether or not the searched device is searched by the another management apparatus, and acquires information from the device, that is not acquired among information on the device, in a case that it is determined that the device is not searched by the another management apparatus. | 03-25-2010 |
20100077077 | Arrangement and a Method Relating to Performance Monitoring - The present invention relates to an arrangement for monitoring performance in a network comprising a number of network devices or nodes, services and users, in real-time. The arrangement comprising information collecting means, generating means for generating performance KPI indicators depending on a number of definition performance parameters for one or more of said network nodes. The generating means comprise or communicate with decision graph generating means adapted to generate decision graph structures representing respective KPI values and combination probabilities in dependence of KPI definition performance parameters and in dependence of additional or correlation parameters. The generating means comprise decision graph content updating means adapted to update the decision graph structure or structures using said collected information to enable prediction of KPI status/behavior and message sending means are provided which are adapted to send out messages or notifications relating to one or more prediction results. | 03-25-2010 |
20100077078 | NETWORK TRAFFIC ANALYSIS USING A DYNAMICALLY UPDATING ONTOLOGICAL NETWORK DESCRIPTION - Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description. | 03-25-2010 |
20100082798 | VIRTUAL UNIVERSE AVATAR ACTIVITIES REVIEW - Methods, services, program products and devices are provided for tracking avatar activities within a virtual universe domain. A proximity threshold of an avatar is defined with respect to proximity to an artifact located within a virtual universe domain. Activity by the avatar within the virtual universe domain is tracked, with activity data generated from the tracking. The activity data is analyzed to determine proximity of the avatar to the artifact within the proximity threshold, and a report is generated from the analyzing, the report noting a determined proximity of the avatar to the artifact within the proximity threshold. In one aspect, the report is provided to a supervisory entity. | 04-01-2010 |
20100082799 | METHODS AND SYSTEMS FOR MANAGING NETWORK CONNECTIONS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can manage network connections in the software provisioning environment. The provisioning server can maintain a network record of network configurations for the networks served by the provisioning server. The network record can include information describing the structure, hardware, software, and configuration of the networks served by the provisioning server. The provisioning server can manage and configure existing networks and instantiate new networks or sub-networks associated with the provisioning server. The network configuration module can retrieve the network configurations maintained in the network record to manage, configure, and instantiate existing or new networks. | 04-01-2010 |
20100082800 | CLASSIFICATION AND CLUSTER ANALYSIS SPAM DETECTION AND REDUCTION - Multiple features of email traffic are analyzed and extracted. Feature vectors comprising the multiple features are created and cluster analysis is utilized to track spam generation even from dynamically changing or aliased IP addresses. | 04-01-2010 |
20100082801 | METHOD AND APPARATUS FOR NETWORK TO RECOMMEND BEST MODE FOR USER COMMUNICATION - The present disclosure generally provides techniques and apparatuses for producing, for an initiating end user, a recommended mode of communication corresponding to a targeted end user in a network environment, based on a plurality of network accessible or determinable inputs. For example, the identity of an initiating end user, the identity of a targeted end user, the current activity of the targeted end user, the communication preferences of the targeted end user, information from available databases, and other available or determinable data may be used by a contact liaison to produce a recommended mode of communication. | 04-01-2010 |
20100082802 | Stabilization of distributed systems - One or more embodiments, described herein, are directed towards a technology for analyzing a distributed system in order to determine one or more inconsistencies placing the distributed system in an unstable state. Once the one or more inconsistencies are determined, one or more operations reconciling the inconsistencies are defined in order to stabilize the distributed system. | 04-01-2010 |
20100082803 | FLEXIBLE COMPLIANCE AGENT WITH INTEGRATED REMEDIATION - A flexible compliance system is described herein that provides a deployable meta-agent and automated remediation of computer system compliance failures based on configurable compliance rules. An administrator defines one or more rules that represent compliance elements that the flexible compliance system will enforce. The flexible compliance system reads the rules defined by the administrator like a flexible set of conditions to check, and correlates the outcome of the conditions to the rules. The flexible compliance system may take various actions with respect to a computer system in violation of a rule, including attempting to resolve the violation or quarantining the computer system to avoid interaction with other computer systems. Administrators can use the flexible compliance system to define these and many other types of actions to automatically remediate non-compliant computer systems and protect the health of the organization's resources. | 04-01-2010 |
20100082804 | MEASURED CLIENT EXPERIENCE FOR COMPUTER NETWORK - Routing network traffic on a computer network is described. In one embodiment, a method is presented which includes transmitting instructions to a client, the instructions executable by the client to request content from two or more content servers, measure two or more network performance characteristics associated with the two or more different content servers, and issue a report to an administrative server. The report may include a first network performance characteristic and a second network performance characteristic. The method may further include selecting a target content server from one of two or more content servers based on comparison of the two or more network performance characteristics; and transmitting routing instructions to an intermediate routing system, the routing instructions executable by the intermediate routing system to direct subsequent content requests transmitted by the client to the target content server. | 04-01-2010 |
20100082805 | MICROCONTROLLER NETWORK DIAGNOSTIC SYSTEM - A network diagnostic device is provided, which comprises a passive real-time measurement tool that is useful for, among other things, expediting fault identification, isolation, and repair of a communication network or bus. The device also facilitates prediction of failures by identifying marginal operating conditions. The device analyzes data flowing through the communication network, including through an analysis of variations in bit waveform shape carried by the network physical interconnect media. In one embodiment, an implementation of the network diagnostic device is particularly useful in a DeviceNet-compatible network or, more generally, a Controller Area Network (CAN). The device identifies faults by comparing measurements made on the actual DeviceNet bus with worst-case acceptable criteria. The device interfaces with a remote monitoring computer via an Ethernet compatible medium to display parsed bit-level waveforms, network warnings and errors, as well as an overall network health index. | 04-01-2010 |
20100082806 | STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A storage network system includes computers, storage systems, connection devices that control connection relations between the computers and the storage system, and a managing device that manages the computers, the storage system and the connection devices. The managing device includes a control section that specifies connection ports of the computers, the storage system and the connection devices that compose the storage network system. Further, the control device of the managing device displays on a display section a data traffic amount at each of the connection ports for each connection path from the computer to the storage system. | 04-01-2010 |
20100082807 | CONTINUITY CHECK METHOD, MAINTENANCE END POINT AND SYSTEM THEREOF - A continuity check method includes the following steps. A maintenance domain (MD) group is maintained in a network, in which the MD group includes a plurality of maintenance end points (MEPs) in the network, and an MD group information base is configured, and the MD group information base stores information about the plurality of MEPs. According to the information stored in the MD group information base, a continuity check message is initiated, and then, the continuity in the network is determined according to information returned from the plurality of MEPs in the MD. An MEP network system is further provided. Through the method and the system, no mis-check of the continuity will occur when the MEPs in the MD group initiate the continuity check. | 04-01-2010 |
20100082808 | SYSTEM AND METHOD FOR AUTOMATICALLY DELIVERING RELEVANT INTERNET CONTENT - This invention discloses a system and method for automatically delivering relevant Internet content to a browser, the system comprises a webpage embedded with a generic pixel tag stored in a first server, the generic pixel tag being configured to cause a retrieval of at least one predetermined attribute of the webpage from a browser that is viewing the webpage; and a rule engine residing in a second server for determining one or more Internet contents based on the predetermined attribute for being sent to the browser, wherein linkages between the webpage and the one or more Internet contents are not hard coded in the webpage. | 04-01-2010 |
20100082809 | Network system, information processing device, information processing method, and recording medium - A network system is provided in which a plurality of information processing devices are mutually connected through a network. | 04-01-2010 |
20100088403 | DIRECTORY MANAGEMENT SYSTEM AND METHOD - A method and computer program product for defining at least one target system. The at least one target system is accessed to identify one or more web services available via the at least one target system, thus defining one or more available services. Information concerning the one or more available web services is identified. At least a portion of the information concerning the one or more available web services is published within a web services directory. | 04-08-2010 |
20100088404 | MONITORING RELATED CONTENT REQUESTS - Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction. | 04-08-2010 |
20100088405 | Determining Network Delay and CDN Deployment - Charting a content distribution system (CDN) involves identifying a set of DNS servers that may be used as vantage points to test delay performance to a CDNs content server. As provided herein, to identify potential vantage point DNS servers, a set of authoritative name servers is identified and, from that set, those authoritative name servers that respond to a DNS query are identified as responsive authoritative name servers. Identifying a CDN content server that serves a particular vantage point DNS server involves retrieving an IP address for the CDN content server from a DNS query to the DNS server corresponding to the vantage point. The delay performance between the vantage point DNS server and the CDN content server can then be determined. Further, one can determine locations to deploy new data centers for a CDN based on delay performance, A delay from one or more vantage points to an existing CDN's DNS servers can be measured, and desired rank of locations can be generated. A location of a new data center can be selected based on a desired delay performance ranking. | 04-08-2010 |
20100088406 | METHOD FOR PROVIDING DYNAMIC CONTENTS SERVICE BY USING ANALYSIS OF USER'S RESPONSE AND APPARATUS USING SAME - A method of providing a dynamic content service using an analysis of a user's response, the method including: monitoring the response of the user watching and/or listening to first content; analyzing preference information with respect to one or more scenes included in the first content, based on the monitored user's response; transmitting, to an external server, metadata of the analyzed preference information; receiving, from the external server, second content generated based on the metadata of the analyzed preference information; and outputting the received second content onto a screen. | 04-08-2010 |
20100088407 | INFORMATION DISTRIBUTION SYSTEM, INFORMATION DISTRIBUTION METHOD, AND INFORMATION DISTRIBUTION PROGRAM - An information distribution system includes a visit determination unit ( | 04-08-2010 |
20100088408 | STATUS REPORTING APPARATUS, IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM STORING CONTROL PROGRAM - A status reporting apparatus for reporting a status of an image processing apparatus operating in connection with a network includes a status detector, a status report destination information obtainer, and a status reporting unit. The status detector detects a status of the image processing apparatus. The status report destination information obtainer obtains information on at least one report destination to which the status detected by the status detector is to be reported in accordance with status report destination information in which the status of the image processing apparatus is associated with the information on the at least one report destination. The status reporting unit reports the status detected by the status detector to the at least one report destination on which the information is obtained by the status report destination information obtainer. | 04-08-2010 |
20100088409 | MANAGEMENT SYSTEM, MANAGING METHOD AND CONTROL PROGRAM - Disclosed is a management system, which makes it possible to securely maintain the communication between the managing apparatus (host) and the managed apparatus (device) even when a certain malfunction has occurred in the network or the server. When the device cannot receive the request sent from the host, the device changes the communication mode from the bilateral communication mode to the unilateral communication mode, and then, when it becomes possible to receive the request, the device changes the communication mode from the unilateral communication mode to the bilateral communication mode to transmit the response to the host. Further, when the host cannot transmit the request to the device, or when the host cannot receive the response to the request, the host suspends an operation for transmitting the request, and then, when it becomes possible to receive the response to the request, the host resumes the operation for transmitting the request. | 04-08-2010 |
20100088410 | Wireless Broadband Network Management - This invention concerns the management of wireless broadband networks. In particular the invention concerns a wireless broadband network management system comprising a data collection engine to collect data concerning traffic levels through the network base transceiver stations (BTSs), and the BTSs to which particular customer premise equipment (CPE) can connect; and a processor to correlate the data collected; to monitor overall network performance; to aggregate performance of one or more CPEs and BTSs; to detect underperforming BTSs and CPEs; and to automate CPE connections and disconnections to improve network performance in real time. In another aspect, the invention is a method for managing broadband networks. In further aspect, the invention is a software to implement the method. | 04-08-2010 |
20100088411 | METHOD AND APPARATUS FOR DETERMINING APPLICATION RESPONSIVENESS OVER A NETWORK - Application responsiveness over a network, such as for a web site or web-based application, is monitored and optionally recorded by tracking actual end users interacting with the application and the time it takes for their requested web pages to load. The process involves a web server that sends instrumented web pages or pointers to such instrumentation code in response to browser requests. This instrumentation causes scripting code on the client browser to gather data sufficient to enable determination of how long the page took to load, with separate measurements for latency time and/or intra-page load time, and to classify the type of request for which the measurements correspond. The scripting code can report the values to a record keeper or an external process. In one embodiment, Page Lifecycle Events are used to track and update a Marker and Timestamp from which the page load times and classifications are derived. | 04-08-2010 |
20100094987 | Method For Activation of at Least One Further Eavesdropping Measure in at Least One Communication Network - In a packet-switching and/or cell-switching communication network which comprises a plurality of switching nodes and in which the individual switching nodes in the communication network are each allocated a unique identification, eavesdropping measures are provided in order to eavesdrop on at least one data link that has been formed between two communication subscribers, in which case one of the two communication subscribers is identified by means of at least one eavesdropping measure as a communication subscriber to be eavesdropped on. The switching nodes which are intended for activation of eavesdropping measures are each allocated at least one activation database which has the identifications of the switching nodes which are enabled for activation of further eavesdropping measures. In this case, a further eavesdropping measure is activated in the switching node to be eavesdropped on only if the identification of the switching node to be eavesdropped on matches at least one identification which is contained in the activation database. | 04-15-2010 |
20100094988 | AUTOMATIC DISCOVERY FRAMEWORK FOR INTEGRATED MONITORING OF DATABASE PERFORMANCE - Provided are techniques for monitoring information. In response to a database process starting, a monitoring agent is loaded under control of the database process, wherein the monitoring agent invokes a discovery service to discover a central server and monitoring service. Under control of the monitoring agent, monitor information about the database process is sent to the central server and monitoring service. | 04-15-2010 |
20100094989 | METHODS AND APPARATUS TO ALLOCATE BANDWIDTH BETWEEN VIDEO AND NON-VIDEO SERVICES IN ACCESS NETWORKS - Example methods and apparatus to allocate bandwidth between video and non-video services in access networks are disclosed. An example system comprises a customer-premises device, a digital subscriber line access multiplexer (DSLAM) to transmit to the customer-premises device a signal having a non-video portion and a video portion, a usage monitor at the customer-premises device to monitor a usage of the video portion and to send a parameter representative of the usage of the video portion to the DSLAM, and a policy manager at the DSLAM to adjust at the DSLAM a bandwidth allocation between the video portion and the non-video portion based on the parameter. | 04-15-2010 |
20100094990 | Platform-level Indicators of Application Performance - A method for monitoring performance includes monitoring packet traffic on at least one socket that is associated with an application running on a computer and is communicated over a data network. First and second instances of a performance indicator of the packet traffic are measured respectively during first and second monitoring intervals. An alert is issued upon making a determination that a change between the first instance and the second instance exceeds a predetermined threshold. | 04-15-2010 |
20100094991 | Automated Role Based Usage Determination for Software System - A usage data collection and evaluation mechanism may collect usage information from various sources and summarize the usage information to determine a role for a system. The role and usage information may be transmitted to a centralized server for aggregation and analysis. The collection and transmission of usage data may be governed by and conform to a privacy agreement and may be collected when an end user agrees to such collection. Role determination may be performed using data collected from a single device, multiple devices, or from a network monitoring system. The usage data collection and evaluation mechanism may determine an installed role base and any changes in the installed role base since a previous report. | 04-15-2010 |
20100094992 | Capacity Planning Of Multi-tiered Applicatons From Application Logs - One embodiment collects performance data for an application server that processes transactions received from a client computer to a database server. An application log is created from the performance data and used for capacity planning in a multi-tiered architecture. | 04-15-2010 |
20100094993 | Use of Persistent Sessions by a Presence Access Layer - A method for a watcher to receive presence information. The method includes the watcher requesting presence information from a presence access layer and then disconnecting from the presence access layer. The method further includes the presence access layer receiving the requested information through a persistent session with a presence server, storing the requested information, and delivering the requested information to the watcher after the watcher reconnects to the presence access layer. | 04-15-2010 |
20100094994 | NETWORK STRUCTURE INFORMATION ACQUIRING METHOD AND DEVICE - A method for acquiring information about connection relationships in a network as a tree structure having a predetermined network device as a root node, includes the steps of acquiring information about the ports held by each of the network devices, and the network devices connected to each of the ports from each of the network devices; and determining connection relationships in the network, based on the fact that an arbitrary partial tree in the tree structure is smaller than an upstream partial tree containing the arbitrary partial tree. | 04-15-2010 |
20100094995 | Silent Probes in a Communication Network - A system, device and process to enable a “silent probe” on a network to facilitate network analysis by nodes within a network. A network node requests the silent probe. During the silent probe, all nodes remain silent so that all nodes can listen, hear, and/or analyze the spectrum of the communications medium. | 04-15-2010 |
20100094996 | System and method for a server-based files and tasks brokerage - A server-based files and tasks brokerage system and method are disclosed. In response to receiving a request from a requesting computing device, the server posts the request to a request queue. The request is for a requested mobile telephonic device to perform a task. The server posts a first notification to a first notification queue, in response to receiving the request. The server pushes the first notification to the requested device upon confirming a connection. Upon detecting a first condition of the task being for the requested device to receive a file, the server transfers the file from a file repository. Upon detecting a second condition of the task being for the requested device to send a file, the server transfers the file to the file repository. In response to confirming task completion, the server posts a second notification to a second notification queue associated with the requesting device. | 04-15-2010 |
20100094997 | Event logging techniques for broadband wireless access networks - An apparatus, system, method, and article for event logging for broadband wireless access networks are described. The apparatus may include a managed node to store a managed object associated with an event and to provide the managed object to a network management system. The managed object may include an event table to store an event table entry defining an event at the managed node and including an event severity attribute. The managed object may include an event log table to store an event log table entry when the event severity attribute is greater than or equal to a severity threshold. Other embodiments are described and claimed. | 04-15-2010 |
20100094998 | COMPUTER RESERVATION AND USAGE MONITORING SYSTEM AND RELATED METHODS - A computer network may include a host computer and a plurality of computer workstations selectively connectable thereto at which user work sessions may be initiated. Each computer workstation when disconnected from the host computer (e.g., due to server outage, etc.) may advantageously initiate a user session responsive to a user request and store session information for updating the respective user account balance when reconnected with the host computer. Additionally, when the computer workstations are connected to the host computer they may copy respective user account balances from the host computer upon initiation of user sessions, and update the copied account balances based upon computer usage during the respective user sessions. The computer network may also include at least one reservation computer for cooperating with the host computer to schedule user session reservations and provide a requesting user an estimated time before a user session will be made available. | 04-15-2010 |
20100100617 | System for Assignment of a Service Identifier as a Mechanism for Establishing a Seamless Profile in a Contextually Aware Presence Access Layer - A method for providing presence-related information is provided. The method includes creating a template of presence parameters for an application, storing the template, a presence access layer retrieving the template, the presence access layer using the template to create a profile of at least one presence parameter for the application, and the presence access layer using the profile to specify a presence-related action for the application. | 04-22-2010 |
20100100618 | Differentiating a User from Multiple Users Based on a Determined Pattern of Network Usage - In one embodiment, a method comprises detecting, by an apparatus, first network activity within a time interval on at least a first user device at a user premises, the first user device usable by first and second users; determining from the first network activity a first pattern of network usage associated with the first user and a second pattern of network usage associated with the second user, the second pattern distinct from the first pattern; detecting, by the apparatus, second network activity on the first user device at the user premises following the time interval; and selectively identifying the second network activity as performed by the first user based on a determined correlation between the second network activity and the first pattern of network usage. | 04-22-2010 |
20100100619 | METHOD AND APPARATUS FOR VISUALIZING NETWORK SECURITY STATE - There are provided a network security state visualization device and method, the device including: a security event collector collecting original security event information from network security apparatuses; a security event analyzer analyzing the original security event information collected by the security event collector and extracting characteristic data corresponding to a security event; and a three-dimensional visualization display unit visualizing a correlation between the characteristic data extracted by the security event analyzer as a three-dimensional screen to be displayed. | 04-22-2010 |
20100100620 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING COMPOSITE CAPABILITY INFORMATION FOR DEVICES IN DISTRIBUTED NETWORKS - An apparatus for providing distribution of composite capability information for devices within a distributed network may include at least one processor and at least one memory including computer program code. The memory and the computer program code may be configured to, with the processor, cause the apparatus at least to receive local capability information from a participant device in a distributed network in which the local capability information describes the capabilities of the participant device, combine the local capability information from the participant device with other capability information defining capabilities of other participant devices to produce composite capability information, generate differential information indicating differences between the local capability information and the composite capability information, and provide the differential information to the participant device. A corresponding method and computer program product are also provided. | 04-22-2010 |
20100100621 | SHARING STATUS INFORMATION ACROSS A PLURALITY OF COMMUNICATION NETWORKS - A method and system for sharing status information across a plurality of communication networks is presented. Such a method and system is adapted to collect and make available network session status information and to collect and make available network user status information. | 04-22-2010 |
20100100622 | METHOD, COMPUTER PROGRAM PRODUCT, AND APPARATUS FOR PROVIDING A DISTRIBUTED ROUTER ARCHITECTURE - An apparatus for providing distributed router architecture includes a processing element and a resource availability element. The processing element may be configured to receive indications of receipt of data associated with a service for routing to a destination address. The resource availability element may be in communication with the processing element and may be configured to monitor resource usage over a plurality of distributed resource planes. The processing element may be further configured to allocate a resource associated with routing the data based on the monitored resource usage. | 04-22-2010 |
20100100623 | SYSTEM AND METHOD FOR MONITORING A MOBILE COMPUTING PRODUCT/ARRANGEMENT - Described is a system and method for monitoring a mobile computing Arrangement. The arrangement may include a sensor and a processor. The sensor detects first data of an event including a directional orientation and a motion of the arrangement. The processor compares the first data to second data to determine if at least one predetermined procedure is to be executed. The second data may include a predetermined threshold range of changes in the directional orientation and the motion. If the predetermined procedure is to be executed, the processor selects the predetermined procedure which corresponds to the event as a function of the first data. Subsequently, the predetermined procedures is executed. | 04-22-2010 |
20100106818 | SYSTEM AND METHOD FOR MANAGING SYSTEM RESOURCES IN A NETWORK ENVIRONMENT - A method for managing system resources in a network environment. The method begins by reading from a first log timestamp T | 04-29-2010 |
20100106819 | Script Based Computer Health Management System - A management system may use a human readable script in which is defined executable statements that may gathers status information from various services. The status information may be displayed within a management user interface, which may also include various summary statistics including an overall security state. The services may be locally running services, and services provided or accessible over a local area network or wide area network. In some cases, the human readable script may include statements for starting or resuming the services, querying a running service, or querying a database related to a service. The user interface may be refreshed when the human readable script is updated and re-executed. The services may include security related services, among others. | 04-29-2010 |
20100106820 | QUALITY OF SERVICE MANAGEMENT - A method and system for providing quality of service to a plurality of hosts accessing a common resource is described. According to one embodiment, a plurality of IO requests is received from clients executing as software entities on one of the hosts. An IO request queue for each client is separately managed, and an issue queue is populated based on contents of the IO request queues. When a host issue queue is not full, a new IO request is entered into the host issue queue and is issued to the common resource. A current average latency observed at the host is calculated, and an adjusted window size is calculated at least in part based on the current average latency. The window size of the issue queue is adjusted according to the calculated window size. | 04-29-2010 |
20100106821 | MANAGING CONFIGURATION ITEMS - There is provided a method for managing a plurality of configuration items that includes a repository that holds, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item and a discovery section that detects information on configuration items. The method includes creating at least one new set of data from information detected by the discovery section. The method also includes storing the new set of data in the repository and managing the new set of data as a combined configuration item. | 04-29-2010 |
20100106822 | Monitoring-target-apparatus management system, management server, and monitoring-target-apparatus management method - If both of LUN security information on storage apparatuses and configuration information on an iSNS server are acquirable, a management server makes reference to configuration situation of the LUN security acquired from a monitoring-target storage apparatus, thereby acquiring iSCSI initiator names which are permitted to access the storage apparatus. Moreover, the management server acquires, from the iSNS server, IP address of an iSCSI initiator name which does not exist on a monitoring-target host out of the iSCSI initiator names, then adding the IP address into monitoring-target nodes. Meanwhile, when an access from the management server to a monitoring-target node becomes impossible for a certain constant time-period due to a reason such that the monitoring-target node has been excluded from the network, the management server is capable of excluding the monitoring-target node from the monitoring targets on a GUI. | 04-29-2010 |
20100106823 | CONFIGURATION SYNCHRONIZATION BETWEEN ELECTRONIC GAMING MACHINES AND A SUPPORTING SERVER - An illustrative method manages configuration information of electronic gaming machines (EGMs) and maintains server configuration information at a server that supports EGMs in a server-client relationship. The server configuration information contains stored information about the configuration of each EGM. EGM configuration information transmitted from the EMGs is received at the server. The server and EGM configuration information each contains corresponding fields with values representing information about predetermined factors. The values in the fields of the server configuration information are compared with the values in corresponding fields of the EGM configuration information. A report is generated based on the comparison. | 04-29-2010 |
20100106824 | METHOD AND DEVICE FOR DETERMINING NETWORK DEVICE STATUS - Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints. | 04-29-2010 |
20100106825 | METHOD AND SYSTEM FOR MANAGING RELATED-PATIENT PARAMETERS PROVIDED BY A MONITORING DEVICE | 04-29-2010 |
20100106826 | SERVER FUNCTION SWITCHING DEVICE, METHOD AND PROGRAM, AND THIN CLIENT SYSTEM AND SERVER DEVICE - Provided is a thin client system that automatically allows two types of user terminals, a network-boot-type user terminal and a screen-transfer-type user terminal, to share the same execution environment. A screen-transfer/network-boot switching system serves as a server function switching device used in the thin client system, including a server function switching section and a terminal process proxy execution section. The server function switching section accepts a connection request from the user terminal, and determines attribute of the user terminal. If the user terminal is the network-boot-type user terminal, the boot image transfer section transfers a boot image to the user terminal. If the user terminal is the screen-transfer-type user terminal, the boot image transfer section transmits a boot image to the terminal process proxy execution section. Moreover, the terminal process proxy execution section transmits screen information to the user terminal. | 04-29-2010 |
20100106827 | METHOD AND APPARATUS FOR RECOMMENDING CONTENT - Provided is a content recommending method including receiving from second users meta data regarding content belonging to each of the second users having a content preference similar to a content preference of a first user, detecting based on the received meta data a plurality of pieces of recommended content similar to content that the first user is currently using, and outputting information regarding the respective pieces of detected recommended content. | 04-29-2010 |
20100106828 | METHOD AND APPARATUS FOR INTERFERENCE REPORTING IN A N-MIMO COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate interference measurement and reporting in a network multiple-in-multiple-out (N-MIMO) communication system. As described herein, a network device can measure and report interference corresponding to network nodes outside a designated set of nodes that can cooperatively serve the device. Respective interference reports can additionally identify dominant interfering nodes, correlation between transmit antennas of respective nodes, or the like. Subsequently, respective interference reports can be combined with per-node channel information to manage coordination and scheduling across respective network nodes. As further described herein, interference from a network node can be measured by observing reference and/or synchronization signals from the network node. To aid such observation, respective non-interfering network nodes can define null pilot intervals in which transmission is silenced or otherwise reduced. As additionally described herein, loading information broadcasted by respective interfering network nodes can be identified and utilized in connection with interference calculation. | 04-29-2010 |
20100106829 | Device Status Notification Device - There is provided a device status notification device that notifies a notification destination, which is connected to a network, of a status change in a device connected to the network through the network. The device status notification device includes a notification destination information table in which a notification destination, to which the status change in the device is notified in a case where there is the status change in the device, is registered, a notification destination validity checking unit that checks whether the notification destination registered in the notification destination information table exists with validity, and a registration deleting unit that deletes the notification destination, of which valid existence cannot be checked by the notification destination validity checking unit, from the notification destination information table. | 04-29-2010 |
20100106830 | METHOD AND APPARATUS FOR COLLECTING AND DELIVERING STATISTICAL DATA - A statistical-data collecting-and-providing apparatus receives, through a statistical-data-acquisition-criterion setting interface, setting of a statistical-data acquisition criterion and setting of a notification destination, which is a destination of statistical data delivery. Subsequently, the statistical-data collecting-and-providing apparatus collects statistical data based on the thus-received statistical-data acquisition criterion. Thereafter, the statistical-data collecting-and-providing apparatus delivers the thus-collected statistical data to a service-providing application server, which is the notification destination received through the statistical-data-acquisition-criterion setting interface. | 04-29-2010 |
20100115082 | POWER USAGE REDUCTION SYSTEM AND METHOD - A computer implemented method includes collecting information from multiple network devices regarding utilization over a predetermined period of time. Unused device resources are identified, along with device resources that may be consolidated. Such identifications are provided to a user for use in consolidating the network to reduce power consumption. | 05-06-2010 |
20100115083 | NETWORK SELECTION MECHANISM - A terminal device includes multiple interfaces having links to various networks. When a trigger event occurs, the terminal device selects a target link to a network to transition from its current link. A candidate link selection function determines candidate links that are filtered to remove links not meeting connectivity criteria. A target link selection function is then executed to select a target link from the filtered candidate links. Thus, the target link selection function is not run for every possible link, but only those meeting the criteria. | 05-06-2010 |
20100115084 | POWER MANAGEMENT FOR A COMMUNICATIONS SYSTEM - Described herein is a method and system for facilitating power management in a communications system. The communications system includes a server and one or more communications devices operably coupled to a network, each communications device being operable to enter a low power state in response to a “hibernate” command. The “hibernate” command may be provided by a power management unit in the server in response to, for example, a change in routing preference, location or availability status of the user. | 05-06-2010 |
20100115085 | COMPUTER NETWORK - A peer-to-peer network operating in accordance with a service-oriented architecture is disclosed. The peers in the network request services from one another and each keeps a record of the quality of service they receive from the other peers. The peers share quality of service information with one another in order to take advantage of the improvement in the overall efficiency of the use of resources in the network offered by such information sharing. However, the invention provides a further improvement in that peers do not report the quality of service offered by the peers they have received the best quality of service from. This is found to increase the overall level of service still further since it prevents the peers converging on a favourite service provider and thereby overloading it. The invention finds particular application in distributed applications which dynamically select a Web Service to perform a function at run-time. | 05-06-2010 |
20100115086 | UNIT AND METHOD FOR MANAGING AT LEAST ONE CHANNEL IN AN ACCESS SESSION FOR ACCESSING A SERVICE IN A NETWORK | 05-06-2010 |
20100115087 | APPARATUS AND METHOD FOR DETECTING KEY WORDS WITHIN DATA FEEDS - An apparatus such as a cordless telephone handset is capable of detecting key words within received data feeds. According to an exemplary embodiment, the apparatus includes an input for receiving a data feed, and a controller for determining whether content of the received data feed includes a key word. If the controller determines that the content includes the key word, a signal is generated to notify a user. | 05-06-2010 |
20100115088 | CONFIGURATION-INFORMATION GENERATING APPARATUS AND CONFIGURATION-INFORMATION GENERATING METHOD - From each server configuring an IT system, process information about a process operating on the server is obtained before a series of processes including a process corresponding to an application for providing an IT service is started in any of the servers. Also, the process information is obtained over a plurality of number of times from start to end of performing the series of processes. Then, from out of the process information during the series of processes, process information corresponding to the process information before the series of processes is started is removed, and then process information while the series of processes including the process corresponding to the application is being performed is specified. From the specified process information, a process name and identification information of a server where the process is performed are extracted, and the extracted process name and identification information are tied together, thereby generating configuration information. | 05-06-2010 |
20100115089 | Identifying Participants in a Conference - A method of obtaining data about all the participants in a Binary Floor Control Protocol (BFCP) conference is provided. The method comprises sending a query message from a floor participant or floor chair to a floor control server, the query message requesting information about all of the participants in the conference, and sending at least one status message from the floor control server to the floor participant, the at least one status message including information about all of the participants in the conference. These operations are performed within BFCP. | 05-06-2010 |
20100115090 | Ordering Tracing of Wireless Terminal Activities - According to the invention a core network management device ( | 05-06-2010 |
20100115091 | METHOD, SYSTEM AND RECORDING MEDIUM FOR COLLECTING CONTENTS USAGE INFORMATION - Disclosed is a method, a system, and a recording medium for collecting content usage information. The method includes the steps of transmitting a usage tracking report message from a DCD client of the terminal to the DCD server; and receiving the usage tracking report message in the DCD server. The usage tracking report message includes first information for identifying a corresponding session, second information including a transaction identifier, third information for identifying a corresponding application, and fourth information including content usage information. Advantageously, the DCD server collects content usage information so that users are provided with highly-preferred contents. The fact that the DCD server collects content usage information and transmits no contents unnecessary to users avoids wasting the network bandwidth and improves content delivery efficiency of the terminals, CP, and DCD server. | 05-06-2010 |
20100115092 | Mobile device or computer theft recovery system and method - A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall. | 05-06-2010 |
20100115093 | MONITORING APPARATUS AND SYSTEM - An individual signal unit; each said individual signal unit including: (i) a transceiver module, (j) a power supply, (k) a logic circuit, (l) at least one of a number of external event sensors, and wherein a signal from a said individual signal unit to a central control facility causes said central control facility to execute one or more predefined steps; at least some of said predefined steps configured or reconfigurable by an owner of said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties. Also provided is a monitoring system including an individual signal unit; said individual signal unit communicating with a central control facility when an event sensor activates said individual signal unit; said central control facility executing a number of predefined steps on receipt of a communication from said individual signal unit; at least some of said predefined steps configured or reconfigurable by an owner of, said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties. | 05-06-2010 |
20100121947 | System and Method for Managing the Offload Type for Offload Protocol Processing - A method for determining the offload type for the processing of the protocol of a network connection is disclosed. An offload policy manager in a server node determines the offload type on the basis of a number of factors, including the application type of the network connection, the traffic priority of the network connection, and the port of the network connection. After the offload policy manager selects the offload type of the network connection, the offload policy manager identifies the offload type to the offload engine, which processes the protocol of the network connection according to the offload type selected by the offload policy manager. The offload policy manager is able to access a number of application-specific tables. The offload policy manager selects an offload type by cross-referencing on an application-specific table the traffic priority of the network connection against the port of the network connection. | 05-13-2010 |
20100121948 | REMOTE MONITORING OF USER APPLIANCES - A method for operating a server of a communication system includes at least one user appliance and a monitoring device adapted to perform a remote monitoring of the at least one user appliance through the intermediation of the server, the at least one user appliance being associated with a list of attributes that can take predetermined values. The method includes: 1) receiving the list of attributes associated with the at least one user appliance, and the values that can be taken by each of said attributes; 2) storing at the server the list of attributes with the related values received in 1); and 3) sending said list of attributes with the related values to the monitoring device. | 05-13-2010 |
20100121949 | MANAGEMENT SERVER AND METHOD OF DISCOVERING NETWORK DEVICE THEREOF - A method of discovering a network device includes setting a number of network devices to be discovered, and repeatedly discovering at least one network device with one or more different discovering methods until the set number of network devices are discovered. Accordingly, a network device to be discovered is discovered from non-discovered network devices more effectively through repetitive discovering operations. | 05-13-2010 |
20100121950 | SYSTEM AND METHOD FOR IDENTIFYING REAL USERS BEHIND APPLICATION SERVERS - The present invention provides a monitoring device and method for identifying the identity of users requesting database accesses. The data request from application servers to an application server are monitored and parsed. The SQL statements associated with the data request from the application server are also monitored and parsed, so are the SQL responses from the database server. The SQL responses are sent back to the user as data responses. The data responses are also monitored and parsed. The monitoring device matches the parsed data request with the parsed SQL statements, the parsed SQL responses, and the parsed data responses. By matching the string portion of these parsed data, the monitoring device can then identity the identity of the user making such data base quest. | 05-13-2010 |
20100121951 | Method and arrangement for diagnosing networks including field bus systems - A method for diagnosing networks including networks of field bus systems utilizes an arrangement for diagnosing the networks. The arrangement includes at least two field bus diagnostic apparatuses with each of the field bus diagnostic apparatuses being assigned to a corresponding field bus. The method is carried out with the steps of: causing each of the field bus diagnostic apparatuses to detect current data traffic of the corresponding one of the field busses as a data record and storing the data record on an allocated storage medium; diagnosing the detected data record in an evaluation unit integrated into the corresponding field bus diagnostic apparatus and storing the diagnosed data record in the storage medium allocated to the corresponding field bus diagnostic apparatus; making the detected, diagnosed and stored data record available in the network via a server integrated into each of the field bus diagnostic apparatuses; causing the field bus diagnostic apparatuses to exchange the data records with each other via the servers thereof and the network and storing the exchanged data records on the storage mediums of corresponding ones of the field bus diagnostic apparatuses so that, on each of the storage mediums, the exchanged data records of all other field bus diagnostic apparatuses are stored in addition to the detected, diagnosed and stored data records of the field bus diagnostic apparatus; and, inspecting the detected, diagnosed and stored data records via at least one output unit with each output unit being connected via a client to the network and the data records being made available in the network by at least one arbitrary server. | 05-13-2010 |
20100121952 | COMMUNICATION UNIT, METHOD OF CONTROLLING COMMUNICATION UNIT AND COMPUTER PROGRAM - Conventionally, when a communication unit needed to apply an authentication process to other communication units, a problem arose in that the communication unit could not be quickly connected to a communication unit near a user and to which the user wishes the communication unit to connect. In this invention, a station measures a range to other communication units in the surrounding area and possesses a trigger, which is initiated by a user, for beginning an authentication process; when initiated, the station selects the nearest communication unit based on the result of the measurement and applies the authentication process to it. | 05-13-2010 |
20100121953 | GEO-INTELLIGENT TRAFFIC REPORTER - A traffic reporter gathers real-time information on traffic conditions within a network and sends out traffic reports to traffic managers. The traffic reporter analyzes the network and also gathers network information from the traffic managers and analyzers dispersed throughout the network. These traffic reports provide real-time information on network conditions to allow the traffic managers to route network traffic in the most efficient, reliable, and fastest manner. | 05-13-2010 |
20100125656 | System and Method for Request Routing Optimization - A system includes a monitoring module, a request allocation module, and a request distribution module. The monitoring module is configured to determine a resource utilization of a preferred server and a non-preferred server. The request allocation module is configured to modify an allocation scheme in response to the resource utilization of the preferred server and the non-preferred server. The request distribution module is configured to distribute a plurality of requests from a plurality of users according to the allocation scheme. | 05-20-2010 |
20100125657 | System for Collecting Computer Application Usage Data from a Plurality of Client Devices - A system and method for collecting computer application usage data from a plurality of client devices. The system may include a monitoring program executable on each of the plurality of client devices. The monitoring program may be configured to receive from a server via a computer network monitoring data including one or more application identifiers, and to identify one or more target application programs executed on the client device as matching one of the identifiers. The monitoring program may further be configured to gather usage data for the target application program over a period of time, and send a message back to the server including the usage data. Reports may be generated based on the usage data. | 05-20-2010 |
20100125658 | METHOD AND SYSTEM FOR MULTIMEDIA CONTENT CONSUMPTION ANALYSIS - A method and system for analyzing consumption of multimedia content provided by a multimedia content delivery network are disclosed. The multimedia content may be selected by a user using an electronic programming guide on customer premises equipment (CPE). A historical log of content selection events may be recorded. The historical log is analyzed to generate consumption statistics and consumption patterns for the user. The consumption statistics may be generated for different content types. The analysis may be performed locally on CPE or by a remote server. The consumption statistics may be compared with a user subscription for multimedia content. A consumption metric may be generated for recommending a more cost-effective subscription package to the user. Consumption data may be provided to third parties for data mining. | 05-20-2010 |
20100125659 | Method and Apparatus Regarding the Automatic Transmission of Operational State Event and Time Information - A network element ( | 05-20-2010 |
20100125660 | RECORDING APPARATUS, METHOD, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREOF - When the communicator sends a communication message for Web access, the monitor suspends the sending process of the communication message in the communicator. The start determiner instructs the operation recorder to start the recording process of data indicative of user operations. The monitor allows the communicator to resume the sending process of the communication message. The operation recorder sets a capture interval to the timer. When the user performs input operations, the operation recorder records the input data. If the remaining time of the timer is 0, the operation recorder captures and records the screen data, and sets the capture interval to the timer. If the end determiner has instructed to end the recording process, the operation recorder closes the file for storing the operation data and stores the file in the operation storage. | 05-20-2010 |
20100125661 | ARRANGEMENT FOR MONITORING PERFORMANCE OF NETWORK CONNECTION - A method, apparatus, system, and computer program for analyzing properties of an application-specific end-to-end communication connection are presented. In a connection performance analysis apparatus, measurement data messages are received from a plurality of traffic-monitoring nodes arranged at selected intermediate points in a plurality of network segments of the application-specific end-to-end communication connection and from at least one end node of the end-to-end communication connection, wherein a measurement data message comprises information related to a travel time of at least one data packet of the end-to-end communication connection to the traffic-monitoring node or to the end node transmitting the respective measurement data message. Then, the connection performance analysis apparatus analyzes the received measurement data messages in order to determine a bottleneck of the end-to-end communication connection. | 05-20-2010 |
20100125662 | Methods, Systems, Devices and Computer Program Products for Protecting a Network by Providing Severable Network Zones - Provided is a computer network that includes computer network devices that are grouped into severable computer network zones and that are operable to detect non-compliant network activity in another of the severable computer network zones. The computer network includes multiple intra-network communication connections that are operable to communicatively couple the severable computer network zones to one another and to be selectively disconnected responsive to the detection of non-compliant network activity in a first zone of the severable computer network zones to isolate the first zone from other of the severable computer network zones. | 05-20-2010 |
20100125663 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 05-20-2010 |
20100125664 | System, Method, and Software for Integrating Cloud Computing Systems - A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources. | 05-20-2010 |
20100125665 | SYSTEM AND METHOD FOR PERFORMANCE DATA COLLECTION IN A VIRTUAL ENVIRONMENT - A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides a data consumer that manages a plurality of data collectors, wherein each data collector resides on one of the plurality of virtualized and non-virtualized machines in the computing environment and extracts performance data from a set of Virtual Machines running on a specific compute resource using an operating contract. The operating contract includes one or more metric descriptors, wherein each metric descriptor specifies one or more resources associated with the set of Virtual Machines. In addition, a push manager allows the data consumer to register performance data items that need to be handled, wherein the push manager calls the data consumer to process the performance data items at each time the periodic interval elapse. | 05-20-2010 |
20100131635 | AGE BIASED DISTRIBUTED COLLISION RESOLUTION WITHOUT CLOCKS - A method resolves collisions in a networking system that includes a plurality of entities operable to transmit an intention to reserve a resource. A first request to reserve resources, which includes a listing of the resources along the first transmission path and a first intention priority value, is broadcast through the networking system. The first intention priority value is determined as a function of other intention priority values previously broadcast through the networking system. A second request is received. The second request includes a second intention priority value and at least one of the same resources included in the first request, thereby indicating a collision. The collision is resolved by comparing the first intention priority value to the second intention priority value. If the collision is resolved in favor of the first request, data is routed through the networking system using the resources along the first transmission path. | 05-27-2010 |
20100131636 | APPLICATION DELIVERY CONTROL MODULE FOR VIRTUAL NETWORK SWITCH - A virtualized platform includes a virtual switch connected to the virtual network interface cards (vNICs) for a group of virtual machines running the same application program that is associated with multiple software ports. A module in the virtualized platform monitors the virtual switch's receipt of a network packet that includes control information relating to the application program and its software ports. The module applies a load balancing algorithm to select a vNIC from the vNICs connected or connectable to the virtual switch, based on the rate of processing of previous network packets by each the vNICs (e.g., as measured by the size of a network packet queue). The module might also apply the load balancing algorithm to select a software port for the application. The module then causes the virtual switch to route the network packet to the selected vNIC and software port. | 05-27-2010 |
20100131637 | Detecting Hidden Shared Dependencies Through Covert Channels - According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times. | 05-27-2010 |
20100131638 | Systems and Methods for GSLB Remote Service Monitoring - The present invention provides improvements to the integration between a metric exchange protocol and a monitoring mechanism supporting load balancing by a Global Server Load Balancing (GSLB) appliance in a GSLB hierarchy of appliances, using a method for triggering a monitor on a remote service. The method includes receiving, by a first appliance, metrics of a second appliance via a metric exchange connection between the first and second appliances. The first appliance includes a GSLB service and identifies a service provided via the second appliance as a remote service for GSLB. The first appliance may identify via the metrics that a state of the service is up, and determine that the metric exchange connection is down. Responsive to the determination, the first appliance may trigger a monitor to monitor the status of the service. Further, the first appliance may obtain via the monitor a second status of the service. | 05-27-2010 |
20100131639 | Systems and Methods For GSLB Site Persistence - The present invention provides systems and methods for maintaining site persistence in a hierarchical Global Server Load Balancing (GSLB) deployment. Via configuration of GSLB services locally and remotely on each of the GSLB appliances and LB appliances at a site, a site appliance identifies and associates requests from the GSLB with the site. Furthermore, the site appliance may receive a GSLB cookie with the client request and confirms the request is from the expected GSLB in the site hierarchy. When the load balancers receives a response from a server, the appliance may include the GSLB cookie with the response back to the client. The appliance may also include an LB cookie to identify the server selected by the LB. When the client sends another request, the request may include the GSLB and LB cookie. With this information, the GSLB and LB appliance may maintain site persistence for the client as well as server persistence at the site. | 05-27-2010 |
20100131640 | TECHNIQUES FOR IDENTIFYING AND LINKING RELATED CONTENT - Techniques for identifying and linking related content are provided. A principal content network node is received having principal-defined content organized around a principal-defined topic. Local content of the principal is also acquired. The principal-defined content and the local content are evaluated to derive relationships associated with principal identities, principal reputations, and the principal-defined topic. A content network is established that links the principal content network node to other content network nodes having the local content; the links are maintained in response to the relationships. | 05-27-2010 |
20100131641 | SYSTEM AND METHOD FOR IMPLEMENTING A WIRELESS QUERY AND DISPLAY INTERFACE - System and method for implementing a wireless query and display interface are disclosed. In one embodiment, the system includes a machine to be monitored and an end-point associated with the machine and comprising an interface, the end-point for connecting to the machine to be monitored via the interface. The system further includes a consolidator comprising an identity service and a Global Device Identity Listing (“GDIL”), the GDIL for maintaining a list of machines to be monitored using the system and a wireless device for viewing the list maintained by the GDIL and for issuing commands and queries related to one or more of the machines on the list. The end-point, the consolidator, and the wireless device are capable of wirelessly communicating with one another. | 05-27-2010 |
20100131642 | SYSTEM FOR MONITORING THE USE OF CONTENT IN A VEHICLE - A content monitoring system having a vehicle content module for monitoring the use of a content player in a vehicle. The vehicle module includes an interface to a data communications network of the vehicle and a data collector for monitoring data on the data communications network to access in real time player data representing use of the player. The content can include self-loaded content, such as that of a CD, DVD, an ipod, and an mp3 file and broadcast content, such as that of an FM radio broadcast. The content monitoring system also includes a transmission module for transmitting the player data from the vehicle and a server system including an analysis module for receiving and processing the player data from the data collector to generate content usage report data, e.g. representing an audience or ratings survey. | 05-27-2010 |
20100131643 | REMOTELY MANAGED DEVICE - A remote management server creates a data set-up instruction telegram to be sent to a remotely managed device. A control program extracts the data set-up instruction from the telegram, and outputs same to a communication control bundle. The communication control bundle outputs the data set-up instruction to a basic data management bundle. The basic data management bundle, based on the data set-up instruction, fetches the data to be set in the remotely managed device, and determines whether this data is basic data or extended data. If the data is basic data, the basic data management bundle executes this data set-up process. If the data is extended data, an extended data management bundle executes the data set-up process. | 05-27-2010 |
20100131644 | RESOURCE ALLOCATION METHOD IN WIRELESS NETWORK - Provided is a resource allocation method performed in a wireless network formed of a plurality of nodes, the resource allocation method including the operations of forming clusters and electing cluster heads respectively for the clusters; determining whether a node from among the plurality of nodes forming the wireless network is an edge node; if the node is not the edge node according to a result of the determining, collecting link information related to other nodes in a cluster that comprises the node, and delivering the link information to a cluster head of the cluster; and if the node is the edge node according to a result of the determining, otherwise, obtaining link information and scheduling information from an edge node of another cluster within a communication range with the cluster comprising the edge node, and delivering the link information and scheduling information to the cluster head. The resource allocation method decentralizes a load of calculations to several nodes, wherein the load may be centralized to one node in a large ad-hoc network, so that an energy efficiency of the node may be increased, and since the several nodes sequentially perform simple calculation, a total of the resource allocation time may be reduced. | 05-27-2010 |
20100131645 | SYSTEM AND METHOD FOR GENERATING AND USING FINGERPRINTS FOR INTEGRITY MANAGEMENT - A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event. | 05-27-2010 |
20100138528 | Determining the graphic load of a virtual desktop - The graphics load of a virtual desktop is estimated to determine the capacity of a virtual desktop system. In one embodiment, the graphics load of a physical desktop is measured by a remoting agent installed on the physical desktop. The graphics load can be used as an estimate of the load that would be created by a deployed virtual desktop. The remoting agent on the physical desktop mimics host operations that are necessary to direct graphics data to a remote site. The remoting agent also measures the graphics load incurred by the host operations to determine a capacity of a virtual desktop system prior to deployment of the virtual desktop system. | 06-03-2010 |
20100138529 | Variance-Optimal Sampling-Based Estimation of Subset Sums - The present invention relates to a method of obtaining a generic sample of an input stream. The method is designated as VAR | 06-03-2010 |
20100138530 | COMPUTING COMPONENT AND ENVIRONMENT MOBILITY - Methods, services, devices, and programmable code are provided for moving computing processes without loss of service. Powered components supporting a computing infrastructure executing computing processes are monitored for thermal characteristics, each associated with at least one of the deployed components. A thermal characteristic rule set comprising a threshold is applied to the monitored characteristics, and in response to an association with a monitored characteristic correlating with the threshold, a computing process is moved from one powered component to another having a monitored thermal characteristics not correlated with the threshold, the moving in real-time and without causing an interruption of service to an end user using the moved process. | 06-03-2010 |
20100138531 | REAL TIME PROTOCOL STREAM MIGRATION - A method for monitoring and migrating a primary server transmitting a real time streaming protocol (RTSP) stream is provided. Backup servers monitor at least one primary server to determining whether the primary server is active. Upon determining that a primary server is inactive, the backup servers take over the connection on which the inactive primary server was streaming data and then take over the transmission of the RTSP stream. The backup server can further derive the position in a file of the next data needed to be transmitted. | 06-03-2010 |
20100138532 | Method of operating a network subnet manager - The invention relates to a method of operating a network subnet manager, in particular Infiniband network subnet manager in a subnet of a network. | 06-03-2010 |
20100138533 | METHOD OF IDENTIFYING A ROOT CAUSE OF A NETWORK EVENT - A method of identifying a root cause of an event in a network of linked entities. The method comprises: defining a plurality of signatures, each signature comprising one or more classes, the classes being categorized by a taxonomy of classes; receiving a first message from the network; assigning one or more of the signatures to the first message; establishing a set of one or more hypotheses, each hypothesis identifying:a respective root cause; and one of the signatures assigned to the first message; receiving one or more subsequent messages from the network; determining whether each subsequent message matches a signature identified by a previously hypothesis; and generating an output based on the determination. | 06-03-2010 |
20100138534 | SYSTEMS AND METHODS FOR MONITOR AN ACCESS GATEWAY - The present invention is directed towards systems and methods for monitoring an access gateway. The systems and methods include monitors on appliances that generate and send requests to logon agents or login page services on access gateways. Based on the responses from the logon agents or login page services, the monitors determine whether the logon agents or login page services are available. | 06-03-2010 |
20100138535 | NETWORK SERVICE ZONE LOCKING - A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network | 06-03-2010 |
20100146099 | Network Address Translators (NAT) Type Detection Techniques - Techniques described herein enable peers to determine each peer's NAT type much more efficiently and quickly than when compared with existing techniques. To do so, a peer simultaneously sends multiple test messages to a server. The peer then waits to either receive a response for each of the multiple test messages or may store an indication that no response has been received after a predetermined timeout period. The peer then analyzes the received responses and/or the stored timeout indications to determine the peer's NAT type or to determine that the peer is operating free from concealment by a NAT/firewall device. By simultaneously sending the multiple test messages, the peer may determine the NAT type within a maximum time defined by the predetermined timeout period or a roundtrip time period that is required for communication between the peer and the server. As such, the tools allow for efficient NAT-type detection. | 06-10-2010 |
20100146100 | Flexible Application Classification - A system includes an information storage module and an inspection module. The information storage module is configured to store a plurality of tags. Each tag is associated with a known set of traffic types of a plurality of known sets of traffic types. The inspection module is configured to compare a traffic flow to a set of traffic types to determine a matching set of traffic types, request a tag from the information storage module, and mark the traffic flow with the tag. The tag corresponds to the matching set of traffic types. | 06-10-2010 |
20100146101 | Method And System For Binding A Watcher Representing A Principal To A Tuple Based On A Matching Criterion - Methods, systems and computer program products are described for dynamically binding a watching principal to a tuple. In one aspect, a system comprises a message router component configured to receive a watcher matching criterion to bind a watcher representing a principal to a tuple, and an attribute manager component configured to receive an attribute of a first principal represented by a first watcher in a publish/subscribe client. The system also includes a matcher component configured to determine whether the first watcher satisfies the watcher matching criterion when an update to a tuple is detected, where the determination is based on an evaluation of the watcher matching criterion and the attribute of the first principal, and a binder component configured to bind the first watcher to the updated tuple by providing at least a portion of the updated tuple information to the first watcher when the matching criterion is satisfied. | 06-10-2010 |
20100146102 | PROVIDING REPORTS OF RECEIVED MULTIMEDIA PROGRAMS - Selections of multimedia programs are monitored and indications of the selections are included in a report if user specified criteria are met. Example criteria include a minimum presentation duration, a report condition, and a maximum retention period. Access to the reports may be limited to administrators. | 06-10-2010 |
20100146103 | PERFORMANCE MANAGEMENT SYSTEM, INFORMATION PROCESSING SYSTEM, AND INFORMATION COLLECTING METHOD IN PERFORMANCE MANAGEMENT SYSTEM - Provided is a performance management system | 06-10-2010 |
20100146104 | SYSTEM AND METHOD FOR DETECTING A REMOTE APPARATUS - A system for detecting a remote apparatus includes a host and a remote interface device connected to the host via a network. The remote interface device includes at least one serial port configured for connecting to a serial port apparatus. The remote interface device detects the connection status of the serial port using a filter rule provided by the host. When the connection status is changed, the remote interface device sends an event notification to the host. The host adds or removes virtual port objects, which are used by application software and are configured to control the remote apparatus, according to the received event notification. Using the mechanism described above, the host can have remote plug and play feature on a remote serial port apparatus. | 06-10-2010 |
20100146105 | BROADBAND SERVICE DELIVERY - Service is delivered from a service provider to a customer in a network system having a plurality of service providers and a network control and provisioning system through which connection of the customer and service provider is controlled. The service provider is connected to the control and provisioning system via a service manager application which contains predetermined values of conditional data parameters for services to be provided to the customer and the customer's connection to the network is interrogated by the service manager to determine the current values of conditional data parameters. The current values are compared with the predetermined values to determine whether or not conditions for provision of the requested services are met. The results of the comparison are communicated to the service provider. | 06-10-2010 |
20100146106 | Method For Context Based Discovery And Filtering Of Portable Collaborative Networks - A peer-to-peer collaborative network system is described. The peer-to-peer collaborative network system allows for the existence of a number of collaborative networks. Within the collaborative networks, users can interact in ways such as messaging, file sharing, resource sharing, and the like. The user will query other users on the network to determine which collaborative networks are active. The user can then select an active collaborative network without having to be invited there. | 06-10-2010 |
20100146107 | Bandwidth Measurement - Methods for testing network bandwidth availability in a non-intrusive manner. By implementing occasional, base-line bandwidth testing, a more accurate indication of actual transfer rate results. When an application dependent upon network bandwidth is first executed, a series of file transfers takes place utilizing a series of different sized pieces of content. | 06-10-2010 |
20100146108 | RATE-CONTROLLABLE PEER-TO-PEER DATA STREAM ROUTING - Difficulties associated with choosing advantageous network routes between server and clients are mitigated by a routing system that is devised to use many routing path sets, where respective sets comprise a number of routing paths covering all of the clients, including through other clients. A server may then apportion a data stream among all of the routing path sets. The server may also detect the performance of the computer network while sending the data stream between clients, and may adjust the apportionment of the routing path sets including the route. The clients may also be configured to operate as servers of other data streams, such as in a videoconferencing session, for example, and may be configured to send detected route performance information along with the portions of the various data streams. | 06-10-2010 |
20100146109 | SYSTEM AND METHOD FOR NETWORK VIRTUALIZATION - A context-aware server is provided. The context-aware server includes an integrated interface unit and a virtualization information generating unit. The integrated interface unit receives context information of a terminal, user profile information, and network state information. The virtualization information generating unit generates virtualization information including network resource information allocated by using the network state information and at least one of the context information and the user profile information. | 06-10-2010 |
20100146110 | METHOD FOR COLLECTING HUMAN EXPERIENCE ANALYTICS DATA - A method for collecting human experience analytics data for visitors browsing a Web site and a web analytics data collection engine are disclosed. The method comprises the steps of registering an action performed by a visitor browsing the Web site, categorizing said registered action as a navigation action between web pages of the Web site and/or as an event action within a web page of the Web site. In the case that the registered action is categorized as an event action, the event is associated with a web page of the Web site, and the action is recorded as an event within the associated web page. In the case that the registered action is categorized as a navigation action, the action is either recorded as a navigation from a current web page to a subsequent web page, or recording of the action is cancelled, based on previously defined criteria. Finally, the recorded events and navigations are stored in a data storage facility. | 06-10-2010 |
20100146111 | EFFICIENT COMMUNICATION IN A NETWORK - A connection may be established between a first device and a second device in a network. Thereafter, the first device may be monitored for one or more performance parameters. Subsequently, full state information of an application may be processed at the first device based on the performance parameters, and the processed full state information may be transmitted by the first device to the second device. Thereafter, one or more state changes of the application may be processed at the first device based on the one or more performance parameters while the connection is active. Subsequently, one or more processed state changes of the application may be transmitted sequentially by the first device to the second device. | 06-10-2010 |
20100146112 | EFFICIENT COMMUNICATION TECHNIQUES - Embodiments of techniques that may be used to improve communication efficiency in a network are provided. One or more versions of one or more communication protocols in the network may be monitored. A document object model of data may be processed at a device to generate raw data. Subsequently, the raw data may be transmitted by the device on the network based on the versions of the communication protocols. | 06-10-2010 |
20100146113 | DIRECTOR DEVICE WITH VISUAL DISPLAY ARRANGEMENT AND METHODS THEREOF - A director device arrangement for performing a plurality of monitoring functions on data traffic traversing through a network is provided. The director device arrangement includes a power module, a processor module, a set of network ports, a set of switch modules, and at least one monitoring ports. The set of switch modules is configured to include at least a first switch module and a second switch module that interact with one another to perform the plurality of monitoring functions on the data traffic received. The at least one monitoring port is configured to receive at least one of the data traffic traversing through the network, whereas the data traffic is configured to traverse the director device arrangement between the set of network ports irrespective whether power is provided to the circuitry, the processor module, and the set of switch modules of the director device arrangement. | 06-10-2010 |
20100153536 | PARTICIPATING WITH AND ACCESSING A CONNECTIVITY EXCHANGE - Methods for integrating with and participating in a connectivity exchange are described herein. Service providers and users access the Internet via the exchange using one or more devices. These devices include user devices for accessing the Internet via the exchange and devices for service providers offering services to users via the exchange. | 06-17-2010 |
20100153537 | METHOD AND APPARATUS FOR PROVIDING DETECTION OF INTERNET PROTOCOL ADDRESS HIJACKING - A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix. | 06-17-2010 |
20100153538 | System and Method for Communication Handling and Handoff - A system and method handles communications and handoffs communications. A network component for the communication system comprises a memory and a processor. The memory stores a table of data relating to devices disposed in the communication system. The data includes locations of the devices. The processor is configured to determine a destination for an incoming communication. The processor is further configured to determine a pathway to forward the incoming communication to the destination as a function of the table. The communication system includes a first region in which the network component is configured to manage and a second region in which a further network component is configured to manage. | 06-17-2010 |
20100153539 | ALGORITHM FOR CLASSIFICATION OF BROWSER LINKS - A method or algorithm for classifying downloaded links or URL's based on the reason behind the download. Downloads are classified into categories, for example, a “visited” URL or an “embedded” URL. Categorizing these downloads allows other applications to collect information for storage, upload, or other action. This algorithm uses information from the browser history and packet streams to obtain and categorize the links or URL's for classification. | 06-17-2010 |
20100153540 | GEOLOCATION MAPPING OF NETWORK DEVICES - A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a client a list of area landmark servers (ALS) with known geographic locations. The client probes ALSs, measures response delays, and provides results to the coordination server. The coordination server then provides to the client a list of additional city landmark servers (CLS) within the area. The client probes the CLSs and provides results to the coordination server which then determines the geographic location of the client. | 06-17-2010 |
20100153541 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON PROCESSOR WORKLOAD - A technique for operating a high performance computing (HPC) cluster includes monitoring workloads of multiple processors included in the HPC cluster. The HPC cluster includes multiple nodes that each include two or more of the multiple processors. One or more threads assigned to one or more of the multiple processors are moved to a different one of the multiple processors based on the workloads of the multiple processors. | 06-17-2010 |
20100153542 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON BROADCAST INFORMATION - A technique for operating a high performance computing cluster (HPC) having multiple nodes (each of which include multiple processors) includes periodically broadcasting information, related to processor utilization and network utilization at each of the multiple nodes, from each of the multiple nodes to remaining ones of the multiple nodes. Respective local job tables maintained in each of the multiple nodes are updated based on the broadcast information. One or more threads are then moved from one or more of the multiple processors to a different one of the multiple processors (based on the broadcast information in the respective local job tables). | 06-17-2010 |
20100153543 | Method and System for Intelligent Management of Performance Measurements In Communication Networks - A system and method operable to monitor a parameter of a node of a communications network, enable one of a plurality of performance measurements for the node based on an enable threshold of the parameter and disable the one of the performance measurements based on a disable threshold of the parameter. | 06-17-2010 |
20100153544 | Content rendering control system and method - A system and method for controlling of rendering of content via electronic networks, whereby content is rendered at a content page only when and to the extent that a pre-defined area of the content page is within the viewer's browser window dimensions and scrolling position, or within a pre-defined distance outside of said browser window dimensions and scrolling position. When a viewer accesses a content page and as the viewer scrolls up or down or left or right on the page, or increases or decreases the dimensions of the viewer's browser window, content that has been designated to render in the content page area corresponding to the viewer's then current browser window dimensions and scrolling position is rendered. Content relating to areas of the content page that are not within (or within such pre-defined distance from) the viewer's browser window dimensions and scrolling position is not rendered unless or until such area is within such browser window dimensions and scrolling position or said pre-defined distance outside of same. | 06-17-2010 |
20100153545 | METHOD OF ASSIGNING SERVICE AND INFORMATION PROCESSING APPARATUS FOR IMPLEMENTING THE METHOD - To provide a method for assigning a service wherein power consumption can be reduced, and an information processing apparatus for implementing the method. The method includes: receiving a request of a service provided by a device connected to a network; checking whether or not a device providing the requested service is in a sleep state; selecting a device to be used based on the checked sleep state of the device, a service table that stores a combination of a service provided via the network and a device connected to the network and providing the service, and a power consumption table that stores a device connected to the network and power consumption of the device, under conditions of a time until the service is provided and power consumption; and issuing an instruction of providing the service to the selected device. | 06-17-2010 |
20100153546 | System and method to publish information from servers to remote monitor devices - To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page. | 06-17-2010 |
20100153547 | COMMUNICATION METHOD, SERVER AND MEDIUM ON NOTIFICATION OF SESSION STATUS - A first server receives the notification of connection ready from each of a plurality of second terminals for executing second communication, notifies the connection ready of each of the second terminals to a second server, detects connection by first communication between a plurality of first terminals, and notifies the detected connection by the first communication to the second server. The second server, upon recognizing the connection ready between the second terminals and the connection by the first communication between the first terminals, provides a service by the second communication between the second terminals. | 06-17-2010 |
20100153548 | METHOD AND SYSTEM FOR TRACKING SCREEN ACTIVITIES - Techniques to facilitate a system to capture, process, and archive a series of user interactive events and subsequently retrieve the stored user interactive events are disclosed. The captured information is indexed and stored for future access either on a terminal device or an accessible remote server device. | 06-17-2010 |
20100153549 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO A RESOURCE MANAGER - A method, system, and program product for communicating with machines connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if urgent service is needed by the device. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information to the resource administrator using e-mail. | 06-17-2010 |
20100161783 | SOCKET CONNECTION-BASED PRINTER DISCOVERY METHOD USING A THREAD MANAGEMENT SCHEME - A targeted TCP socket connection-based printer discovery method is disclosed. It does not use network broadcasts; rather, single packets are sent to each IP address. A multi-threaded method is implemented so that each child thread attempts a TCP socket connection with one IP address, and multiple child threads executes simultaneously. If a connection is successful, the child thread records the corresponding IP address in a local record table. After all child threads exits, the parent thread examines each IP address in the local record table to determine whether the IP address is a supported printer not already in the discovered printer list, and adds the IP address to the discovered printer list if appropriate. Alternatively, the steps of determining whether the IP address is supported printer not already in the discovered printer list may be performed by the child threads. | 06-24-2010 |
20100161784 | Dynamic Fusion Management - A system and method for managing a network of nodes that share sensor data is presented. In one embodiment, the system and method clusters groups of nodes into subnets. Nodes in a common subnet share sensor data with other nodes in the subnet at one rate, while nodes that are not in a common subnet share sensor data at a second substantially reduced rate. | 06-24-2010 |
20100161785 | METHOD AND SYSTEM FOR MINING WEBSITES - One website mining embodiment is for characterizing first time users of a website, collecting user session data of the users visiting the website and identifying first time visitors, determining features of the first time visitors utilizing the user session data, determining rules utilizing the features of the first time visitors, monitoring actions of the first time visitors on the website, updating the rules utilizing the monitored actions of the first time visitors and recommending web content utilizing the rules to the first time visitor. | 06-24-2010 |
20100161786 | QOS CONTROL METHOD FOR ISCSI - A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced. | 06-24-2010 |
20100161787 | WEB PAGE RESPONSE MONITORING - A device receives a list of uniform resource locators (URLs), selects a web page URL from the list of URLs, and requests, via a browser application, content corresponding to the selected web page URL. The device also receives, via a packet capture, a web page associated with the selected web page URL, derives performance information associated with the packet capture, parses the packet capture to extract page level statistics, connection level statistics, and inline object level statistics, and stores the page level statistics, the connection level statistics, and the inline object level statistics to output files. | 06-24-2010 |
20100161788 | MONITORING USER DEMOGRAPHICS WITHIN A VIRTUAL UNIVERSE - An invention that provides discovery and transfer of assets in a virtual universe is provided. In one embodiment, there is an asset transfer utility, including an inventory component configured to display to a user within a virtual universe an inventory containing a plurality of assets owned by other users within the virtual universe, each of the plurality of assets listed anonymously. A search component is configured to search the inventory containing the plurality of assets. A selection component is configured to select a set of assets from the plurality of assets based on the search. A transfer component is configured to transfer the set of assets between the user and an owner of each of the set of assets. | 06-24-2010 |
20100161789 | TECHNIQUES FOR GAUGING PERFORMANCE OF SERVICES - Techniques for gauging performance of services are provided. A client agent is configured to process on a client. The client agent simulates operations of a transaction as instructed by a server agent. The client agent also gathers metrics for each of the operations as they process on the client and passes the metrics back to the server agent. The server agent analyzes the metrics in accordance with a policy and takes one or more actions in response thereto. | 06-24-2010 |
20100161790 | Lawful Intercept for Multiple Simultaneous Broadband Sessions - Identifying information associated with a user under surveillance is received. A first intercept is provisioned on a first network element to intercept the data traffic according to the identifying information. A database is queried based on a login identifier associated with the user. A query result is received from the database. The query result may include a network element identifier and circuit information associate with the login identifier. A determination is made as to whether the network element identifier contained in the query result is the same as a network element identifier contained in information of record. In response to determining that the network element identifier contained in the query result is different from the network element identifier contained in the information of record, a second intercept is provisioned on a second network element to intercept the data traffic according to the network element identifier contained in the query result. | 06-24-2010 |
20100161791 | SYSTEM AND METHOD FOR SAMPLING NETWORK TRAFFIC - Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value. | 06-24-2010 |
20100161792 | Alternate media identification/selection based upon rendered media meta-data - A technique to identify and characterize meta-data associated with an original content that is being transferred from a source to a renderer in a home network, in which the original content is to be rendered by the renderer. Instead of making available for rendering the original content, an alternate content for delivery to the renderer is located, wherein the alternate content is identified by associating the alternate content to the original content via characterization of the meta-data. Then, the alternate content is rendered instead of the original content or rendered in addition to the original content. | 06-24-2010 |
20100161793 | METHOD FOR COMPOSING ON-CHIP NETWORK TOPOLOGY - A method for optimizing a binary tree includes: sequentially searching a binary tree having IP modules of an on-chip network as the lowermost child nodes in a direction from the lowermost node to the uppermost node, and checking whether or not a search target node has child nodes; if the search target node does not have a child node, directly obtaining a minimum solution of the search target node, while if the search target node has child nodes, obtaining the minimum solution of the search target node by using the minimum solutions of the child nodes; and if the search target node is an intermediate node, continuously searching the binary tree, and if the search target node is a root node, optimizing the binary tree by merging nodes of the binary tree according to the minimum solution. | 06-24-2010 |
20100161794 | MAINTAINING CLOSED SUBSCRIBER GROUP INFORMATION FOR ACCESS CONTROL - Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list. | 06-24-2010 |
20100161795 | APPARATUS AND METHOD FOR MULTI-USER NAT SESSION IDENTIFICATION AND TRACKING - A method and apparatus are provided for identifying and tracking multiple computer user sessions associated with a network address translation (NAT) device coupled to a computer network. Data packets originating from the NAT device containing a request to a destination server coupled to the computer network are received. A client source address associated with the data packets is determined where the source address associated with the NAT device. One or more session entries associated with the client source address can then be determined, wherein the session entries are stored in system state information. A session signature can then be determined based one or more characteristics defined by the data packet header information and/or request header information in the one or more data packets, the session signature uniquely identifying one of the multiple computer user sessions coupled to the NAT device. | 06-24-2010 |
20100161796 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO USERS - A method, system, and program product for communicating with machines and end users connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and an end user or a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device by an end user to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if an urgent need of the end user is indicated, so that a communication may be sent either directly to the end user or to a device driver so that the device driver may communicate the message to the end user. For example, an end user may have exceeded a predetermined limit of resource usage, and needs to be informed. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information. such as summary information regarding usage of network resources to the end user using e-mail. | 06-24-2010 |
20100169472 | Web Access Monitoring Method and Associated Program - A centralized control server for controlling each computer includes a step for setting monitoring rules including warning conditions and processing forms at the time of warning for web accesses which are improper from a business or educational point of view. A client computer is provided with a filtering module for monitoring web accesses. Said filtering module includes a step for analyzing the communication contents of the client computer and detecting the occurrence of a web access to an object to be monitored prescribed by the monitoring rules, a step for counting an access quantity at the time of detection of the web access, and a step for issuing warning processing in real time to a user or an administrator in accordance with the processing forms at the time of warning when it is judged that the access quantity has reached an upper limit value prescribed by the warning conditions. | 07-01-2010 |
20100169473 | Terminal, network apparatus, network apparatus searching system including the terminal and the network apparatus, and network apparatus searching method - The present invention has as its object providing a terminal capable of accurately searching for an apparatus installed near a user. The terminal connected to a network apparatus through a network includes a display section which performs a displaying operation and position searching means which, on receiving an instruction to make a search for the network apparatus, transmits a signal indicating specific content and then, on receiving a response signal from the network apparatus that receives the signal through the network, causes the display section to display information that shows that the network apparatus transmitting the response signal has received the signal. | 07-01-2010 |
20100169474 | Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System - Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned. | 07-01-2010 |
20100169475 | SYSTEM AND METHOD FOR MANAGING A BROADBAND NETWORK - A process for managing usage on a broadband network, said process comprising: (a) monitoring a subscriber's broadband usage; (b) determining if said usage rises to a level indicative of an event; (c) determining if said event is consistent with heavy usage or with a security incident; (d) if said event is consistent with heavy usage, offering said subscriber at least one of a plan for an upgraded subscription, or an incentive to concentrate usage in nonpeak time; and (e) if said event is consistent with a security incident, exercising security measures to minimize unintended usage. | 07-01-2010 |
20100169476 | METHOD AND SYSTEM FOR DETECTING AND REDUCING BOTNET ACTIVITY - A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist. | 07-01-2010 |
20100169477 | SYSTEMS AND METHODS FOR DYNAMICALLY PROVISIONING CLOUD COMPUTING RESOURCES - In one embodiment the present invention includes a computer-implemented method comprising specifying configuration information for creating one or more software servers as images on a cloud computing system, specifying a processing load threshold, and continuously monitoring a processing load on one or more software servers. If the monitored load exceeds the processing load threshold, a request to the cloud computing system may be generated to instantiate an instance of one of said images. The method further includes creating a server instance on the cloud in response to the request, distributing the processing load across the one or more servers and the server instance, and monitoring the processing load on the one or more servers and the server instance. | 07-01-2010 |
20100169478 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTIVELY ADJUSTING A REGISTRATION INTERVAL OF AN ENDPOINT - Methods, systems, and computer program products for adaptively adjusting a registration interval of an endpoint are provided. In an embodiment of the subject matter disclosed herein, a method of adaptively adjusting a registration interval of an endpoint comprises determining a registration interval for an endpoint associated with a binding defined at a network address translation device. The method also comprises determining a stability of the binding based on a message received from the endpoint. Further, the method comprises adjusting the registration interval for the endpoint based on the determined stability of the binding. A message can be sent to the endpoint for indicating the adjusted registration interval. | 07-01-2010 |
20100169479 | Apparatus and method for extracting user information using client-based script - Provided are an apparatus and method for extracting user information using a client-based script in which user information including the internet protocol (IP) addresses of an attacking host and an anonymous proxy server used by the attacking host can be collected using a client-based script that can be automatically executed in the web browser of the attacking host. According to the apparatus and the method, it is possible to detect the location of an attacking host without alerting the attacking host by using a script that can be automatically executed in a web browser of the attacking host without any program installation. In addition, according to the apparatus and the method, it is possible to collect the IP addresses of an attacking host and an anonymous proxy server, if any, used by the attacking host by directly connecting the attacking host and a monitoring server. | 07-01-2010 |
20100169480 | Systems and Methods for Monitoring Messaging Applications - The present inventions relate systems and methods for monitoring and managing electronic messages in one or more computer networks. More particularly, the systems and methods of the present invention provide a substantially global or unified approach to messaging management within one or more computer networks that allows network administrators or other authorized users to define and identify electronic messages of interest within the network and store selected messages such that they can be retrieved and examined in connection with an audit or other inquiry. | 07-01-2010 |
20100169481 | TEST SYSTEM FOR SEMICONDUCTOR DEVICES BASED ON NETWORK MONITORING - A test system for semiconductor devices based on network monitoring is disclosed. The test system includes a testing apparatus, a test system server and one or more control terminals. The test system server wirelessly receives the test request transmitted from the testing apparatus, the control terminals, the designing apparatus or the manufacturing apparatus. According to the test request, the test system sever wirelessly transmits the test information to the testing apparatus to proceed with a test process for a semiconductor device. | 07-01-2010 |
20100169482 | Method And An Apparatus For Monitoring Multimedia Data - The present invention discloses a method for monitoring network multimedia data, comprising: analyzing network packets, identifying multimedia data carried in the packets; separating the multimedia data from the packets, and saving the data and the associated access information to a monitoring information base to be utilized for illegal information detection. This invention also discloses a monitoring apparatus to implement the network multimedia monitoring. The method and apparatus in this invention implement monitoring of the multimedia information travelling in the network. | 07-01-2010 |
20100169483 | Capability Service in Communications System - According to the present solution, a capability service is provided to a user terminal (T | 07-01-2010 |
20100174812 | SECURE REMOTE MAINTENANCE AND SUPPORT SYSTEM, METHOD, NETWORK ENTITY AND COMPUTER PROGRAM PRODUCT - A remote, secure maintenance and support system, method, network entity and computer program product are provided. The system can include site terminal(s) and/or a site server (collectively “site device(s)”), a data center in communication with the site device(s) over a first secure tunnel, and at least one client terminal in communication with the data center over a second secure tunnel. The site device(s) can be configured to periodically transmit to the data center one or more error messages over the first secure tunnel. The data center can, in turn, be configured to make the error messages accessible to at least one authorized technician operating one of the client terminals. The client terminal can be configured to retrieve at least one of the error messages over the second secure tunnel and to take an action associated with resolving the error message. | 07-08-2010 |
20100174813 | METHOD AND APPARATUS FOR THE MONITORING OF RELATIONSHIPS BETWEEN TWO PARTIES - A computer implemented method and data processing device for assessing electronically mediated communications is described. A plurality of messages sent by a first party are captured. The content of the messages is processed to determine a quantitative metric reflecting a first property. The behavior over time of the quantitative metric is analyzed to assess the nature of a relationship involving the first party. | 07-08-2010 |
20100180023 | Automatic protocol detection - A method and corresponding device provides for automatically detecting a protocol for a load testing routine. The method includes the steps of, for an application to be load tested, executing the application and recording communications between a first tier and a second tier during the execution. The recording step includes recording modules loaded by the application, recording network traffic and Web traffic, comparing the recorded modules, network traffic and Web traffic to a rule set, and based on the comparing step, selecting one or more protocols appropriate for load testing the application. Finally, the method includes the step of generating a script based on the recorded communications and the protocols, where the script specifies the protocols. | 07-15-2010 |
20100180024 | REDUCING OCCURRENCES OF TWO-PHASE COMMITS IN A MULTI-NODE COMPUTING SYSTEM - Techniques are disclosed for reducing the number of two-phase commits required to perform atomic transactions in a multi-node system. By monitoring atomic operations that require two-phase commit protocols, a system may identify when it would be beneficial to consolidate data onto single (or at least fewer) compute node(s). In doing so, a less compute intensive commit protocol, such as a one-phase commit protocol may be used. Moreover, in situations where data consolidation is not available, the data may be migrated to compute nodes having a closer proximity. Thus, in such cases, network response times for two-phase commits required for an atomic operation may be reduced, thereby increasing the performance of a multi-node system. | 07-15-2010 |
20100180025 | DYNAMIC LOAD BALANCING BETWEEN CHASSIS IN A BLADE CENTER - A computer-implemented method, system and computer program product for load balancing between different blade chassis within a blade center are presented. Each blade chassis is monitored for total data traffic to and from that blade chassis. If a first blade chassis within the blade center is overworked, then a most overtaxed blade within that first blade chassis is disabled. A less utilized second blade chassis within the blade center is then identified, and a least taxed blade within the second blade chassis is assigned to take over the workload of the disabled blade from the first blade chassis. | 07-15-2010 |
20100180026 | RECYCLING ITEMS IN A NETWORK DEVICE - A network device includes a data structure and an ager. The data structure includes a group of positions. One or more of the positions are associated with at least one item. The ager is configured to sequentially analyze each position of the group of positions, and recycle, at each analyzed position, any item associated with the analyzed position. | 07-15-2010 |
20100185760 | Overlay network traffic detection, monitoring, and control - An overlay network traffic detection system deploys traffic measurement units at multiple points on a network, creates profiles of the network traffic measured at each point, and then compiles the traffic profiles obtained at different points. The compiled profile of outbound traffic originating at a node is compared with the compiled profile of inbound traffic addressed to the same node. A strong correlation between the two profiles indicates that the node is relaying overlay network traffic. Further information can be gained by profile screening, by active interference in the traffic flow, by launching known information into the network at known times and observing its effect on the traffic profiles, and by observing keyword distributions in non-encrypted traffic. | 07-22-2010 |
20100185761 | SERVICE PROVIDER NODE, AND COMPUTER-READABLE RECORDING MEDIUM STORING SERVICE PROVIDER PROGRAM - A computer-readable recording medium storing a verification support program is provided. The computer-readable recording medium storing a service provider program that causes a computer to execute: providing a service through acceptance of a service request; establishing a process-to-process communications by waiting for a process to be a destination of the service; stopping provision of the service corresponding to the service request accepted by the providing after the process-to-process communications is established; transmitting, while the provision of the service is being stopped, information for use by the providing to provide the service, to the process by the process-to-process communications; and ending, after the information is completely transmitted by the transmitting, the acceptance of the service request by the providing. | 07-22-2010 |
20100185762 | ABNORMAL POINT LOCATING APPARATUS, METHOD, AND STORAGE MEDIUM - An abnormal point locating method includes: a link primary abnormality judgment procedure that acquires information on a link through which each observation flow passes, locates a link through which an observation flow observed at an observation point passes, and judges whether the located link is normal or abnormal based on the observation flow; and a link secondary abnormality judgment procedure that judges a probability of abnormality based on a result of the link primary abnormality judgment procedure by using a connection relationship as seen from each observation point. | 07-22-2010 |
20100191844 | CLUSTER-BASED FRIEND SUGGESTION AGGREGATOR - Techniques are described to generate a list of suggested friends for a client of a social networking service. In an implementation, a cluster of clients is identified from among the clients of the social networking service. The cluster of clients includes the client for which the list of suggested friends is to be generated. The list of suggested friends for the client may then be generated and may include one or more clients of the social networking service selected based on connections with the cluster of clients. The list indicates at least one other client of the social networking service that is suggested as a friend. | 07-29-2010 |
20100191845 | SPECULATIVE VIRTUAL MACHINE RESOURCE SCHEDULING - A speculative virtual machine (“VM”) resource scheduler for a VM that is hosted by a primary host server initiates the creation of at least one duplicate VM on a secondary host server. The VM and the duplicate VM are run substantially in lockstep while the scheduler monitors resources on the primary host server and the secondary host server. The scheduler then determines an advantageous host server among the primary host server and the secondary host server and, based at least in part on the determination, initiates the powering down of either the VM on the primary host server or the duplicate VM on the secondary host server. | 07-29-2010 |
20100191846 | Verifiable service policy inplementation for intermediate networking devices - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, an intermediate networking device acts as a service intermediary or intermediate connection between a network and one or more communications devices; implements a service policy set for assisting control of the intermediate networking device use of a service set on the network, the service policy set including one or more service policies associated with the intermediate networking device or one or more communications devices connected to the intermediate networking device, the service set being one or more network services used by the intermediate networking device or one or more communications devices; and monitors use of the service set based on the first service policy set, in which the implementation of the service policy set is verified. | 07-29-2010 |
20100191847 | Simplified service network architecture - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a network device collects a plurality of service usage measurements for a communications device use of a service on a network; and compares the plurality of service usage measurements to a device assisted implementation of a service policy to verify the device assisted implementation of the service policy. | 07-29-2010 |
20100191848 | INFORMATION SHARING METHOD BETWEEN NEIGHBORING NODES, NODE AND INFORMATION SHARING PROGRAM - A load caused by an information sharing message in an upper layer is reduced. | 07-29-2010 |
20100191849 | COMMUNICATION METHOD, COMMUNICATION SYSTEM, SERVER AND STORAGE MEDIUM STORING PROGRAM RELATED TO TRANSFER OF SESSION MANAGEMENT - A first server detects a condition that requires a service to be invoked, and the detection of this condition triggers it to establish a connection with a second server. The first server relays data relevant to a first communication between first and second terminals and the second server over the established connection. The first server also relays data relevant to a second communication between the first and second terminals and the second server, or between third and fourth terminals and the second server. Alternatively, the second server both receives and returns the data relevant to the first communication from/to the first server over the established connection. | 07-29-2010 |
20100191850 | SYSTEM AND METHOD FOR DETECTION OF ABERRANT NETWORK BEHAVIOR BY CLIENTS OF A NETWORK ACCESS GATEWAY - A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway. | 07-29-2010 |
20100191851 | METHOD AND APPLIANCE FOR USING A DYNAMIC RESPONSE TIME TO DETERMINE RESPONSIVENESS OF NETWORK SERVICES - In a method and appliance for determining responsiveness of a service via a particular protocol, a device intermediary to a plurality of clients and a plurality of services determines response times from each of a plurality of services to respond to requests via a first type of protocol of a plurality of protocols. The device calculates an average response time for the first type of protocol from each of the response times of the plurality of services. The device establishes a predetermined threshold for which a response time of a service for the first type of protocol may deviate from the average response time. The device identifies a service as available responsive to determining that a deviation of the response time of the service from the average response falls within the predetermined threshold. | 07-29-2010 |
20100198959 | SYSTEM AND METHOD FOR TRACKING INDIVIDUALS ON A DATA NETWORK USING COMMUNITIES OF INTEREST - The current invention relates to a system and method for tracking or locating a target entity on a data network, such as the public Internet, by analyzing network traffic and communication among interacting network nodes. The invention describes a system of creating an information set of data related to the traffic patterns associated with a specific entity over a time period, and comparing the information set to other information related to the traffic patterns associated with a group of entities over the same time period. By excluding information that is common to both the specific entity and the group of entities from the information set, the information set is left with only the information that helps identify the specific entity on the network. | 08-05-2010 |
20100198960 | AUTOMATED TEST EXECUTION IN A SHARED VIRTUALIZED RESOURCE POOL - In a computer-implemented method for automated test execution in a shared virtualized resource pool, a test description containing at least one model for a service under test (SUT) is received and one or more infrastructure configurations to be tested by resources in the shared virtualized resource pool based upon the test description are identified. In addition, a service lifecycle management (SLiM) tool is interacted with to cause the SUT and a load source to be created, the SLiM tool is directed to instantiate the SUT and the load source on the one or more infrastructure configurations in the shared virtualized resource pool for the SUT, and the SLiM tool and the load source are interacted with to receive performance data related to performance of the SUT under one or more loads generated by the load source. | 08-05-2010 |
20100198961 | MULTI-THREADED METHOD AND SYSTEM FOR AUTOMATED REMOTE SUBMISSION OF JOBS TO MAINFRAME AND UNIX SYSTEMS FROM THE WINDOWSTM PLATFORM - A method and system for automated remote submission of jobs to host systems generate a single executable file having a user program specified in a command line. A separate thread is used to submit the single executable file to the host system. The separate thread monitors progress of the single executable file on the host system and posts information associated with the monitored progress of the single executable file. | 08-05-2010 |
20100198962 | METHOD FOR MONITORING A REMOTE MACHINE - A method used for monitoring a remote machine by a local computer via a computer network. The remote machine is installed with web server programs and has parameter settings reconfigured by updating an Electronic Data Sheet. The method comprises initiating a browser at the local computer and establishing the computer network link to the remote machine via the computer network; downloading a JAVA applet from the remote machine to the local computer; and accessing an Electronic Data Sheet corresponding to the remote machine with the JAVA applet stored in the local computer and displaying the content of the Electronic Data Sheet at the local computer. | 08-05-2010 |
20100198963 | NOTIFICATION INFRASTRUCTURE FOR SENDING DEVICE-SPECIFIC WIRELESS NOTIFICATIONS - A data store is monitored for a change in the data store. A notification communication is generated upon detecting that the change has occurred. The notification communication is formatted based on a wireless device associated with the data store. The notification communication is sent to the wireless device associated with the data store. | 08-05-2010 |
20100198964 | COMPUTER SYSTEM, MANAGING APPARATUS AND COMPUTER SYSTEM MANAGING METHOD - A resource usage analysis tool ( | 08-05-2010 |
20100198965 | NETWORK CONTROL DEVICE, IMAGE DISPLAY DEVICE AND NETWORK CONTROL METHOD - In order to easily ensure service quality by reducing network traffic, a network monitoring section ( | 08-05-2010 |
20100198966 | MANAGEMENT SERVER, MONITORING APPARATUS, AND METHOD FOR MANAGING IMAGE FORMING APPARATUS AND CONTROLLING MONITORING APPARATUS - A management server receives identification information including an IP address, MAC address, and product number of an image forming apparatus together with operation information thereof such as counter information via a network. Then, the management server determines whether the received identification information coincides with registration information. When the management server determines that the received identification information coincides with the registration information, the management server stores the operation information in association with a registered image forming apparatus. | 08-05-2010 |
20100198967 | IMAGE FORMING APPARATUS, MANAGEMENT APPARATUS, AND MANAGEMENT SYSTEM FOR MANAGING IMAGE FORMING APPARATUS - In an image forming apparatus, when a plurality of events are detected within a predetermined period of time, event relevant information is not transmitted for all of the detected events and the same event ID is set for event information so that event relevant information which is transmitted at least once can be associated with the plurality of events. In a management apparatus, the event information and the event relevant information which have the same event ID are managed in association with each other. | 08-05-2010 |
20100205291 | SYSTEMS AND METHODS FOR ENFORCING POLICIES IN THE DISCOVERY OF ANONYMIZING PROXY COMMUNICATIONS - In embodiments of the present invention improved capabilities are described for systems and methods that enforce policies with respect to proxy communications. | 08-12-2010 |
20100205292 | SYSTEM AND METHOD FOR NETWORK OPTIMIZATION THROUGH PREDICTIVE DOWNLOADING - As more internet service providers have more customers with high-speed internet access accounts and these customers access more multi-media rich data (such as videos), the network infrastructure of internet service providers becomes saturated. Thus, internet service providers are facing pressure to upgrade their networks. Thus, internet service providers need to optimize the usage of their existing networks. To optimize the usage of existing networks, a system of performing predictive downloading for data caches is proposed. The system for performing predictive downloading examines network traffic conditions and does not issue predictive download requests if the network is busy. By restricting predictive downloads to times when the network is not busy, the system utilizes an under used resource. Accurate predictions will reduce future network traffic. Incorrect predictions cause no harm since the transfers only occur when free network bandwidth is available. | 08-12-2010 |
20100205293 | COMPREHENSIVE POLICY FRAMEWORK FOR CONVERGED TELECOMMUNICATIONS NETWORKS - The subject innovation relates to systems and/or methodologies for comprehensive policy based service delivery. A policy plane is provided as a comprehensive way to manage operator policies for most all IP and/or service flows (e.g., IMS and non-IMS) under varying network conditions, while keeping in view user preferences, user subscriptions, service requirements, terminal capabilities (e.g., including converged terminals), network capabilities (e.g., 3gpp and non-3gpp accesses inter-working with 3gpp), session transfer policies, service aware roaming, and so forth. The policy plane can be generated through harmonization of existing components (e.g., discussed infra), and creation of new policy aspects where desired (e.g., policies for identity and charging management in personal area network, etc.). The policy plane works to close gaps between standards, operator requirements, and user requirements. | 08-12-2010 |
20100205294 | METHOD FOR MEASURING THE PERFORMANCE OF A TARGET SERVER HOUSING A DYNAMIC MONITORING TOOL - A method for measuring the performance of at least one target server housing a dynamic monitoring tool which can be controlled by scripts, the dynamic monitoring tool having predefined probes for acquiring the data relating to the behavior of an operating system and applications of the target server, the method including, from a remote management server, the following steps: a dynamic monitoring tool within the target server is accessed via a communication network, at least one script to be executed by the dynamic monitoring tool is remotely transmitted, and at predetermined times, the target server is automatically accessed so as to retrieve the performance data resulting from the execution of the script by the dynamic monitoring tool. | 08-12-2010 |
20100205295 | System Consisting Of A Plurality Of Cooking Devices With Respective Network-Based Monitoring Devices - A system for synchronous monitoring of a cooking process of a plurality of cooking devices via the internal web browser of one of the cooking devices comprises a plurality of cooking devices that can be interconnected via interfaces. Each cooking device is connected to at least one internal web server that is connected to a network and that provides services for the monitoring, control or analysis of at least one of the cooking devices. At least one internal web browser is provided that is connected to the network and that can use at least the services of one of the internal web servers. | 08-12-2010 |
20100205296 | FLOW CONTROL APPARATUS AND FLOW CONTROL METHOD - A flow control apparatus includes a status monitoring unit, a flow control deciding unit, a flow control strategy storing unit and a performing unit. The status monitoring unit is configured to report the current operating status of a service node to the flow control deciding unit. The flow control deciding unit is configured to provide the current operating status of the service node to the flow control strategy storing unit, generate a flow control command based on an evaluating result which is obtained by the flow control strategy storing unit based on one or more flow control algorithms and the current operating status of the service node, and distribute the flow control command. The flow control strategy storing unit is configured to store the one or more flow control algorithms, obtain the evaluating result based on the one or more flow control algorithms and the current operating status of the service node provided by the flow control deciding unit, and provide the evaluating result to the flow control deciding unit. The performing unit is configured to control new services arriving at a service processing system according to the flow control command distributed by the flow control deciding unit. A flow control method is also provided. | 08-12-2010 |
20100205297 | SYSTEMS AND METHODS FOR DYNAMIC DETECTION OF ANONYMIZING PROXIES - In embodiments of the present invention, improved capabilities are described for systems and methods that dynamically detect uncategorized web-based proxy sites and translator sites. The systems and methods may be directed at identifying a suspected proxy site, intercepting a form submission intended to be submitted to the suspected proxy site, submitting a probe in place of the intercepted form submission to the suspected proxy site wherein the probe is adapted to instruct a proxy site to direct communications to a known probe site adapted to return predetermined information as verification of interaction with the probe site, analyzing a response to the submission of the probe for the presence of the predetermined information, and upon detection of the presence of the predetermined information in the analysis, categorizing the suspected proxy site as a proxy site that is adapted to anonymize internet behavior. | 08-12-2010 |
20100205298 | Method, system and computer program to enable semantic mediation for SIP events through support of dynamically binding to and changing of application semantics of SIP events - An event notification system includes a data communications network ( | 08-12-2010 |
20100205299 | Intelligent Discovery Of Network Information From Multiple Information Gathering Agents - A system, method and computer program product for intelligent discovery of network information from multiple information gathering agents adapted to discover information concerning the network. The discovery agents each have an associated discovery capability. Based on consideration of the agent discovery capabilities, discovery assignments are computed and network discovery is performed according to the assignments so as to reduce discovery poll overhead. | 08-12-2010 |
20100205300 | ROUTING METHOD - A method executed by a router that establishes a connection between a network and an another network that includes an information processing device and an information storage device, the method includes: detecting an access status of the information processing device to the information storage device; and prohibiting transfer of the information from the information processing device to the another network depending on the access status managed in the detecting. | 08-12-2010 |
20100211668 | OPTIMIZED MIRROR FOR P2P IDENTIFICATION - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, by the network node, a packet belonging to an IP flow; when the IP flow is a flow for which content information is to be sent to the content identification device, performing the steps of: determining, using deep packet inspection, that the packet contains a value for at least one field of interest, determining whether all fields of interest needed by the content identification have been seen by the network node among a plurality of packets belonging to the IP flow, and communicating the value of the at least one field of interest to the content identification device. | 08-19-2010 |
20100211669 | DATA CENTER CONTROL - Systems and methods for data center control are provided that identify parameters of one or more data centers, where each data center includes a plurality of devices. The systems and methods receive a command to execute an application, and identify a selected data center from the one or more data centers as a location to run the application based at least in part on an evaluation of the parameters. | 08-19-2010 |
20100211670 | SYSTEM FOR MONITORING PRODUCTION OPERATIONS - A system for monitoring production operations includes an operator box located at a workstation and having a plurality of manual input devices configured for manual activation by an operator, a corresponding plurality of status indicators, each status indicator being configured to provide an indication of the operational status of the workstation, and a communications port configured to facilitate communication between the operator box and a network. The system also includes a computing device coupled to network to receive data from a machine controller coupled to the network and data from the operator box, and to store that data in a database of records reflecting historical performance of the system. | 08-19-2010 |
20100211671 | EFFICIENT MAINTENANCE OF A DISTRIBUTED SYSTEM MEMBERSHIP VIEW - A method, system and computer program product are disclosed for maintaining a membership view of a distributed computing system comprising a multitude of members, wherein each of said members sends out a message indicating that said each of the members is available in the system. In one embodiment, the method comprises maintaining a first list of at least some of the members in the distributed system; and over a period of time, when one of the members sends out the message indicating that said one of the members is available in the distributed system, adding said one of the members to a second list. At defined times, the first list is replaced with the second list. In an embodiment, the method further comprises at said defined times, starting a new, empty second list. | 08-19-2010 |
20100211672 | METHOD AND SYSTEM FOR SIMULATING LATENCY BETWEEN LAYERS OF MULTI-TIER APPLICATIONS - A method, system and article of manufacture for simulating latency between software applications. There is provided a middleware component, e.g., a delay driver, within a multi-tier software product, the middleware component driver enables simulation of both latency and bandwidth restrictions experienced by the components in the multi-tier software product. The middleware component determines whether I/O request packets should be delayed, selects the number and types of I/O requests packets to be delayed and the amount of time to delay processing of the packets. Through the use of such a middleware component, a user is able to simulate various conditions experienced by the multi-tier software product. | 08-19-2010 |
20100211673 | Methods and Apparatus for Determining and Displaying WAN Optimization Attributes for Individual Transactions - An apparatus for associating WAN optimization attributes with performance metrics of transactions between hosts on a network includes a network management device, a processor, and a display device. The network management device monitors data traffic between hosts communicating over the network and collects WAN optimization information relating to the data traffic. The data traffic includes individual flows between the hosts, and the individual flows include individual transactions involving exchanges of packets. The processor computes at least one performance metric for individual transactions between the hosts and determines what types, if any, of WAN optimization were applied to the individual transactions. The display device displays on an individual transaction basis the performance metric in combination with either the types of WAN optimization applied to the individual transaction or an indication that no WAN optimization was applied to the individual transaction. | 08-19-2010 |
20100211674 | COMMUNITY GENERATION SUPPORT SYSTEM, COMMUNITY GENERATION SUPPORT METHOD, AND COMMUNITY GENERATION SUPPORT PROGRAM - A community generation support system and a community generation support method. A community generation support device ( | 08-19-2010 |
20100211675 | REAL-TIME NETWORK DATA ANALYSING SYSTEM - An arrangement and method for analysing the data transferred in communications networks. The fact that though the amount of user plane traffic and data is increasing fast, the amount of signalling traffic is hardly increasing at all, is utilised. In the present system the analysis of the user plane and the control plane is done separately in user plane analysis appliance ( | 08-19-2010 |
20100211676 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - When communication is performed with the upstream and downstream sides being defined in the order of relay apparatuses, the relay apparatuses each transmit a keepalive message representing that they are effectively performing communication. When no keepalive message can be received from the relay apparatus and an abnormality is detected thereby, the relay apparatus transmits a keepalive message including abnormality information representing that the abnormality is detected. By receiving the keepalive message including the abnormality information, the relay apparatus detects the abnormality on the upstream side, changes a communication path, and transmits a master candidate notification to the relay apparatus on the downstream side in order that the relay apparatus itself becomes a master. | 08-19-2010 |
20100217858 | Handling User Identities In The IP Multimedia Subsystem - A method of handling SIP requests received by an IP Multimedia Subsystem network. The method comprises determining whether or not the SIP destination identity is within a range of identities owned by an operator of the network but is currently unallocated to a subscriber or service of the network and, if yes, routing the message to one or more SIP application servers within the network and implementing service logic at the application server(s) specific to a network owned but unallocated SIP identity. | 08-26-2010 |
20100217859 | SIMPLIFIED SUPPORT OF AN ISOLATED COMPUTER NETWORK - A method, a device and computer program products product for allowing performance related data to be obtained from an isolated computer network that includes a diagnostics collection function. Selections from a support user of nodes and plug-in modules associated with applications provided in the isolated computer network that are to be diagnosed are received by a autocollector file generating unit, which then provides at least one command file with instructions for the diagnostics collection function, including the user selected nodes and plug-in modules, and saves the provided data as an autocollector file that automatically makes the diagnostics collection function to apply the command file on the nodes and plug in modules when being activated. | 08-26-2010 |
20100217860 | SYSTEMS AND METHODS FOR SINGLE SESSION MANAGEMENT IN LOAD BALANCED APPLICATION SERVER CLUSTERS - Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session. | 08-26-2010 |
20100217861 | METHOD AND SYSTEM FOR MULTICAST STATISTIC COLLECTION | 08-26-2010 |
20100217862 | SUPPLYING NOTIFICATIONS RELATED TO SUPPLY AND CONSUMPTION OF USER CONTEXT DATA - Techniques are described for providing information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a module a request related to the modeling of the current state with the multiple state attributes. In such situations, the providing further includes, without further intervention related to the request by the module, determining that the request cannot currently be satisfied, and indicating to the module that the request cannot currently be satisfied, monitoring at later times after the indicating to determine whether the request can be satisfied, and indicating to the module that the request can be satisfied if it is determined at one of the later times that the request can currently be satisfied. | 08-26-2010 |
20100217863 | Securing An Access Provider - To secure an access provider, communications to/from the access provider are monitored for a partially-completed connection transaction. Detected partially-completed connection transactions are terminated when they remain in existence for a period of time that exceeds a threshold period of time. The monitoring may include detecting partially-completed connection transactions initiated by an access requestor, measuring the period of time that a partially-completed connection transaction remains in existence, comparing the period of time with the threshold period of time, and resetting a communication port located on the access provider. | 08-26-2010 |
20100223375 | SYSTEMS AND METHODS FOR SEARCHING A MANAGED NETWORK FOR SETTING AND CONFIGURATION DATA - A network management server can be configured to search the components of computing systems and devices in a managed network for specified settings and configurations in order to determine if the computing systems or devices contain the specified settings and configurations. The network management server can receive a request containing search parameters. The search parameters can identify specific settings and configurations to search for in the components of the systems and devices of the managed network. The network management server can initiate a search of the components of all the systems and devices in the managed network based on the search parameters. | 09-02-2010 |
20100223376 | METHODS AND APPARATUS FOR PROCESSING DISCOVERY SIGNALS AND/OR CONTROLLING ALERT GENERATION - Methods and apparatus for processing discovery signals and/or generating alerts based on received discovery signals are described. In at least some embodiments, alert signal generation is performed on a selective basis in response to received discovery signals. In at least some embodiments a user is given at least some control over alert generation with the user being able to indicate types of signals which should not trigger generation of an alert, the minimum permitted frequency of particular alerts or types of alerts and/or time or location constraints which are considered when a device determines whether or not to generate an alert in response to a received discovery signal. While user control of discovery signal processing and alert generation are provided, automatic control or adjustment of discovery signal processing and alert generation may also be implemented or the automatic control may be implemented as an alternative to the user control. | 09-02-2010 |
20100223377 | NETWORK MONITORING SYSTEM, SERVER APPARATUS, NETWORK MONITORING METHOD - A network monitoring system includes a server apparatus managing information of an optical transmission device in a network configured in a ring fashion and a client apparatus carrying out at least change of setting of the optical transmission device and check of apparatus condition thereof. A first protocol is used between the server apparatus and the client apparatus while a second protocol is uses between the server apparatus and the optical transmission apparatus. The first protocol and the second protocol are different from each other. The server apparatus includes a conversion portion carrying out mutual conversion between the first protocol and the second protocol. | 09-02-2010 |
20100223378 | SYSTEM AND METHOD FOR COMPUTER CLOUD MANAGEMENT - A method for auto-scaling the infrastructure capacity of an application in response to client demands includes providing an application configured to run on an application infrastructure comprising a plurality of server nodes and to be accessed by clients via a first network. Next, providing traffic management means directing traffic from the clients to the server nodes of the application infrastructure. Providing monitoring means gathering performance metrics of the application and metrics of the application infrastructure. Providing controlling means configured to change the application infrastructure. Next, monitoring the performance metrics of the application and the metrics of the application infrastructure via the monitoring means thereby obtaining metrics information and then changing the application infrastructure based on the metrics information via the controlling means. Finally directing network traffic targeted to access the application to server nodes of the changed application infrastructure via the traffic management means. | 09-02-2010 |
20100223379 | COORDINATING SERVICE PERFORMANCE AND APPLICATION PLACEMENT MANAGEMENT - Coordinating tasks of performance management and application placement management in a dynamic fashion by: estimating capacity needs for various service classes of service requests; computing desired capacities of at least one application for said service requests; deciding whether the desired capacities are satisfied by a current application placement; making no change to current application placement if the desired capacities are satisfied; determining a new application placement based on the desired capacities and a projected load if the desired capacities are not satisfied; computing corresponding capacity constraints for all pairs of service classes and servers; and computing an optimal allocation of capacities among the service classes so as to optimize a quality of service. | 09-02-2010 |
20100223380 | Session Monitoring Method, Apparatus, and System Based on Multicast Technologies - A session monitoring method based on multicast technologies is disclosed. The method includes: obtaining information about members of a multicast group that can be joined by a user in a session, wherein the session between a network and a member of the multicast group in the session is in an alive state; and checking whether the information about the members of the multicast group in the session includes user information corresponding to the user; if the member information includes the user information corresponding to the user, determining that the session between the network and the user as the member of the multicast group in the session is alive. A session monitoring apparatus, a session monitoring system, and an Access Node (AN) based on multicast technologies are also disclosed. | 09-02-2010 |
20100228849 | Deployment of Asynchronous Agentless Agent Functionality in Clustered Environments - A mechanism for the deployment of asynchronous agentless agent functionality in clustered environments. An agentless agent execution node in an agentless agent execution node cluster receives a context message comprising an asynchronous operation request and an execution context from a messaging service. The agent node determines if an entry for the execution context exists in an execution context state table of the agent node. If no entry exists, the agent node creates an execution context entry in the execution context state table of the agent node. The agent node retrieves an asynchronous code module associated with the asynchronous operation from a central repository. The asynchronous code module is then executed on a managed resource to detect asynchronous code events occurring on the managed resource. When asynchronous code events are detected at the managed resource, the agent node sends a message comprising the asynchronous code events to a management server. | 09-09-2010 |
20100228850 | Method and System for Estimating Unique Visitors for Internet Sites - This invention comprises a method and system for estimating unique visitors for Internet sites that is more accurate than the existing unique cookie/unique address counting methods. The invented method relies on the count of unique user identifiers (such as network addresses or preferably cookies)—I—that can be obtained from an existing cookie tracking/user access logging system. The number of unique visitors U is calculated substantially as a ratio of the count of unique cookies (or unique network addresses) to the number of visits N times the inflation factor X plus constant on that is approximately one (exactly one in the case of cookies). The number of visits is calculated by multiplying the sampling period t to the visitation frequency T | 09-09-2010 |
20100228851 | Aggregating and Reporting of Performance Data Across Multiple Applications and Networks - This description provides tools and techniques for aggregating and reporting of performance data across multiple applications and networks. These tools may provide apparatus for transforming visible characteristics of a graphical user interface. The graphical user interface may include representations of different physical networks, and may include representations of status indicators, with the representations of the physical networks being associated with one or more corresponding status indicators. These status indicators may represent respective performance levels computed for the different physical networks. More specifically, the performance levels relate to components of the physical networks or applications running on the physical networks. The graphical user interface may also respond to changes in the performance levels that are computed for the physical networks, to transform the status indicators that are associated with the physical networks | 09-09-2010 |
20100228852 | Detection of Advertising Arbitrage and Click Fraud - This description provides tools and techniques for detecting advertising arbitrage and click fraud. These tools may monitor packet traffic to or from subscribers to website hosting services. These tools may also analyze the packets to determine whether at least a part of the traffic is indicative of suspected click fraud affecting websites managed as part of the website hosting services. | 09-09-2010 |
20100228853 | CLUSTER-FREE TECHNIQUES FOR ENABLING A DIRECTORY PROTOCOL-BASED DOMAIN NAME SYSTEM (DNS) SERVICE FOR HIGH AVAILABILITY - Cluster-free techniques for enabling a directory protocol-based Domain Name System (DNS) service for high availability are presented. A DNS service monitors a node for wild-carded IP address that migrate to the node when a primary node fails to service DNS requests for a directory of the network. The DNS service forwards the wild-carded IP address to a distributed directory service for resolution and uses the distributed directory service to dynamically configure the DNS service for directly handling subsequent DNS requests made to the directory over the network while the primary node remains inoperable over the network. | 09-09-2010 |
20100228854 | NETWORK OPERATION MANAGEMENT - Systems and methods are provided to monitor and control peripheral devices at a remote operational site. A management platform configures a site controller deployed at the operational site, wherein configuration specifies collection of data from the peripheral devices connected to the site controller. Conditions that monitor device status and specify device alarms triggers also can be configured. Commands, which can be part of a script, remotely control peripheral devices functionally coupled to the site controller. Collected data is conveyed through a wired or wireless link to management component, which stores the data for analysis and report generation, and can supply the data to an authorized terminal. Data and reports can be conveyed to one or more systems and mass storage functionally connected to the management component. Analysis includes data trend generation. Reports include features of observed and predicted data, and alarm summaries. | 09-09-2010 |
20100228855 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 09-09-2010 |
20100228856 | Autonomous and Dependent Data Collection for Traffic Analysis - A central control system operates in conjunction with multiple mobile traffic probes to analyze and characterize traffic in a particular region or area. The traffic probes operate autonomously to collect traffic related data and report the collected data to the central control system. The traffic probes can analyze the collected data to identify traffic anomalies, and in response, change the amount and type of data collected, as well as the frequency of reporting the data to the central control system. In addition, the central control system can analyze the received data to identify traffic anomalies or points of interest and force one or more deployed traffic probes to change the amount and type of data collected, as well as the frequency of reporting. | 09-09-2010 |
20100228857 | MEDIA MONITORING, MANAGEMENT AND INFORMATION SYSTEM - Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed. | 09-09-2010 |
20100228858 | METHODS AND APPARATUS FOR DYNAMIC ALLOCATION OF SERVERS TO A PLURALITY OF CUSTOMERS TO MAXIMIZE THE REVENUE OF A SERVER FARM - A method and structure for dynamic allocation of servers to customers in a server farm which supports a flexible contract structure such that the total revenue of the farm is maximized. The invention creates a resource allocation plan based on a long term forecast for the server farm, taking into account traffic, number of servers, customers' contracts and revenue optimization algorithms. The plan is then modified as indicated by short term forecasting using currently monitored load metrics to reallocate to maximize revenue for particular time periods. | 09-09-2010 |
20100235489 | Systems and methods for determining electronic relationships - Systems and methods are provided for measuring the level of relative activity (relationship) between two entities (e.g., people, companies, organizations, etc.) in a group as compared with others in that group or in a subset of that group. A group or subset of a group can be defined manually or automatically by the program. Once the activity is measured, it is further analyzed to generate behavioral attributes (e.g., trust, respect, mutually enjoyable company or personal relationship, reciprocity and shared experience) of the relationship. These attributes may be employed to derive characteristics such as the strength of the relationship for each pair of entities. The relationships and characteristic and/or attributes may then be displayed in a simple to understand manner. | 09-16-2010 |
20100235490 | Method and Apparatus of Correlating Power Usage With Traffic Flow for a Network Device - A network device including: a power utilization monitor for monitoring and determining the power usage for the network device, the power usage being associated with a predetermined time value when the power usage was monitored; a data traffic monitor for determining the traffic flow of the network device, the traffic flow being associated with a predetermined time value when the traffic flow was measured; and a data correlator for correlating the power usage of the network device to the data traffic of the network device by associating the predetermined time value when the power usage was monitored with the predetermined time value when the data traffic flow measurement was made is described. | 09-16-2010 |
20100235491 | MEDIA DISTRIBUTION APPARATUS AND METHOD - A system that incorporates teachings of the present disclosure may include, for example, a recipient client device having a controller operable to receive and store a media object from an originating device, track locations where the media object has been since the media object has been stored in the recipient client device, track identifiers associated with a device or a user that has accessed the media object at the locations, and track and store annotations about the media object by the device or the user that accessed the media object. Other embodiments are disclosed. | 09-16-2010 |
20100235492 | SYSTEM AND METHOD FOR GENERIC APPLICATION OF LOCATION DETERMINATION FOR NETWORK ATTACHED DEVICES - A system and method for determining the location of a target device. A location request may be received for a target device, and a plurality of parameters determined that identify the target device. A most likely path may be selected from a plurality of paths to produce a location of the target device, each path having one or more of the plural determined parameters as an input and one or more measurement results as an output. Measurement information may be collected on the most likely path as a function of one or more of the determined parameters to provide the one or more measurement results. Location information may then be derived for the target device as a function of the one or more measurement results, the derivation utilizing a location determination function that evaluates ones of the plural paths. An estimated location of the target device may then be determined as a function of the respective location information for the selected path. | 09-16-2010 |
20100235493 | EXTENDABLE DISTRIBUTED NETWORK MANAGEMENT SYSTEM AND METHOD - An extendable network management system and method is provided to manage a network environment. The system can include a management server with a management application. In addition, the management application is configured to enable a user to manage the network environment. A extension application server can host a plurality of extension modules. The extension modules can supply management functions to the management application for defined network components. Further, a plurality of management engines can be located on the extension application server. The management engines can provide network probing and network event management, while integrating an extension modules' data object model with a management application's data object | 09-16-2010 |
20100235494 | FLEXIBLE LOGGING, SUCH AS FOR A WEB SERVER - A flexible logging system is described herein that operates with a web server to provide activity logging in a way that is customizable to include a variety of data fields, can capture both client and server log information to a single location, and can provide data to an analysis engine directly to provide near real-time reporting. The system captures events within the web server as they occur and can provide reporting before the final response occurs. During request processing in the web server, server extension modules raise log events whenever an event occurs. The system matches the received data to a log definition and writes the data to any log that matches. Thus, the flexible logging system provides a rich, flexible, and fast platform for content providers and administrators to get a real-time view of the state of requests to their web servers. | 09-16-2010 |
20100235495 | METHODS AND SYSTEMS FOR REDUCING A LOAD ON A MULTI-TENANT DATABASE - Mechanisms and methods for reducing a load on a multi-tenant database are provided. These mechanisms and methods for reducing a load on a multi-tenant database can enable a reduction in the computational effort expended to handle login requests with invalid usernames and the computational effort expended to handle valid login requests that occur at a high rate. The ability to provide a reduction in computational effort expended on login requests can enable a providing of a reliable level of resources to users and tenants of the multi-tenant database. | 09-16-2010 |
20100235496 | Method, System and Apparatus for Collecting Statistics of Characteristic Value with Threshold - A method for collecting statistics of a characteristic value with a threshold includes: determining, according to a total threshold for a characteristic value whose statistic is to be collected, at least one sub-threshold corresponding to at least one application processing apparatus participating in statistic-collection; issuing the at least one sub-threshold respectively to the at least one application processing apparatus, notifying the at least one application processing apparatus to enter into a distributed statistic-collecting state; after receiving from anyone of the at least one application processing apparatus a notification which indicates that a current statistic value of the characteristic value of the application processing apparatus reaches a sub-threshold corresponding to the application processing apparatus, notifying the at least one application processing apparatus to enter into a centralized statistic-collecting state to collect statistics of the characteristic value in a centralized mode. | 09-16-2010 |
20100235497 | INFORMATION PROCESSING APPARATUS AND COMMUNICATION PROCESSING METHOD THEREOF - An information processing apparatus including a first communication interface for individually communicating with a plurality of communication terminals without involvement of a public network and a second communication interface for communicating with involvement of a public network, wherein the apparatus provides services, via the first communication interface or via the first communication interface and the second communication interface, to a plurality of communication terminals that perform communication via the first communication interface, manages information regarding a communication interface used by each service and information regarding the service provided, and controls communication performed with the first and the second communication interfaces based on the managed information. When disconnection of communication performed with either one of the first and the second communication interfaces has been detected, the apparatus performs control relating to disconnection of communication performed with the communication interface in which disconnection was not detected based on the managed information. | 09-16-2010 |
20100235498 | INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING THE SAME - In order to enable more of the contents managed by a content server to be provided, an information processing apparatus connected to a communication network includes: a managing unit that manages a content and attribute information; a detecting unit that detects an external processing apparatus connected to the communication network; an acquiring unit that acquires capability information, which indicates a capability that can be provided by the external processing apparatus; a generating unit that generates content list information containing a first list containing a content that is managed by the managing unit and that can be directly provided by the information processing apparatus, and a second list containing a content that can be provided by giving a processing request to the external processing apparatus; and a providing unit that provides the content list information to a client terminal. | 09-16-2010 |
20100235499 | PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A processing apparatus capable of making it easy to set a selection condition under which desired packets are acquired. When a desired print job log is selected from a displayed print job history or when a desired transmission job log is selected from a displayed transmission job history, a file creation unit automatically creates, based on address information in the selected print job log or in the selected transmission job log, a filtering condition expression for acquiring desired packets and sets the created expression to a filtering unit. | 09-16-2010 |
20100235500 | INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE APPARATUS, METHOD OF CONTROLLING BOTH, AND STORAGE MEDIUM - An apparatus includes a storage unit configured to store information which is acquired by a negotiation with an external apparatus and is for communication via a network, a detection unit configured to detect that conditions are satisfied for switching to a power saving mode in which power consumption is smaller than in a normal power mode while the normal power mode is operating, and a notification unit configured to notify a network interface of the stored information when the conditions for switching to the power saving mode are satisfied. | 09-16-2010 |
20100235501 | Advanced Availability Detection - A method is provided for determining user availability on the basis of the manner in which a person uses (1) a communication terminal or (2) a computing device that is associated with the communication terminal or (3) any combination of (1) and (2). User availability is determined based on: (1) a characteristic of the use of a software application that is running on a computing device, or (2) a characteristic of the use of a feature of software that is running on a communication terminal, or (3) a characteristic of the use of a resource of a computing device, or (4) a characteristic of the use of a resource of a terminal, or (5) a sensor input, or (6) a characteristic of the incoming invitation, or (7) any combination of (1), (2), (3), (4), (5), and (6). | 09-16-2010 |
20100235502 | METHOD FOR MANAGING NETWORK COMPONENTS IN A NETWORK, AND A NETWORK COMPONENT - The invention relates to a method for managing network components in a network comprising a request subnet with request network components and a select subnet with select network components as well as to a network component, wherein the requesting network component out of the request network components of the request subnet transmits a registration request to a selected network component out of the select network components of the select subnet and, based on the registration request, the selected network component transmits information concerning the configuration of the select subnet at the time of registration request to the requesting network component, wherein, based on the registration request, the selected network component transmits further information concerning the configuration of the select subnet to the requesting network component at a later point in time which is chronologically following the registration request. | 09-16-2010 |
20100235503 | Method and apparatus for measuring stream availability, quality and performance - A streaming measurement agent designed to experience, measure, and report on a media stream as an actual end user would experience the stream. Preferably, agent resides transparently within a streaming media player itself so that it can monitor stream packet flows within the player as the measured streams are being played. In an illustrative embodiment, the agent comprises a performance monitoring module (PMM), which is software that resides in an interface between an existing core module and a renderer of a media player. The agent PMM intercepts each useful packet as it goes from the core to the renderer and, as a result, it is able to compute quality metrics about the playback. The agent functions “transparently” to the media player by presenting the core with an application programming interface (API) that emulates the API that the renderer normally presents to the core. Thus, when the core believes it is calling the renderer, it is actually calling the agent PMM, which can then receive all the packets from the core and process them. After computing relevant performance metrics using the packets it receives, the agent PMM calls the renderer. A set of performance agents can be managed by a service provider to enable a content provider to determine how a stream is perceived by end users. | 09-16-2010 |
20100235504 | METHOD AND APPARATUS FOR A POWER-EFFICIENT FRAMEWORK TO MAINTAIN DATA SYNCHRONIZATION OF A MOBILE PERSONAL COMPUTER TO SIMULATE A CONNECTED SCENARIO - An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed. | 09-16-2010 |
20100241742 | Collaborative speed determination in distributed systems - The described implementations relate to collaborative speed determination in distributed systems. One method estimates upload speeds of a plurality of hosts. The method sends a first bandwidth probe from a first host to a second host. The method receives, at the first host, a second bandwidth probe sent from the second host. The method determines which of the first and second bandwidth probes was relatively slower. The method designates either of the first or second hosts that sent the relatively slower bandwidth probe as a loser and takes a speed of the bandwidth probe of the loser as a first estimate of the loser's upload speed. | 09-23-2010 |
20100241743 | Achieving at least substantially constant processing request throughput within environment having varying resource availability - Resource loads are determined based on normalized factors that are themselves based on resource factors. The following is repeated until each resource's load is less than or equal to the resource's willingness capacity or until all the resources are each fully loaded or unavailable. Each resource's willingness capacity is determined based on the resource's willingness parameter. The willingness parameter indicates at least whether a resource is willing to receive a number of processing requests no greater than a maximum or a minimum request limit. A throughput overflow is determined for each resource having a load greater than its willingness capacity. The load for each resource having a throughput overflow greater than zero is reset. The load for each resource that is available and not fully loaded is updated based on new normalized factors and based on a potential throughput loss that is equal to a sum of the throughput overflows. | 09-23-2010 |
20100241744 | Network Monitoring Apparatus and Network Monitoring Method - According to one embodiment, a network monitoring apparatus includes an unauthorized node determination module, a spoofed address resolution protocol request transmission module, and a spoofed address resolution protocol reply transmission module. The unauthorized node determination module determines whether a sender node which transmits an address resolution protocol request packet is an unauthorized node. The spoofed address resolution protocol request transmission module transmits a spoofed address resolution protocol request packet to a target node corresponding to a target network address in the address resolution protocol request packet if the sender node is an unauthorized node. The spoofed address resolution protocol reply transmission module transmits to the unauthorized node a spoofed address resolution protocol reply packet which includes a predetermined physical address other than the physical address of the target node as a sender physical address and a network address of the target node as a sender network address. | 09-23-2010 |
20100241745 | CHARACTER DIFFERENTIATION BASED ON PATTERN RECOGNITION - A method and apparatus for character differentiation based on pattern recognition is provided. A sequence of events is received that have been generated from a given session or connection and determines if the sequence of events is likely to have come from an existing, known character, or if the events are from a previously unknown character. A character identifier (ID) is tagged onto (i.e. associated with) the event for further processing in another system that can, for example, provide different content based on the identified character and an associated preference profile. | 09-23-2010 |
20100241746 | Method, Program and System for Efficiently Hashing Packet Keys into a Firewall Connection Table - A method for increasing the capacity of a connection table in a firewall accelerator by means of mapping packets in one session with some common security actions into one table entry. For each of five Network Address Translation (NAT) configurations, a hash function is specified. The hash function takes into account which of four possible arrival types a packet at a firewall accelerator may have. When different arrival types of packets in the same session are processed, two or more arrival types may have the same hash value. | 09-23-2010 |
20100250726 | APPARATUS AND METHOD FOR ANALYZING TEXT IN A LARGE-SCALED FILE - The subject matter discloses a system for analyzing a large-scaled file downloaded to a user's computerized device in segments that comprises a detection module for reviewing at least a portion of the large-scaled file and detects new segments added to the large-scaled file since a previous review of the large-scaled file. The system also comprises a triggering module for triggering the detection module and an analyzing module for analyzing at least the text of the at least one new segment detected by the detection module. | 09-30-2010 |
20100250727 | SYSTEM AND METHOD FOR VERIFIED PRESENCE TRACKING - A system and method for verified presence tracking. A request for a location is received over a network. The request comprises a request type, a request source and at least one request target. Location data relating to the request targets is retrieved from a plurality of location data sources. The reliability of the retrieved location data is determined. A response is formulated using based on the request type, the retrieved location data, and the determined reliability of the retrieved location data. The response is then transmitted over the network to the request source. | 09-30-2010 |
20100250728 | METHOD FOR CONTROLLING WEB PAGE OPERATION IN BROWSER/SERVER ARCHITECTURE - A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page. | 09-30-2010 |
20100250729 | Method and System For Providing Access To Metadata Of A Network Accessible Resource - Methods, systems and computer program products are described for providing access to metadata of a network accessible resource, where the system includes a content handler component configured to receive request information identifying a matching condition and identifying a metadata-schema domain in a metadata-schema domain space. The metadata-schema domain includes a network domain of a schema provider node providing access to a metadata-schema defining metadata of a network accessible resource. A message formatter component is configured to generate a metadata access request identifying the metadata-schema domain and identifying the matching condition, and a content manager component is configured to send, based on the identified metadata-schema domain, the metadata access request to a metadata repository node representing a metadata-schema domain at least partially including the metadata-schema domain identified in the request. | 09-30-2010 |
20100250730 | AUTOMATED LICENSE RECONCILIATION FOR DEPLOYED APPLICATIONS - Systems, methods, and computer program products are described that perform automated license reconciliation for deployed applications. The applications may be deployed among a plurality of computers. Agents are deployed on respective computers to determine the deployed applications. The agents further determine licensable software product identifiers corresponding to the respective instances of the applications. A license data source module provides entitlements corresponding to respective license agreement(s). A reconciliation module matches the entitlements to the instances of the applications to determine whether the instances of the applications are in compliance with the license agreement(s). | 09-30-2010 |
20100250731 | SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION - An application identification system includes a network interface, a signature monitor, a rule generator and a packet access controller. The network interface is operable for receiving first and second packets transmitted by a network application. The signature monitor coupled to the network interface is operable for identifying the network application based on a first packet transmitted by the network application and for generating monitoring data indicative of a state of the first packet. The rule generator coupled to the signature monitor is operable for generating a rule according to the monitoring data and according to a state machine indicative of a state transition between the first and second packets transmitted by the network application. The packet access controller coupled to the rule generator is operable for identifying the network application if the second packet contains contents matched to the rule. | 09-30-2010 |
20100250732 | DETERMINING SERVER LOAD CAPACITY - A method, computer program product, and system for determining a number of users corresponding to a server load including simulating one or more virtual users on a test computer system on coupled to network. One or more client requests are sent from each of the one or more virtual users to a server application executed on a server computer system coupled to the network. A metric indicative of a load on the server computer system is measured. The metric is compared to a predetermined value; and the number of the one or more virtual users is changed based on the difference between the metric and the predetermined value until the metric is within a predetermined range of the predetermined value. | 09-30-2010 |
20100250733 | Method and Apparatus for Data Transfer in a Peer-to-Peer Network - A method is provided of managing traffic in a network. The method comprises applying (S | 09-30-2010 |
20100250734 | SERVER REASSIGNMENT SUPPORT SYSTEM AND SERVER REASSIGNMENT SUPPORT METHOD - A server reassignment support system has a storage device, a deallocated state estimation module and an allocation plan generation module. Stored in the storage device are an operation data indicating operation status of a plurality of physical servers and a plurality of virtual servers and a capacity data indicating resource capacity of each of the plurality of physical servers. The deallocated state estimation module refers to the operation data and the capacity data to extract an overloaded server from the plurality of physical servers, load of the overloaded server exceeding a threshold value depending on the resource capacity. Further, the deallocated state estimation module estimates a state in which at least part of virtual servers allocated to the overloaded server is deallocated as a deallocated server among the plurality of virtual servers. The allocation plan generation module generates an allocation plan for the deallocated server based on the estimated state. | 09-30-2010 |
20100250735 | MONITORING AN ENTERPRISE NETWORK FOR DETERMINING SPECIFIED COMPUTING DEVICE USAGE - Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. More specifically, embodiments relate to monitoring or otherwise “watching” the online and/or offline activity of specified computing devices in an enterprise wide electronic discovery system. By determining when a computing device is online/offline and notifying a requesting party of the online/offline status, the requesting party knows when the specified device is available for electronic discovery functions, such as collecting data from the computing device or the like. The monitoring application of the present invention eliminates the need for the requesting party to wait for prolonged periods of time for a computing device to come online or to randomly attempt to find a computing device on line. | 09-30-2010 |
20100250736 | Connection State Estimating Device, Connection State Estimating Method and Storage Medium - A connection state estimating method includes: acquiring a network distance between respective devices in a communication network; assuming branch point candidates at which three devices extracted from the network are connected together; calculating the network distance between each of the assumed branch point candidates and each of the three devices; classifying all the branch point candidates assumed to be connected with one of the devices into groups on the basis of the network distance between the one device and each branch point candidate; calculating representative values of the network distances between each device and branch point candidates assumed to be connected with the device; and selecting a device from the devices assumed to be connected with one of the branch point candidates and the representative value relating to the selected device. | 09-30-2010 |
20100250737 | DETECTING AND CONTROLLING PEER-TO-PEER TRAFFIC - A method for communication management includes detecting addresses of peer nodes ( | 09-30-2010 |
20100250738 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD,AND STORAGE MEDIUM - An apparatus configured to perform a search via communications excluding unicast and to use a registration function for searching for and registering a network device includes a re-search unit configured to re-search the registered network device when an actual operation is performed or when a status is acquired. The re-search unit performs the re-search via communication including unicast to re-search for the network device. | 09-30-2010 |
20100250739 | NETWORK MONITORING CONTROL DEVICE AND MONITORING CONTROL METHOD - A monitoring control device monitors a communication device connected through a network through a virtual LAN provided on the network. The monitoring control device includes: a bandwidth learning unit which learns a bandwidth between the communication device and the monitoring control device by a first file transfer; and a file transfer management unit which manages whether or not a second file transfer, which passes through at least one section, is able to be performed based on a section bandwidth of the at least one section of the network, the section bandwidth obtained from the bandwidth learned by the bandwidth learning unit. | 09-30-2010 |
20100250740 | METHOD AND APPARATUS FOR TRANSFERRING CONTEXT INFORMATION ON WEB SERVER - A method for transferring context information on a web server that contains a context pool. The method includes: in response to the web server receiving a message, obtaining context information from the message, generating a unique identifier according to a thread for processing the message, associating the context information with the generated unique identifier, and storing the context information and the associated unique identifier in context pool of web server correlatively. In response to a web server obtaining the context information, generating an identifier according to a thread that is executed currently in the web server, and extracting context information for which an associated unique identifier is matched with the generated identifier from the context pool. | 09-30-2010 |
20100250741 | INFORMATION PROCESSING APPARATUS AND ITS METHOD - An information processing apparatus which stores identification information (MAC address) for detection confirmation of a target network device in advance and executes detection of the target network device by comparing the stored identification information and identification information acquired from the network device on a network repeats executing a request by unicast to a part of addresses in a range of addresses to be detection target and then executing a request by broadcast or multicast until the target network device can be detected. | 09-30-2010 |
20100250742 | Global load balancing across mirrored data centers - An intelligent traffic redirection system that performs global load balancing can be used in any situation where an end-user requires access to a replicated resource. The method directs end-users to the appropriate replica so that the route to the replica is good from a network standpoint and the replica is not overloaded. The technique preferably uses a Domain Name Service (DNS) to provide IP addresses for the appropriate replica. The most common use is to direct traffic to a mirrored web site. | 09-30-2010 |
20100250743 | EFFECTIVE POLICIES AND POLICY ENFORCEMENT USING CHARACTERIZATION OF FLOW CONTENT AND CONTENT-INDEPENDENT FLOW INFORMATION - Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics. | 09-30-2010 |
20100262687 | DYNAMIC DATA PARTITIONING FOR HOT SPOT ACTIVE DATA AND OTHER DATA - A computer readable medium having executable instructions stored thereon to execute a database partitioning method during a current period of time is provided. The database partition method includes picking current hot spot data keys according to available data, creating hot spot partitions, respectively associated with the hot spot data keys, into which hot spot data is loaded before a start time of the current period of time and creating non-hot spot partitions into which non-hot spot data is loaded before the start time, routing hot spot data requests to the hot spot partitions and non-hot spot data requests to the non-hot spot partitions, and monitoring computing resources to determine if a number of the hot spot partitions is to be increased or decreased and, accordingly, increasing or decreasing the number of the hot spot partitions. | 10-14-2010 |
20100262688 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack; and (3) Spoofing Attack. A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint of the IP device or its configuration settings, a watermark inserted in the data-stream, and a private key burned into the IP devices' physical memory may be used to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 10-14-2010 |
20100262689 | STAR NETWORK AND METHOD FOR PREVENTING A REPEATEDLY TRANSMISSION OF A CONTROL SYMBOL IN SUCH A STAR NETWORK - A star network ( | 10-14-2010 |
20100262690 | RECORDING COMMUNICATIONS - Determining an operation mode of a terminal, and recording communications data of the terminal, on the basis of the determined operation mode. | 10-14-2010 |
20100262691 | INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE DEVICE, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An apparatus stores address information of a server and transmits information of an apparatus to the server at a regular interval. The apparatus, when shifting from a normal state to a power-saving state, keeps continued regular transmission, by notifying a network interface device of the stored address information and the information of the apparatus. | 10-14-2010 |
20100262692 | Recommendation of network object information to user - Recommending network object information to a user includes, for each of a plurality of network objects, a respective plurality of behavior frequencies by the user is determined; a network object among the plurality of network objects that is of interest to the user is identified, the identification being based at least in part on the respective plurality of behavior frequencies that corresponds to each of the plurality of network objects; and additional information relating to the identified network object is provided to the user. | 10-14-2010 |
20100268812 | System and Method of Migrating Virtualized Environments - A system and method migrating virtualized environments is disclosed. According to an aspect of the disclosure, the information handling system can include a migration monitor configured to initiate migration of a remote virtualized environment operating on a first remote system. The information handling system can also include a trusted platform module including a local memory storing a plurality of access keys configured to enable use of a plurality of virtualized environments. According to an aspect, the plurality of access keys can include a first access key configured to be used with a first remote system. The information handling system can also include a secure communication channel configured to enable a mapping of the first access key to a second remote system upon the migration monitoring determining the second remote system is capable of satisfying an operating characteristic of the remote virtualized environment. | 10-21-2010 |
20100268813 | SYSTEM AND METHOD FOR HANDLING REMOTE DRAWING COMMANDS - Examples of systems and methods are provided for handling remote drawing commands. A system may comprise a buffer module configured to receive, at the system from a remote server system over a remote access connection between the system and the remote server system during a remote connection session, remote drawing commands, according to a drawing command rate, of a remote application running on the remote server system. The buffer module may be configured to store the remote drawing commands. The system may comprise a timer module configured to facilitate sending at least some of the remote drawing commands in the buffer module to a graphics module according to a refresh rate that is less than the drawing command rate. The timer module may be application agnostic. | 10-21-2010 |
20100268814 | Intercept Device for Providing Content - Described are computerized methods and apparatuses, including computer program products, for network virtualization. An intercept device receives a DNS response message from a DNS server. The DNS response includes a domain name, a network address associated with the domain name, and a destination address of a first network device. The intercept device determines whether the domain name satisfies a DNS intercept criterion. If the domain name satisfies the DNS intercept criterion, then a request intercept criterion is updated to include the network address associated with the domain name. The DNS response message is transmitted on to the first network device by the intercept server. | 10-21-2010 |
20100268815 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) COLLISION DETECTION MECHANISM AND METHOD - A LDAP collision detection mechanism and a method are described herein that allow a LDAP client to detect and avoid an update operation collision on an entry within a LDAP directory. The method includes the steps of: (a) reading data from the entry in the directory; (b) processing the retrieved data; (c) sending a request to modify the data in the entry in the directory, wherein the client is assured that the requested modification will not be performed by the directory if another client had previously performed a modification on the data within the entry that was originally read by the client. There are several different embodiments of the LDAP collision detection mechanism and the method described herein. | 10-21-2010 |
20100268816 | PERFORMANCE MONITORING SYSTEM, BOTTLENECK DETECTION METHOD AND MANAGEMENT SERVER FOR VIRTUAL MACHINE SYSTEM - A performance monitoring system, comprising: a server; a storage system; and a management server, the management server the management server is configured to: obtain the gathered time-sequential data from the server; judge whether at least one bottleneck has occurred in the logical resource of a specified one of the plurality of virtual machines at each time of the obtained time-sequential data, judge whether at least one bottleneck causing large influence on the specified one of the plurality of virtual machines has occurred; and notify that at least one large bottleneck has occurred in the specified one of the plurality of virtual machines. | 10-21-2010 |
20100268817 | HIERARCHICAL TREE-BASED PROTECTION SCHEME FOR MESH NETWORKS - In a hierarchical tree-based protection scheme, a node in a mesh network is designated as a root node of a spanning hierarchical protection tree and subsequently invites each adjacent node to become its child within the tree. If the inviting node provides a more capacious protection path to the root node than is currently enjoyed by the invitee, the invitee designates the inviting node as its primary parent and assumes a new tree position. Otherwise, the invitee designates the inviting node as a backup parent. A node assuming a new tree position invites all adjacent nodes except its parent to become its child. The invitations propagate throughout the network until a spanning hierarchical protection tree is formed. Upon a subsequent failure of a straddling link, the tree may be used to re-route data. Further, given a tree link failure, protection switching is quickly achieved at a disconnected node through use of a backup parent as the new primary parent. Dynamic tree reconfiguration in the event of network topology changes may be limited to the network area surrounding the change. | 10-21-2010 |
20100268818 | SYSTEMS AND METHODS FOR FORENSIC ANALYSIS OF NETWORK BEHAVIOR - Systems and methods monitor and manage computer network traffic and identify a status of normality or consistency of the traffic on a per user, per interne protocol address or MAC address basis. More specifically, the systems and methods determine, with degrees of significance, the abnormality or inconsistency of network traffic from a user, IP address or MAC address based on a comparison of said network traffic to previous network traffic from the same location. Moreover, the systems and methods monitor and manage the network traffic whereby, after an anomaly has occurred, network traffic is tagged as suspicious and thereafter is flagged for forensic study and placed in storage. In addition, the systems and methods report tagged traffic and alert administrators of a breach or violation in the computer network. | 10-21-2010 |
20100268819 | EVENT PROBLEM REPORT BUNDLES IN XML FORMAT - A network device may include logic configured to detect that an event has occurred in the network device, determine an XML document structure based on the detected event, and generate an XML document with the determined structure including information relating to the detected event. | 10-21-2010 |
20100268820 | USER DATA SERVER SYSTEM, METHOD AND APPARATUS - A user data server system includes: a data storage node, which stores user data, registers the user data in a Distributed Hash Table (DHT) network by using a key, and receives and processes user data operation requests; a DHT index node, which creates and maintains DHT routing information according to a DHT algorithm and stores information of data storage nodes where user data is stored according to the key and searches for information of a data storage node where target user data is stored according to the key; a DHT super maintenance node, which manages and optimizes the DHT network; and a front end node capable of protocol processing and service processing, which obtains a key associated with a target user and obtains information of a data storage node where the target user data is stored by querying the DHT index node via the DHT network according to the key, and performs operations on the user data stored in the data storage node where the target user data is stored. With the technical solution provided by the present invention, a user data server is not centralized and is highly scalable and highly reliable with a high cost-effectiveness. | 10-21-2010 |
20100274885 | PROACTIVE LOAD BALANCING - A load balancing system is described herein that proactively balances client requests among multiple destination servers using information about anticipated loads or events on each destination server to inform the load balancing decision. The system detects one or more upcoming events that will affect the performance and/or capacity for handling requests of a destination server. Upon detecting the event, the system informs the load balancer to drain connections around the time of the event. Next, the event occurs on the destination server, and the system detects when the event is complete. In response, the system informs the load balancer to restore connections to the destination server. In this way, the system is able to redirect clients to other available destination servers before the tasks occur. Thus, the load balancing system provides more efficient routing of client requests and improves responsiveness. | 10-28-2010 |
20100274886 | VIRTUALIZED DATA STORAGE IN A VIRTUALIZED SERVER ENVIRONMENT - Methods and systems for virtualizing a storage system within a virtualized server environment are presented herein. A computer network includes a first physical server configured as a first plurality of virtual servers. The computer network also includes a plurality of storage devices. The computer network also includes a first storage module operating on the first physical server. The first storage module is operable to configure the storage devices into a virtual storage device and monitor the storage devices to control storage operations between the virtual servers and the virtual storage device. The computer network also includes a second physical server configured as a second plurality of virtual servers. The second server includes a second storage module that is operable to maintain integrity of the virtual storage device in conjunction with the first storage module of the first physical server. | 10-28-2010 |
20100274887 | System and Method for Recommending Personalized Identifiers - Methods, systems and computer program products for providing one or more personalized identifiers to a user. In one method, the method obtains the user's personal information and user interest information from the user. The method generates a list of candidate identifiers taking into account the personal information or the user interest information. The method checks availability of the list of candidate identifiers using a database. The method provides a list of available identifiers to the user. | 10-28-2010 |
20100274888 | GENERATING A SUMMARY OF USERS THAT HAVE ACCESSED A RESOURCE - Information relating to monitored communications between user machines and a resource of a particular machine is received. Group information that identifies groups of the users is received. Based on the monitored communications and the group information, a summary of a subset of users that have accessed the resource is generated. | 10-28-2010 |
20100274889 | AUTOMATED FEED READER INDEXING - An incoming web feed received from a web feed document server is monitored for changes associated with a web feed document. A change associated with the web feed document is determined to have occurred. A priority is assigned to the change associated with the web feed document based upon a ranking criterion. The change associated with the web feed document is stored with the assigned priority to a memory. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 10-28-2010 |
20100274890 | METHODS AND APPARATUS TO GET FEEDBACK INFORMATION IN VIRTUAL ENVIRONMENT FOR SERVER LOAD BALANCING - Methods and apparatus for providing availability information of a virtual machine to a load balancer are disclosed. The availability information of the virtual machine may be normalized information from performance metrics of the virtual machine and performance metrics of the physical machine on which the virtual machine operates. The normalized availability of a virtual machine is provided by a feedback agent executing on the virtual machine. Alternatively, the normalized availability of a virtual machine is provided by a feedback agent executing on a hypervisor executing multiple virtual machines on a common set of physical computing hardware. | 10-28-2010 |
20100274891 | NETWORK MONITORING SYSTEM AND METHOD - The present invention provides a network monitoring system and method, wherein the system includes a plurality of monitoring units, each containing a host computer and a camera. Each of the plurality of host computer stores the video images taken by the camera using a monitoring system program, and the monitoring units upload their network addresses to a portal server, so that remote clients can obtain the network addresses of these monitoring units by logging into the portal server. While enabling the remote clients to obtain the video images through connection with the monitoring units via these addresses, this will prevent them from gaining access to the video data by logging into the portal server at the same time, thus helping solve the problem of insufficient bandwidth and speeding up the connection with the server. Besides, once the telephone function of the monitoring units is started, the plurality of voice servers can notify the remote clients of unusual conditions via telephone immediately after that the conditions are found by the monitoring units. Therefore, the present invention will enable the remote clients to obtain the network addresses of the monitoring units by logging into the portal server, so that they can connect to the portal server and watch the video images immediately, achieving the purpose of responding to emergency situations in a real-time manner. | 10-28-2010 |
20100274892 | Method for Monitoring a message associated with an action generated by an element or the user of an IS, and corresponding computer software product, storage means and device - The invention relates to a method for monitoring at least one message, each message being associated with an action generated by at least one element or user of an information system ( | 10-28-2010 |
20100274893 | METHODS AND APPARATUS FOR DETECTING AND LIMITING FOCUSED SERVER OVERLOAD IN A NETWORK - Computer-based methods and apparatuses, including computer program products, are described for detecting and limiting focused server overload in a network. A feedback message is received from a downstream server, wherein the feedback message includes a communication protocol statistic. The methods and apparatuses determine which of one or more counters that store a number of feedback messages received that include the statistic, from an array of counters, are associated with the downstream server using one or more hash functions based on information included in the feedback message. The one or more counters are incremented in response to the feedback message including the statistic. Using the one or more hash functions, a value of the number stored in the one or more counters is determined. The value is determined to be indicative of an overload episode in the network for the downstream server based on whether the value satisfies a predetermined criteria. | 10-28-2010 |
20100274894 | Router Method And System - A method and system for operating a virtual router system. A system health index for each of a plurality of physical routers in a virtual router system is determined, and virtual router operation for the physical routers is suspended in response to the system health index. | 10-28-2010 |
20100274895 | OBJECT ORIENTED COMMUNICATION AMONG PLATFORM INDEPENDENT SYSTEMS OVER NETWORKS USING SOAP - A system for object oriented communication among platform independent systems over networks using SOAP, in which communications can be performed over a network utilizing a single communications protocol. A simple object access communications protocol (SOAP) is utilized for sending messages from one object to another across the network in a platform independent manner. This type of protocol can be utilized to control network elements provided at various locations. | 10-28-2010 |
20100274896 | SYSTEMS AND METHODS FOR FLOW SIGNATURE FORMATION AND USE - An embodiment of a method for use in performing interoperability testing between two network architectures includes forming multiple transaction signatures that each characterizes a communication transaction conducted over the two networks and analyzing each of the transaction signatures to determine if the transaction signature matches a previously classified pattern. The method may further include generating a report identifying each of the communication transactions and indicating that each of the communication transactions is classified with a classification associated with a previously classified pattern or are of unknown classification. Another method includes receiving a transaction signature composed of multiple transaction elements, and determining whether the received transaction signature corresponds to a previously identified transaction signature pattern. If the transaction signature does not correspond to a previously identified transaction signature pattern, a new transaction signature pattern is created, and classified as one of a plurality of classifications indicative of completion or failure of the communication transaction. | 10-28-2010 |
20100274897 | Random Early Detect and Differential Packet Aging Flow Control in Switch Queues - Flow control is provided for a packet switch. An incoming packet is classified according to its priority based on predefined rules to produce a weight value based on the priority of the packet. A lifetime value associated with the packet is produced based on the weight value and the queue occupancy in a queue to which the packet is assigned. The packet is discarded if its associated lifetime value is less than or equal to a threshold value. Otherwise the packet and associated lifetime value are sent to the queue. The lifetime value is periodically changed and compared to a threshold value. The packet is removed from the queue when its lifetime value reaches the threshold value. | 10-28-2010 |
20100281154 | Methods and Apparatus for Remote Monitoring - Provided are methods, apparatus and computer programs for remote monitoring of data. Log data output by an application program running on a storage-constrained apparatus is saved to local system memory—either as an in-memory data file or as output from one application piped to the input of another, or as a named pipe that passes data to a local publisher program—and then captured by the local publisher program. The local publisher program sends the data to a publish/subscribe broker, which can retain the most recent publications for analysis by one or more subscribers. This avoids the need to save large amounts of data to disk storage on the storage-constrained apparatus, and ensures that console output data and log data that is often discarded by headless, storage-constrained systems is available for analysis. The combination of the retain feature and publishing of output data in response to failure of a monitoring application ensures the availability of the data that was output just before the failure, which is generally the most useful data for problem diagnosis. | 11-04-2010 |
20100281155 | APPLICATION MONITORING - A method and apparatus for monitoring an application executing on a self-service terminal. The method comprises: registering with a services manager (such as an XFS or J/XFS manager) to receive event reports indicative of a change of state being sent to the application; accessing an operating system function to deduce a current status of the application; and communicating a status of the application to the remote management system, without communicating with the application, to enable the remote management system to manage the self-service terminal more effectively. | 11-04-2010 |
20100281156 | SYSTEM AND METHOD OF RECORDING AND SHARING MOBILE APPLICATION ACTIVITIES - A method of recording activity at a wireless device is provided. The method includes receiving a record command, determining a user activity at the wireless device, and determining available memory at the wireless device. The method further includes recording the user activity to create a device recording at least partially based on the user activity and the available memory. | 11-04-2010 |
20100281157 | DETECTING OVERLOADS IN NETWORK DEVICES - Systems and methods are provided to allow detection of the load conditions on network devices. The load detection can occur using a mobility management device to track establishment of sessions and attempts at session establishment to determine the loading conditions on various network devices. This information can then be used by a selection logic to determine which devices are selected to send session establishment messaging for new session establishment requests. This can provide quicker setup times as highly loaded network devices or network devices experiences other failures are selected less until conditions are back to normal. | 11-04-2010 |
20100281158 | ENVIRONMENTAL FOOTPRINT MONITOR FOR COMPUTER NETWORKS - A system and method for obtaining an environmental footprint of a website are presented. The system includes a website embedded with a unique identifying tag, a user terminal to view the website, an environmental footprint server which identifies the unique identifying tag of the website, and a processor to calculate the environmental footprint of the website based upon time data and the average emissions emitted by a user terminal, the server hosting the website and a network connecting the user terminal and the server. | 11-04-2010 |
20100281159 | MANIPULATION OF DHCP PACKETS TO ENFORCE NETWORK HEALTH POLICIES - A facility for causing a device connected to a network that is configured to act as a DHCP server to enforce network health policies against hosts connected to the network is described. The device intercepts network packets sent to a DHCP server from any host connected to the network. For each of at least a portion of these intercepted network packets that contain a statement of health, the facility ( | 11-04-2010 |
20100281160 | SYSTEM, APPARATUS AND METHODS TO IMPLEMENT HIGH-SPEED NETWORK ANALYZERS - Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit. | 11-04-2010 |
20100281161 | METHOD, SYSTEM AND APPARATUS FOR AUTOMATED INVENTORY REPORTING OF SECURITY, MONITORING AND AUTOMATION HARDWARE AND SOFTWARE AT CUSTOMER PREMISES - A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide for remote access to the configurable controller, thereby providing for remote monitoring of the state of a dwelling and for remote control of home automation. Embodiments of the present invention further provide for reporting to a provider those sensors and other hardware used by the configurable architecture, enabling the provider to track inventory of such items. | 11-04-2010 |
20100281162 | SYSTEMS AND METHODS OF PROVIDING SERVER INITIATED CONNECTIONS ON A VIRTUAL PRIVATE NETWORK - The present invention is related to a method for establishing via an appliance a transport layer protocol connection initiated by a server on a first network to a client connected from a second network to the first network via a secure socket layer virtual private network (SSL VPN) connection. The method includes the step of receiving, by an appliance, a transport layer connection request from a server on a first network to connect to a client connected to the first network via a SSL VPN connection from a second network. The transport layer connection request identifies a client destination internet protocol address and a client destination port on the first network. The method includes establishing, by the appliance, a first transport layer connection to the server on the first network, determining, by the appliance, the client on the second network associated with the client destination internet protocol address on the first network, and transmitting, by the appliance, connection information identifying the client destination port to an agent on the client. The agent establishes a second transport layer connection to the client destination port using a local internet protocol address of the client on the second network and establishes a third transport layer connection to the appliance, which it associates with the second transport layer connection. | 11-04-2010 |
20100281163 | METHOD AND APPARATUS FOR MAINTAINING ROUTING INFORMATION - A method and apparatus for maintaining routing information in a Peer-to-Peer (P2P) network are provided. The method includes that: a super maintenance node receives routing update information of an ordinary node in its home area; the super maintenance node sends routing update information to super maintenance nodes in other network areas; the super maintenance nodes in other network areas notify ordinary nodes in their home network areas to update routing information. With the present invention, a node of strong processing capabilities at the network area border is chosen to act as a super maintenance node and other nodes as ordinary nodes; when a node joins or fails, an ordinary node sends detected routing update information only to the super maintenance node in the local network area; the super maintenance node then forwards the update information to super maintenance nodes in other network areas. Each super maintenance node notifies ordinary nodes in its home network area of the received routing update information. | 11-04-2010 |
20100287273 | SYSTEM AND METHOD FOR DIRECTING COMMUNICATIONS WITHIN A HETEROGENEOUS NETWORK ENVIRONMENT - Disclosed is a communications device that monitors the status of its communications links. When more than one communications link is available, an “appropriate” link is selected for use by an application running on the device. The links are continually monitored, and, as circumstances change, the link selection can also change. In some embodiments, a link is “appropriate” when it is available to transfer data and when it satisfies certain “hard” rules set by the application or by a user of the communications device. Some embodiments monitor the behaviour of the communications device and of its user and capture that behaviour in “soft” rules that are applied when selecting an appropriate link and when the hard rules leave the choice open. When multiple links transmit on the same frequency, they may be supported “virtually simultaneously” by time-slicing the actual data transmissions. Unneeded links may be shut down to save battery power. | 11-11-2010 |
20100287274 | EFFICIENT NETWORK UTILIZATION USING MULTIPLE PHYSICAL INTERFACES - An architecture for streaming data from a sending endpoint to a receiving endpoint which are connected to each other by multiple networks is provided. Each of the sending endpoint and the receiving endpoint has multiple physical interfaces each for interfacing to a respective one of the multiple networks. The architecture is implemented on both of the endpoints. The architecture includes a traffic monitor for gathering performance characteristics of each of the multiple physical interfaces, and a software library for controlling sending and receiving of the data stream between the endpoints. The traffic monitor and the software library communicate information to each other. The software library instantiates a plurality of bondable virtual interfaces for splitting the data stream into multiple data sub-streams and for combining the multiple data sub-streams into the data stream, and a data organizer for designating one of the plurality of bondable virtual interfaces. | 11-11-2010 |
20100287275 | OPERATION SUPPORTING DEVICE AND METHOD FOR SUPPORTING OPERATION - Provided is an operation supporting device that can estimate an apparatus to be supported in operation and support the operation independent of a position relationship between a position of the apparatus to be supported and a position of the user, and of a density of apparatuses. The operation supporting device includes: an operation history collecting unit ( | 11-11-2010 |
20100287276 | NETWORK DEVICE AND NETWORK DATA ACCESS RECORDER - A network device includes flash memory to store a plurality of bits indicating login data on a user device. The network device sets the plurality of bits stored in the flash memory to a first value, sets a changing interval, and copies the plurality of bits from the flash memory to random access memory (RAM). The network device further searches for a first bit of the first value from the plurality of bits in the RAM, and records an index of the first bit of the first value in a variable. The network device further changes the first bit corresponding to the variable to a second value and increases the variable by 1 when the changing interval arrives. The network device further writes the bit changed to the second value from the RAM to the flash memory. | 11-11-2010 |
20100287277 | METHOD FOR MONITORING A PROCESS SYSTEM HAVING A FIELD BUS IN THE PROCESS AUTOMATION TECHNOLOGY - A method for monitoring a process plant having a fieldbus of process automation technology, via which a number of field devices exchange with a process control unit PLC telegrams in regular data traffic for process control. The following method steps are executed: telegrams transmitted via the fieldbus to the process control are tapped by a monitoring application, which performs a testing of the telegrams for data relevant for the monitoring application; data relevant for the monitoring application are processed as actual values in a process modeling application, which is part of the monitoring application; and when a significant deviation is determined between desired and actual values, an error signal is generated. | 11-11-2010 |
20100287278 | Automatic Proxy Detection and Traversal - The invention provides a method for detecting a proxy. The method comprises inspecting one or more network communications being sent from a client computer; and determining from information contained in the network communication whether the network communication is being sent via a proxy. | 11-11-2010 |
20100293266 | SYSTEM AND METHOD FOR DYNAMIC CONTROL OF NETWORK MANAGEMENT TRAFFIC LOADS - A system and method for dynamically controlling network management traffic load on network devices is provided. A network management module on a network management server has a request module for requesting management data from a network device. A storage device accessible by the network management module stores a list of the network devices and associated management request limits representing a number of management requests the network management module is allowed to send to a particular network device for processing at a time. A queue module on the network management module stores a management request from the network management module when a number of outstanding management requests exceeds the management request limit and places the management request in a queue. The queue module also forwards a management request from the queue to a network device when the network management module receives a response from the network device. | 11-18-2010 |
20100293267 | METHOD AND SYSTEM FOR MONITORING A WORKSTATION - A method and system for monitoring a workstation. The system includes a monitoring system for monitoring activity on a workstation and an analysis module for comparing a monitored activity to specified activities in a work profile. The system may include an alert generator for generating an alert if the monitored activity does not conform to the work profile. The work profile may be a user profile of specified activities allowed to be performed by a user, and/or a transaction profile of a sequence of specified activities to be performed in a transaction by a user. The monitoring system includes an inputs monitor for monitoring inputs by the user into the workstation, a screen monitor which extracts content from a screen display viewed by a user, and a physical presence monitor to determine if a user is at his workstation. | 11-18-2010 |
20100293268 | EFFICIENT MESSAGE CONSUMPTION IN A POINT-TO-POINT MESSAGING ENVIRONMENT - A method and system for assigning a message to an application instance are disclosed. Message processing times of a currently available application instance and a currently unavailable application instance are measured. An unavailable time of the currently unavailable application instance is approximated based on the estimated message processing time of the currently unavailable application instance. The unavailable time and estimated message processing time of the currently unavailable application instance are added to generate an updated processing time of the currently unavailable application instance. The estimated processing time of the currently available application instance and the updated processing time of the currently unavailable application instance are compared. If the updated processing time of the currently unavailable application instance is less than the estimated processing time of the currently available application instance, the currently unavailable application instance is selected to process the message. Otherwise, the currently available application instance is selected. | 11-18-2010 |
20100293269 | INVENTORY MANAGEMENT IN A COMPUTING-ON-DEMAND SYSTEM - A system may receive parameters for provisioning a resource object and may select network resources that correspond to the resource object based on the parameters, inventory information, and configuration information. In addition, the system may configure the selected network resources in accordance with the parameters and may monitor the selected network resources to obtain information on the selected network resources. Further, the system may update the inventory information and the configuration information based on the obtained information to reflect changes in state and configuration of the selected network resources. | 11-18-2010 |
20100293270 | Use Tag Clouds to Visualize Components Related to an Event - A method, system, and computer program product for displaying components assigned to events produced by resources, includes: registering a new resource by generating a label to which is associated a system specific device identifier used by the new resource within a computing environment; storing in a mapping table the generated label identifying the registered new resource together with an associated system specific device identifier; and updating the mapping table by associating to the label any other system specific device identifier used by the new resource within the computing environment; receiving events produced by resources when being executed within the computing environment, each event being associated with a list of labels for the resources relevant for the generation of the event; and maintaining a tag cloud including different tags, the different tags including labels for the resources associated with the received events to be displayed as components. | 11-18-2010 |
20100293271 | COMMUNICATION APPARATUS AND METHOD FOR CONTROLLING COMMUNICATION APPARATUS - A first communication apparatus for use in a network established by a plurality of communication apparatuses to implement a predetermined system function includes a sending unit configured to send, to the network, information on an apparatus function for implementing the predetermined system function to accommodate a communication apparatus having the apparatus function in the network, and an execution unit configured to execute processing for accommodating a second communication apparatus having the apparatus function sent by the sending unit in the network according to a request from the second communication apparatus. | 11-18-2010 |
20100293272 | TOLERANT DEVICE LICENSING IN A DISTRIBUTED ENVIRONMENT - Methods, apparatus and a computer program product provide for a Tolerant License Manager that defines a cluster of a plurality of network controllers, wherein each respective network controller contributes at least one license to a current total amount of licenses in a license pool. The Tolerant License Manager identifies at least one threatened access point upon detecting a first network controller has become unavailable. Each threatened access point comprises any access point connected to the first network controller when the first network controller becomes unavailable. The Tolerant License Manager establishes (and/or) approves a connection between a back-up controller and the threatened access point(s). While the first network controller is unavailable, the Tolerant License Manager allocates a license to each threatened access point via the back-up network controller. | 11-18-2010 |
20100293273 | System and Method for obtaining a classification of an identifier - A method for obtaining a classification of at least one identifier of at least one computer element is presented. The method involves the sending of identifiers between a sending client computing system and a plurality of receiving client computing systems, with the objective of obtaining a classification of said identifier, which corresponds to a computer element. Alternatively, if a predetermined condition of reception is not reached, a further sending of the identifier may be performed to a server computing system. This way, the classifications may be found spread over a plurality of receiving client computing systems or a server, and the data traffic may be distributed over several paths instead of, for example, a unique path to a unique server computing system. | 11-18-2010 |
20100293274 | DATA COMMUNICATION - A management device ( | 11-18-2010 |
20100299430 | AUTOMATED ACQUISITION OF VOLATILE FORENSIC EVIDENCE FROM NETWORK DEVICES - Examples disclosed herein are directed to techniques for automatically retrieving and processing forensic data from network devices connected to a communications network without requiring device-specific knowledge or training. A mobile forensic device includes and extensible forensic analysis tool that allows on-scene forensic investigators to quickly and automatically acquire data from network devices without device-specific knowledge. The extensible forensic analysis tool is designed for use on handheld mobile computers, enabling on-scene investigators to quickly and easily acquire forensic data from network devices in the field without losing volatile data or shutting down the network. | 11-25-2010 |
20100299431 | SYSTEM AND METHOD OF DETERMINING USER PROFILES - A method determines a user demographic profile of a user that visits one or more websites of a predetermined group of websites. The method includes generating a first record of visits by the user to the websites of the predetermined group of websites. The method further includes providing one or more website profiles comprising demographic characteristics of each website visited by the user of the predetermined group of websites. The method further includes calculating an estimated user demographic profile of the user by using the first record of visits by the user and the one or more website profiles. | 11-25-2010 |
20100299432 | SYSTEM AND METHOD FOR MANAGEMENT OF INFORMATION STREAMS DELIVERED FOR USE BY A USER - A method for management of information streams delivered for use by a user of a user device comprises discovering information streams relevant to the user using a plurality of uniquifiers, wherein each uniquifier of the plurality of uniquifier characterizes the user; adding the discovered information streams to a list of approved information streams; registering to at least one information stream in the list of approved information streams; filtering data provided by the at least one information stream using the plurality of uniquifiers; and providing a feedback based on the user usage of the filter data to enable improved future discovery and filtering. | 11-25-2010 |
20100299433 | NETWORK RESOURCE MANAGEMENT - The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth, delay, packet loss, and jitter, network element storage capacity, network element processing power. This information is made available by the RAS. In addition, the RAS generates and maintains predictive models and makes available predictive data from these models. Network elements and devices retrieve this information in the form of notifications from the RAS or by way of querying the RAS. The network elements and devices, based on these predictions, act to negotiate sessions to optimise QoS. In one embodiment the RAS is updated by only mobile devices subscribed to the operator which hosts the RAS. The update information is addressed to the RAS as a stand-alone entity. However, it is envisaged that the server may be hosted by multiple operators and may receive updates from devices subscribed to different operators. Also, it is envisaged that not only mobile devices but also network elements such as MMSCs may send update information. | 11-25-2010 |
20100299434 | SYSTEMS AND METHODS FOR TRACKING WEB ACTIVITY - Systems and methods of tracking activity over networks and, in particular, tracking web activity over the Internet are described. Exemplary systems and methods may include a receiver for receiving a request from a visitor for a data object, a processor for providing a cookie to track the visitor's web activity, and a transmitter for transmitting the cookie to the visitor in response to the request. The cookie may comprise tracking information for a plurality of web sites visited by the visitor. | 11-25-2010 |
20100306363 | DETERMINING COMPLETION OF A WEB SERVER DOWNLOAD SESSION AT A DATABASE SERVER - Techniques are described herein for determining completion of a Web server download session at a database server. A Web server initiates a download session for downloading a requested resource (e.g., a file or an output of an executable) to a client. The download session includes download operation(s), each corresponding to a respective portion of the requested resource. The Web server incorporates a session-specific identifier indicative of the download session and/or byte range indicator(s) corresponding to the respective download operation(s) into Web server log files. The database server uses the session-specific identifier and/or byte range indicator(s) to determine that the download operation(s) are included in the download session. The database server determines a download pattern corresponding to the download session based on download request(s) that correspond to the download operation(s). The database server determines whether the download session is complete using an algorithm that is indicative of the download pattern. | 12-02-2010 |
20100306364 | SORTING SYSTEMS IN A TREE - A method, computer program product, and computing system for monitoring, via a monitoring server, attributes of computer systems in communication with the monitoring server. A graphical user interface may display selectable attributes of the computer systems monitored by the monitoring server. The computer systems may be sorted in a tree based upon, at least in part, one or more selected attributes of the computer systems monitored by the monitoring server. | 12-02-2010 |
20100306365 | PUSH-BACK MECHANISM FOR PUB/SUB BROKERS - A method and system for controlling message throughput rates of clients connected to a broker device in a publish/subscribe network are disclosed. The broker device determines a maximum allowable message throughput for each client connected to the broker device. If a message-producing rate of a client exceeds the maximum allowable message throughput of the client, the broker device sends a negative acknowledgement (NACK) packet to the client and messages from the client are not accepted at the broker device. The NACK packet includes a maximum allowable message throughput of the client, so the client can adjust its message-producing rate based on the maximum allowable message throughput of the client. The present invention can be applied to a publish/subscribe network as well as a TCP/IP network. | 12-02-2010 |
20100306366 | SYSTEM FOR ENABLING RICH NETWORK APPLICATIONS - The present invention generally provides methods, systems and articles of manufacture that provide an autonomous system for enabling rich network applications. Embodiments of the invention may monitor an existing network application and generate a profile on the network application based on what responses and data updates are triggered by various requests from a user. Embodiments of the invention may refactor the existing network application into a rich network application based on the profile created for that network application. | 12-02-2010 |
20100306367 | IP SESSION-BASED REGULATION AND BILLING - Among other things, there are disclosed structures, systems and methods for monitoring and regulating access by consumers to computer network bandwidth, particularly with regard to peer-to-peer file sharing. A router (in certain embodiments, a core router) is programmed with a predetermined number of open or open and active internet protocol (IP) sessions a particular computer is allowed. Requests to open sessions that do not exceed that number are permitted. Requests to open sessions that exceed that number may be rejected, or an offer obtain additional session(s), perhaps with additional payment, may be made. | 12-02-2010 |
20100306368 | CONTENT DELIVERY NETWORK WITH CUSTOMIZED TRACKING OF DELIVERY DATA - A custom tracking system can provide functionality for operators of content sites to specify types of content delivery data to be tracked in a content delivery network. The custom tracking system can propagate operator tracking preferences to edge nodes in the content delivery network, such as delivery servers, which can track delivery data according to the preferences. The custom tracking system can use one or more tracking filters to reduce the storage burden of certain tracking requests while still providing relevant results. The custom tracking system can output results of the custom tracking for presentation to the content site operator. | 12-02-2010 |
20100306369 | VIDEO POLICY SERVER - A system for distributing digital content includes two or more digital content sources. Each source has a separate session manager that is distinct from other session managers associated with other digital content sources. The system further includes at least one set of network resources that receive digital content from the two or more digital content sources, modulate the digital content onto a carrier signal suitable for transmission over an access network, and transmit the carrier signal over the access network. The system also includes a receiving device for terminating the carrier signal. The receiving device generates a digital content stream corresponding to the digital content from the two or more digital content sources. The system further includes a policy server for allocating bandwidth of the network resources to the digital content sources, and for monitoring a utilization state of the network resources. | 12-02-2010 |
20100306370 | CALL PROCESSING TIME MEASUREMENT DEVICE, CALL PROCESSING TIME MEASUREMENT METHOD, AND PROGRAM FOR CALL PROCESSING TIME MEASUREMENT - To provide a call processing time measurement device which can measure the time required to process a measurement-object message to be measured. When a measurement-object message detection module detects a measurement-object message, a response request message transmission module transmits a response request message towards a node designated as a measurement object right after the measurement-object message. A response request message transmission time record module records the transmission time of the response request message transmitted by the response request message transmission module. A response message reception time record module records the reception time of the response message transmitted from the designated node. A processing time calculation module measures the message processing time of the designated node by calculating a difference between the reception time of the response message and the transmission time of the response request message. | 12-02-2010 |
20100306371 | METHOD FOR MAKING INTELLIGENT DATA PLACEMENT DECISIONS IN A COMPUTER NETWORK - A method for making data placement decisions in a computer network uses multiple factors comprising social rules (rules, factors and criteria common to all participating nodes and intended to benefit the community of nodes), as well as rules, factors and criteria driven by individual self-interest of the participating nodes. The method calls for each node to act in a semi-autonomous manner, without the need for a central coordinating node. By considering multiple factors fully, and not eliminating factors by a sequence of True/False decisions, the method may arrive at optimal decisions and may generate a ranked list of node candidates. | 12-02-2010 |
20100306372 | SYSTEM AND METHOD FOR ANALYZING THE STRUCTURE OF LOGICAL NETWORKS - Systems and methods for analyzing the structure of logical networks. Embodiments of the invention include ranking critical nodes according to regional hierarchies, distance hierarchies, global hierarchies, and relay hierarchies. Embodiments of the present invention are capable of testing the effectiveness of such hierarchies. In addition, critical nodes may be used to define critical regions. | 12-02-2010 |
20100306373 | DATA RETRIEVAL BASED ON BANDWIDTH COST AND DELAY - The invention provides for a download agent executing on a computing device. The download agent determines the status of each of the source servers, and downloads from source servers that are in the available state. Additionally the download agent tracks characteristics of the source servers. The download agent determines the required bandwidth of portions of the media content stored on the source servers. Based on the characteristics of the source servers and the required bandwidth of the portions of the media content, the download agent determines how much media content should be downloaded from which source servers and at what time. | 12-02-2010 |
20100306374 | Centralized network control - A method and system of network control is disclosed. The method and system includes collecting real-time operation information on one or more first network elements of a network, selecting a policy to be implemented by at least one second network element, different from the first network element, responsive to the collected real time information from the one or more first network elements, the at least one second element including an end-point element of the network and enforcing the selected policy on an agent hosted by the at least one second network element. | 12-02-2010 |
20100306375 | Method and System for Verifying Modem Status - A system for verifying modem status for a telecommunications service provider in a broadband network serviced by a central office. The system comprising an interne interface for receiving a modem status request from the telecommunications service provider via a telecommunications network and an integrator capable of retrieving subscriber information and a server connected to the internet interface for receiving the modem status request and transmitting the modem status request to the integrator. The integrator interprets the modem status request and retrieves corresponding subscriber information and transmits the corresponding subscriber information to the server, the server thereby converting the corresponding subscriber information to a central office request and sending the central office request to the central office. The central office responding to the request and transmitting a status signal to the server and the server transmitting the signal to the interne interface which converts the status signal to a readable format for the telecommunications service provider. | 12-02-2010 |
20100312872 | METHOD AND APPARATUS FOR MONITORING FUNCTIONS OF DISTRIBUTED DATA - This invention discloses continuous functional monitoring of distributed network activity using algorithms based on frequency moment calculations given by | 12-09-2010 |
20100312875 | AUTOMATED DISCOVERY OF MONITORING DEVICES ON A NETWORK - A system and method are disclosed for the automated discovery of devices on a network, such as a TCP/IP network using Dynamic Host Configuration Protocol (“DHCP”) and Domain Name System (“DNS”) servers. Devices on the network may be discovered, identified, and tracked by a monitoring server. Communications with the monitoring server may include identification information for each device. The identification information may be stored in DHCP option fields, transmitted with DHCP messages, and used to identify whether the device is new to the network. | 12-09-2010 |
20100312876 | METHOD FOR MONITORING ACTIVITIES OF A FIRST USER ON ANY OF A PLURALITY OF PLATFORMS - There is provided a method for monitoring activities of a first user on any of a plurality of platforms, with the first user having access to a first computing device for use by the first user. The method may include two modes which allows a master user to monitor activities of the first user even when the master user is not connected to the world wide web (offline). | 12-09-2010 |
20100312877 | HOST ACCOUNTABILITY USING UNRELIABLE IDENTIFIERS - An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change. Analysis of traffic (e.g., network activity or application request) logs may be performed and a host tracking graph may be generated that shows hosts and their bindings to IP addresses over time. A host tracking graph may be used to determine host accountability. To generate a host tracking graph, a host is represented. Host representations may be application-dependent. In an implementation, application-level identifiers (IDs) such as user email IDs, messenger login IDs, social network IDs, or cookies may be used. Each identifier may be associated with a human user. These unreliable IDs can be used to track the activity of the corresponding hosts. | 12-09-2010 |
20100312878 | Providing Ring Protection For Access Networks - According to one embodiment, an apparatus comprises one or more hub interfaces and one or more processors. A hub interface is coupled to an access network element of a ring network comprising a number of access network elements. The ring network comprises a pair of rings: a first ring traveling in a first direction and a second ring traveling in a second direction. The processors perform the following for each access network element: facilitate establishing a pair of point-to-point logical connections to couple a access network element to a hub interface at a corresponding dedicated bandwidth, a first connection traveling along the first ring, a second connection traveling along the second ring; facilitate establishing a pair of tunnels on the pair of point-to-point connections; and utilize the tunnels to protect the ring network. | 12-09-2010 |
20100312881 | SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - A site controller adapted to be used in an automated monitoring system for monitoring and controlling a plurality of remote devices via a host computer connected to a first communication network is provided. The site controller is configured for controlling communication with the host computer and a plurality of communication devices that define a second communication network associated with the plurality of remote devices. Briefly described, in one embodiment, the site controller comprises a transceiver configured to communicate with the plurality of communication devices via the second communication network; a network interface device configured to communicate with the host computer via the first communication network; and logic configured to: manage communication with each of the plurality of communication devices, via a first communication protocol, based on one or more communication paths for each of the plurality of communication devices, each communication path comprising one or more communication devices involved in the communication link between the transceiver and each of the plurality of communication devices; and manage communication with the host computer via a second communication protocol. Other aspects, features, and embodiments are also claimed and described. | 12-09-2010 |
20100312882 | CALL PROCESSING TIME MEASURING DEVICE, CALL PROCESSING TIME MEASURING METHOD, AND CALL PROCESSING TIME MEASURING PROGRAM - To enable the measurement of service time actually spent on the proceeding of a message out of the proceeding of messages. When a measurement-target message detecting device detects a measurement-target message, a latest transmission instruction device requests a response request message transmitting module to transmit a response request message immediately before the measurement-target message to a measurement-target node. Further, an immediate transmission instruction module requests the response request message transmitting module to transmit the response request message immediately after the measurement-target message to the measurement-target node. The response request message transmitting module transmits the response request which is a message to request a response according to each transmission request. A response message received time recording module records the received time of each of the response messages from to the measurement-target node. A processing time computing module computes the difference of the received time of each of the response messages. | 12-09-2010 |
20100312889 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, INFORMATION RECORDING MEDIUM, AND PROGRAM - In order to detect a fraudulent action, such as an attempt of invalidating a result of a match-up through a communication in a communication match-up game by changing the setting of a router device, in a communication system, a first terminal device ( | 12-09-2010 |
20100318647 | System and Method to Determine Network Usage - Systems and methods to measure network usage are provided. A particular method includes collecting first usage data from a first network device of a network at a network usage tracking system. The first network device determines the first usage data based on an inband measurement of data passing through the first network device. The method includes collecting second usage data from a second network device of the network at the network usage tracking system. The first network device and the second network device are different network devices. The method includes matching the first usage data and the second usage data to user accounts. The network usage data is determined based on the first usage data, the second usage data, and the user accounts. | 12-16-2010 |
20100318648 | Selective Instrumentation of Distributed Applications for Transaction Monitoring - Systems and methods provide a selective instrumentation strategy for monitoring the progress of transactions in a distributed computing system. The monitoring of the transactive processing of jobs is considered through a collection of computer operating stages in a distributed system, using limited information. The monitoring is performed by observing log records (or footprints) produced during each stage of processing in the system. The footprints lack unique transaction identifiers resulting in uncertainties in monitoring transaction instances. The processing stages are selective instrumented to reduce monitoring uncertainty under the given constraints such as limited budget for instrumentation cost. | 12-16-2010 |
20100318649 | CUSTOMER INTELLIGENCE IN A CLOUD OPERATING ENVIRONMENT - Computer-readable media, computer systems, and computing devices for providing customer intelligence data to a developer of an application that runs on a cloud operating environment associated with an online services provider. The online services provider collects customer information about customers, each of whom is identified by a customer ID. A developer uploads an application, having a corresponding application ID, and manages the application using resources associated with the cloud operating environment. An analysis module creates a three-way mapping between the application ID, customer IDs corresponding to customers that use the application, and customer intelligence data associated with the customer IDs. Using this mapping, the system presents the developer with customer intelligence information based on the customer intelligence data. | 12-16-2010 |
20100318650 | METHOD AND DEVICE FOR AGILE COMPUTING - A method for operating a group of nodes in a system for agile computing comprising a coordinator node and a first computation node communicating via a connection, and wherein the first computation node is adapted to perform a task for the coordinator node is provided. The method comprises the steps of: monitoring at least one operating parameter indicating the quality of the connection between the two nodes; determining a quality parameter based on the operating parameter, wherein the quality parameter indicates the quality of the connection between the two nodes; and transferring information from the first computation node to the coordinator node, when the value of the quality parameter falls within a transfer interval, wherein the information comprises information about a part of a task performed by the first computation node. | 12-16-2010 |
20100318651 | Network Communication System With Monitoring - The present invention is directed to a network communications system including a data communication path; a user communication device; a tapping device; and a rendering device. The user communications device (for example, a personal computer, a Blackberry type device) is structured, connected and/or programmed to receive web pages from the Internet over a data communication path. The tapping device is structured, located and/or connected to receive the communications and to send the network communication pages a rendering device. The tapping device and the rendering device are both separate from the user communications device. The rendering device converts the visual communications into corresponding bit maps. Preferably, the rendering device permanently stores the bit maps to a data storage device and/or displays the bit maps on a display device. In embodiments where the bit maps are permanently stored, the rendering device preferably compresses the bit maps. | 12-16-2010 |
20100318652 | APPARATUS AND METHODS FOR REAL-TIME MULTIMEDIA NETWORK TRAFFIC MANAGEMENT & CONTROL IN WIRELESS NETWORKS - The invention is directed to network management systems and methods that provide substantially real-time network management and control capabilities of multimedia streaming traffic in telecommunications networks. The invention provides pre-emptive and autonomous network management and control capabilities, and may include shared intelligence of embedded systems—Heterogeneous Sensor Entities (HSE) and the Sensor Service Management (SSM) system. HSEs are distributed real-time embedded systems provisioned in various network elements. HSEs performs fault, configuration, accounting, performance and security network management functions in real-time; and real-time network management control activations and removals. SSM facilitates automated decision making, rapid deployment of HSEs and real-time provisioning of network management and control services. The service communication framework amongst various HSEs and the SSM is provided by the Heterogeneous Service Creation system. The proposed network management procedure provides real-time network management and control capabilities of multimedia traffic in wireless networks and clusters of independent networks respectively. | 12-16-2010 |
20100318653 | INFORMATION OBTAINING ASSISTANCE APPARATUS AND METHOD - An information obtaining assistance apparatus including: a storage to store system environment information on an information processing system and obtaining method information on one or more methods of obtaining information; and a processor to create presentation information that is based on the system environment information and the obtaining method information and to present a method of obtaining target information of the information processing system. | 12-16-2010 |
20100325258 | CAPTURING A COMPUTING EXPERIENCE - The described implementations relate to capturing a computing experience. In one case, a user session capture tool can launch a remote user session where a user-interface and user inputs are gathered from a single computing device. Remote user session data produced by the remote user session can be analyzed to determine user activity. | 12-23-2010 |
20100325259 | Supervised Access Computer Network Router - A system for monitoring and regulating computer usage on a local network is disclosed. Computers on a network are configured with a client activity monitoring module that collects activity information including screen captures, keyboard activity, and/or information relating to network communications and sends the collected activity information to a network activity monitor for storage and later retrieval. Each computer on the local network periodically verifies that its client activity monitor module is operable. If a computer fails to send such verification, the system restricts network access by that computer, thus enforcing compliance with the activity monitoring system. The system further provides means for automatically displaying the collected activity information, including through screen savers, automatically changing desktop background images, and pop-up or sidebar windows. The system thus enables review of computer activities for appropriateness by both supervisors or parents as well as by peer users without requiring the reviewer to take affirmative steps to retrieve the activity information. | 12-23-2010 |
20100325260 | METHOD AND APPARATUS FOR MESSAGE ROUTING OPTIMIZATION - An approach is provided for optimizing message routing without repeatedly resolving a home location. A login request from a user equipment associated with a resource identifier is received. The user equipment is configured to operate within a network including a plurality of clusters. The resource identifier of the user equipment is modified to include home cluster information indicating a corresponding one of the clusters serving the user equipment. | 12-23-2010 |
20100325261 | System and Method to Manage Information Handling System Resources in Virtual Machine Infrastructure - A method can include monitoring a proportion of a particular type of information handling system resource used by a particular virtual machine of a plurality of virtual machines. The particular virtual machine can be accessible to a thin client information handling system via a communications broker. The method can include sending first data to the communications broker, the first data indicating the proportion of the particular type of information handling system resource used by the particular virtual machine, and receiving second data from the communications broker. The second data can indicate that a greater or lesser amount of the particular type of information handling system resource is to be allocated to the particular virtual machine. The method can include automatically allocating the greater or lesser amount of the particular type of information handling system resource to the particular virtual machine in response to the second data. | 12-23-2010 |
20100325262 | USING TRANSPORT-INDEPENDENT RESOURCE STATUS - The present invention extends to methods, systems, and computer program products for using transport-independent resource status. Embodiments of the invention provide a mechanism for implementing a new protocol for performing resource request status updates that maintains the benefits of existing protocol (e.g., HTTP) conventions while being usable with arbitrary transport protocols. Additionally, the new protocol works with a variety of different message exchange patterns. The use of the protocol can be hidden behind a programming model that normalizes transport-specific resource status protocols, such as, for example, HTTP, with transport-independent resource status protocols, such as, for example, with a SOAP binding of the described protocol. As such, embodiments of the invention provide resource status updates over an arbitrary network transport protocol whose format and message exchange pattern is decoupled from the definition of the application. | 12-23-2010 |
20100325263 | SYSTEMS AND METHODS FOR STATISTICS EXCHANGE BETWEEN CORES FOR LOAD BALANCING - Systems and methods for consolidating metrics and statistics used for load balancing by a plurality of cores of a multi-core intermediary are disclosed. A timer operating on each packet engine of each core in a multi-core system may expire. A consolidator may store, responsive to expiration of the timer, a set of counter values from each of the packet engines to a first storage location. The consolidator may send to each packet engine a message to update the set of counter values. The consolidator may, upon completion of updating the set of counter values by the packet engines, send a second message to the packet engines that includes a consolidated set of counter values determined based on the updated set of values from each packet engine. Each packet engine may establish settings and parameters for load balancing based on the consolidated set of counter values. | 12-23-2010 |
20100325264 | MEDIA RESOURCE STORAGE AND MANAGEMENT - Provided are computer-implemented methods and systems for performing media resource storage and management. The computer-implemented method and system implemented as a request manager is capable of monitoring requests for media resources in a content delivery network. For each monitored request, the request manager determines whether to generate a multifile for the requested media resource. For example, the request manager can first determine whether the media resource is eligible for multifile generation. If eligible, the request manager then determines whether the media resource has reached a popularity threshold. If the media resource has reached the popularity threshold, the request manager initiates generation of the multifile for the requested media resource. Generally, the generated multifile is stored in a storage system associated with the content delivery network. | 12-23-2010 |
20100325265 | METHOD AND SYSTEM OF MANAGING AND/OR MONITORING DISTRIBUTED COMPUTING BASED ON GEOMETRIC CONSTRAINTS - A method for managing distributed computing. The method comprises estimating, for each of a plurality of local computing nodes, a distribution of multidimensional values in a space. Each multidimensional value is calculated according to a plurality of locally monitored parameters. The method further includes calculating safe zones in the space where each safe zone is defined according to a respective estimated distribution under a global geometric constraint in the space and setting local geometric constraints for the local computing nodes according to the respective safe zones. Each local geometric constraint is defined such that a detection of at least one monitored multidimensional value violating it by a respective local computing node induces a communication event between the respective local computing node and one or more central computing nodes. | 12-23-2010 |
20100325266 | WEB SERVICE PROCESSING METHOD FOR A WEB SERVER PROVIDING DEVICE, AND A WEB SERVICE PROVIDING DEVICE - A web service processing method for a web server providing device, and a web service providing device enable eliminating the process delay that occurs the first time a web service is accessed. A web service provider | 12-23-2010 |
20100325267 | METHOD AND APPARATUS FOR NETWORK OPTIMIZATION USING SON SOLUTIONS - A method, an apparatus, and a computer program product for wireless communication are provided in which a communication event is detected, one or more aspects of the detected communication event are analyzed and at least one of the one or more aspects of the detected communication event is stored on an user equipment in a log. | 12-23-2010 |
20100325268 | SYSTEMS AND METHODS FOR SPILLOVER IN A MULTI-CORE SYSTEM - The present invention is directed towards systems and methods for spillover threshold management in a multi-core system. A pool manager divides the spillover threshold limit of connections for vServers into an exclusive quota pool and a shared quota pool. Each vServer operating on a core is allocated an exclusive number of connections from the exclusive quota pool. If a vServer wishes to create connections beyond its exclusive number, the vServer can borrow from the shared quota pool. When the vServers are using at least a first predetermined threshold of their exclusive number of connections and the number of available connections in the shared quota pool has reached a second predetermined threshold, the multi-core system establishes a backup vServer. | 12-23-2010 |
20100325269 | PERSONALIZED SERVICE SYSTEM BASED ON SMART CARD AND METHOD THEREOF, AND SMART CARD APPLIED TO THE SAME - Disclosed are a personalized service system based on a smart card, a method thereof, and a smart card applied to the same. Personalized information is extracted through the data mining by collecting user input information stored based on an SCWS (smart card web server) function, access history information for a site requested by a user, call history information of a user terminal stored based on a USIM (universal subscriber identity module), and base station information received from the user terminal. Since the personalized information is obtained based on the SCWS function and the USIM installed in the smart card, various regulations related to personalized information are circumvented, enabling provision of various personalized services. | 12-23-2010 |
20100325270 | AIR CONDITIONING MANAGEMENT APPARATUS AND AIR CONDITIONING MANAGEMENT SYSTEM - An air conditioning management apparatus is provided which can remotely monitor and control air conditioning equipment with ease of viewing a home page while securing security. | 12-23-2010 |
20100325271 | DYNAMIC SERVICE-AWARE FLOW CONTROL IN PACKET NETWORKS - The present invention, including system methods and computer program product, provide the ability to control the flow of traffic into an aggregated trunk port in a network. This is performed by monitoring the trunk port of an aggregation packet switch for congestion and limiting the traffic flowing into the aggregation packet switch through virtual connections with one or more user network interfaces. An access control system executing an access control algorithm monitors the trunk port and controls the user network interfaces to limit the traffic the passes through the trunk port in the event of traffic congestion. Traffic may be limited on the basis of the class of service, the virtual connection, or other parameters. | 12-23-2010 |
20100325272 | METHODS AND SYSTEMS FOR NETWORK TRAFFIC SECURITY - The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic. | 12-23-2010 |
20100325273 | METHOD AND APPARATUS FOR LOCATING CANDIDATE DATA CENTERS FOR APPLICATION MIGRATION - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 12-23-2010 |
20100325274 | Method and System to Connect Multiple SCSI Initiators to a Fibre Channel Fabric Topology Using a Single N-Port - A method and system for connecting multiple initiators to a storage area network (SAN) via a Fibre channel fabric using a single N_port fibre channel switch. The multiple initiators are associated with a common domain identification (DID), each initiator having a unique source identification (SID). The method includes initiating a communication exchange between at least one of the initiators and the SAN, the exchange including transmission of a command frame. The method also includes monitoring the initiated exchange communication exchange, and replacing the unique SID of one of the initiators with an SID of the fibre channel switch. | 12-23-2010 |
20100332641 | PASSIVE DETECTION OF REBOOTING HOSTS IN A NETWORK - Host reboots may be detected passively by tracking and analyzing host initialization events and/or by tracking and analyzing temporal skews in periodic events. Detected host reboots may then be used to determine or help determine whether or not the host has a possible malware infection. | 12-30-2010 |
20100332642 | SYSTEM AND METHOD FOR ANALYZING DOMINO IMPACT OF NETWORK GROWTH - A system and method for analyzing domino impact of network growth including collecting, via a collector module, network information from one or more domains of a communication network. Also, the system and method may include processing, via an analytical module, the network information in order to determine a domino impact of growth of the communication network, wherein processing the network information comprises determining a number of lower network resources and a number of higher network resources within plurality types of networks in the one or more domains of the communication network and outputting, via a presentation module, the processed network information collected from the one or more domains of the communication network. | 12-30-2010 |
20100332643 | Pre-Scheduling the Timelines of Virtual Machines - A host controller pre-schedules the timelines of virtual machines that run on a host cluster. In one embodiment, the host controller uses a plurality of timers to determine the start times of the virtual machines. The host controller starts the virtual machines on the host cluster over a time span according to the configurable timelines recorded in the timers. The start times of the virtual machines can be spread over the time span to prevent a load spike at any particular time instance. The virtual machines are up and running on the hosts by a pre-determined time to provide virtual desktops to remote clients. The timers may be configured as a calendar. | 12-30-2010 |
20100332644 | OPTIMIZATION OF APPLICATION DELIVERY IN A VIRTUAL UNIVERSE - An approach is provided for optimizing delivery of virtual universe applications to users of said virtual universe applications. In one embodiment, there is an optimizing tool, including a ranking component configured to rank types of communication methods based on frequency of utilization of said communication methods by a user. The optimization tool further includes a determining component configured to determine a most desirable optimization technique for each available communication method used the most by said user. | 12-30-2010 |
20100332645 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT IN A COMPUTING ENVIRONMENT - A method and system for monitoring resources in a network of resources in a computing environment, is provided. One implementation involves discovering resources in the network; constructing a topology model including event information for each discovered resource; providing queries for polling the models for event information, such that the resources need not be polled; executing one or more queries against one or more models; evaluating the query results to ascertain whether or not an event has affected what is considered to be normal for the result of each query; and presenting the evaluation results to enable monitoring of the resources. | 12-30-2010 |
20100332646 | UNIFIED ENTERPRISE LEVEL METHOD AND SYSTEM FOR ENHANCING APPLICATION AND STORAGE PERFORMANCE - A unified enterprise level method and system for enhancing a performance of applications and storage subsystems in a storage network are disclosed. In one embodiment, a method for enhancing the performance of the storage network having applications and storage subsystems includes collecting performance data associated with the applications and the storage subsystems, and generating performance profiles for a set of combinations of the applications and the storage subsystems implemented in the storage network based on the performance data. The method also includes receiving desired performance criteria for an application of the storage network, and applying a performance profile to configure the application and a storage subsystem assigned to the application substantially similar to the desired performance criteria. | 12-30-2010 |
20100332647 | METHOD AND SYSTEM OF UPDATING PRESENCE INFORMATION IN A COMMUNICATION SYSTEM - In implementing a method of updating presence information for a plurality of presentities in a communication system, a presence server: defines a group of presentities that share the same value for a first presence attribute; receives an update of the value of the first presence attribute for one of the presentities in the group; and applies the update of the value to all of the presentities in the group. | 12-30-2010 |
20100332648 | COMPUTATIONAL MODELS FOR SUPPORTING SITUATED INTERACTIONS IN MULTI-USER SCENARIOS - Individuals may interact with automated services as one or more parties, where such individuals may have collective (as well as individual) intents. Moreover, parties may concurrently communicate with the interface, and the interface may have to manage several concurrent interactions with different parties. Single-individual interfaces may be unable to react robustly to such dynamic and complex real-world scenarios. Instead, multi-party interfaces to service components may be devised that identify individuals within a scene, associate the individuals with parties, track a set of interactions of the parties with the service component, and direct the service component in interacting with the parties. A multi-party interface may also detect and politely handle interruptions, and may identify information items about individuals and parties based on context and history, prioritize the intents of the individuals and parties, and triage interactions accordingly. | 12-30-2010 |
20100332649 | CONFIGURING APPLICATION MANAGEMENT REPORTING IN A COMMUNICATION NETWORK - The invention is directed to configuring an application management reporting service for managing a networked application carried over a WAN service without requiring knowledge of a network operator's infrastructure that is providing the WAN service. This capability aims at providing an abstraction from both the architecture of the operator's network and the technical details of its QoS management. | 12-30-2010 |
20100332650 | SYNCHRONIZED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 12-30-2010 |
20100332651 | MESSAGE-BASED COMMUNICATION SYSTEM MONITOR - Message-based communication system monitor, comprising an inspector ( | 12-30-2010 |
20100332652 | Distributed Methodology for Approximate Event Counting - In a method and system for aggregating event information, events are received at a first plurality of nodes in a distributed system. For the events received at each node aggregated attribute information is determined in accordance with two or more rules and stored in distinct first tables, each table storing aggregated attribute information for a respective rule of the two or more rules. At each node of the first plurality of nodes, the two or more distinct first tables are transmitted to a respective node of a second set of nodes in the distributed system. At each node of the second set of nodes, two or more distinct second tables are generated by merging the aggregated attribute information in the tables transmitted to the node. Each rule of the two or more rules is evaluating using the aggregated attribute information obtained from a corresponding table of the second tables. | 12-30-2010 |
20100332653 | IMAGE FORMING APPARATUS AND IMAGE FORMING METHOD - According to one embodiment, an image forming apparatus includes a unit configured to transmit input authentication information of a user or a department to a server apparatus, a unit configured to acquire setting information input, concerning a job allocated to the authenticated user or department, a unit configured to transmit the setting information to the server apparatus and request the sever apparatus to permit printing, a unit configured to receive a provisional limited number of printed sheets from the server apparatus and execute printing, a unit configured to request transmission of a new provisional limited number of printed sheets, a unit configured to receive the new provisional limited number of printed sheets from the server apparatus and execute the printing, and a unit configured to transmit the number of printed sheets to the server apparatus in a predetermined case. | 12-30-2010 |
20100332654 | METHOD AND APPARATUS FOR PROVIDING MOBILE DEVICE INTEROPERABILITY - An apparatus for providing mobile device interoperability with other devices may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured, with the processor, to cause the apparatus to perform at least receiving a frame buffer update request from a remote environment, determining a scan interval defining a first portion of the frame buffer over which scanning to determine data changes is to occur and a second portion over which scanning to determine data changes is not to occur, identifying whether a data change occurs in the first portion of the frame buffer by comparing relatively newer data to relatively older data, and updating a selected portion of the frame buffer to the remote environment based on the identifying. A corresponding method and computer program product are also provided. | 12-30-2010 |
20100332655 | CONTENT RECORDING CONTROL METHOD FOR PEERS, AND A DEVICE THEREFOR - A method and apparatus for controlling content recording for a buddy of a management server are provided. The method includes: receiving a recording request message for the buddy according to an external input; determining whether a local recording apparatus of the buddy is in a recording state; and selectively sending a recording start message to a recording apparatus on a network, different from the local recording apparatus of the buddy, according to a result of the determining. | 12-30-2010 |
20110004680 | SYSTEMS AND METHODS FOR UNIFIED MANAGEMENT OF DESKTOP SESSIONS - A method for using standards-based functionality to provide unified management for a plurality of remote desktop sessions includes executing an enhanced management access point on a first physical machine. The method includes monitoring a plurality of desktop sessions including a desktop session executing on one of a second physical machine and a virtual machine executing on the second physical machine. The desktop session provides access to at least one application or file. The method includes determining a first level of activity of the desktop session. A level of activity may be one of: active, inactive, hibernating and standby. The method includes receiving a notification of a migration of the desktop session to a third physical machine, the migrated desktop session maintaining the first level of activity. The method includes instructing a management component on the third physical machine to modify the migrated desktop session to a second level of activity. | 01-06-2011 |
20110004681 | Methods and Apparatus for Enhanced Overlay State Maintenance - Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates. | 01-06-2011 |
20110004682 | DETERMINING PROJECTION WEIGHTS BASED ON A CENSUS DATA - Projection weights may be configured to project usage of a first set of resources by users of a first group of clients systems to usage of the first set of resources by users in a larger group of users. Users of the first group of client systems may be a sample of a larger group of users that access resources on the network using client systems. The projection weights may be determined based on a first set of usage data and a second set of usage data. The first set of usage data may be determined based on information received from monitoring applications installed on a first group of client systems. The second set of usage data may be determined based on information received from a second group of client systems sent as a result of beacon instructions included with a second set of resources accessed by the second group of client systems. | 01-06-2011 |
20110004683 | Systems and Methods for Granular Resource Management in a Storage Network - In accordance with some aspects of the present invention, systems and methods are provided for dynamically and/or automatically selecting and/or modifying data path definitions that are used in performing storage operations on data. Alternate data paths may be specified or selected that use some or all resources that communicate with a particular destination to improve system reliability and performance. The system may also dynamically monitor and choose data path definitions to optimize system performance, conserve storage media and promote balanced load distribution. | 01-06-2011 |
20110004684 | Prediction Of Systems Location Inside A Data Center By Using Correlation Coefficients - The present invention enables location prediction of a system in a data center. Specifically, the invention monitors resources from the systems in the data center and measuring points in the data center. A system resource monitors the internal conditions of the system. A data center measuring point is any device which provide environment or data center resource information of the data center. The conditions obtained from the system resources and measuring points are correlated, and then utilized to predict the location of the system in the data center. For example, by correlating heat sensor values and bandwidth measurements, the prediction mechanism may be able to predict that a system that has a spike in network usage and is at fully capacity is near measuring points that detected an increased heat sensor value and detected increased bandwidth usage at the same time that the machine had its spike in network usage. | 01-06-2011 |
20110010445 | MONITORING APPLICATION SERVICE LEVEL OBJECTIVES - Embodiments of the invention provide a technique to model applications and storage used thereby, and to monitor application service level objectives. An aspect is directed to a method for managing a computer system which includes at least one host computer and at least one storage system which are connected via a network, the at least one host having an application running thereon. The method comprises modeling an application running on a host of a computer system as an application object, which includes associating storage utilized by the application with the application object; monitoring one or more application-based storage service level objectives for the storage utilized by the application, each service level objective being defined by a user to be threshold specific to the application; and alerting the user when any of the one or more service level objectives being monitored is violated. | 01-13-2011 |
20110010446 | Program and Method for Adaptively Maintaining a Local Peer Group in a Dynamic Environment - A method for maintaining a local peer group (LPG) for supporting communications among vehicles. The LPG is formed from a plurality of vehicles. Each vehicle is equipped with a wireless communications device. One of the vehicles is selected as a group header node (GH). The method comprises receiving periodically a heartbeat packet from the GH, the heartbeat packet including a maximum hop count, and a heartbeat cycle, forwarding the heartbeat packet until the maximum hop count is reached after waiting for a first random relay delay, which is less than a maximum allowable adjustable value, replying to the heartbeat packet with a membership report packet, forwarding a membership report packet towards the GH, and adding a vehicle that submitted the membership report packet to a LPG membership as a member node of the LPG if the membership report packet is new or updating information for a member node. | 01-13-2011 |
20110010447 | AUTO GENERATED AND INFERRED GROUP CHAT PRESENCE - A system can include multiple individual status identifiers that correspond to multiple users and a group status identifier that corresponds to a group with which the users are associated. A status identifier update module can update the group status identifier based on a change to at least one of the individual status identifiers. | 01-13-2011 |
20110010448 | LEVERAGING AND INFLUENCING COMPUTING NETWORK ACTIVITY - A system and method for associating benefit with the activities of a computing system, and for influencing the behaviour of users of the computing system, the system and method comprising a computing system having one or more subseribable actions, optionally associated with the functionality of the computing system; optionally, a means for associating additional information, activity or events with one or more of the one or more subseribable actions, the additional information, activity or events being associated with one or more third parties; a means for detecting and recording information relating to activity that is related to: the one or more subscribable actions, the one or more first users triggering the one or more subscribable actions, or a combination thereof; and optionally, a means for communicating or making available to one or more second users information relating to: the subseribable action, the one or more first users and, if necessary, the associated information, activities or events. | 01-13-2011 |
20110010449 | METHOD AND SYSTEM FOR SIMPLIFIED NETWORK WIDE TRAFFIC AND/OR FLOW MONITORING IN A DATA NETWORK - Method and system for providing dynamic network data traffic monitoring including monitoring a data network, detecting a change in the data network, initiating a span session based on the detected change in the data network, and dynamically modifying network configuration based on the detected change in the data network is disclosed. | 01-13-2011 |
20110010450 | APPARATUS AND METHOD FOR MONITORING AND AUDITING ACTIVITY OF A LEGACY ENVIRONMENT - An apparatus and a method for monitoring and auditing activity of a legacy environment. The apparatus includes an analyzer and a mirror manager. The analyzer is operative to analyze intercepted packets conveyed by entities in a network and to generate analyzed data based on information associated with at least some of the packets. The analyzed data is indicative of sessions. The mirror manager is responsive to the analyzed data for generating data representative of mirror sessions, each mirror session corresponding to a session. | 01-13-2011 |
20110010451 | Handheld Media Device For Displaying Computer Status Information - A system comprises a personal computer (PC) and a handheld media device (HMD) communicably coupled to the PC. The PC transfers status information to the HMD and the HMD displays the status information. The HMD is capable of displaying the status information using at least one of graphics or text. The status information includes information pertaining to the status the PC. | 01-13-2011 |
20110010452 | System and method for establishing a point-to-point connection - A communications system including a communications network, a multiplicity of communications terminals, a monitor operative to monitor whether or not a specific user is connected to the communications network, a point-to-point connection enabler operative to conditionally allow at least one seeking user to establish a point-to-point connection with at least one other user who is in a set of sought users and an authorization request manager operative to transmit an authorization request to the at least one other user, when the at least one other user is connected to the communications network, receive a response to the authorization request from the at least one other user and transmit the response to the point-to-point connection enabler prior to the point-to-point connection enabler allowing establishment of the point-to-point connection. | 01-13-2011 |
20110016204 | SYSTEMS, METHODS, AND MEDIA FOR IDENTIFYING AND ASSOCIATING USER DEVICES WITH MEDIA CUES - Systems, methods, and media for identifying and associating user devices with media cues are provided. In some embodiments, a plurality of data streams from a plurality of endpoints is received. At least one media segment is then received from a user device. It is determined whether the at least one media segment from the user device corresponds with one of the plurality of data streams from the plurality of endpoints. In response to being unable to match the at least one media segment, a media cue is inserted into one of the plurality of data streams. In response to detecting that the media cue in that data stream is received by the user device, identification information is transmitted to the user device that associates the user device with one or more services on a communications server. | 01-20-2011 |
20110016205 | MULTIPLE INSTANCE COMMERCIAL BROWSER WEBSITE TEST AGENT - A website test environment invokes multiple instances of a commercial browser, and captures invocations of browser operations for gathering performance data without interference from other instances or multiple occurrences of the operating system (OS). Commercial browsers often employ constraints that assume only a single instantiation is executing on a particular machine. Configurations allow each instance to present as a separate user, thus avoiding conflicts that may arise from temporary files and network connections, for example. Each browser instance operates as a performance agent and dynamically links with a set of entry points for accessing performance related browser operations. As each agent invokes native (OS specific) machine functions for network access via particular entry points, configurations disclosed herein redirect the entry points to a collection layer of instructions (code) for capturing performance data in addition to invoking the native OS function called for by the browser operation. | 01-20-2011 |
20110016206 | SYSTEMS AND METHODS FOR CREATING USER INTEREST PROFILES - Example methods include monitoring Internet traffic for a user, analyzing content of the Internet traffic, correlating the analyzed content with a simplified classifier set, ranking each correlated simplified classifier in the simplified classifier set, and storing the ranked simplified classifiers in a user interest profile for the user. Customer premise equipment may include a residential gateway, such as a wireless router, and user equipment such as a personal computer. Example systems may be configured from customer premise equipment or Internet service providers to generate user interest profiles in accordance with example methods. | 01-20-2011 |
20110016207 | Selective Reporting Of Upstream Transaction Trace Data - Technology for monitoring transactions in a computing environment is disclosed. Execution of a transaction by a first application is monitored by a first software entity executing on a first computing device. Performance data that relates to execution of the transaction by a first application is generated. Execution of the transaction by a second application is monitored by a second software entity. The transaction is executed by the second application based on a request from the first application. A determination is made, based on the monitoring, that the first software entity should report the performance data to a third software entity that executes on a second computing device. Based on determining that the first software entity should report the performance data, data is propagated that indicates that the first software entity should report the performance data. The first software entity reports the performance data to the third software entity. | 01-20-2011 |
20110016208 | APPARATUS AND METHOD FOR SAMPLING SECURITY EVENT BASED ON CONTENTS OF THE SECURITY EVENT - There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof. | 01-20-2011 |
20110016209 | NETWORK CHARACTERISATION - Methods and systems for assigning information indicative of a network characteristic to one of a plurality of data units traversing a path across a network, said data units having associated therewith values indicative of said network characteristic, said path having at least one portion passing through a lower-capability region and at least one portion passing through a higher-capability region, said lower-capability region being a region in which information indicative of said network characteristic may be represented by values having a first resolution, and said higher-capability region being a region in which information indicative of said network characteristic may be represented by values having a second resolution, said second resolution being greater than said first resolution, said one data unit being a data unit entering said higher-capability region. | 01-20-2011 |
20110016210 | METHOD AND SYSTEM FOR PROVIDING AUTOMATIC DISABLING OF NETWORK DEBUGGING - An approach is provided for automatic disabling of network debugging. A debugging command is received for initiating debugging of a router that includes a processor configured to execute a debugging procedure. Utilization of the processor is monitored. A determination is made whether the utilization exceeds a utilization threshold. The debugging procedure is disabled based on the determination that the utilization threshold is exceeded. | 01-20-2011 |
20110016211 | MONITORING SYSTEM - A monitoring system includes a center device and terminal devices. The center device is configured to return a first response if receiving a first request from a terminal device. At this point, if the center device has a second request to at least one of the other terminal devices, the center device includes the second request and identification information of a corresponding terminal device in the first response. If receiving the first response, the terminal device transfers the second request to the corresponding terminal device. | 01-20-2011 |
20110016212 | REMOTE MONITORING SYSTEM - A first relay ( | 01-20-2011 |
20110016213 | MONITORING SYSTEM - A monitoring system includes a center device and terminal devices. The center device is configured to return a first response if receiving a first request from a terminal device. At this instance, if having a request to another terminal device, the center device includes designation information for designating said another terminal device in the first response. The terminal device receiving the first response, if the designation information is included in the first response, transfers the designation information to a corresponding terminal device. The corresponding terminal device transmits a second request to the center device if receiving the designation information. Thereby, the center device can promptly transmit the request with respect to said another terminal device to the terminal device. | 01-20-2011 |
20110022697 | DYNAMIC RESOURCE COLLABORATION BETWEEN NETWORK SERVICE PROVIDERS - Service providers capable of dynamic resource collaboration and corresponding dynamic resource collaboration techniques are provided. In one embodiment, a network service provider includes a service server that processes service requests, a resource monitoring unit that monitors available computing resources of the service server and generates a resource request for supplementary computing resources from one or more collaborating network service providers based on the result of the monitoring, and a resource collaboration unit acquires supplementary computing resources from at least one of the collaborating network service providers. | 01-27-2011 |
20110022698 | DYNAMIC MANAGEMENT OF MAINTENANCE ASSOCIATION MEMBERSHIP IN A COMPUTER NETWORK - In one embodiment, a new maintenance end-point (MEP) may join a particular network (and initiate its sending of continuity check messages, “CCMs”) by transmitting one or more join announcement messages (JAMs). When the JAMs are received by remote MEPs in the particular network, the new MEP may be added to a configured list of MEPs within the particular network at each remote MEP without an alarm. Also, a current MEP may leave the particular network (and cease its transmission of CCMs) by transmitting one or more leave announcement messages (LAMs), which request removal of the current MEP from the configured list at each of the remote MEPs without alarms. Otherwise, transmission of CCMs (that are not JAMs or LAMs) may result in alarms being generated by the MEPs in the particular network for unexpected MEPs or missing MEPs, accordingly. | 01-27-2011 |
20110022699 | Method And System For PHY Initiated Wake-Up In Energy Efficient Ethernet Networks - One or both link partners coupled via an Ethernet link may comprise a PHY device operable to initiate a wake-up interval. The PHY device may monitor parameters that may indicate Ethernet link status. Exemplary parameters may comprise a timer, communication performance metrics and/or configuration parameters. From a low power mode, the PHY device may generate a wake state idle symbol based on the monitoring and may communicate it to a local and/or a remote MAC. The local and/or remote MAC may establish a wake-up interval. The wake-up interval may comprise synchronization, circuit adaption and updating of communication parameters, which may enable control of noise cancellation functions and/or equalization functions. One or both of the link partners may transition to a low power mode after the wake-up interval and/or to an active state after the wake-up interval. | 01-27-2011 |
20110022700 | Real World Network Testing Combining Lower Layer Network Tests, Application Layer Tests and Interdependent Interactions - Combining lower layer network tests and upper layer network tests is disclosed. A method includes receiving a user selection to create an upper layer test and a lower layer test, receiving upper layer test information and lower layer test information, displaying a first timeline showing the activity of the upper layer test in a first pane and a second timeline showing the activity of the lower layer test in a second pane. Synchronization between the lower layer tests and upper layer tests may be defined. The method allows for observing and ascertaining the impact of the lower layer tests on the upper layer tests. The method may be implemented in software, stored on a storage medium and performed on a network testing system that includes one or more network cards and in one or more network testing systems. | 01-27-2011 |
20110022701 | METHOD AND APPARATUS OF FILTERING STATISTIC, FLOW AND TRANSACTION DATA ON CLIENT/SERVER - Network traffic filtering is provided to enable gathering of data and statistics related to client/server traffic corresponding to valid and desired client to server/server to client traffic. | 01-27-2011 |
20110022702 | MECHANISM FOR DETECTING AND REPORTING TRAFFIC/SERVICE TO A PCRF - A method implemented by a policy server operating on a network to which is connected a device that performs a data packet inspection function, the method involving: sending a first message over the network from the policy server to the device, the first message instructing the device to detect an occurrence of a particular network traffic or service taking place over a connection on the network and to send a notification to the policy server upon detecting the occurrence of that particular network traffic or service; at the policy server receiving a notification from the device that the device has detected the occurrence of that particular network traffic or service; and in response to receiving the notification, sending a second message over the network from the policy server to a network component, the second message containing information associated with the notification. | 01-27-2011 |
20110022703 | METHOD AND SYSTEM FOR ESTIMATING A NUMBER OF USERS OF A WEBSITE BASED ON LOSSY COMPRESSED DATA - The invention relates to a method and system for estimating a number of users of a website. According to the method, it is repeatedly determined that the website is accessed by an entity and data dependent on the entity is determined and stored. The stored data is repeatedly compressed using a lossy compressing algorithm and based on the compressed data a number of users of the website is estimated. | 01-27-2011 |
20110022704 | METHOD AND SYSTEM FOR COLLECTING INFORMATION ON A USER VISIT - The present invention provides a computer implemented method and system for collecting information on a user visit for web analytics. An information collection module is sent to a client in response to a page opening request from the client. The information collection module is for collecting additional information on user visit of the client. Additional information on user visit and basic information on user visit of the client is obtained from a web service request. A web beacon request is generated based on the obtained information. The invention adopts a non-intrusive information collection manner that does not require modifying code of a web application and thus, is much simpler, feasible, and cost-effective than prior art. Further, centralized collection and management for the information on user visit can be implemented. Thus, it is more flexible and convenient for maintenance and optimization. | 01-27-2011 |
20110022705 | METHOD AND APPARATUS FOR SUBSCRIPTION-BASED BANDWIDTH BALANCING FOR INTERACTIVE HETEROGENEOUS CLIENTS - A method or system for enabling client devices connected to a network to subscribe to a one or more multimedia signals available in a selection of bandwidths, based on an analysis of capabilities of the client, the quality of the connection, and the real-time changes in the ability of the client to process the signal. | 01-27-2011 |
20110022706 | Method and System for Job Scheduling in Distributed Data Processing System with Identification of Optimal Network Topology - The method of the present invention provides an automatic and optimised selection of the network topology for distributing scheduling of jobs on the computers of the modified network topology. The automatic and optimised selection of the network topology starts from the current topology and a desired number of additional connections. In this way the method of the present invention provides a higher convergence speed for the modified consensus algorithm in comparison, e.g., to a simple ring network. The method exploits the so called small-world networks. Small-world networks are more robust to perturbations than other network architectures. The preferred embodiment provides a workload scheduling system which is highly scalable to accommodate increasing workloads within a heterogeneous distributed computing environment. A modified average consensus algorithm is used to distribute network traffic and jobs amongst a plurality of computers. | 01-27-2011 |
20110022707 | HIERARCHY FOR CHARACTERIZING INTERACTIONS WITH AN APPLICATION - Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components). | 01-27-2011 |
20110022708 | METHOD AND DEVICE FOR MEASURING THE TEMPORAL DRIFT OF AN ITEM OF ELECTRONIC EQUIPMENT CONNECTED TO A NETWORK - A method of measuring temporal drift of an electronic apparatus linked to a network and capable of providing a time-stamp including capturing at least two messages including a gauge reference time circulating around the network, and determining precision of the time-stamping function of the apparatus as a function of the gauge reference time and of a time-stamp provided by the apparatus. The apparatus can be a network analyser and each message captured includes at least one Ethernet frame including a gauge reference time in accordance with NTP (Network Time Protocol). | 01-27-2011 |
20110022709 | Method, System and Game Server for Recommending Game Room - A method, system and game server for recommending a game room are disclosed. The method includes: a speed measuring server measuring a network speed from a network user logging on an IDC in which the speed measuring server is located to the IDC, counting an average of network speeds from all network users in a same subnet to the IDC; the speed measuring server sending the average of network speeds to a QoS center, the QoS center allocating, according to the average of network speeds and a predetermined principle, a QoS level to a communication link from each subnet to each IDC, sending the QoS level to a game server in each IDC; and the game server sending information of a recommended game room to a game client according to the QoS level of the communication link from the subnet to which the game client belongs to each IDC. | 01-27-2011 |
20110022710 | LOCATION INFORMATION SERVICE METHOD - A location service method in a terminal includes: receiving a message including a first parameter with respect to an inner area determined based on a particular geographic area and a second parameter with respect to an outer area from a server; and checking whether or not the terminal leaves the particular geographic area through the parameters of the inner area and the outer area. | 01-27-2011 |
20110029657 | TRACKING HIGH-LEVEL NETWORK TRANSACTIONS - A system and method of tracking high-level network transactions. At least one switching node on a network may collect low-level data packets, the low-level data packets forming collectively a corresponding stream of high-level messages as parts of high-level transactions involving network resources of the network. Identifiers of the network resources in the network serving the high-level transactions may be identified from the low-level data packets. The data content of the high-level messages may be determined. The high-level messages may be grouped into groups of high-level messages having similar data content. Commonalities in the occurrences of high-level messages having different data content may then be identified. | 02-03-2011 |
20110029658 | SYSTEM AND METHODS FOR PROVIDING A MULTI-DEVICE, MULTI-SERVICE PLATFORM VIA A CLIENT AGENT - The solution of the present application provides many types and forms of resources, such as products or services, to an environment of heterogeneous devices. An agent and centralized service may communicate to deliver an optimum package of resources to a device. Each device may include an agent that collects information important to determining the appropriate resources for the device and understanding the environment the devices are contributing to. The information may be stored and analyzed in a cross device knowledge base, and the knowledge base may be consulted to determine resources appropriate for devices. The agent and centralized service may engage in pro-active alerting and provisioning of services, based on any collected information, to minimize the burden of resource procurement on the customer. After delivery of resources, the agent and centralized service may also perform updating, repairing, and healing functions for the resources. Resources may be aggregated into a cohesive platform to be combined and delivered in an optimum manner, and resources may also be maintained and monitored to ensure their quality via escalation or remedial action. Devices may be connected to the resources through intelligent routing. | 02-03-2011 |
20110029659 | Method and System for Network Proxy Services for Energy Efficient Networking - A network device may provide power-aware network proxy services to one or more resources internal to the network device and/or one or more other network devices that may transition to corresponding power saving states. The power saving states may comprise disabling, shutting down, and/or reducing power consumption. The power-aware network proxy service may comprise handling at least some of network communication on behalf of serviced internal resources and/or other network devices, and monitoring for conditions to transition the serviced internal resources and/or other network devices from the corresponding power saving states. The power-aware network proxy services may be provided via a network interface controller (NIC) in the network device. Determining when to transition serviced resources and/or other network devices from corresponding power saving states may be based on monitoring and/or processing of traffic handled on behalf of the serviced resources and/or other network devices during power-aware network proxy servicing. | 02-03-2011 |
20110029660 | METHOD FOR MONITORING AND PROVIDING INFORMATION OVER A PEER TO PEER NETWORK - A pseudonode for deployment on a peer to peer network. The pseudonode is programmed for monitoring the peer to peer network to receive search requests therefrom, optionally comparing each said received search with said list of data objects, and to respond to such requests. The response may include advertising; the advertising may be selected in response to the request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method further includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode, and responding to substantially each node representing an acquired ID. | 02-03-2011 |
20110029661 | Enforcement of Network Service Level Agreements - A service level agreement may be imposed by a service provider, such as an Internet service provider, that may include, e.g., a volume limitation and a bandwidth limitation. One or more limitations of the service level agreement may be enforced or modified in response to a triggering event. For example, a bandwidth limitation on a network subscriber may be enforced or modified based on how much data is consumed by the subscriber. | 02-03-2011 |
20110029662 | Isolating Local Performance Variation in Website Monitoring - Systems and methods are provided for isolating performance variation in website monitoring. A set of geographically diverse monitoring agents are identified and a subset of baseline agents is selected from these monitoring agents. The baseline agents are those agents that are geographically close to the target website or otherwise enjoy reliable communications with the target website and are therefore less affected by network latencies. The frequency at which a target website is monitored is weighted in favor of the baseline agents in order to get an accurate baseline metric for the target website while also obtaining information regarding global accessibility of the website from the geographically disperse monitoring agents. The variations in sample frequency can be optimized for each particular set of baseline agents. The set of baseline agents can be pre-assigned or dynamically identified based on an analysis of the performance variation from each of the monitoring agents. | 02-03-2011 |
20110029663 | METHOD OF GATHERING INFORMATION RELATED TO ACTIVITY OF A USER AND A DATA PROCESSING SYSTEM PROGRAM PRODUCT - Information related to activity of a user may be provided using a method or a data processing system program product to perform the method. In one embodiment, the method includes sending a first view request to a first electronic site, receiving a first view from the first electronic site, and first information related to the first view request to a second entity that is different from the first entity. In another embodiment, a data processing system program product may perform a method of sending information related to a view request from the user for an electronic site. The information is to be sent to an entity that is different from an entity that substantially controls or owns the electronic site and different from an Internet service provider of the user, if the user is to use the Internet service provider in accessing the electronic site. | 02-03-2011 |
20110029664 | SYSTEM AND METHOD FOR PEAK FLOW DETECTION IN A COMMUNICATION NETWORK - An adaptive file delivery system and method transmits a data file, such as an audio-video file, over a network or collection of networks in segments, each segment transmitted during a different time period. Each time period has a transmission portion to transmit its associated file segment and a wait portion in which no further interaction with the network occurs regarding the transmitted segment. In some implementations, the duration of the transmission portion of each time period is sufficient to reach a steady-state throughput condition, which allows the traffic load status of the network or networks to be determined from rate measurements of file segment transmissions. A peak flow determination is made to assure that the delivery of file segments does not cause network congestion. The system has spurious peak rejection to avoid the false detection of network congestion. | 02-03-2011 |
20110029665 | DYNAMICALLY CONFIGURABLE SESSION AGENT - A monitoring system captures the behavior of distributed applications and also provides a framework for augmenting functionality of the application in response to user interactions and different states of the application and network. Network events exchanged between an application and an application server are captured and the local client events on the client device are also selectively captured. The different disparate network events and client events are then combined together during a replay operation to simulate the user experience during the previous application session. | 02-03-2011 |
20110029666 | Method and Apparatus for Passively Monitoring Online Video Viewing and Viewer Behavior - Various user behaviors are passively monitored and recorded when a user/viewer interacts with a network video player, e.g. a web video player, while watching an online video clip. For one embodiment, a data collection agent (DCA) is loaded to the player and/or to a web page that displays the video clip. The DCA passively collects detailed viewing and behavior information without requiring any specific input or actions on the part of the user. Indications of user preferences are inferred by user actions leading up to viewing the video, while viewing the video, and just after and still related to viewing the video. The DCA periodically sends this information to a central server where it is stored in a central database and where it is used to determine preference similarities among different users. Recorded user preference information may also be used to rate a video itself. | 02-03-2011 |
20110029667 | Data Retention and Lawful Intercept for IP Services - The method provides a Law Enforcement Agency LEA with retention or interception data related to a target user. At a data retention source node or at an interception control element of a telecommunications network, traffic packets involving the target user are inspected and a plurality of usage data records based on the inspected traffic packets are generated. Each record comprises information relating to a certain service class and to a respective communications stack layer. For each communications session involving a plurality of different communications stack layers, at the data retention source node or, respectively, the interception control element, the plurality of usage data records are provided with a same correlation identity number for correlating the data at the different communications stack layers. Then, the usage data records comprising the correlation identity number to the LEA are sent, for instance to the LI system or the data Retention System, respectively. | 02-03-2011 |
20110029668 | MANAGEMENT OF THE DISTRIBUTION OF CONTENTS - A method of transmitting management information for entities linked to a contents distribution network comprises a registration of entities linked to the distribution network with a notification entity; a detection of at least one event by at least one entity linked to the distribution network; a transmission of information regarding detection of events by said entity linked to the distribution network to the notification entity; and a transmission of management information corresponding to said event by said notification entity to the registered entities linked to the distribution network, wherein said detection comprises the observation and the analysis of signalling messages circulating over the contents distribution network. | 02-03-2011 |
20110029669 | Adjustable Server-Transmission Rates Over Fixed-Speed Backplane Connections Within A Multi-Server Enclosure - Embodiments of the present invention are directed to providing configurable transmission rates for devices within a multi-device enclosure, despite common communication media within the multi-device enclosure that would otherwise constrain or fix the transmission rates of the devices. In one embodiment of the present invention, implemented within a virtual-connect manager or other module or device contained in, or associated with, a multi-server enclosure, the virtual-connect manager provides an administrative or management interface through which each server can be assigned a maximum transmission rate. The virtual-connect manager then continuously monitors the transmission rates of servers and/or ports within servers in order to apply back pressure, or flow control, so that the servers and/or ports within servers do not exceed the configured maximum transmission rates. | 02-03-2011 |
20110035485 | System And Method For Goal Driven Threshold Setting In Distributed System Management - The present invention includes, but is not limited to, a method, system and computer-usable medium for providing automated management of threshold crossing alarms. Transaction processing resources are selected for monitoring, followed by selecting a monitoring time interval, an initial threshold alarm level. Selections are then made regarding transaction codes to monitor, acceptable average transaction processing times, and acceptable ratio of successful transactions to unsuccessful transactions. The transaction processing resources are then monitored to count the number of transactions processed, measure the processing time for individual transactions, and capture their corresponding transaction result code. An average transaction processing time value and a successful transaction ratio processing value are generated. Comparison operations are performed. If the results of the comparison operations are acceptable, then threshold crossing alarms are then suppressed and the threshold alarm level is increased. If not, then a threshold crossing alarm is generated and the threshold alarm level is decreased. | 02-10-2011 |
20110035486 | MONITORING THE HEALTH OF WEB PAGE ANALYTICS CODE - A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server. The monitoring service can attempt to render any analytics code on the web pages to see if the analytics code renders or executes as expected. The monitoring service can also perform basic text searches to identify analytics code, even if it cannot be rendered, and to determine if such code is present and correctly written in the web page. For web pages that require form input, the monitoring service can prompt the user for corresponding input, or retrieve pre-recorded user input from a store. The monitoring service can determine analytics health for web pages of interest in real-time. | 02-10-2011 |
20110035487 | COMMUNICATION NETWORK SYSTEM AND SERVICE PROCESSING METHOD IN COMMUNICATION NETWORK - A communication network system includes a resource network element and further includes a resource server adapted to retrieve availability information of the resource network element and to allocate the resource network element according to the retrieved availability information. A service processing method in a communication network at the resource server side includes: receiving a resource query request; and searching for an available resource network element and responding with it being a response result. A service processing method in a communication network at the resource network element side includes: receiving a request for a service; determining whether the service can be processed immediately, and if not, transmitting a resource query request to a resource server; and transmitting the service request to an available resource network element in a response result. A resource server and a resource network element are further disclosed. With a resource server, the invention can monitor dynamically availability information of a resource network element and allocate appropriately an idle resource network element to thereby improve both a utilization ratio of network resource and a service processing capability of network element. | 02-10-2011 |
20110035488 | Method for Monitoring and Providing Information Over A Peer to Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 02-10-2011 |
20110035489 | SYSTEM AND METHOD FOR INTERFACING WITH A MANAGEMENT SYSTEM - Systems and methods that interface with a management system are provided. In one embodiment, a system and a method may provide a command protocol and format for communication between a network interface card (NIC) and a management device such as, for example, an intelligent management device (IMD). An interface may be adapted to allow the management device to merge its traffic with that of the NIC to provide a fully integrated management solution. The fully integrated management solution may be implemented, for example, without additional network connections. | 02-10-2011 |
20110035490 | METHOD, SYSTEM AND CONNECTIVITY SERVICE NETWORK (CSN) FOR REALIZING LOCATION SERVICE - A method, a system, and a connectivity service network (CSN) for realizing a location service are provided. When a user terminal roams to the visited domain network from the home domain network, the H-CSN interacts with the V-CSN after receiving the location request, and obtains the location result through location control exercised by the V-CSN over the V-ASN, which realizes the location of the user terminal from the home domain network, and expands the application of the location service in the home domain network. | 02-10-2011 |
20110035491 | Method for Internetworked Hybrid Wireless Integrated Network Sensors (WINS) - The Wireless Integrated Network Sensor Next Generation (WINS NG) nodes provide distributed network and Internet access to sensors, controls, and processors that are deeply embedded in equipment, facilities, and the environment. The WINS NG network is a new monitoring and control capability for applications in transportation, manufacturing, health care, environmental monitoring, and safety and security. The WINS NG nodes combine microsensor technology, low power distributed signal processing, low power computation, and low power, low cost wireless and/or wired networking capability in a compact system. The WINS NG networks provide sensing, local control, remote reconfigurability, and embedded intelligent systems in structures, materials, and environments. | 02-10-2011 |
20110035492 | DATA USE STATUS TRACKING SYSTEM, MANAGER DEVICE, AGENT DEVICE, DATA USE STATUS TRACKING METHOD, AND STORAGE MEDIUM - A data use status tracking system | 02-10-2011 |
20110035493 | APPARATUS AND METHOD FOR TRACKING REQUESTS IN A MULTI THREADED MULTI TIER COMPUTERIZED ENVIORONMENT - The subject matter discloses a method and apparatus for associating requests and responses in a multi-tier computerized environment, comprising for each tier, detecting incoming and outgoing data flow; sending the detected data to a processing module; for each two neighboring tiers, comparing incoming data of one tier and outgoing data of the other tier; associating incoming requests of one tier to outgoing requests of the other tier. The association may use an ad-hoc ID. The subject matter also discloses a computerized apparatus detecting data and sending the data to a central storage outside the multi-tier environment when the data is used to match requests and responses. Another object of the subject matter is a method for associating an incoming request and outgoing response or outgoing requests in a multi-threaded computerized environment. | 02-10-2011 |
20110035494 | NETWORK VIRTUALIZATION FOR A VIRTUALIZED SERVER DATA CENTER ENVIRONMENT - A data center includes a physical host machine operating a virtualized entity and a network switch having a physical port connected to the physical host machine. To configure the network switch, the network switch has a management module that acquires information about the virtualized entity operating on the physical host machine. The network switch associates the acquired information about the virtualized entity with the physical port, assigns the virtualized entity to a group associated with a traffic-handling policy, and processes packet traffic from the virtualized entity in accordance with the traffic-handling policy. The virtualized entity can be, for example, a virtual machine or a multi-queue network input/output adapter operating on the physical host machine. | 02-10-2011 |
20110040867 | MECHANISM TO DETECT RESTRICTED ACCESS VIA INTERNET HOTSPOT - The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot. | 02-17-2011 |
20110040868 | SERVER INFORMATION SENDING SYSTEM - A server information sending system includes a server and an optical receiving device. The server has a microprocessor and a single LED element connected the microprocessor. The microprocessor transmits some server information in series outwardly by the single LED element. Flashes having information transmitted by the single LED element includes a machine-received message for the optical receiving device and a naked-eye-received message for a user. | 02-17-2011 |
20110040869 | ELECTRONIC DEVICE WITH WEBSITE INFORMATION - An electronic device is capable of communicating with at least one website via a network. The electronic device includes a storage module, an executing module, an integrating module, and a display module. The executing module is capable of retrieving information from the at least one website via the at least one webpage address. The integrating module is capable of determining positions where the information would be displayed in the electronic device. The display module is capable of displaying the information in the determined positions. | 02-17-2011 |
20110040870 | Systems and Methods for Determining Location Over a Network - Systems and methods for determining location over a network are disclosed. In some embodiments, a method comprises scanning, by a digital device, an area for one or more wireless networks, receiving one or more BSSIDs associated with the one or more wireless networks, generating a location request in a DNS protocol formatted message, the location request comprising the one or more BSSIDs, providing the location request, receiving a location response based on the location request, and retrieving at least one location identifier from the location response. | 02-17-2011 |
20110040871 | MONITORING WEBSITE VISITS FROM ON-LINE ENQUIRY AND VIEWS OF ELECTRONIC DOCUMENTS TO OFF-LINE (DELAYED) PURCHASE - A system for monitoring website visits is implemented by an implementing server ( | 02-17-2011 |
20110040872 | SYSTEM AND METHOD FOR MANAGING NETWORK TRAFFIC - A system and method for managing network traffic is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a data switch having a controller element to transmit telemetry data representative of bandwidth usage by one or more users of the data switch. At least one higher bandwidth user can have an increased polling frequency based at least in part on a differential in upstream and downstream data transfer rates for the one or more users. Additional embodiments are disclosed. | 02-17-2011 |
20110040873 | HOME NETWORK USING WIRELESS MODULE - Methods and apparatus for implementing a home network including a wireless module. In one implementation, a home network includes: two or more host devices, where at least one host device includes a wireless module port, and where the host devices are connected in a local network; and a wireless module connected to the wireless module port of a host device, where the wireless module provides a wireless connection to an external network; where at least one host device is a consumer appliance. | 02-17-2011 |
20110040874 | Automated Characterization of Network Traffic - Automated characterization of network traffic is described herein. A method may include compiling network traffic data based on received network traffic, preparing a network traffic characterization based on the network traffic data, and generating outgoing network traffic scripts based on the network traffic characterization. A method may also include capturing network traffic and generating test network traffic based on the scripts. A network testing system on which the method may be executed may include one or more chassis and/or computing devices, each having one or more network cards. The chassis and/or computing devices may be connected to one or more networks and to one another. The networks may include a production network and a test network. A system may include a data collector, a characterization engine, a script generator, and a traffic generator. | 02-17-2011 |
20110047261 | INFORMATION COMMUNICATION APPARATUS, INFORMATION COMMUNICATION METHOD, AND PROGRAM - An information communication apparatus is provided which can maintain a communication by an information processing unit (for example, application program etc.) even when a change may occur in a communication with employment of an actual address. | 02-24-2011 |
20110047262 | System And Method For Circuit And Path Based Event Correlation - A method, system and computer-usable medium are disclosed for the correlation of network events. A port of a network device is monitored at the physical layer interface for the occurrence of a network event. If detected, a repository of circuit path, network device, and device interface data is queried for information related to the network event and each network device at each hop of the circuit path associated with the event. A user selects time intervals for other network events or alarms occurring before or after the target event. A repository of network event and alarm data is then queried to retrieve all network events or alarms occurring during the selected time interval. Information related to the network events or alarms are then compared to interfaces related to devices that are likewise associated with the circuit path associated with the event. If the event information does not match the interface, then it is associated as a child event of a network circuit event. Otherwise it is associated as a parent event of a network path query event. | 02-24-2011 |
20110047263 | Method and System for Automatic Location Tracking of Information Technology Components in a Data Center - Methods and systems provide the automatic tracking of the physical location of information technology components in a data center. These systems automatically identify where a given IT component, such as a server, router, switch or other device, is located. They automatically identify which slot the IT component is located in a given rack in the data center. When a server is added or removed from a particular slot, the tracking database is automatically notified and updated, and users of the database have instantaneously accurate information about the location of each IT component in a data center. If the server is changed to a different slot or rack, the system immediately identifies that the given server or device is located in a different location. Users can rely on the information in the database when remotely managing the data center's IT assets. | 02-24-2011 |
20110047264 | ANALYZING A COMMUNICATION PERFORMANCE OF AN IED - A communication stack performance of an Intelligent Electronic Device (IED) is analyzed in a communication network of a Substation Automation (SA) system. The IED processes network messages that are transferred with, or belonging to, a specific configurable SA communication service. A plurality of application level scenarios corresponding to a high communication load is executed. Among all network messages captured or intercepted during the scenario, the network messages destined to the IED and sent by the IED in response are identified. A number of the identified messages, a number of specific communication protocol elements or data items related to a service-specific property, and a number of changed protocol elements, which are indicative of an SA event, for which the value of the data item has changed compared to the value of the same data item in a previous message, are determined. An IED-intrinsic processing time of the identified messages is likewise determined, based on which parameter values of a service specific processing time model are calculated. | 02-24-2011 |
20110047265 | Computer Implemented Method for Identifying Risk Levels for Minors - A computer system is configured to monitor and analyze the use of a client device by a minor and compute a risk for that minor. Examples of client devices include personal computers, laptops, cellular phones, “smart phones”, and other personal electronic devices. The analysis includes receiving text blocks from the client, processing the text block to discover “hit strings”, compute risk scores for the hit strings, and then to compute an overall risk score for the minor. A hit string is a string of characters such as a word or phrase that is indicative of a risk to the minor such as depression, “cyber bullying”, or an “adult predator”. | 02-24-2011 |
20110047266 | METHOD AND APPARATUS FOR SHARING FUNCTION OF EXTERNAL DEVICE THROUGH COMPLEX NETWORK - A method of sharing a function of a device, the method including detecting at least one device from among a plurality of devices through a first device connected to the plurality of devices through a plurality of networks, wherein the detecting is performed by a second device in the plurality of devices; interworking the second device with a third device in the detected at least one device, through the first device; and using, by the second device, a function of the third device through the first device. | 02-24-2011 |
20110047267 | Method and Apparatus for Managing Communication Between Participants in a Virtual Environment - A method and apparatus for managing communication between participants in a virtual environment enables the participants to elect to automatically connect with each other via a preferred communication mechanism, manually connect with each other, or choose not to connect with each other. The connection may be point-to-point between two participants or may include multiple participants. Establishment of a connection, or the ability to establish a connection, may be based on the proximity of the participants, or the Avatars representing the participants, in the virtual environment. Once the connection is established, the connection may be managed so that the connection is maintained while the Avatars remain proximate each other and is automatically severed once the Avatars move away from each other. Environmental noise and other audio aspects may be included in the connection to simulate a real-world conversation. | 02-24-2011 |
20110047268 | Switching system - An Ethernet access connection connects a user access point to an access node in the network. The access connection comprises a passive coupler, by means of which a further access connection can be provided between the user access point and a second access node, such that data can be exchanged over each access connection between the user access point and the network. This duplication ensures that communication is not severed if the access connection is breached. To avoid interference at the destination terminal between the two resulting identical data streams, the access nodes giving access to the destination terminal are controlled such that only one of them forwards data to the destination access point, with the capability to switch to the other one in the event of a loss of connection between the access node and user access point. | 02-24-2011 |
20110047269 | DEVICE, METHOD AND SYSTEM FOR DETECTING UNWANTED CONVERSATIONAL MEDIA SESSION - Some embodiments of the invention relate to a method and a system for detecting unwanted conversational media session data. In accordance with one aspect of the invention, a method of detecting unwanted conversation media session data according to some embodiments of the invention may include calculating two or more progressive similarity scores each with respect to a different instant during a progress of a real-time conversational media session, wherein each of said scores is associated with a similarity between the conversational media session's media data that was available at the associated instant and a reference data item corresponding to media data of a previous conversational media session, and evaluating progressive similarity between the real-time conversational media session and the reference data item based upon the two or more progressive similarity scores. | 02-24-2011 |
20110055369 | SYSTEM AND METHOD FOR PRESENCE NOTIFICATION BASED ON PRESENCE ATTRIBUTE - Provided is a system and method for optimizing the presence notifications. The system includes a presence server which stores the presence subscription and presence information; and a presence XDMS for storing the authorization related information, wherein the presence server store the filtering rule pertaining to presence based notification delivery. The method includes: storing the presence subscription and presence information by a presence server; and storing the authorization related information by a presence XDMS, wherein a filtering rule pertaining to presence based notification delivery is used with the presence server. | 03-03-2011 |
20110055370 | Dynamically Balancing Resources In A Server Farm - Methods, apparatus, and products are disclosed for dynamically balancing resources in a server farm, the server farm comprising a plurality of servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, the methods, apparatus, and products including: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 03-03-2011 |
20110055371 | Using a Content Delivery Network for Security Monitoring - A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and receive content and security data from a content server. Each cache server is further configured to provide the content to the client system and provide the security data to a monitoring system. | 03-03-2011 |
20110055372 | Auto Suspense Of Virtual Machine On Client Disconnection - A host controller or a host detects that a client has disconnected from a virtual machine running on the host. The host controller or host initiates a timer upon detecting that the client has disconnected. When the timer times out, the host controller or host saves the state of the virtual machine. The host controller or host causes the virtual machine to be shut down upon saving the state. | 03-03-2011 |
20110055373 | SERVICE IDENTIFICATION FOR RESOURCES IN A COMPUTING ENVIRONMENT - A method for identifying computational services performed by one or more computing resources is provided. The method comprises analyzing digital data associated with the computing resources to identify similarities between the digital data; grouping sets of digital data into one or more clusters according to similarities identified between the digital data; and generating a description for the one or more clusters to describe at least one computational service associated with a set of digital data grouped in the one or more clusters. | 03-03-2011 |
20110055374 | COMPUTER IMPLEMENTED DNS SERVER IP ADDRESS LOOKUP MECHANISM - Systems, methods and articles of manufacture are disclosed for resolving hostnames on a private network with a public Internet server. One embodiment of the invention provides for a public Internet server configured to generate a private network ID when a new private network is identified, wherein the private network ID is a unique reference to all nodes within a private network and wherein the private network is comprised of one or more private DNS servers. The public internet server stores the private network ID and an IP address for at least one or more private DNS servers on the private network and sends, upon request, the private network ID to at least one of the private DNS servers. | 03-03-2011 |
20110055375 | METHODS FOR MONITORING OPERATING STATUS OF REMOTE HOSTS - Methods for monitoring operating statuses of hosts are described herein. Operating statuses for one or more hosts are monitored by a management server over a network using a network management protocol. In response to a failure to obtain an operating status of a first host over the network using the network management protocol, the management server instructs a second host to access a predetermined storage location to obtain the operating status of the first host. The predetermined storage location is specifically allocated for the first host from a storage space shared by all the hosts. Thereafter, the management server is configured to determine an operating condition of the first host based on the operating status obtained via the second host. | 03-03-2011 |
20110055376 | HEURISTIC TRANSACTION TIMEOUT CONTROL - A processing device receives a request to initiate a new transaction. The processing device identifies one or more components of that will be used by the new transaction. The components may include hardware components and software components that operate on the hardware components. A timeout period is determined to apply to the new transaction based on properties of the one or more components and a current resource utilization of the one or more components. The new transaction is then initiated, wherein the determined timeout period is assigned to the new transaction. | 03-03-2011 |
20110055377 | METHODS AND SYSTEMS FOR AUTOMATED MIGRATION OF CLOUD PROCESSES TO EXTERNAL CLOUDS - A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud management system can migrate the virtual machines to an external cloud. | 03-03-2011 |
20110055378 | METHODS AND SYSTEMS FOR METERING SOFTWARE INFRASTRUCTURE IN A CLOUD COMPUTING ENVIRONMENT - A metering tool can monitor the software resources of the cloud to meter the software utilization of the cloud. The metering tool can cooperate and communicate with a cloud management system to determine the software resources utilized by processes instantiated in the cloud and to track the duration of the utilization. The metering tool can store the tracked utilization in a record. | 03-03-2011 |
20110055379 | CONTENT-BASED AND TIME-EVOLVING SOCIAL NETWORK ANALYSIS - System and method for modeling a content-based network. The method includes finding single mode clusters from among network (sender and recipient) and content dimensions represented as a tensor data structure. The method allows for derivation of useful cross-mode clusters (interpretable patterns) that reveal key relationships among user communities and keyword concepts for presentation to users in a meaningful and intuitive way. Additionally, the derivation of useful cross-mode clusters is facilitated by constructing a reduced low-dimensional representation of the content-based network. Moreover, the invention may be enhanced for modeling and analyzing the time evolution of social communication networks and the content related to such networks. To this end, a set of non-overlapping or possibly overlapping time-based windows is constructed and the analysis performed at each successive time interval. | 03-03-2011 |
20110055380 | NETWORK PROVIDING AUTOMATIC CONNECTIONS BETWEEN DEVICES BASED ON USER TASK - A system including a network; and a plurality of devices configured to be communicatively coupled to the network, each device configured to be automatically discoverable when connected to the network; wherein at least one of the devices is configured to: discover devices connected to the network; and establish a network communication link between at least two devices based on a user task. | 03-03-2011 |
20110055381 | HOST INFORMATION COLLECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for collecting information of host devices. In one aspect, a method includes transmitting a plurality of information probes to the host device, including an agent probe that queries an agent installed on the host device for a unique agent identifier, monitoring for replies to the information probes from the host device during the host detection phase, ending the host detection phase in response to receiving a reply to the agent probe and that includes the unique agent identifier, resending the plurality of information probes and incrementing a repeat counter in response to not receiving a reply to the agent probe after the expiration of a time period and ending the host detection phase in response to a value of the repeat counter exceeding a maximum repeat value. | 03-03-2011 |
20110055382 | HOST ENTRY SYNCHRONIZATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, synchronizing records in peer devices. In one aspect, a method includes comparing, in a first peer device, a peer record received from a second peer device based on an IP address of the peer record from the second peer device and an IP address of a record stored in a host table of the first peer device. Unique agent identifiers, MAC addresses and time stamps are also compared to determine whether the peer record indicates a new host device, a new IP assignment to a known host device, or a new user logged into a known host device. | 03-03-2011 |
20110055383 | PROBE ELECTION IN FAILOVER CONFIGURATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type. | 03-03-2011 |
20110055384 | METHOD FOR CREATING CONTENT, METHOD FOR TRACKING CONTENT USE ACTIONS, AND CORRESPONDING TERMINAL AND SIGNALS - A method is provided for tracking at least one use of at least one piece of multimedia content on a terminal connected to a communication network. The piece of content is transmitted to the terminal in the form of at least one description file generated according to a predetermined description format. The method includes using the piece of content by a user of the terminal, including activation of at least one interaction element; implementing at least one instruction followed by the use associated with the activated interaction element; executing the use tracking instruction controlling storage of at least one piece of information concerning the activation of the interaction element, or use tracking information; and transmitting by the terminal the piece of use tracking information to a tracking terminal in charge of processing the use tracking information. | 03-03-2011 |
20110055385 | ENTERPRISE-LEVEL MANAGEMENT, CONTROL AND INFORMATION ASPECTS OF CLOUD CONSOLE - A method, computer-readable medium, and system for monitoring usage of computing resources provisioned across multiple cloud providers and/or data centers are disclosed. Events associated with usage of a plurality of computing resources may be accessed, where the plurality of computing resources may implement a virtual machine, a plurality of virtual machines of a cloud computing environment, etc. The events may be associated with a start, a stop, a status change, etc., of the plurality of computing resources. The events may be used to generate usage data for the plurality of computing resources. The usage data may include historical data associated with previous usage of the plurality of computing resources. Additionally, the usage data may be displayed using a graphical user interface, thereby enabling monitoring and/or tracking of usage of computing resources provisioned across at least one cloud provider and/or at least one data center. | 03-03-2011 |
20110055386 | NETWORK ANALYTICS MANAGEMENT - Embodiments generally disclosed herein include a methods and systems configured for providing network analytics for a content delivery network. The methods and systems include providing a content delivery network comprising at least one content server. The methods and systems further include detecting a request for network analytics from the content delivery network and extracting network analytics at the at least one content server. The methods and systems may further include disseminating the network analytics from the content delivery network. | 03-03-2011 |
20110055387 | Method and Apparatus for Performing Buffer Status Reporting - The present invention provides a method for performing Buffer Status Reporting (BSR) in a user equipment (UE) of a wireless communication system. The method includes steps of determining whether any BSR has been triggered since last cancellation of a triggered BSR to a current Transmission Time Interval (TTI); and performing a BSR procedure when determining that at least one BSR has been triggered. | 03-03-2011 |
20110055388 | Methods and computer program products for monitoring and reporting network application performance - Provided are methods and computer program products for monitoring and reporting network application performance in a networked device. Methods may include collecting performance data corresponding to at least one application running on the networked device in substantially real time using at least one kernel space driver interface; generating multiple kernel level metrics and multiple user level metrics based on the collected performance data; aggregating the kernel level metrics and the user level metrics that were generated during a predefined time interval; and generating, responsive to aggregating the kernel level metrics and the user level metrics, an event incorporating the aggregated metrics. | 03-03-2011 |
20110055389 | Methods and Computer Program Products for Generating a Model of Network Application Health - Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that corresponds to activities of multiple applications that are operable to execute on at least one networked device, and combining the received activity data to remove redundant portions thereof and/or to reconcile inconsistencies therein. Based on the received activity data, ones of the multiple applications are identified, and relationships between the identified applications are determined. A model is generated including the identified applications and the relationships therebetween, and a representation of the model is displayed. Related computer program products are also provided. | 03-03-2011 |
20110055390 | NETWORK CAPACITY PLANNING - Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations is used or until a substantially steady state of network performance is achieved. | 03-03-2011 |
20110060821 | SYSTEM AND METHOD FOR DETERMINING AFFINITY GROUPS AND CO-LOCATING THE AFFINITY GROUPS IN A DISTRIBUTING NETWORK - In at least one embodiment, an apparatus for determining one or more affinity groups in a distributed network is provided. A first distributed computing device is operably coupled to a plurality of clients for enabling electronic interactive activities therebetween. The first distributed computing device is configured to detect at least one network interaction among the plurality of clients. The first distributed computing device is further configured to generate at least one weighted value based on the number of detected network interactions. The first distributed computing device is further configured to establish an affinity group comprising at least one client from the plurality of clients based on the at least one weighted value. | 03-10-2011 |
20110060822 | APPARATUS AND METHOD FOR MANAGING COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a gateway having a controller to transport media data between a service provider network and one or more end user devices associated with the gateway, and transmit connection signals to a second gateway for establishing a management channel between the gateway and the service provider network when an undesired condition is detected, where the management channel transports management data associated with the gateway to the second gateway for transport to the service provider network using a separate transport queue of the second gateway. Other embodiments are disclosed. | 03-10-2011 |
20110060823 | NETWORK-ASSISTED HEALTH REPORTING ACTIVATION - A system and method for generating and tracking health diagnoses of devices connected to a computer network via a statement of health provided by each device. The system monitors the health of devices on the network and attempts to engage the operator of undiagnosed devices in order to provide a diagnosis. Undiagnosed devices are quarantined to restrict their access to network resources. For example, access requests from quarantined devices to certain Web services may be intercepted and the device redirected to a page informing the operator of the need to provide a health diagnosis by installing or activating a compatible system health agent. | 03-10-2011 |
20110060824 | Signalling Proxy System for a Switching Center Server - A signalling proxy system for a switching center server is provided, as well as a method of operating a signalling proxy system for a switching center server. The signalling proxy system comprises two signalling proxies for routing signalling traffic between a network node and a plurality of switching center server units. Each signalling proxy is addressable by an address code and is operable in one of an active state and a passive state towards the network node. | 03-10-2011 |
20110060825 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM RECORDING CONTROL PROGRAM FOR INFORMATION PROCESSING APPARATUS, CAPABLE OF EXECUTING EFFICIENT DATA COMMUNICATION DISPENSING WITH COMMUNICATION WITH ONCE COMMUNICATED PARTNER - An exchange data communication determining unit determines, based on a received reception wireless frame, whether or not a communication partner is an exchange partner with which the exchange data can be exchanged. Receiving a notice that exchange of the exchange data is possible, a data communication control unit executes a process for giving/receiving the exchange data. A machine identification information registration unit stores an MAC address of a portable game machine in an MAC address list saving area. Again, the wireless frame transmitting/receiving unit sets a transmission wireless frame and executes an exchange partner searching process. An exchange data communication determining unit determines whether or not an MAC address included in the received reception wireless frame is registered with the MAC address list saving area, and if it is registered, the data communication is terminated. | 03-10-2011 |
20110060826 | DETECTING AND DETERMINING AVAILABILITY OF A NETWORK STRUCTURE WITH ACTIVE CONNECTION NODES - This is achieved in an arrangement of a network forming a network topology with network components connected via data lines of a computer with an operating system and holding software for detecting the network components and the network topology is stored. An analysis tool is connected at a connection to the network to be examined and includes a computer and software developed for this combination and stored on this computer. This analysis tool has a processing unit, an integrated or external display, a network card for exchange of data via the connection with the network components in the network to be examined, and programming for automatically detecting all of the network components connected to one another in the network using the network card for automatically detecting all of the active switching nodes in the network via the connection with the network. | 03-10-2011 |
20110060827 | MANAGING APPLICATION SYSTEM LOAD - An improvement in a networked digital computing system comprises an Information Resource Manager (IRM) operable to communicate with elements of the digital computing system to obtain performance information regarding operation of and resources available in the computing system, and to utilize this information to enable the IRM to adjust the application parameters relating to application execution, thereby to optimize execution of the at least one application program. | 03-10-2011 |
20110060828 | AUTOMATIC SEQUENCING BASED ON WIRELESS CONNECTIVITY - A method of determining the sequence of traversing nodes in a communication network is provided. The method comprises with each node, determining other nodes in the network it can reach in a single hop. Creating a local sequence connection order based on the determined other nodes the node can reach in a single communication hop. Storing historical data of local sequence connection order information and determining a new local sequence connection order based in part on the historical data and communication information. | 03-10-2011 |
20110060829 | METHOD AND APPARATUS PROVIDING DEVICE-INITIATED NETWORK MANAGEMENT - A method is disclosed for managing a network entity that is initiated by the network entity, the method comprising the computer-implemented steps performed at the network entity of monitoring the network entity; periodically evaluating one or more specified conditions at the managed network entity; when one or more of the specified conditions are satisfied, then gathering specified information from the managed network entity, preparing a message that includes the specified information and the specified conditions that were satisfied, and sending the message to a management point. | 03-10-2011 |
20110060830 | METHOD, SYSTEM AND DEVICE FOR DEVICE CAPABILITIES EXCHANGE - A method, system and device for device capabilities exchange are provided. The method for device capabilities exchange includes: receiving a device capability exchange request sent from an initiating Diameter node; and returning a device capability exchange answer to the initiating Diameter node according to a state of a state machine of a receiving Diameter node or a request type in the device capability exchange request. The method can optimize the existing method for updating and negotiating device capability information when a Diameter device is upgraded, reduce the amount of data exchanged over the network, reduce the repetition of database update performed by the Diameter nodes, and improve the robustness of network connection and system processing. | 03-10-2011 |
20110060831 | NETWORK MONITORING DEVICE, BUS SYSTEM MONITORING DEVICE, METHOD AND PROGRAM - A network monitoring device which monitors a network in which data is transmitted through relays, includes a monitoring frequency recording unit ( | 03-10-2011 |
20110066717 | METHOD AND APPARATUS FOR TIME ADAPTATION OF ONLINE SERVICES TO USER BEHAVIOR - An approach is provided for time adaption of online services. Timing information relating to usage by a user of one or more online services is retrieved. A pattern of consistent usage is determined from the timing information. Scheduling information is generated for transmission of a message based on the determined pattern. | 03-17-2011 |
20110066718 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENTLY POOLING CONNECTIONS BETWEEN CLIENTS AND SERVERS - An apparatus, method and computer program product for efficiently pooling network client-server connections. The apparatus is implemented within an interface unit connecting a plurality of servers to the Internet, which is in turn connected to a plurality of clients. The method includes the steps of opening a connection between a first client and the interface unit; determining whether a connection between the interface unit and a server is finished being utilized by the first client; opening a connection between a second client and the interface unit; if no free connection is open between the interface unit and the server, then allowing the second client to access information on the server via the same connection utilized by the first client without waiting for the first client to initiate closing the connection; and delinking the connections between the first and second clients and the interface unit while keeping open the connection between the interface unit and the server. | 03-17-2011 |
20110066719 | Automated Applicatin Dependency Mapping - A computer-executed method for network management automatically maps applications to network infrastructure. The method comprises monitoring network activity on one or more managed computers and collecting network activity data on the managed computers. The association of executable files to applications is identified and network activity data and the association of executable files to applications are analyzed. Connections from applications on the managed computers are established according to the analysis. | 03-17-2011 |
20110066720 | NETWORK CONNECTION STATUS DETECTING SYSTEM AND METHOD THEREOF - A network connection status detecting system is provided for detecting a network connection status of a server, and the detecting system includes a plurality of monitoring servers and a central processing server. Each monitoring server is communicably coupled to the server and continues detecting the network connection status of the server. If the detected network connection status of the server is offline, offline information including an offline starting time will be produced. The central processing server contains a selected time interval and receives the offline information to compute a time difference between the offline starting times. If all time differences are smaller than the selected time interval, then the central processing server determines that the network connection status of the server is an offline status and records the earliest offline starting time as an offline time. | 03-17-2011 |
20110066721 | IMAGE PROCESSING APPARATUS, REMOTE MANAGEMENT SYSTEM, LICENSE UPDATE METHOD, AND COMPUTER PROGRAM PRODUCT - An image processing apparatus includes an HDD that stores therein a license file containing an expiration date of a license of an application and a class of the license, a detecting unit that acquires the expiration date from the license file and detects whether the expiration date has passed, a class identifying unit that identifies a class of the license whose expiration date is detected as having passed, based on the license file, an update-process determining unit that determines a method of performing an update process based on the class, a license-file acquiring unit that acquires a license file from the license file management server based on the method of performing the update process, and a replacing unit that replaces the license file stored in the HDD with the license file acquired by the license-file acquiring unit. | 03-17-2011 |
20110066722 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, DEVICE MANAGEMENT PROGRAM, AND STORAGE MEDIUM - A device management apparatus is connected to one or more devices via a network, and includes: a response request unit that requests a response from the devices via the network; a reception unit that receives the response from the respective devices, a storage unit that stores a record, the record being arranged such that device identification information for identifying the devices is associated with response information indicative of whether the response was received and a date and time at which the response was received; a recording unit that updates the record; and an output control unit that reads on the storage unit and delivers the device identification information indicating that the corresponding response information is indicative of an absence of the response and an elapsed time from the corresponding date and time has exceeded a predetermined period. | 03-17-2011 |
20110066723 | GENERATING STATISTICS OF POPULAR CONTENT - Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics. | 03-17-2011 |
20110066724 | SYSTEMS AND METHODS FOR DIRECTION OF COMMUNICATION TRAFFIC - An internet traffic redirection architecture is disclosed that allows for directing of various traffic to specified sites. The system and method allow a controller, such as an ISP, to benefit from unresolved IP Address requests and keyword and hotword queries by capturing this traffic and directing it to participating partners who provide content relevant and/or geographically relevant results. The system and method can decrease lost traffic, irrelevant keyword and hotword search results, and irrelevant redirection by web browsers resident on user's personal computers. | 03-17-2011 |
20110066725 | SOCIAL NEWS RANKING USING GOSSIP DISTANCE - Devices, systems, and methods are directed towards ranking of messages based on a hop distance a forwarded message travels through a social network. As a message is forwarded by a member of the social network the hop distance increases. As the message is forwarded, recipients and/or senders may view the hop distance in real-time. The hop distance may reflect a number of times the message is forwarded to reach a recipient, or the maximum number of times the message is forwarded. The message may be displayed to a member in a rank ordering based on the hop distance, and messages with hop distances below a defined value may be deleted from a displayed list after a period of time. In one embodiment, a message may be forwarded anonymously to, for example, encourage members to forward the message. | 03-17-2011 |
20110066726 | COMMUNICATION DEVICE AND REMOTE MANAGEMENT SYSTEM - A communication device is provided in a network including a plurality of network segments to which customer devices are connected respectively, the communication device being connected through a cable or radio communication line to a central management device so that management information required for remote management of the customer devices is exchanged between the communication device and the central management device through the communication line. In the communication device, a searching unit searches customer devices connected to a predetermined network segment among the plurality of network segments in the network by predetermined timing. A transmitting unit transmits segment configuration information of the predetermined network segment as a result of device searching by the searching unit through the communication line to the central management device by predetermined timing. | 03-17-2011 |
20110066727 | DISTRIBUTION OF NETWORK COMMUNICATIONS BASED ON SERVER POWER CONSUMPTION - A network device is described that load-balances network traffic among a set of network servers based on electrical power consumption of the network servers. The network device may measure electrical power consumption in a variety of ways, and may generate and maintain a power consumption profile for each of the network server. The power consumption profile may describe the respective server power consumption in increasing granularity. For instance, each power consumption profile may specify electrical power consumption according to watts consumed by a server per average transaction, watts consumed per transaction for a specific type of software application, watts consumed per transaction for a software application for individual network resources, and so on. Furthermore, the profiles may be maintained for individual servers or aggregated for groups or sequences of servers. | 03-17-2011 |
20110072126 | METHOD AND APPARATUS FOR CONSTRUCTING A DHT-BASED GLOBAL NAMESPACE - A DHT-based global namespace (GNS) is constructed for a network system that includes network attached storage (NAS) devices, including at least one DHT-NAS device (a NAS device having DHT Functionalities) and at least one Existing-NAS device (a NAS device lacking DHT Functionalities). In a DHT Overlay Construction Phase, the DHT-NAS devices construct a DHT overlay. In an Initial Phase, the GNS is created above share folders in the Existing-NAS devices, with mapping of the share folders in the Existing-NAS devices to GNS paths distributed to a key lookup table in the DHT-NAS devices. Each mapping in the key lookup table includes a key, a GNS path, NAS type, IP address of the NAS, and the path within the NAS Share. There is no central GNS mapping table. In a Discovery Phase, the DHT-NAS devices discover the Existing-NAS devices to construct the GNS under the share folders. In a Working Phase, the DHT-NAS devices service GNS requests. | 03-24-2011 |
20110072127 | Network Aware Application Management - A method of managing a network application includes identifying a network path for the network application, obtaining network performance measurements along the network path, obtaining application performance information for the network application, and extracting infrastructure specific information for the infrastructure supporting the network application. The method further includes correlating the application performance information, network performance measurements, and the infrastructure specific information to identify a performance issue affecting the network application, and modifying the application behavior, the network behavior, or any combination thereof in response to the performance issue. | 03-24-2011 |
20110072128 | AUTOMATED PRESENCE RANKING FOR COMMUNICATIONS NETWORKS - Messaging interactions among a set of network user access accounts is monitored at a presence server. The messaging interactions between the set of network user access accounts are ranked based upon a characteristic of the messaging interactions. A presence filtering profile is automatically configured that defines distribution controls for presence information for the set of network user access accounts based upon the determined ranking. Distribution of the presence information for the set of network user access accounts is controlled based upon the configured presence filtering profile. | 03-24-2011 |
20110072129 | ICMP PROXY DEVICE - Provided are an ICMP proxy device, system and method of proxying. The ICMP proxy device includes a receive module, a protection determination module and a response module. The receive module is configured to receive a direct availability request addressed to a server from a host. The protection determination module is configured to determine whether the server is available. The response module configured to respond to the host with an availability response based the determination, such that the availability response is addressed from the server to the host. | 03-24-2011 |
20110072130 | Extracting Overlay Invariants Network for Capacity Planning and Resource Optimization - A method and system determines capacity needs of components in a distributed computer system. In the method and system, a pair-wise invariant network is determined from collected flow intensity measurements. The network includes at least two separate and unconnected pair-wise invariant subnetworks, each of the subnetworks including two of the flow intensity measurements connected by a pairwise invariant, each of the pair-wise invariants characterizing a constant relationship between their two connected flow intensity measurements. At least one overlay invariant is determined from the pair-wise invariant network and from the collected flow intensity measurements using a minimal redundancy least regression process. The capacity needs of the components are determined using the pair-wise and overlay invariants. | 03-24-2011 |
20110072131 | SYSTEM AND METHOD FOR MONITORING ADVERTISEMENT ASSIGNMENT - A method is disclosed which emulates accessing web sites by a simulated web visitor. The characteristics of the web user may be controlled as may be the timing and number of visits and the nature of the web sites visited. During the emulated visits cookies of the web visitor are modified. The emulated visits may be directed to a sub-group of web sites which are engaged in agreements granting them reward for the provision of data indicative of the nature of past web visits, and to a sub-group of web sites which are not engaged in such agreements. Comparison of the exposure of the emulated web visitor to advertisements in each of the sub groups may be analyzed to indicate whether the agreements are properly executed and the reward is properly given. | 03-24-2011 |
20110072132 | Retail Product Tracking System, Method, and Apparatus - According to some example embodiments, systems, apparatus, methods and computer program products are provided for monitoring articles, such as in a commercial environment. | 03-24-2011 |
20110072133 | SYSTEMS AND METHODS FOR MONITORING AND CONTROLLING COMMUNICATION TRAFFIC - Communication traffic monitoring and controlling systems and methods are disclosed that allow for controlling communication traffic over the Internet based on the identity of particular users using potentially volatile information, such as a dynamically assigned IP Addresses. The system and method allow a controller to personalize services for users without the need for the user to supply personal information, such as name, address, and the like, and without the need to have computer programs or code installed on the user's computer. Methods of doing business with a computer are provided based on the systems and methods of communication traffic monitoring and controlling. | 03-24-2011 |
20110072134 | CONTENT MANAGEMENT - A system and method for management and processing of resource requests is provided. A content delivery network service provider determines a class associated with a set of client computing devices and monitors resources requests for the determined class. The content delivery network service provider then identifies at least one cache component for providing additional content, such as advertisement content or other additional content provided in anticipation of future resource requests, to client computing devices as a function of the determined class. In other embodiments, instead of cache components, the content delivery network service provider identifies a second set of client computing devices as a function of the determined class for providing the additional content information. | 03-24-2011 |
20110078301 | SYSTEMS AND METHODS FOR DETECTING NETWORK CONDITIONS BASED ON CORRELATION BETWEEN TREND LINES - Embodiments relate systems and methods for detecting network conditions based on a correlation between trend lines. In embodiments, a network management server can monitor the status and operation of network machines, such as servers or targets, as well as network transmission hardware (e.g. routers). Streams of network operation data from those sources can be captured and stored. The management server or other logic can examine the network operation data to identify trend lines for network conditions, such as application faults, attempted intrusions, or other events or conditions. Trend line data can be treated to generate second or other higher-order derivatives, such as third-order derivatives or others. A time correlation between two or more trend lines and/or their higher order derivatives, for instance, the occurrence of a peak value in the same time window, can be used to identify an event, state or condition. | 03-31-2011 |
20110078302 | SYSTEMS AND METHODS FOR DETECTING NETWORK CONDITIONS BASED ON DERIVATIVES OF EVENT TRENDING - Embodiments relate systems and methods for detecting network conditions based on derivatives of event trending. In embodiments, a network management server can monitor the status and operation of network machines, such as servers or targets, as well as network transmission hardware (e.g. routers). Streams of network operation data from those sources can be captured and stored. The management server or other logic can examine the network operation data to identify trend lines for network conditions, such as application faults, attempted intrusions, or other events or conditions. trend line data can be treated to generate second or other higher-order derivatives, such as third-order derivatives representing the rate of change of acceleration (or jerk) in the time series of one or more conditions. The presence of acceleration or jerk for one or more trend lines, such as attempted network intrusions, can reflect an event and trigger a flag or other automated response. | 03-31-2011 |
20110078303 | DYNAMIC LOAD BALANCING AND SCALING OF ALLOCATED CLOUD RESOURCES IN AN ENTERPRISE NETWORK - Various exemplary embodiments relate to a workload distribution system for an enterprise network extended in to a cloud network and a related method. The enterprise network may include a series of servers in a private enterprise network and a scalable series of servers in a cloud network. The enterprise network may employ one or more load balancers in both a private enterprise network and cloud network that are connected to each series of servers to distribute work amongst the servers in both networks based on criteria such as overall system performance and costs. The enterprise network may also employ one or more controllers to scale the number of cloud servers allocated to the enterprise network based on the system workload and other user-defined criteria, such as revenue generated per work request. | 03-31-2011 |
20110078304 | Automatic Server Administration of Serial Numbers in a Replicated Certificate Authority Topology - A Serial Number Management System (SNMS) automatically manages the allocation of unique serial numbers to certificate authority servers in a replicated server environment. The SNMS automatically detects that a Certificate Authority (CA) server has a need for additional unused serial numbers. The SNMS identifies a provider CA server that has unused serial numbers. The SNMS obtains a portion of the unused serial numbers from the provider CA server. | 03-31-2011 |
20110078305 | FRAMELESS VIDEO SYSTEM - A frameless audio/video object (FAVO) that provides information to a user. In one embodiment, the FAVO is interactive, such as having hotspots for allowing a user to select more features or information. The information may be advertising. The user can select a desirable FAVO, such as a favorite celebrity. | 03-31-2011 |
20110078306 | METHOD AND APPARATUS TO IDENTIFY OUTLIERS IN SOCIAL NETWORKS - A system that incorporates teachings of the present disclosure may include, for example, a computing device having an interface for receiving seed information, and a controller to identify one or more outliers from a reduced sampling of a total population of on-line social network (OSN) users according to the seed information and at least one of a social graph or a generalization of portions of the total population of OSN users. Additional embodiments are disclosed. | 03-31-2011 |
20110078307 | COOPERATIVE SYSTEM AND COOPERATIVE PROCESSING METHOD AMONG MEDICAL SECTORS AND COMPUTER READABLE MEDIUM - A cooperative processing method includes: transmitting pathological inspection request information from an endoscopic sector to a pathological sector, the pathological inspection request information being created by use of an endoscopic inspection report and for requesting the pathological sector to perform pathological inspection; managing status information for the pathological inspection request received on the pathological sector side; issuing a request to change the transmitted pathological inspection request information corresponding to the report when there occurs a change in the report; acquiring the status information of the pathological inspection request information upon reception of the change request and determining whether the pathological inspection request information can be changed or not; and changing the pathological inspection request information when it is concluded that the pathological inspection request information can be changed, and transmitting a change rejection notification when it is concluded that the pathological inspection request information cannot be changed. | 03-31-2011 |
20110078308 | Methods, Systems, And Computer Program Products For Managing Electronic Subscriptions - Methods, systems, and computer program products for managing electronic subscriptions are disclosed. According to one aspect, a method includes monitoring, at an electronic subscription client, receipt of one or more subscription messages associated with an electronic subscription. Interaction with the electronic subscription client by a client may be monitored to determine a viewing frequency of the one or more received subscription messages. Further, a prompt with a control configured for unsubscribing the user from receiving a future subscription message associated with the electronic subscription may be presented based on the determined viewing frequency. | 03-31-2011 |
20110078309 | Apparatus for Filtering Server Responses - A data processing apparatus, comprising at least one processor and a traffic monitor comprising logic which, when executed by the processor, causes the processor to perform: creating, using forward Domain Name System (DNS) lookups, a mapping of domain names to Internet Protocol (IP) addresses; determining whether a particular domain in the mapping requires handling data traffic to or from the particular domain by performing a particular action; based on the mapping, determining one or more IP addresses that are associated with the particular domain; generating policy for a firewall that instructs the firewall to perform the particular action upon receiving a particular request; wherein the particular request specifies a particular IP address that is within the particular domain. | 03-31-2011 |
20110078310 | System, Method and a Component for Monitoring Broadcast/Multicast Usage - A method, system and a component is provided which enables monitoring of usage statistics associated with broadcast or multicast services, distributed via a communications network. Information, such as e.g. the identity of a user client and the identity of a requested service, associated with a request for a long term key (LTK) is stored in a key management system for later retrieval. A statistics client requesting aggregated statistics associated with the information, may request such statistics from a statistics aggregation system, which is configured to compile the requested statistics on the basis of the stored information. | 03-31-2011 |
20110082926 | ADAPTIVE CUSTOMER-FACING INTERFACE RESET MECHANISMS - Automating event detection in a communications network includes correlating reports, issued by users experiencing an outage or a performance degradation for a service provided by a service provider, to identify a network element associated with the outage or the performance degradation. It is determined whether a predetermined threshold is crossed based on the reports. A customer-facing portion of the network element associated with the reports is adaptively reset, based on determining whether the predetermined threshold is crossed. | 04-07-2011 |
20110082927 | Processing and Presenting Multi-Dimensioned Transaction Tracking Data - An approach is provided that receives a set of tracking data from a monitored activity. The set of tracking data includes name-value pairs. The received set name-value pairs are compared with context masks. Each context mask include one or more name-filter pairs. One of the sets of context masks is selected in response to determining that the incoming name-value pairs matches the mask name-filter pairs of the selected context mask. Name-value pairs are selected based upon the selected context mask. The selected name-value pairs are then stored in an aggregate data store. If the received set of tracking data fails to match at least one of the name-filter pairs then the received set of tracking data is disregarded and none of the name-value pairs are stored in the aggregate data store. | 04-07-2011 |
20110082928 | MAINTAINING CONSISTENCY WITHIN A FEDERATION INFRASTRUCTURE - The present invention extends to methods, systems, and computer program products for a joining node to join a ring of nodes within a rendezvous federation. Embodiments of the invention include establishing a neighborhood of multiple nodes on the ring of nodes. The joining node indicates its intent to take id-space ownership for a portion of the id-space between the joining node and a selected immediately adjacent node. The joining node initiates a one-way monitoring relationship with the selected immediately adjacent node. The joining node receiving an indication from the selected immediately adjacent node that indicates acceptance of the joining node's intent to take id-space ownership for a portion of the id-space between the joining node and the selected node and indicates establishment of a one-way monitoring relationship between the selected node and the joining node. The joining node agrees to participate in a one-way monitoring relationship with the selected node. | 04-07-2011 |
20110082929 | PROVIDER PRESENCE INFORMATION - In some embodiments, a client computer includes a memory, a client presence program adapted to be located in the memory, and a processor. The processor is coupled to the memory and is adapted to execute the client presence program to receive provider presence information from an instant messaging (IM) server and to store the provider presence information in the memory. The provider presence information includes at least a provider status for at least one service provider. | 04-07-2011 |
20110082930 | METHOD AND APPARATUS FOR MONITOR AND NOTIFICATION IN A NETWORK - A user specifies one or more monitoring/probing rules on a client station. These rules specify user instructions for monitoring and probing conditions, events and data on monitored sites on the Internet. The client station transfers the monitor/probing rules to the monitoring site which also processes and interprets the monitoring/probing rules. When the monitoring site processes these rules, it results in (1) an allocation of space and (2) the creation or initialization of agent programs, such that these agent programs will affect periodic monitoring of Internet sites and send data therefrom back to monitoring site. If the retrieved information at the monitoring site satisfies the user specified conditions, the monitoring site will conduct further exploration to gather more information which may help determine the causes of these conditions. The results of such a probe may be obtained from the monitoring site or the Internet, and are communicated by the monitoring site to the client station for display on a display device. | 04-07-2011 |
20110082931 | Method, System And DNS Server For Load Balancing Network Servers - Embodiments of the present invention provide a method, system and DNS server for load balancing network servers. The method includes: monitoring whether each network server is capable of providing a network service, deleting an IP address of a network server which is incapable of providing a network service from an IP list in a DNS server or setting the IP address as invalid in the IP list according to a monitoring result; receiving, by the DNS server, a request from a network user for accessing a network server, selecting an IP address from valid IP addresses in the IP list which corresponds to the request; providing, by a network server having the selected IP address, network services for the network user. | 04-07-2011 |
20110082932 | COMMUNICATION APPARATUS, COMMUNICATION METHOD THEREFOR, PROGRAM, AND STORAGE MEDIUM - When a communication apparatus instructed to perform an automatic setting process detects an existing network, the communication apparatus monitors whether a communication apparatus that is in the existing network and that has a communication-parameter providing function starts an automatic setting process. When the communication apparatus in the existing network starts an automatic setting process, the communication apparatus receives communication parameters provided from the communication apparatus in the existing network. | 04-07-2011 |
20110087765 | NETWORK BANDWIDTH MANAGEMENT SYSTEM - A method is disclosed for managing bandwidth in a packet network carrying time sensitive data wherein sessions are established over virtual connections between respective pairs of endpoints. For at least some of the sessions, data representing local session bandwidth usage is sent over the network to a central server. The global bandwidth usage is monitored at the central server based on the local session bandwidth usage obtained from the data received from the endpoints. The central server sends messages to the endpoints to allocate bandwidth to the sessions in accordance with global bandwidth demands on the network. | 04-14-2011 |
20110087766 | APPARATUS AND METHODS FOR MANAGING NETWORK RESOURCES - Apparatus and methods are provided for managing network resources. A central unified services and device management framework is operated to simultaneously manage various types of resources on behalf of multiple organizations. Within the framework, a common management layer provides services (e.g., account management, event logging) common to multiple different services and devices. Within a specific management layer, separate subsystems are implemented for different devices or types of devices. The device-specific subsystems invoke device-independent functional modules through primitives exposed by the common management layer. A given organization may establish tiered logical constructs to group resources deployed at different physical locations (e.g., cities, offices) or within different subdivisions of the organizations (e.g., subsidiaries, departments). | 04-14-2011 |
20110087767 | Computer Environment Analysis Tool - A computer environment analysis tool may have a modular architecture that comprises data collection modules and data analysis modules. The data collection modules may populate multiple data sets defined by a schema, and the data analysis modules may analyze or interpret the data from the database to produce report output. A reporting module may generate information that may be consumed by a user or other service. The data collection modules may be specialized modules that collect specific types of data from local and remote devices, and the data analysis modules may analyze the data for specific business logic, such as determining if a computer environment is capable of upgrading or deploying various changes. | 04-14-2011 |
20110087768 | CODING METHODS AND APPARATUS FOR BROADCAST CHANNELS - Methods and apparatus related to selecting and/or using different coding methods for a broadcast channel are described. The coding method to be used is selected as a function of an estimated level of congestion. Various methods and apparatus are well suited for use in peer to peer wireless communications systems including broadcast peer discovery channels. A wireless communications device, e.g., a mobile terminal supporting peer to peer signaling, detects peer discovery signals from other devices and estimates a level of congestion. The wireless communications device selects one of a plurality of alternative coding methods as a function of the estimated level of congestion. Two different coding methods which may be used, in some embodiments, vary in at least one of: coding rate, convolution code used, and amount of resources used. The wireless device transmits information indicating the selected coding method and coded peer discovery data in accordance with the selected coding method. | 04-14-2011 |
20110087769 | Domain Popularity Scoring - Systems and methods for scoring a domain including analyzing counter data and information obtained from a web site associated with the domain. Methods may include receiving requests to resolve the domain at an authoritative domain resolution server. A counter may be incremented for the domain based on the received requests. Information may be obtained from a web page associated with the domain. For example, obtaining information from the web page may include obtaining quantitative, qualitative, and/or functional information from the web page, such as link information, a status of network links corresponding to the link information, and associated ratios. The status of link information may include searching for functional details and/or results, such as, domain redirections, domain errors, mirror content, and commonly linked sites. A score may be calculated for the domain based upon the counter data and the information obtained from the web page associated with the domain. | 04-14-2011 |
20110087770 | System for Indicating to Network User the Cost of Service Provided to Each Device on Network - Managing printer and copier server units connected to a network by enabling the user of a personal computer connected to the network to know print costs depending on the environmental load. Server units provide document print and copy services to each network connected client unit, typically personal computers. The server units can operate in any of several operational states, including for example, a standby state, a sleep state and a run state. Upon receiving a service request from the client unit, a management unit estimates the change in operational state for each connected server unit, assigns a priority to the various server units based on the estimated operational state changes, and provides the information for selection by the user requesting the print or copy service. | 04-14-2011 |
20110087771 | METHOD, APPARATUS AND SYSTEM FOR A LAYER OF STACKED NETWORK CAPTURED TRAFFIC DISTRIBUTION DEVICES - Methods, systems, computer-readable media, and devices for transmitting received captured traffic through a stacked topology of network captured traffic distribution devices are provided. An exemplary system may include a source of captured network traffic, a plurality of stacked network captured traffic distribution devices arranged in a stacked topology, and an external device. On some occasions, one or more of the network captured traffic distribution devices may be associated with unique IP address and the system may further include a web browser. The web browser may be enabled to communicate with each of the plurality of stacked network captured traffic distribution devices via their respective unique IP address. | 04-14-2011 |
20110087772 | METHOD, APPARATUS AND SYSTEM FOR FILTERING CAPTURED NETWORK TRAFFIC - Methods, systems, computer-readable media, and devices for filtering captured network traffic received by a network captured traffic distribution device communicatively coupled to a plurality of network captured network traffic distribution devices arranged in a stacked topology are described. Methods, systems, computer-readable media, and devices for applying a plurality of filters to received captured network traffic by a network captured traffic distribution device communicatively coupled to a plurality of network captured network traffic distribution devices arranged in a stacked topology are also described. Applying a plurality of filters to the received captured traffic may generate a plurality of filtered captured traffic sets. In some instances, filtered captured network traffic sets that have similar target destinations may be aggregated together and transmitted toward the target destination. | 04-14-2011 |
20110087773 | CONTENTS' RELATIONSHIP VISUALIZING APPARATUS, CONTENTS' RELATIONSHIP VISUALIZING METHOD AND ITS PROGRAM - There is provided a contents' relationship visualizing apparatus including a usage history acquiring unit for acquiring usage histories of multiple contents, a users' set specifying unit for specifying a content's users' set indicating users utilizing each content by use of the contents' usage histories, a similarity calculating unit for calculating a similarity between the specified users' sets by use of a similarity index, and a network creating unit for creating a network indicating a relationship between the contents by use of the calculated similarity between the users' sets. | 04-14-2011 |
20110087774 | SWITCHING API - A network interface device for a data processing system comprising: one or more network connection ports for connection to a network; a routing table supported at a memory of the network interface device; a controller operable to modify the routing table; and a control plane interface of the controller arranged to receive routing table update instructions carried in one or more control packets received at the said ports; wherein the control plane interface is configured to, on receiving a routing table update instruction, cause the controller to update the routing table in accordance with the routing table update instruction. | 04-14-2011 |
20110087775 | PEER-TO-PEER CONTROL DEVICE AND TRANSMISSION OVERLAY MANAGEMENT METHOD - A peer-to-peer (P2P) control device receives peer registration requests from a plurality of peers which want to receive contents and registers information regarding the plurality of peers, and receives an application service and contents registration request from at least one contents server providing contents and registers the information regarding the application service and contents. When the P2P control device receives a request for generating an overlay of desired contents from a requesting peer, it generates a P2P overlay, a logical path along which contents are to be transmitted to the requesting peer, by using the registered information regarding the plurality of peers, information regarding a network to which the plurality of peers are connected, and information regarding the application service corresponding to the desired contents, and delivers the connection information to the requesting peer with reference to the P2P overlay. | 04-14-2011 |
20110087776 | CLOUD BASED COMPUTER POWER MANAGEMENT - According to one general aspect, a method of providing data to a client device may include receiving a request from a client device for a multi-element document. The method may also include receiving, from the client device, an indicator related to the level of system resources of the client device. The method may include dynamically adjusting one or more of the elements included by the requested multi-element document based, at least in part, upon the received indicator. The method may further include transmitting the adjusted multi-element document to the client device. | 04-14-2011 |
20110087777 | Information-processing device, information-processing method, and program - An information-processing device includes an execution unit configured to execute a plurality of application programs, an evaluation order decision unit configured to decide an evaluation order based on a degree of reliability of each of the plurality of application programs, and an execution management unit configured to manage execution, by the execution unit, of each of the application programs based on the evaluation order that is decided by the evaluation order decision unit. | 04-14-2011 |
20110087778 | PROVIDER PRESENCE INFORMATION - In some embodiments, a client computer includes a memory, a client presence program adapted to be located in the memory, and a processor. The processor is coupled to the memory and is adapted to execute the client presence program to receive provider presence information from an instant messaging (IM) server and to store the provider presence information in the memory. The provider presence information includes at least a provider status for at least one service provider. | 04-14-2011 |
20110087779 | DETECTION OF HEAVY USERS OF NETWORK RESOURCES - A device includes a multistage filter and an elephant trap. The multistage filter has hash functions and an array. The multistage filter is operable to receive a packet associated with a candidate heavy network user and send the packet to the hash functions. The hash functions generate hash function output values corresponding to indices in the array. The elephant trap is connected to the multistage filter. The elephant trap includes a buffer and probabilistic sampling logic. The probabilistic sampling logic is operable to attempt to add information associated with the packet to the buffer a particular percentage of the time based in part on the result of the multistage filter lookup. The buffer is operable to hold information associated with the packet, counter information, and timestamp information. | 04-14-2011 |
20110093583 | TRIGGERING ACTIONS BASED ON CHANGES IN A NETWORK CONNECTION - The described embodiments provide a system for performing an action based on a change in a status of a wired or wireless network connection for the system. During operation, the system detects the change in the status of the network connection. In response to detecting the change, the system determines a state of the system. The system then performs one or more actions using the determined state. | 04-21-2011 |
20110093584 | System and method to prevent endpoint device recovery flood in NGN - A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an enhanced DNS load balancer, DNS queries from the user end points relating to a particular NGN edge device are selectively dropped if a rate of queries for the particular edge device suddenly increases or exceeds a threshold. The query dropping may also be based in part on the class of service assigned to the user endpoint. | 04-21-2011 |
20110093585 | METHOD OF DETECTING MEASUREMENTS IN SERVICE LEVEL AGREEMENT BASED SYSTEMS - A method and program product are provided for implementing object state changes in a data network system that includes at least one application having a plurality of objects. Each object is capable of being in of a plurality of different object states. The method comprises utilizing a network monitor to identify potential object state anomaly candidates from among the plurality of objects and utilizing object measurements taken during a predetermined time segment to determine of the current object state of a potential object state anomaly candidate should change from the current object state to an updated object state. | 04-21-2011 |
20110093586 | SYSTEM AND METHOD FOR DIRECTING CLIENTS TO OPTIMAL SERVERS IN COMPUTER NETWORKS - A communication protocol includes one or more messages passed between Web routers over a reliable transmission protocol used for inter-Web router communication. These messages include information that allows the Web routers to dynamically update mappings of client addresses or address ranges to information object repository addresses based on client-to-server distance and server load. The mappings are preferably optimal mappings of the client addresses or address ranges to the information object repository addresses and the messages report updated distances from these information object repository addresses to the client addresses or address ranges. For example, the messages may report, for each updated distance, an associated client address or address range and/or an associated anchor address of a Web router co-located with an information object repository that is the subject of the message. | 04-21-2011 |
20110093587 | DEVICE DATA MANAGEMENT SYSTEM - [Problems] To provide a device data management system which can know and monitor use of user computers constituting a network and respective operation states. | 04-21-2011 |
20110093588 | Monitoring the performance of a Computer - A computer implemented method of monitoring the performance of a computer comprises determining the value of an activity metric of the monitored computer. The contribution(s) to the said value of one or more predetermined activities is/are determined In one embodiment, the said contribution(s) are subtracted from the said total value to provide a net value representing a measure of the performance of the computer. A predetermined data set may be used to identify the one or more predetermined activities. In another embodiment, the value of at least one activity metric of the monitored computer is determined excluding contributions to that value from the said one or more predetermined activities identified from the said data set to provide a net value representing a measure of the performance of the computer. The net value may be used to control the power consumption of the computer. | 04-21-2011 |
20110093589 | DETERMINING USAGE OF COMPUTING DEVICES THAT STORE STATE INFORMATION ON HOST COMPUTER SYSTEMS - A state storage application can be configured to retrieve, from a computing device coupled to a host computing system, state information for the computing device, with the state information reflecting a current or past state of the computing device. The state storage application can be further configured to store the retrieved state information in a storage medium. A monitoring application can be configured to access the stored state information, and send at least a portion of the accessed state information to one or more servers. | 04-21-2011 |
20110093590 | Event Management System - An event management system is configured to detect an overlap between events and provide a communication to remediate the overlap to one or more event attendees. | 04-21-2011 |
20110093591 | Detecting Unavailable Network Connections - A method for detecting unavailable network connections comprises, at a first data processing node that is hosting a transport protocol connection that uses a plurality of sequence values to identify messages sent to a peer node, wherein the first node is communicatively coupled to a second data processing node serving as a redundant backup, periodically sending a checkpoint sequence value to the second node; detecting that either the transport protocol connection or a process using the transport protocol connection is unavailable, without use of a timeout; and in response thereto, sending a notification to the peer node, wherein the notification includes the checkpoint sequence value. One embodiment provides for rapidly detecting and responding to failure of a TCP process without using long timeouts as conventionally provided in long-lived applications that run on top of TCP. | 04-21-2011 |
20110093592 | IMS PERFORMANCE MONITORING - A method and apparatus enabling performance monitoring in packet-switched IP networks such as those configured according to an IP multimedia subsystem, IMS, architecture. Performance is monitored by reconstructing selected control signaling sequences. The control signaling sequences, which are typically executed according a signaling protocol such as the Session Initiation Protocol, SIP, are reconstructed by parsing the contents of monitoring request headers configured, modified, and attached to control messages according to the present invention. The header includes at least an IMS monitoring ID field ( | 04-21-2011 |
20110099263 | Automated social networking television profile configuration and processing - Content selected by a user of a web access television (TV) device is monitored via a profile controller associated with the web access TV device. Social network aspects of a web access TV user profile are automatically configured based upon the monitored content selected by the user. Social networking opportunities for the user are managed via the web access TV user profile. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 04-28-2011 |
20110099264 | NETWORK DEVICE DISCOVERY - A system and method enable a local area network connected mobile device to discover, via an ancillary wireless communication channel, a local area network connected device and install the appropriate driver and network configuration information when the mobile device and network connected device are brought into physical close proximity with each other. | 04-28-2011 |
20110099265 | DEFINING ENFORCING AND GOVERNING PERFORMANCE GOALS OF A DISTRIBUTED CACHING INFRASTRUCTURE - Embodiments of the present invention provide a method, system and computer program product for enforcing performance goals in an n-Tier distributed caching infrastructure. In an embodiment of the invention, a method of enforcing performance goals in an n-Tier distributed caching infrastructure can include establishing a communicative connection to multiple different cache servers arranged in respective tier nodes in an n-Tier cache. The method also can include collecting performance metrics for each of the cache servers in the respective tier nodes of the n-Tier cache and identifying a cache server amongst the cache servers in respective tier nodes of the n-Tier demonstrating a performance likely to breach at least one term of an SLA. Finally, the method can include applying a remedial measure to the identified cache server. | 04-28-2011 |
20110099266 | Maintaining Service Performance During a Cloud Upgrade - Systems, methods, and computer storage media for upgrading a domain in a distributed computing environment are provided. Upgrading of the domain includes preparing for the upgrade, upgrading, and finalizing the upgrade. The preparation of the domain includes ensuring predefined quantities of role instances are available in domains other than the upgrade domain. The preparation also includes ensuring that a predefined number of extent replicas are available in domains other than the upgrade domain. The preparation may also include checkpointing partitions within the upgrade domain to facilitate faster loading once transferred to a domain other than the upgrade domain. The finalization may include allowing nodes within the upgrade domain to resume functionality that was suspended during the upgrade. | 04-28-2011 |
20110099267 | Resource Optimization and Monitoring in Virtualized Infrastructure - A method includes monitoring a resource consumption of one or more virtual machines on a host computer in a computer network, and suspending the one or more virtual machines based on the resource consumption to free one or more resources on the host computer. The method also includes losslessly handling a request intended for the suspended one or more virtual machines to seamlessly resume the suspended one or more virtual machines. The request includes a network traffic intended for the suspended one or more virtual machines and/or a non-network request. | 04-28-2011 |
20110099268 | INFORMATION PROCESSING SYSTEM, AND MANAGEMENT METHOD FOR STORAGE MONITORING SERVER - An information processing system | 04-28-2011 |
20110099269 | MESSAGE FILTRATION IN A NETWORK MONITORING SYSTEM - A system and method for monitoring unit for providing network monitoring and message filtration in a network system is provided including a message generator configured to generate at least one alert message for defining an alert condition in the network system. A message designator is provided for designating the at least one alert message in accordance with the state of the alert condition. A reset module is provided configured for generating a reset message for defining when an alert condition is resolved. The reset message is automatically mapped to or associated with its corresponding alert message, which is now designated as a resolved or inactive message. A user view is provided in which only unresolved or active messages are displayed. | 04-28-2011 |
20110099270 | Communications Device and Method of Operation Thereof - A communications device, such as a mobile telephone, fixed line telephone, computer with network access, or any other similar device which is equipped to communicate using network and/or telephony protocols, is provided, wherein before a call or other communications sessions is set up and made, a determination of the present time at the intended recipient of the call or session is made. In some embodiments, this determination of the time at the intended recipient's location is displayed to a user of the calling device to allow the user to decide whether to proceed with a call to the intended recipient. In other embodiments the determined time is compared with a set of one or more predetermined time bands during which calls to a recipient should not be made. Depending on the results of the comparison, the operation of the communications device is altered, for example, in one embodiment the call is not made, and the user preferably informed. In another embodiment, the user (caller) is advised that the call is being made at an inappropriate time for the intended recipient, and prompted to indicate whether the call should proceed. With such techniques, the problems noted above of unwanted calls being set up unnecessarily can be addressed. | 04-28-2011 |
20110099271 | SYSTEM AND METHOD FOR ENFORCING RFID EVENT MANAGEMENT POLICY - Provided are a system and method for enforcing a radio frequency identification (RFID) event management policy. The system includes a policy definer for defining an RFID event management policy to be used by a client to manage an apparatus on the basis of an RFID event, a policy storage for storing the RFID event management policy, a policy determiner for selecting the RFID event management policy stored in the policy storage using a profile of the client included in an RFID event management policy request when the RFID event management policy request is received from the client, and a policy enforcer converting the selected RFID event management policy according to a standard executable by the client. | 04-28-2011 |
20110099272 | MANAGEMENT SYSTEM, IMAGE FORMING APPARATUS, AND METHOD THEREFOR - A management system includes an image forming apparatus that manages a phenomenon having occurred in the image forming apparatus as history information, inquires a management apparatus about status information indicating whether the management apparatus is ready for a remote operation of the image forming apparatus, receives the status information relating to the image forming apparatus, from the management apparatus, as a response to an inquiry, enables a function for starting connection to the management apparatus for communication if the managed history information includes an unprocessed phenomenon and the status information transmitted from the management apparatus indicates that the management apparatus is ready for the remote operation, and causes the image forming apparatus to start the connection to the management apparatus for communication in response to a user's operation to execute the enabled function. | 04-28-2011 |
20110099273 | MONITORING APPARATUS, MONITORING METHOD, AND A COMPUTER-READABLE RECORDING MEDIUM STORING A MONITORING PROGRAM - A monitoring apparatus configured to monitor applications running on one or more monitored apparatuses; the monitoring apparatus includes: an enquiry packet generator and transmitter that generates multiple types of enquiry packets, and successively transmits the multiple types of enquiry packets to respective communication ports on the one or more monitored servers; an enquiry packet response receiver that receives enquiry packet responses, which are transmitted in response to the multiple types of enquiry packets from communication ports on the one or more monitored apparatuses; and an application analyzer that analyzes the content of the enquiry packet responses transmitted in response to the multiple types of enquiry packets, and analyzes applications running on the one or more monitored servers as applications to be monitored. | 04-28-2011 |
20110099274 | PEER DISCOVERY AND CONNECTION MANAGEMENT BASED ON CONTEXT SENSITIVE SOCIAL NETWORKS - In a method for automatically filtering communications, a networking request from an initiating party on an initiating communication device is received. The networking request pertains to a request for communication between the initiating communication device and a recipient communication device of a user over a communication channel. A determination is made of whether the communication channel to be used for the communication matches a communication channel for a previous communication between the initiating party and the user. It is automatically determined whether to grant the networking request, based at least in part on the determination of whether the communication channel for the communication matches the communication channel for the previous communication between the initiating party and the user. Other embodiments are described and claimed. | 04-28-2011 |
20110099275 | RACF SYSTEM AND EQUIPMENT HAVING DYNAMIC DISCOVERING FUNCTION IN NGN - A resource admission control function system having dynamic discovering function in a next generation network is provided. The resource admission control function system comprises a transport resource control function entity and a policy decision function entity that intercommunicate with each other; the system also comprises a dynamic discovering function unit for dynamically collecting and saving information of connection relationship between various function entities in the network, receiving an inquiry request, and feeding back the information of connection relation meeting the inquiry conditions to an inquiry request submitting entity. | 04-28-2011 |
20110106935 | POWER MANAGEMENT FOR IDLE SYSTEM IN CLUSTERS - Clusters of systems employed to increase computation capacity for specific services like the web or protocols such as the file transfer protocol. Broadly contemplated herein is an arrangement involving a set of compute nodes that perform the actual task and load balancer systems that monitor and distribute work among the compute nodes, taking into account the current load and remaining compute capacity available in each of the nodes. Power saving techniques can be applied to nodes in the cluster that are not actively running the workload due to lower utilization of the total cluster capacity. | 05-05-2011 |
20110106936 | TRANSACTION STORAGE DETERMINATION VIA PATTERN MATCHING - A network analyzer, system and method determine whether or not network transaction data derived from network analysis should be stored, based on a configuration. Configuration strings (patterns) are entered via a configuration file, including specifying whether the string should be a prefix, suffix, other location or exist anyplace in the data. Storage enabling/disabling is provided for network transaction data. Configuration strings (patterns) can be specified for request/response summary/detail, and for specified parameters. | 05-05-2011 |
20110106937 | MIXED-MODE ANALYSIS - A network analyzer determines, analyzes, and displays in streaming and non-streaming modes to provide analysis of specific transactions in that make sense within a primarily streaming or asynchronous flow of data, providing useful and accurate measurements. | 05-05-2011 |
20110106938 | Multi-Level Offload of Model-Based Adaptive Monitoring for Systems Management - A method, system, and article are provided for monitoring performance of hardware devices. Each hardware device is configured with an agent, and the server is configured with a coordinator. The agent collects device data at a first modifiable frequency and communicates the collected data to the coordinator at a second dynamically modifiable frequency. The collected data is periodically monitored and the first and second frequencies are modified subject to evaluation of the collected and monitored data. | 05-05-2011 |
20110106939 | COMPUTER SYSTEM AND ITS MANAGEMENT METHOD - Specifically, provided is a computer system, and its management method, including multiple nodes for providing to a host system a storage area to be used for reading and writing data, and respectively acquiring a snapshot at a pre-set time, and which configures a node group from a part or all of the nodes among the multiple nodes and makes data redundant in node units in the node group. With the foregoing computer system and its management method, an access log is acquired from the respective nodes configuring the node group, and the usage of the snapshot in the node group is determined based on the acquired access log of the respective nodes, and the acquisition time of the snapshot is changed in a part or all of the nodes among the nodes configuring the node group based on the determination result. | 05-05-2011 |
20110106940 | METHOD AND SYSTEM FOR ADAPTING A SESSION TIMEOUT PERIOD - A method for adapting a session timeout period of an application comprising one or more parts, each part of the application having a corresponding predetermined session timeout period for receiving an input from a user connected to a part of the application, comprising the steps of determining the rate of timed out sessions for the part of the application after the number of connections to the part has reached a predetermined level; comparing the rate of timed out sessions of the part of the application with a predetermined threshold value of the rate of timed out sessions; adapting the predetermined session timeout period of that part ( | 05-05-2011 |
20110106941 | Processing Network Events - Processing network events generates multiple events from a single network device event. The system includes a network monitoring device for acquiring event data and a processing system for receiving an input event from a network monitoring device on a processing thread, wherein the processing system includes a communications thread generating component for generating multiple communications threads each for transmitting event data to a server database. The communication threads open connections to required server databases and these connections are maintained in an open state while the network monitoring device is running. | 05-05-2011 |
20110106942 | Data collection associated with components and services of a wireless communication network - Systems, apparatus, and methods for transmitting a data collection profile from a server in connection with a telecommunications network that includes multiple devices. The data collection profile controls which devices should collect data, the condition under which certain data is desired, and when the data is to be returned. The data collection profile is provided to devices which collect data in accordance with the data collection profile. Finally, the collected data is received by a service platform for further processing. | 05-05-2011 |
20110106943 | Host Independent Secondary Application Processor - A system for providing a secondary processing environment to a computer system having a host processor includes a secondary processor configured to perform a processing service, a policy manager configured to control interaction between the secondary processor and the host processor, a service provider configured to provide the processing service to the computer system and a host-state monitor to monitor state of the host processor, wherein the secondary processor operation is based on the state of the host processor. | 05-05-2011 |
20110106944 | METHOD AND APPARATUS FOR EXTRACTING AND VISUALIZING EXECUTION PATTERNS FROM WEB SERVICES - One embodiment of the present method and apparatus for extracting and visualizing execution patterns from Web Services collects data relating to one or more transactions executed in accordance with one or more Web Services-based applications (e.g., messaging systems or other services). One or more patterns is then extracted from the collected data, where the patterns are representative transactions commonly executed in accordance with the Web Services configuration under analysis. | 05-05-2011 |
20110106945 | METHOD AND SYSTEM FOR ENERGY EFFICIENT ROUTING AND NETWORK SERVICES - A method and system of an embodiment may include identifying a power source used by a network element, determining a carbon footprint of a unit of power usage from the power source, identifying one or more components associated with the network element used for a network operation performed by the network element, determining the power usage of the one or more identified components during the process, and calculating the carbon footprint of the process performed by the network element. | 05-05-2011 |
20110113134 | Server Access Processing System - A method, programmed medium and system are provided for preventing the denial of file system access to a plurality of clients accessing a NFS server. In one example, an NFS server is configured to listen on a server port. The server runs a separate daemon which “watches” client requests as they are received at the NFS server. The server processing system tracks the number of times a client sends consecutive TCP zero-window packets in response to a data packet from the server. If the number of zero-window packets crosses a user-defined threshold, then a routine is called to stop responding to that client using a backoff algorithm. When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server process starts terminating connections to the clients starting from the ones with the oldest entry in the table. | 05-12-2011 |
20110113135 | METHOD, SYSTEM AND APPARATUS FOR MANAGEMENT OF PUSH CONTENT WHEN CHANGING COMPUTING DEVICES - A method, system and apparatus for management of push content when changing computing devices is provided. In an example embodiment, a computing device is configured to maintain an absolute identifier of the device that remains unchangeable, and a relative identifier that can be changed. The processor of the device is configured to ascertain if the relative identifier has been changed, and accordingly notify any network infrastructure that is configure to send push content to the device to cease delivery of such push content. | 05-12-2011 |
20110113136 | METHOD AND APPARATUS FOR COMBINING DATA ASSOCIATED WITH HARDWARE RESOURCES AND NETWORK TRAFFIC - To generate performance statistics of a host, a physical or virtual component of the host is associated with network interface information corresponding to one or more physical or virtual network interface devices disposed in the host. The performance statistics of the physical or virtual component together with the associated network interface information are periodically transmitted. The network interface information may be a MAC address or an SNMP ifIndex associated with the physical or virtual network interface devices. The SNMP ifIndex may be used to retrieve a corresponding MAC address. The transmitted network interface information is used to analyze the performance statistics of the associated physical or virtual component. The performance statistic may represent a CPU usage, a memory usage, a disk usage, an I/O usage, power consumption, or temperature of the physical or virtual component. | 05-12-2011 |
20110113137 | BEAM COMBINATION METHODS AND SYSTEMS FOR ADAPTING COMMUNICATION LINKS TO VARYING CHANNEL CONDITIONS - Methods and systems for rectifying deteriorated channel conditions on a communication link are described. In response to the detection of a link deterioration event, a cluster of beams about a currently utilized beam pair can be trialed to determine a suitable, alternate pair of beams on which to establish a communication link. In turn, in the case of a link blockage event, a set of beams having a relatively large azimuthal angle with respect to a currently utilized beam pair can be trialed to determine a suitable beam pair for further communication. | 05-12-2011 |
20110113138 | SEMANTICALLY ENHANCED SERVICE SWITCHING - A system for automating service switching in a manner that may be transparent to any actively communicating applications or devices operating in a modular service based system architecture for mobile and embedded devices. An application level entity, such as an application node, may connect to a virtual service, which may be connected to one or more registered services. A switching subsystem may relay communication between the one or more registered services and the application via the virtual service. If a more suitable service becomes available, the switching subsystem may decide to switch from one or more of the registered services to the newly available service via the virtual service. | 05-12-2011 |
20110113139 | System and Method for Providing Remote Forensics Capability - A system and method for performing a forensic analysis of a subject computer having a non-volatile memory with a second computer is provided. In one embodiment, the method includes executing on the subject computer a first code segment configured to provide communications via a non-proprietary communication protocol such as the Internet Small Computer System Interface (iSCSI) protocol; establishing a connection between the second computer and the subject computer via the non-proprietary communication protocol. The non-proprietary communication protocol includes one or more write operations for writing data to a non-volatile memory in response to one or more write commands and the first code segment is configured to not write data to the non-volatile memory of the subject computer in response to receipt of the one or more write commands. The method may include performing a first forensic analysis of the subject computer via the connection. In addition, the method may further comprise establishing a secure connection, such via the Internet, between the second computer and a remote computer, wherein performing the first forensic analysis is initiated by the remote computer. A pre-defined forensic instruction set may be stored on the second computer and executed to perform the first forensic analysis. | 05-12-2011 |
20110119369 | MONITORING COMPUTER SYSTEM PERFORMANCE - Disclosed are embodiments related to a method for monitoring performance of a plurality of client nodes. The client nodes are coupled to a master node over a network. The method comprises the master node requesting performance data from at least one of the client nodes. At least one of the client nodes being configured to collect the performance data from at least one other client node and transmit the performance data to the master node. Other embodiments are also disclosed. | 05-19-2011 |
20110119370 | MEASURING NETWORK PERFORMANCE FOR CLOUD SERVICES - Described is a technology by which a content server downloads an active content measuring tool object to a client request for a page. When loaded, the measuring tool object makes network measurements, including by direct socket access, and return measurement results. As part of its operations, the measuring tool object may request measurement assignments from a central controller, and/or return those results to the central controller. Measurement assignments may be directed towards determining a round trip time/latency, measuring throughput, packet loss rate, detecting in-fight modification of content and/or detecting the presence of a middle box, including the presence of a caching proxy server middle box. The measurement results may be used to evaluate hypothetical deployment of a number of servers and/or geographic locations for those servers. | 05-19-2011 |
20110119371 | DEVICE DATA MANAGEMENT SYSTEM - [Problems] To provide a device data management system which monitors connection with an external device other than user computers constituting a network. | 05-19-2011 |
20110119372 | MESSAGE MANAGEMENT AND SUPPRESSION IN A MONITORING SYSTEM - A system and method for providing message suppression and management in a monitoring system is provided including a monitoring module including a message listener configured for receiving messages from monitored modules, and a suppression module configured for determining if an incoming message matches any existing message stored in the monitoring system and increasing a Suppression Interval (SI) exponentially for each same incoming message received at an Event Time which is within a time limit. | 05-19-2011 |
20110119373 | SERVICE WORKFLOW GENERATION APPARATUS AND METHOD - A service workflow generation apparatus, having a quality of service (QoS) monitor for obtaining a plurality of real time QoS values respectively corresponding to a plurality of service elements on the web. A QoS calculation module generates a plurality of possible service workflows composed of the service elements and a plurality of overall QoS values of the possible service workflows based on the real time QoS values by using a Modified Heuristic Algorithm. A service workflow selection module dynamically selects a service workflow from the possible service workflows according to the overall QoS value. | 05-19-2011 |
20110119374 | Method and System for Detecting Anomalies in Time Series Data - A server system stores time series data for a data source. The time series data comprises a plurality of time-value pairs, each pair including a value associated with an attribute of the data source and a time. For a particular attribute, the server system generates a plurality of forecasting models for characterizing the time-value pairs, each model including an estimated attribute value and an associated error-variance. For a time-value pair, the server system determines a plurality of differences between the value of the time-value pair and respective estimated attribute values of the plurality of forecasting models and tags the time-value pair as an anomaly if the differences for at least a first subset of the forecasting models are greater than the corresponding error variances. In response to a request from a client application, the server system returns at least a subset of the time-value pairs tagged as anomalies. | 05-19-2011 |
20110119375 | Systems and Methods for Analyzing the Health of Networks and Identifying Points of Interest in Networks - Systems and methods for analyzing the health of networks and identifying Points of Interest in networks are provided. In one embodiment, a method for analyzing the health of a network is provided. The method may include: receiving status information for multiple network devices associated with a network; and analyzing the status information for at least a portion of the network devices by comparing the statuses of one or more network devices that are located downstream on the network relative to the statuses of one or more network devices that are located upstream on the network. | 05-19-2011 |
20110119376 | Methods, Systems, And Computer Program Products For Determining An Originator Of A Network Packet Using Biometric Information - Methods, systems, and computer program products for determining an originator of a network packet using biometric information are disclosed. A network packet is received from a network device. A header or a trailer of the network packet is analyzed to determine whether the header or trailer includes an identifier of biometric identification information of a network user. The network packet is identified as having originated from the network user if the header or trailer includes the identifier of biometric identification information of the network user. Identifying the network packet as having originated from the network user does not require reading a payload of the packet. | 05-19-2011 |
20110119377 | METHOD AND APPARATUS FOR NETWORK TO RECOMMEND BEST MODE FOR USER COMMUNICATION - The present disclosure generally provides techniques and apparatuses for producing, for an initiating end user, a recommended mode of communication corresponding to a targeted end user in a network environment, based on a plurality of network accessible or determinable inputs. For example, the identity of an initiating end user, the identity of a targeted end user, the current activity of the targeted end user, the communication preferences of the targeted end user, information from available databases and other available or determinable data may be used by a contact liaison to produce a recommended mode of communication. | 05-19-2011 |
20110119378 | Managing Virtual Business Instances Within a Computer Network - Methods and apparatus, including computer program products, implementing and using techniques for orchestrating a business process in a computer network. A script describing a business process is received from a client machine over the computer network. The script is compiled into executable program instructions. A reference to the script and data to be operated on by the script is received from the client machine over the computer network. The data is processed in accordance with the script. The result of the data processing is returned to the client machine over the computer network. | 05-19-2011 |
20110125892 | SYSTEMS AND METHODS FOR TRACE FILTERS BY ASSOCIATION OF CLIENT TO VSERVER TO SERVICES - The present disclosure is directed towards systems and methods for tracing packets via an intermediary device. The systems and methods include an intermediary device that establishes connections with clients and connections with servers. The intermediary device links a connection to a server with a connection to a client to provide a client with access to the server. When the client requests a packet trace, the intermediary device applies the trace to linked connections with the client to obtain full trace information for network packets servicing the client. | 05-26-2011 |
20110125893 | Method for recording user experience or performance of a peripheral device - The present invention comprises a system, apparatus, and method for subscribing to indicia related to a user experience or a peripheral device, in an embodiment a broadband wireless modem, recording selected indicia, and forwarding them to a server on a network. The system comprises a server coupled to a plurality of user terminals through a network, to receive a set of indicia, an apparatus for controlling a baseband/broadband processor, and a program product comprising instructions to adapt a central processing unit to perform as follows. In an embodiment, connecting to a broadband/baseband processor comprising issuing commands, subscribing to receive indicia, determining a condition has occurred, recording a plurality of indicia, forwarding a set of indicia to a destination on the network. Indicia includes measurement values, state changes, event occurrences, user actions, activity and inactivity at time stamped milestones, and sequences and combinations of the above. | 05-26-2011 |
20110125894 | SYSTEM AND METHOD FOR INTELLIGENT WORKLOAD MANAGEMENT - The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads, wherein the management threads may converge information for managing identities and access credentials, enforcing policies, providing compliance assurances, managing provisioned and requested services, and managing physical and virtual infrastructure resources. In one implementation, an authentication server may generate authentication tokens defining access credentials for managed entities across a plurality of authentication domains, wherein the authentication tokens may control access to resources in an information technology infrastructure. For example, a management infrastructure may create service distributions for the managed entities, which may include virtual machine images hosted on physical resources. Further, the authentication tokens may be embedded in the service distributions, whereby the embedded authentication tokens may control access to the resources in the information technology infrastructure. | 05-26-2011 |
20110125895 | SYSTEM AND METHOD FOR PROVIDING SCORECARDS TO VISUALIZE SERVICES IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for providing scorecards to visualize services in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for describing services, applications, workloads, in an information technology infrastructure. For example, a discovery engine may reference an identity vault to capture enriched models of an infrastructure, and a management infrastructure may then generate one or more scorecards that can be used to manage the infrastructure. In particular, the scorecards may provide information for tuning or otherwise controlling risk, complexity, cost, availability, and agility versus rigidness in the infrastructure. | 05-26-2011 |
20110125896 | SYSTEM AND METHOD FOR ACQUIRING AND ADDING DATA ON THE PLAYING OF ELEMENTS OR MULTIMEDIA FILES - The invention relates to a system and method for acquiring and aggregating information relating to the reproduction of multimedia files or elements in a database, said data including information relating to the number of multimedia file or element reproductions. The inventive system comprises a plurality of digital devices which can access and reproduce multimedia files and an acquisition and storage device which communicates with each of the digital devices in order to receive data from each of the identification/characterization programs, such that said identification/characterization program can count the reproductions at least in a direct and/or weighted manner. | 05-26-2011 |
20110125897 | DETECTION OF HOME NETWORK CONFIGURATION PROBLEMS - A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks. | 05-26-2011 |
20110131315 | METHODS AND SYSTEMS FOR VERIFYING SOFTWARE LICENSE COMPLIANCE IN CLOUD COMPUTING ENVIRONMENTS - A monitoring system can monitor computing processes in clouds. The monitoring system can verify software license compliance in the computing processes instantiated in the clouds. The monitoring system can generate and maintain a software license knowledge base. The software license knowledge base can include the software license requirements for various software programs. To verify software license compliance, the monitoring system can determine the software programs utilized by the computing processes instantiated in the clouds. The monitoring system can compare the software programs utilized by the computing processes to the software license knowledge base to determine the number of software licenses required by the computing processes. The monitoring system can compare the number of software licenses required to the number of software licenses currently held by the user to determine if the user is in compliance. | 06-02-2011 |
20110131316 | METHODS AND SYSTEMS FOR DETECTING EVENTS IN CLOUD COMPUTING ENVIRONMENTS AND PERFORMING ACTIONS UPON OCCURRENCE OF THE EVENTS - A monitoring system can monitor computing processes in clouds. The monitoring system can monitor the clouds for certain events associated with the computing processes. The monitoring system can receive, from the user, a particular event and an action to perform upon the occurrence of the event. Once received, the monitoring system can compare the information collected during monitoring against the event specified by the user. Once the event occurs, the monitoring system can perform the action associated with the event. | 06-02-2011 |
20110131317 | Coverage Gap Detection In Wireless Networks - Embodiments are described herein to provide a general approach to wireless coverage gap detection. One general approach involves network equipment comparing ( | 06-02-2011 |
20110131318 | HIGH AVAILABILITY ENABLER - Embodiments of the invention provide systems and methods for interacting with a high availability session. According to one embodiment, a method of providing high availability can comprise abstracting one or more functions of a high availability infrastructure via a high availability enabler and providing access to the abstracted one or more functions via a northbound interface of the high availability enabler. For example, the one or more functions of the high availability infrastructure can comprise session control, either synchronous session control or asynchronous session control, concurrency management, data distribution, e.g., possibly including storing at least some of the data local to the high availability enabler, caching, session replication, providing fault tolerance, providing predictable latencies, etc. The high availability infrastructure can comprise, for example JGroups, Oracle Coherence, or another high availability infrastructure. The method can include decoupling application level processing from protocol level processing via the high availability enabler. | 06-02-2011 |
20110131319 | SYSTEMS AND METHODS FOR OPTIMIZING CHANNEL RESOURCES BY COORDINATING DATA TRANSFERS BASED ON DATA TYPE AND TRAFFIC - A networked computing system for optimizing network channel resources. The system includes a sender device, user equipment, a congestion sensing agent, a data transfer agent, and a data communications network facilitating data communications amongst all devices of the system. The networked computing system is configured to detect a portion of channel traffic that is associated with a first data type, detect a portion of the channel traffic that is associated with a second data type, and determine whether to modify at least one data transfer of the second data type based on a comparison of the portions of the channel traffic associated with the first data type and the second data type. The first data type may relate to either voice data communications or another high priority data type, and the second data type may relate to a media content file type. | 06-02-2011 |
20110131320 | APPARATUS AND METHOD OF DYNAMICALLY MANAGING SENSOR MODULE ON SENSOR NODE IN WIRELESS SENSOR NETWORK - Provided is an apparatus and method of dynamically managing a sensor module on a sensor node in a wireless sensor network. The apparatus includes an update unit, a request unit, and a transmission unit. If a change occurs in sensor data corresponding to each sensor node stored in a sensor information storage server, the update unit receives the sensor data from the sensor information storage server, and transmits the received sensor data to the corresponding sensor node. The request unit requests the sensor data from the sensor information storage server upon receipt of a sensor data request message from the sensor node. The transmission unit receives the requested sensor data from the sensor information storage server and transmits the received sensor data to the sensor node. | 06-02-2011 |
20110131321 | MOBILE COMPUTING DEVICE AND METHOD WITH INTELLIGENT PUSHING MANAGEMENT | 06-02-2011 |
20110131322 | METHOD AND APPARATUS FOR ACCESSING FILES STORED IN A STORAGE ACCESS NETWORK (SAN) OR NETWORK ATTACHED STORAGE (NAS) - A method and apparatus for file access in a storage access network (SAN) wherein a portion of a first file is accessed and an access rate computed based on time and amount of data accessed. If the computed access rate is less than an expected rate, a problem is identified and analysis performed. A first analysis accesses the first file through a second link to determine if the link is the problem. If the first file is accessed at an expected rate, the first link is identified as the problem and the file is accessed through an alternate link. A second analysis accesses a second file through the first link. If the second file is accessed at an expected rate, the first file is identified as the problem and the second file is accessed through the first link. | 06-02-2011 |
20110131323 | INFORMATION COLLECTION DEVICE, INFORMATION COLLECTION PROGRAM, AND METHOD - An information collection device acquires information from a plurality of devices connected through a network. The information collection device includes: a first addition unit that adds, for each of the devices, an information collection duration required to collect information of the devices to a communication duration required to communicate with the devices; a second addition unit that adds a maximum duration among the durations by addition of the first addition unit to a predetermined time to obtain a first time; a subtraction unit that subtracts the information collection duration of each of the devices from the first time; a first setting unit that sets a time obtained by the subtraction unit as a second time that is when information collection starts at each of the devices; and an acquisition unit that acquires information obtained by the information collection that starts at the second time. | 06-02-2011 |
20110138034 | METERING RESOURCE USAGE IN A CLOUD COMPUTING ENVIRONMENT - An approach that provides assigning and tracking inter-Cloud operational transactions within a Cloud computing environment in order to meter Cloud resource usage when processing a Cloud service request. In one embodiment, there is a Cloud usage and accounting tool, including a route management component configured to define and manage the physical implementation of delineation points between Clouds. The Cloud usage and accounting tool further includes a workflow control component configured to track inter-Cloud operational transactions as they pass through the delineation points. | 06-09-2011 |
20110138035 | LOCATION OF MOBILE NETWORK NODES - The physical position of a movable node in a network is determined by sending a broadcast message from the movable node repeated through a path comprising at least a first node, a second node, and a third node, wherein the first, second, and third nodes have known locations. The movable node receives the broadcast message from the first, second, and third nodes, and measures the time from sending the repeated broadcast message to the time the broadcast message is received from each of the first, second, and third nodes. The movable node determines the distance from the movable node to the first, second, and third network nodes by using at least a known turnaround time and known message propagation velocity, such that the position of the movable node is determined. | 06-09-2011 |
20110138036 | SCALABLE REUSABLE SCANNING OF APPLICATION NETWORKS/SYSTEMS - A device schedules a scan of a group of devices associated with an application network/system, and receives, at a scheduled time, scan information from the group of devices, where the scan information is provided in different formats. The device also converts the scan information, in the different formats, into a single normalized format, and processes the normalized scan information to produce enriched, normalized scan information. | 06-09-2011 |
20110138037 | TECHNIQUES FOR WEB SERVER MANAGEMENT - Techniques for provisioning and decommissioning web servers in an automated manner. In one embodiment, a threshold value relating to an operational metric of a web server can be stored. The metric can be monitored as the web server receives requests. If the metric exceeds the threshold value, additional web servers can be automatically provisioned to handle a portion of the requests. If the metric falls below the threshold value, the additional web servers can be automatically decommissioned. In another embodiment, information can be logged pertaining to web server requests received over time. Based on this information and a threshold value, patterns of high/low server load can be determined and a policy can be generated identifying time intervals during which additional web servers should be provisioned (or existing web servers should be decommissioned). The policy can be used at server runtime to provision or decommission web servers at the identified intervals. | 06-09-2011 |
20110138038 | INTERPRETING CATEGORIZED CHANGE INFORMATION IN ORDER TO BUILD AND MAINTAIN CHANGE CATALOGS - Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may then group the change data into clusters and may correlate the clusters with a change catalog in order to provide a possible reason or cause for the cluster of changes. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user. In various embodiments, a reason may be determined for causing a cluster of changes and the change catalog may updated with the reason. | 06-09-2011 |
20110138039 | SCORING AND INTERPRETING CHANGE DATA THROUGH INFERENCE BY CORRELATING WITH CHANGE CATALOGS - Methods, systems, and articles for receiving, by a monitor server, change data associated with a change captured on a target host, are described herein. In various embodiments, the target host may have provided the change data in response to detecting the change, and the change data may include one or more rules, settings, and/or parameters. Further, in some embodiments, the monitor server may then group the change data into clusters and may correlate the clusters with a change catalog in order to provide a possible reason or cause for the cluster of changes. Once the change data have been classified as clusters, a report may be generated providing classification or categorization and cluster information for the various changes. In various embodiments, the generating may comprise generating a report to the target host and/or to an administrative user. | 06-09-2011 |
20110138040 | SYSTEM AND METHOD FOR MANAGING CUSTOMIZED SERVICE LEVEL AGREEMENT MONITORING - A system for managing customized SLA monitoring for providing a customized SLA monitoring service is linked with an external system to receive an external index order for a customer line subscribed in the service. The system reflects demands of the customer included in the external index order on SLA management data to update the SLA management data. Further, the system uses the updated SLA management data to determine whether to monitor with the external system and the customer line according to the result of the determination. | 06-09-2011 |
20110138041 | ZERO-MINUTE VIRUS AND SPAM DETECTION - Disclosed are systems and methods for detecting unwanted electronic message transmissions on a communications network. These include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages. | 06-09-2011 |
20110138042 | PERFORMANCE INFORMATION COLLECTION METHOD, APPARATUS AND RECORDING MEDIUM - In order to collect performance information of a computer capable of executing more than one application software, collection information indicating a timing at which the performance information is to be collected is prepared by the unit of application software. This collects the performance information by referring to the collection information corresponding to the application software currently being executed by the computer. Such a manner collects the performance information at an appropriate timing suitable to the application software currently being executed. | 06-09-2011 |
20110138043 | MUSIC COMPOSITION DATA TRANSMISSION RECORDING METHOD AND MUSIC COMPOSITION REPRODUCTION DEVICE - A song in a music player is replaced by another song in a server in accordance with the user's estimated preferences without requiring the user to become conscious of individual songs. A music player in a server detects a size of a free space in a memory and a playback history (a substantial playback count, which denotes the number of times a song was continuously played for a duration not shorter than a predetermined one, or a skip count, which denotes the number of times a song was played for a duration shorter than a predetermined one) of every song recording, and judges whether any song should be deleted from the memory to permit a song to be downloaded into the music player from the server. If any song should be deleted, a CPU selects a song having a small evaluation function as the song to be deleted. | 06-09-2011 |
20110145390 | LOAD BALANCING - A device may include a memory and logic. The logic may be configured to monitor a number of computer devices associated with a service, identify, based on the monitoring, whether any of the computer devices is experiencing a problem or is unavailable, and store, in the memory, information identifying each of the computer devices that is experiencing a problem or is unavailable. The logic may also be configured to receive a client request for the service, the client request being directed to a virtual Internet protocol (VIP) address associated with the device. The logic may be further configured to identify one of the computer devices to which the request is to be forwarded, and forward the request to the identified computer device. | 06-16-2011 |
20110145391 | SYSTEM AND METHOD FOR CORRELATING IP FLOWS ACROSS NETWORK ADDRESS TRANSLATION FIREWALLS - Systems and methods are disclosed for correlating IP flows across a NAT firewall. Data packets are captured from a first interface using a monitor probe coupled to the first interface and are correlated into a first group of session records. For each of the first group of session records, a correlation key is created using data in one of the packets in the session record. Data packets are captured from a second interface using a monitor probe coupled to the second interface and are correlated into a second group of session records. For each of the second group of session records, a correlation key is created using data in one of the packets in the session record. The correlation key for one of the first group is compared to the correlation keys for each of the second group of session records to identify session records with matching correlation keys. | 06-16-2011 |
20110145392 | DYNAMIC PROVISIONING OF RESOURCES WITHIN A CLOUD COMPUTING ENVIRONMENT - The present invention provides a solution (e.g., rules, techniques, etc.) for enabling the dynamic provisioning (e.g., movement) of Cloud-based jobs and resources. Such provisioning may be within a Cloud infrastructure, from Cloud to Cloud, from non-Cloud to Cloud, and from Cloud to non-Cloud. Each movement scenario is assigned a specific technique based on rules, profiles, SLA and/or other such criteria and agreements. Such dynamic adjustments may be especially advantageous in order to balance real-time workload to avoid over-provisioning, to manage Cloud performance, to attain a more efficient or cost-effective execution environment, to off-load a Cloud or specific Cloud resources for maintenance/service, and the like. | 06-16-2011 |
20110145393 | METHOD FOR DYNAMIC RESERVATION OF CLOUD AND ON PREMISES COMPUTING RESOURCES FOR SOFTWARE EXECUTION - A method for dynamic reservation of cloud and on premises resources for software execution is disclosed. The method may be comprised of: receiving the specification for the resources needed for the software, evaluating the availability of resources and reserving the resources for the software. The method may include a protocol to discover, evaluate availability, negotiate terms and create a reservation contract for software execution resources based on the required specification. This can be implemented using resource agent modules that represent available software execution resources (e.g.: CPU, memory, storage, network . . . ) and reservation agent modules that are used for communicating with the resource agent modules for reserving software execution resources. In addition, monitoring agent modules are used to monitor the actual software execution reservation contract. | 06-16-2011 |
20110145394 | PERFORMANCE MONITORING OF E-TREE SERVICE - A root node associated with an Ethernet-Tree (E-Tree) service sends, over a rooted-multipoint Ethernet virtual connection (EVC), a performance monitoring (PM) packet, where the PM packet includes a unique identifier for the root node and a time sent by the root node. The root node receives, from leaf nodes and a root point associated with the E-Tree service, PM response packets, where each PM response packet includes a unique identifier for the responding leaf node/root point and a time received by the responding leaf node/root point. The root node extracts, from each of the PM response packets, the unique identifier and the time received, and stores performance measurements based on the extracted data, where the performance measurements are associated with the respective leaf nodes/root point. | 06-16-2011 |
20110145395 | AIR CONDITIONING SYSTEM - An air conditioning system includes one or plural device group monitoring targets including one or plural indoor units and an outdoor unit, one or plural connection devices configured to be communicably connected to the indoor unit/units and the outdoor unit and have a unique ID, and a monitoring device configured to be communicably connected to the connection device/devices and have a monitoring memory that stores data received from the connection device/devices. When power supply is started respectively, the connection device/devices respectively performs communication with the indoor unit/units and the outdoor unit to collect configuration type information representing at least the configuration and the type of the device group monitoring target corresponding to the connection device, and respectively transmits the configuration type information to the monitoring device together with the ID of the connection device corresponding to the configuration type information. | 06-16-2011 |
20110145396 | METHOD AND SYSTEM FOR LAWFUL INTERCEPTION OF INTERNET SERVICE - In a lawful interception system including an interception unit, an application service providing unit, and an Internet access service providing unit, the application service providing unit may receive, from the interception unit, an interception request including interception target information of an interception target. Next, the application service providing unit may transfer a user code corresponding to the received interception target information to the interception unit, and may insert user related information into a packet to be provided to the interception target corresponding to the user code, enabling the packet to be lawfully intercepted. The interception unit may request the Internet access service providing unit for an interception of the packet with respect to the interception target by including the user code. | 06-16-2011 |
20110145397 | APPARATUS AND METHOD OF PEER-TO-PEER COMMUNICATION - An apparatus and method of communication include establishing, by a first peer device, a proximity-based connection with a second peer device, transmitting a first public network address of the first peer device over the proximity-based connection for receipt by the second peer device, receiving a second public network address of the second peer device over the proximity-based connection, and establishing a communication session over a wide area connection using the first public network address and the second public network address. | 06-16-2011 |
20110145398 | System and Method for Monitoring Visits to a Target Site - Methods and systems for monitoring visits to a target site are provided. A list of one or more origin sites is embedded in the target site. A determination is made whether any entry in the list of origin site has been previously visited. | 06-16-2011 |
20110145399 | PERFORMANCE, ANALYTICS AND AUDITING FRAMEWORK FOR PORTAL APPLICATIONS - A performance, analytics and auditing (PAA) system is configured to operate with a complex web application including a portal application and its sub systems non-intrusively. The PAA system includes a first component configured to capture behavior-related information from the portal application, a second component configured to capture performance-related information from the portal application, a third component configured to capture auditing-related information from the portal application. The PAA system is further configured to start or stop with minimal impact on the portal application, wherein the PAA system is coded using Aspect Oriented Programming (AOP) and able to collect information from multiple threads. | 06-16-2011 |
20110145400 | APPARATUS AND METHOD FOR ANALYSING A COMPUTER INFRASTRUCTURE - A system and method for analysing a computer infrastructure. The system and method analyses messages sent and received within the computer infrastructure to determine a system model and exception data. | 06-16-2011 |
20110145401 | Accessing Information From An Internet User's Web Session - A pre-existing reference number on a legacy website provided by a legacy website provider may be supplemented with an enhanced reference number capable of identifying an internet user engaged in a web session on the legacy website. A check may be made to establish whether the internet user's computing device has a state object, including a web user ID (wUID) unique to the internet user's computing device. A processor may create an enhanced reference number based on the pre-existing reference number upon receipt of a request, and an association between the wUID and the enhanced reference number may be stored in a database accessible by the website provider. The enhanced reference number may be made available to the user by displaying it in place of the pre-existing reference number on the legacy website via the web session. | 06-16-2011 |
20110145402 | WAIT FOR READY STATE - Automation of actions on a server system (e.g., web server, FTP server) is facilitated by a server system that is ready for actions to be performed upon it. Because there are scenarios when a server system is not in a state to be acted upon (e.g., web page changed due to navigation, script execution, asynchronous request through dynamic web extensions), an automated action needs to be synchronized to when then server system is in a ready state for that action to occur. A wait-for-ready state can be initiated that detects when a server system is ready for a next action. | 06-16-2011 |
20110145403 | AUTO-CREATION OF STORAGE RESOURCE MANAGEMENT PATHS - A method and an apparatus to automatically create storage resource management (SRM) paths has been presented. In one embodiment, the method includes monitoring a data storage system to collect configuration data of storage objects in the data storage system and automatically creating a storage resource management (SRM) path for a storage object in the data storage system using at least a portion of the configuration data in response to a user request to scan the storage object. | 06-16-2011 |
20110145404 | Autonomic Control of a Distributed Computing System Using Finite State Machines - In general, this disclosure describes techniques of managing resources in a service-oriented distributed computing system. As described in this disclosure, one or more control nodes provide for the efficient and automated allocation and management of resources within the distributed computing system. In order to provide automated allocation and management of computing functions and resources, a control node uses a set of governors. This set of governors includes a set of service governors to govern services used in the distributed computing system. The set of governors also includes a set of resource governors that govern individual resources of the services in the distributed computing system. The service governors and the resource governors may be implemented using finite state machines. | 06-16-2011 |
20110145405 | Methods for Collecting and Analyzing Network Performance Data - In an embodiment, a method comprises: collecting first connection data for first data connections that are (a) established between one or more clients and one or more servers, and that are (b) serviced by a first Internet service provider; based on the first connection data, determining a first re-transmission rate for the first data connections; collecting second connection data for second data connections that are (a) established between the clients and the one or more servers, and that are (b) serviced by a second Internet service provider; based on the second connection data, determining a second re-transmission rate for the second data connections; in response to determining that the first re-transmission rate exceeds a threshold value and that the second re-transmission rate does not exceed the threshold value, recommending, to the clients, that the clients reconfigure their Internet services to be serviced by the second Internet service provider. | 06-16-2011 |
20110145406 | Method and apparatus for realizing heartbeat mechanism in a communication network - In this invention, a proxy device is introduced between control device and implementing device in a communication network, to achieve the management related to work status monitoring between control device and implementing device, so that the load of control device handling message(s) related to status monitoring. Specifically, the proxy device firstly obtains the work status information of multiple implementing devices, and reports them to the control device via one or more uplink report messages; after receiving the uplink report message(s) from the proxy device, the control device obtains the work status information of multiple implementing devices based on the above uplink report message(s). The solutions in this invention are especially applicable to device status monitoring based on heartbeat mechanism in soft switch network. | 06-16-2011 |
20110153801 | Prefix Hijacking Detection Device and Methods Thereof - A method of placing prefix hijacking detection modules in a communications network includes selecting a set of candidate locations. For each candidate location, a detection coverage ratio with respect to a target Autonomous System is calculated. Based on the relative size of the coverage ratios, proposed locations for the prefix hijacking detection modules are determined. | 06-23-2011 |
20110153802 | LOCALIZATION OF PEER TO PEER TRAFFIC - A method of processing peer-to-peer requests is provided. The method may include; storing, at a network element, peer information in a database for each peer of a plurality of peers, the peer information indicating at least one ISP associated with the peer and the content contained by the peer, receiving a request for content from a requester, and sending a response to the content requester based on the ISP with which the requester is associated and the stored peer information. | 06-23-2011 |
20110153803 | System and Method for Enforcing Device Service Eligibility - A network component includes a device analyzing module and a functionality analyzing module. The device analyzing module analyzes first attributes related to a mobile device. The first attributes are associated with a device profile. The functionality analyzing module analyzes second attributes related to the mobile device. The second attributes are associated with a service profile. The analyses of the device profile and the service profile indicate whether the mobile device is operable to execute a requested service. | 06-23-2011 |
20110153804 | METHOD AND SYSTEM FOR REPORTING DEFECTS WITHIN A NETWORK - A method and system for reporting defects within a network are disclosed. In accordance with an embodiment of the present invention, a method for reporting defects within a network comprises generating a summary alarm by a network element based on defects detected within a network. The method further comprises receiving at the network element a first request for the detected defects within the network from a network management system in response to generation of the summary alarm. The method further comprises reporting the detected defects by the network element in response to the first request from the network management system. | 06-23-2011 |
20110153805 | TECHNIQUES TO MANAGE A MOBILE DEVICE BASED ON NETWORK DENSITY - Techniques to manage a mobile device based on network density are described. An apparatus may comprise a mobile computing device having a radio module operative to receive radio signals, a resource detector operative to collect a sample for one or more wireless resources based on the received radio signals, a network density module operative to estimate a network density for an operating environment of the mobile computing device based on the sample and a probability density function, and a parameter management module operative to manage one or more operational parameters of the mobile computing device based on the estimated network density. Other embodiments are described and claimed. | 06-23-2011 |
20110153806 | SERVICE DELIVERY PLATFORM AND MANAGEMENT SYSTEMS AND METHODS - Exemplary service delivery platform and management systems and methods are described herein. An exemplary method includes an intermediary application management subsystem, which is configured to communicate with an end-user access device and with an application server that is configured to deliver a service to the end-user access device, receiving a software application from a developer, the software application configured to be executed by the end-user access device to access the service delivered by the application server, setting up the service for selection by the end-user access device, receiving a request to subscribe to the service delivered by the application server, the request initiated by the end-user access device, and provisioning the service for delivery from the application server to the end-user access device. Corresponding systems and methods are also disclosed. | 06-23-2011 |
20110153807 | Systems and Methods for Preemptive DNS Resolution - Disclosed are systems, methods and computer program products for preemptive DNS resolution. A DNS proxy is provided for inspecting data packets transmitted to a client device on a first communication link. The proxy identifies one or more host device names embedded in the inspected data packets and resolves IP addresses associated with the embedded host device names. The proxy device transmits the inspected data packets to the client device without alterations on a second communication link. The second communication link has significantly higher propagation latency than the first communication link. The proxy then transmits to the client device, independent of the inspected data packets, the one or more host device names and the associated resolved IP addresses for use by the client device to establish connections to the host devices identified in the inspected data packet. | 06-23-2011 |
20110153808 | METHOD AND SYSTEM FOR PROVIDING A PERFORMANCE REPORT IN A WIRELESS NETWORK - A method and system for providing a performance report in a communication network are disclosed. For example, the method establishes a session with a mobile endpoint device, and monitors at least one performance parameter associated with the session by the mobile endpoint device. The method detects a termination of the session, and sends the performance report associated with the session to the communication network, wherein the performance report comprises information associated with the at least one performance parameter for the session. | 06-23-2011 |
20110153809 | Legal Intercept - Aspects of the subject matter described herein relate to silently recording communications. In aspects, data associated with a request to establish a communication is modified to cause the communication to be established via a path that includes a recording agent. Modification may include, for example, adding, changing, and/or deleting data within the data. The data as modified is then passed to a protocol entity that uses the data to establish a communication session. Because of the way in which the data has been modified, the protocol entity selects a path that includes the recording agent. The recording agent is then able to silently record the communication. | 06-23-2011 |
20110153810 | SYSTEMS AND METHODS FOR GSLB SPILLOVER - The present invention is directed towards systems and methods for global server load balancing spillover. An intermediary device providing global server load balancing (GSLB) identifies a spillover threshold for a first GSLB virtual server of the intermediary device. The first GSLB virtual server resolving DNS requests to a remote site of a plurality of remote sites. The intermediary device monitors spillover related statistics of each of a plurality of services at the plurality of remote sites, establishes a first spillover aggregate statistic for the plurality of services, determines that the first spillover aggregate statistic exceeds the spillover threshold for the first GSLB virtual server, and receives a DNS request and directing the DNS request to a second GSLB virtual server of the intermediary device responsive to the determination. | 06-23-2011 |
20110153811 | SYSTEM AND METHOD FOR MODELING ACTIVITY PATTERNS OF NETWORK TRAFFIC TO DETECT BOTNETS - The invention relates to a system and method that can detect botnets by classifying the communication activities for each client according to destination or based on similarity between the groups of collected traffic. According to certain aspects of the invention, the communication activities for each client can be classified to model network activity by differentiating the protocols of the collected network traffic based on destination and patterning the subgroups for the respective protocols. Those servers that are estimated to be C&C servers can be classified into download and upload, spam servers and command control servers, within a botnet group detected by modeling network activity, i.e. analyzing network-based activity patterns. Also, botnet groups can be detected by way of a group information management function, for generating an activity pattern-based group matrix based on group data, and a mutual similarity analysis, performed on groups suspected to be botnets from the group information. | 06-23-2011 |
20110153812 | APPARATUS AND METHOD FOR DISTRIBUTING CLOUD COMPUTING RESOURCES USING MOBILE DEVICES - An apparatus for distributing mobile resources in a cloud computing environment includes: a resource register configured to analyze, when a request for mobile resource registration is inputted by a user, the requested resource and confirm if the resource is registerable; a provisioning manager configured to create a MVO, when the mobile resource is a registerable resource, and register the mobile resource; a metadata repository configured to store metadata information regarding the registered mobile resource; and a resource manager configured to control the provisioning manager, when the resource register receives a request for the resource registration, so as to create a MVO, register the resource, and store metadata regarding the registered mobile resource information. | 06-23-2011 |
20110153813 | DETERMINING DEADLOCK-CRITICAL RELATIONS BETWEEN COMPONENTS OF A VEHICLE SYSTEM - In a method for determining deadlock-critical relations between networked components of a vehicle system, a graph, which at least partially represents the inhibit relations defined in the vehicle system and which has nodes and edges, is used, in which a classification takes place of at least a portion of the edges on the basis of the properties of the edges and the nodes connected by the edges, a prioritization of the edges on the basis of the classification takes place, and a determination of shortest deadlock-critical cycles for all nodes and at least some of the edges on the basis of the prioritization is implemented. | 06-23-2011 |
20110153814 | Communication route determination method and transmission device - A transmission device is included in a communication network, and the transmission device includes a link trace frame transfer unit that transfers, from a first transferring port corresponding to an operation system route, a first link trace frame that is received and that is destined to a target transmission device, and that transfers, from a second transferring port corresponding to a preliminary system route, a second link trace frame that is distinguishable from the first link trace frame, when transferring ports of the transmission device have a route redundancy configuration; and a link trace response frame transmission unit that transmits, in response to receiving the second link trace frame, a second link trace response frame to an origin transmission device, the second link trace response frame being distinguishable from a first link trace response frame that is transmitted in response to receiving the first link trace frame. | 06-23-2011 |
20110153815 | INFORMATION PROCESSING APPARATUS HAVING A PLURALITY OF COMMUNICATION INTERFACES AND CONTROL METHOD - An apparatus having a plurality of interfaces, the apparatus includes a detection unit configured to detect a network address collision of the plurality of interfaces, a confirmation unit configured to confirm whether sub-networks to which the plurality of interfaces is connected are different sub-networks, and a control unit configured to control communication via the plurality of interfaces based on a result of detection by the detection unit and a result of confirmation by the confirmation unit. | 06-23-2011 |
20110153816 | Matching Encoder Output to Network Bandwidth - Implementations include a method, systems, and computer program products for adaptively configuring codecs to transmit encoded data to better utilize available bandwidth of reachable networks. One implementation is a method of transmitting encoded data from a host to a target. The method includes, selecting a communication network reachable by the host, estimating an available bandwidth from the host to the target via the selected communication network, configuring a codec from a plurality of codecs implemented in the host according to the estimated available bandwidth, encoding data using the configured codec, and transmitting the encoded data to the target. | 06-23-2011 |
20110153817 | TRACE MONITORING - A method of operating a transaction server for use with trace components, providing an execution cost for each trace component, receiving input selecting one or more trace components, running the transaction server with each selected trace component active, monitoring the execution cost of each selected trace component, and providing an updated execution cost for each trace component. The method can also be extended to provide an execution cost for one or more combinations of trace components monitoring the execution cost of any selected trace component combination, and also to provide an updated execution cost for each trace component combination. The method can further comprise maintaining a record of the execution cost of each selected trace component and transmitting the record to a different transaction server, thereby sharing knowledge between connected systems. | 06-23-2011 |
20110153818 | EFFICIENT SERVICE ADVERTISEMENT AND DISCOVERY IN MULTIPLE WIRELESS NETWORKS - A local device broadcasts a first advertisement in a first wireless network via a first wireless interface, where the first advertisement includes one or more service identifiers (IDs) identifying one or more services being advertised and an availability schedule of the local device in the first wireless network. The local device broadcasts a second advertisement in a second wireless network via a second wireless interface. The local device scans in the first wireless network during an availability window of the availability schedule for a response to the first advertisement, where the broadcast of the second advertisement is disabled during the availability window. | 06-23-2011 |
20110153819 | COMMUNICATION SYSTEM, CONNECTION APPARATUS, INFORMATION COMMUNICATION METHOD, AND PROGRAM - A communication system includes a terminal, a server apparatus that manages the movement of the terminal, and a connection apparatus that connects the terminal to the server apparatus. The connection apparatus both records the MAC address of the terminal and records maintenance function execution necessity information that indicates whether a maintenance function must be executed for the terminal in association with the MAC address of the terminal, and uses a Mobile IP to transmit to the server apparatus a message that contains the maintenance function execution necessity information that was placed in association with the MAC address of the terminal. | 06-23-2011 |
20110153820 | LATENCY LOCATOR - A method for capturing data packets sent on a network for evaluating response time performance, the network including a financial institution and a partner bank. The method includes associating a captured data packet sent to the partner bank with a captured data packet received from the partner bank, by comparing at least one coded field of a data portion of the captured data packet sent to the partner bank with at least one coded field of a captured data portion of the data packet received from the partner bank. The method also includes measuring a response time of the associated data packet received from the partner bank, relative to a transmission time of the captured data packet sent to the partner bank. The method further includes transmitting an alert message upon determining that the response time is not within an adjustable predetermined threshold, wherein the alert message includes data from a data portion of the associated data packets. | 06-23-2011 |
20110161484 | DYNAMIC MOBILE APPLICATION QUALITY-OF-SERVICE MONITORING AND REPORTING - In accordance with embodiments of the present disclosure, a process for determining a quality-of-service for a mobile application running on a mobile device coupled with a mobile network is presented. The process may be implemented to monitor, on an application layer level, a network usage pattern of the mobile application communicating via the mobile network. The process may emulate the network usage pattern of the mobile application by transmitting or receiving test data via the mobile network. And the process may determine the quality-of-service for the mobile application by analyzing the test data being transmitted or received. | 06-30-2011 |
20110161485 | MANAGING MULTIPLE DYNAMIC MEDIA STREAMS - A coordinated adaptive streaming system provides a level of intelligence between adaptive streaming heuristics applied to multiple multi-bitrate streams playing on a client computer at the same time. The system receives a media event that includes multiple multi-bitrate streams and plays two or more of the streams. Each stream registers with the coordinated adaptive streaming system so that the system is aware of each of the streams. The system receives a priority indication from each stream that indicates the priority of the stream relative to other streams associated with the media event. The system uses the received priority indications to make adaptive streaming decisions. Thus, the coordinated adaptive streaming system provides playback that more closely aligns with a user's priorities and provides a higher quality experience to a user viewing multiple concurrent media streams. | 06-30-2011 |
20110161486 | DETECTING AND MONITORING SERVER SIDE STATES DURING WEB APPLICATION SCANNING - A computer-implemented method, system, and computer program product for detecting and monitoring server side state during the scanning of a web application. The method includes: monitoring executed code of the web application while scanning the web application; retrieving code coverage information from the monitoring of the executed code and retrieving scanning information from the scanning of the web application; correlating the code coverage information with the scanning information; and determining a change in the server side state based on the correlation. The system includes one or more devices that executes the steps of the method. The computer program products includes computer program instructions stored on a computer readable storage medium, where the instructions, when executed, will cause a computer to perform the steps of the methods. | 06-30-2011 |
20110161487 | METHOD AND SYSTEM FOR COMMUNICATION SESSIONS - A method and computer program product includes calculating a score for one or more communication sessions on a communication device, associating the score with the one or more communication sessions, and measuring a performance metric on the communication device. The performance metric may be indicative of a load on the communication device, and may be caused, at least in part, by the one or more communication sessions. If the performance metric on the communication device falls outside an acceptable value, a number of participants in at least one of the one or more communication sessions may be reduced based on the score associated with the at least one of the one or more communication sessions. | 06-30-2011 |
20110161488 | REDUCING WORKLOAD ON A BACKEND SYSTEM USING CLIENT SIDE REQUEST THROTTLING - Embodiments of the present invention address deficiencies of the art in respect to workload management of backend systems and provide a novel and non-obvious method, system and computer program product for limiting a request rate from a client based on a health state of a server system. In one embodiment of the invention, a computer-implemented method for limiting a request rate from a client based on a health state of a server system that includes monitoring a server system, determining a measure of health of the server system, sending the determined measure of health to a client submitting a request to the server system and receiving a subsequent request from the client that is delayed by a time period, wherein the time period is based at least in part upon the determined measure of health. The computer-implemented method can further include receiving server system CPU utilization, determining an approximate predicted real server response time of a transaction and sending the determined approximate predicted real server response time of a transaction to a client submitting a request to the server system. | 06-30-2011 |
20110161489 | AUTOMATIC AGGREGATION OF INTER-DEVICE PORTS/LINKS IN A VIRTUAL DEVICE - A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation. | 06-30-2011 |
20110161490 | TERMINAL CAPABLE OF SUBSTITUTING FOR CONTROL STATION - A terminal of the present invention comprises a control frame detection portion of detecting a control frame issued from a control station, a control frame memory portion of storing control information contained in the control frame, a substitute frame issuance determination portion of determining to issue a substitute frame when the control frame is not detected until a predetermined first time period is elapsed, and a substitute frame issuance portion of creating a frame which is the same as or equivalent to the control frame, as the substitute frame, based on the control information stored in the control frame memory portion when the substitute frame issuance determination portion determines to issue the substitute frame, and issuing the created substitute frame. | 06-30-2011 |
20110161491 | MIGRATION CONTROL APPARATUS AND MIGRATION CONTROL METHOD - A migration control apparatus for controlling migration of a virtual machine includes a monitoring section, a planning section, a time estimation section, a comparing section, and a plan execution section. The monitoring section monitors a status of a current migration of the virtual machine running on a first physical machine. The planning section makes, on the basis of the status of the current migration, a new migration plan for migrating the virtual machine. The time estimation section estimates a first migration time required to perform a new migration. The comparing section compares the first migration time with a second migration time to determine which migration will be completed earlier. The second migration time is an estimated time required to complete the current migration. The plan execution section performs the new migration when it has been determined that the new migration will be completed earlier. | 06-30-2011 |
20110161492 | PRESERVATION OF SCORES OF THE QUALITY OF TRAFFIC TO NETWORK SITES ACROSS CLIENTS AND OVER TIME - A method and system for preserving scores of the quality of traffic to network sites, so that the scores are consistent over time and/or are comparable across clients. | 06-30-2011 |
20110161493 | SYSTEMS AND METHODS FOR SELECTING BUFFERING TIME FOR MEDIA DATA - The invention is related to methods and apparatus for tailoring an amount of Pre-Data that can be used in media clip streaming applications. A variable-bit-rate encoded media clip can be encoded at an average playback bit rate. When the actual transmission bit rate exceeds the average playback bit rate, a maximum bit deficit computation that uses the average playback bit rate overestimates the amount of Pre-Data that can be used to buffer the media clip. Embodiments of the invention tailor the amount of Pre-Data at least in part to the amount of data used to encode intervals of data and to actual transmission bit rates or to predictions of actual transmission bit rates, thereby decreasing the amount of Pre-Data that can be used and decreasing a latency time before play of the media clip begins. | 06-30-2011 |
20110167147 | CALCULATING PACKET DELAY IN A MULTIHOP ETHERNET NETWORK - A method, system, and computer-readable medium for determining the upper bound of the end-to-end delay of a multiframe flow in a multihop Ethernet network. Flows are characterized by the generalized multiframe model, the route of each flow is pre-specified and the output queue of each link schedules Ethernet frames by static-priority scheduling. | 07-07-2011 |
20110167148 | SYSTEM AND METHOD FOR MERGING MONITORING DATA STREAMS FROM A SERVER AND A CLIENT OF THE SERVER - A method, system, and computer program product for merging monitoring data streams includes: receiving a first monitoring data stream relating to a server containing first records, each first record has a first transaction identifier relating to a first transaction and first monitoring data, relating to a performance of executing the first transaction; receiving a second monitoring data stream relating to a client containing second records, each second record has a list of second transaction identifiers relating to one or more second transactions and second monitoring data, relating to a performance of executing the second transactions; buffering at least parts of the first and the second monitoring data streams; and merging the buffered first and second monitoring data streams by computing an outer-join with a join-condition that the first records have the first transaction identifier that occurs in the list of second transaction identifiers to provide a merged data stream. | 07-07-2011 |
20110167149 | INTERNET FLOW DATA ANALYSIS METHOD USING PARALLEL COMPUTATIONS - A method of analyzing internet flow data includes: (A) an internet flow data input step of dividing internet flow data stored in a file system and receiving the divided data at one or more data nodes; (B) a Map task step of producing, with respect to each of the data nodes, a (Key, Value) pair from the received data and temporarily storing the (Key, Value) pair; and (C) a Reduce task step of calculating a (Key, SUM(Value)) value from the stored (Key, Value) value and storing the calculated (Key, SUM(Value)) value. In accordance with the method, the analysis task is not performed in one server, but distributed into a plurality of server and then performed. Accordingly, internet flow data can be analyzed within a shorter period. | 07-07-2011 |
20110167150 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTING INITIATION OF A SERVICE DATA FLOW USING A Gx RULE - Methods, systems, and computer readable media for detecting a service data flow using a Gx rule are disclosed. According to one method, a policy and charging rules function (PCRF) node sends to a policy and charging enforcement function (PCEF) node, a Gx rule for triggering the PCEF node to generate a notification message upon initiation of a service data flow. The PCEF node receives and installs the Gx rule and uses the Gx rule to detect and report initiation of a service data flow. | 07-07-2011 |
20110167151 | EVENT PROXY NOTIFICATION APPARATUS AND METHOD OF CONTROLLING THE SAME AND PROGRAM - When a notification request for an event is received from a client apparatus, information about the type of the event, an event notification apparatus, and the client apparatus included in the notification request are registered. Upon reception of issuance of an event from an event notification apparatus, it is determined whether the event notification apparatus, the type of the event, and a client apparatus that has requested notification of the event have been registered. If it is determined that the event notification apparatus, the type of the event, and the client apparatus have been registered with respect to the event, the event is transmitted to the registered client apparatus. | 07-07-2011 |
20110167152 | METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PROVIDING SESSION INITIATION PROTOCOL (SIP) EVENT WATCHER ENTITY INFORMATION IN A COMMUNICATIONS NETWORK - Methods, systems, and computer readable media system for collecting and distributing session initiation protocol (SIP) event watcher entity subscription information in a communications network are disclosed. According to one aspect, a system includes one or more notifier servers for receiving subscription requests for SIP event information associated with a plurality of watched entities from a plurality of watcher entities. The system further includes a watcher information (WINFO) server for receiving, from the notifier servers, SIP event subscription information that includes, for each watcher entity, an association between the watcher entity to each of the watched entities in which a subscription for SIP event information was requested by the watcher entity, for storing the SIP event subscription information in the WINFO server, for receiving, from one of the watched entities, a request for watcher entity subscription information associated with the requesting watched entity from one of the watched entities, and for accessing the SIP event subscription information to locate the watcher entity subscription information associated with the requesting watched entity. | 07-07-2011 |
20110167153 | POLICY-BASED EXPOSURE OF PRESENCE - Embodiments of the invention provide methods and systems for enforcing policy-based exposure of presence. The method includes receiving, from a service provider, a request for presence information about a subscriber, intercepting the request at a policy enforcer, and analyzing the request to determine attributes associated with the request. The method further includes, based in part on the determined attributes of the request, applying a policy to the request, and based on the applied policy, filtering the request for presence information about the subscriber. Further, the method includes forwarding the filtered request to a presence server, and publishing, to the service provider, the filtered presence information about the subscriber. | 07-07-2011 |
20110167154 | NETWORK MANAGEMENT - A tool for managing a computer network includes a gateway service module that identifies a gateway for a network and a network information service module. The network information service module identifies devices in the network, determines at least one property for each of the identified devices, and creates a network information data structure for storing device properties. A communication agent service module transmits at least one determined device property to other agent service modules associated with the network, receives at least one device property from another agent service module associated with the network, and provides the received at least one property device to the network information service module. A method of monitoring a computer network is also provided. The method includes identifying devices in a network, determining at least one property for each of the identified devices, receiving at least one determined device property from another device the network, and creating a network information data structure for storing the determined device properties. | 07-07-2011 |
20110167155 | BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied. | 07-07-2011 |
20110167156 | MONITORING RELATED CONTENT REQUESTS - Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction. | 07-07-2011 |
20110173314 | Methods and apparatus for optimizing responsiveness of portable documents - A system detects a requirement to obtain a first document by the computer system, the first document having a predefined format. The system identifies a sequence of portions of the first document to obtain based on analysis of the predefined format of the first document, and analysis of current operational parameters of the computer system. The system obtains a first portion of the document from the identified sequence, and then obtains successive portions of the first document in accordance with the identified sequence. | 07-14-2011 |
20110173315 | Network physical layer security - A data processing device is connectable to a communication network and operable to receive data associated with at least one physical layer characteristic of a cable communication subsystem, the subsystem comprising a transmitter and/or receiver coupled to at least one cable, and to initiate a security procedure responsive to the received data. A tangible computer readable medium and a method of applying physical layer security in a communication network are also disclosed. | 07-14-2011 |
20110173316 | RELATIONSHIP BASED REPRESENTATION OF PARTICIPANTS IN SHARED ONLINE SPACE - One or more techniques and/or systems are disclosed for presenting members of a shared online space to a user of the shared online space. A relationship value is determined between the user and a member of the shared online space by: determining an interaction value for the user and member relationship based on the user's and member's co-presence in the shared online space; determining a social network value for the user and member relationship based on a number of social network connections between the user and member; and combining the interaction value and social network value. The relationship value is associated with a specified visual representation of the member used in the shared online space, and two or more visual representations of members are scaled in the user's display in the shared online space in order to fit an available screen space, based on the relationship value. | 07-14-2011 |
20110173317 | PERFORMANCE MEASUREMENT AND SERVICE QUALITY MONITORING SERVER USING A COMMAND LINE INTERFACE - A performance measurement and service quality monitoring server capable of collecting performance information within a set of equipment over a communication network, the server integrating a generic performance model comprising high-level indicators, a performance model dedicated to each type of equipment and provided with equipment-oriented indicators and an SNMP model to sample equipment as well as an interfacing model, known as a CLI model to sample equipment according to a CLI (Command Line Interface) mechanism. | 07-14-2011 |
20110173318 | Method, Device and Gateway Server for Detecting Proxy at the Gateway - The present invention provides a method for detecting proxy at the gateway, comprising decomposing the access request from the IP need to be proxy-monitored into an access request to original address and an access request to gateway-specified address to access the original address and the gateway-specified separately; determining whether a specific cookie information is included in said access request to gateway-specified address or not to obtain a second determining result; responding to the access request to said gateway-specified address and embedding the cookie information with the time stamp into the client PC by the gateway when said second determining result is no, and reading said cookie information when said second determining result is yes; determining whether said IP is using proxy or not on the basis of said cookie information. Accordingly, the present invention also provides a device and gateway server for detecting proxy at the gateway. It can be detected accurately and secretly in the intranet whether a certain IP is using common proxy or nat proxy. | 07-14-2011 |
20110173319 | APPARATUS AND METHOD FOR OPERATING SERVER USING VIRTUALIZATION TECHNIQUE - An apparatus for operating a server using a virtualization technique includes: a system managing unit for registering a virtual server performing a service, assigning and cancelling physical hardware resources in response to a command of a manager, and managing resource assigning policies to be applied depending on services; and a virtual resource managing unit for managing information on physical hardware and a virtual operating system. The apparatus further includes a virtual server managing unit for executing the virtual operating system using physical hardware resources, assigning a virtual server processing a service to the virtual operating system, and executing the virtual server to monitor resource assignment to the operated virtual server, when a designated service is requested over a network. | 07-14-2011 |
20110173320 | NETWORK-SPECIFIC ESTIMATION IN NETWORK NODE DISCOVERY - Network node discovery is implemented using parameters reflecting network-specific characteristics. Estimates of the number of active nodes in a network are computed based on the presence of dead time (e.g., due to clock latency, device driver delays, etc.), network topology, packet size, network capacity, a tolerable network overload threshold, and other characteristics. A network node enumeration process is therefore parameterized to incorporate consideration of such characteristics. A damping factor that incorporates dead time to set a lower bound for an estimate of remaining active nodes in a network is one example of a network-specific parameter. | 07-14-2011 |
20110173321 | OVER-THE-AIR DELIVERY OF METERING CERTIFICATES AND DATA - Metering is enabled through an arrangement in which a metering certificate is communicated to a mobile device using an over-the-air protocol. A metering trigger provides the metering certificate that includes a location to which metering data is posted by the mobile device and a public key of a public-private key pair, or alternatively provides a link to such metering certificate. A metering helper passes the metering certificate to a DRM system on the mobile device which collects metering data associated with the metering ID and uses the public key to encrypt the metering data into a metering challenge. The metering helper posts the metering challenge to the location. The metering service extracts the metering data from the metering challenge using a private key and generates a metering response that is received by the metering helper which prompts the DRM system to reset at least a portion of a data store in which the metering data is stored. | 07-14-2011 |
20110173322 | Distributed User Validation and Profile Management System - A distributed user validation and profile management system operates to automatically validate and update user profiles, such as those stored within an organizational security database, to properly reflect the actual positions and rights of various users within the organization to the various organizational assets, such as computer implemented applications. The user validation and profile management system periodically sends validation e-mails to various users within the organization to initiate the process of updating and verifying user profile information. The individual users may respond to the validation e-mails to verify their position and status within the organization as well as the position or status of one or more closely associated users, such as a manager or a subordinate. Failure of the user to respond to the validation e-mail causes the user validation and profile management system to determine that the user profile is invalid when the user attempts to access an application. | 07-14-2011 |
20110173323 | SYSTEM FOR DELIVERING AND PRESENTING A MESSAGE WITHIN A NETWORK - A system for delivering and displaying messages in a display device part of a network comprising: a set of display devices ( | 07-14-2011 |
20110179158 | FINE-GRAINED LOCATION DETERMINATION OF NETWORKED COMPUTERS - Location of a communication network subscriber is determined employing confidence metrics such as remote vs. local computer usage, primary user in a multi-user computing environment, likelihood of forgery, and comparable ones. A fine-grained location determination is then made based on the metric results and directory information for the particular subscriber such that services like emergency services can be provided with accurate location information. | 07-21-2011 |
20110179159 | Monitoring System - A configurable system that employs a processing unit, such as a computer, to which one or more responders, such as a keyboard and a mouse, through which a user interacts with the processing unit. While each of the responders is utilized by the user for its designed primary function, its activity is also used for monitoring whether the individual is interacting with the processing unit within expected bounds. | 07-21-2011 |
20110179160 | Activity Graph for Parallel Programs in Distributed System Environment - In a distributed system environment, a system profiling log can be used at a central server to collect and analyze log data. The log data can be used to gauge performance of software applications. In particular, the log data includes different activities (i.e., tasks) that are executed to implement the software applications. Correlation of the different activities versus a timeline is an important parameter in the system profiling log. For example, where the correlation of the different activities is represented in colored graphs at a user interface, a user may easily pinpoint a bottleneck. The bottleneck at the one or more activities may encourage the user to adopt system improvement in the distributed system environment. | 07-21-2011 |
20110179161 | AGGREGATION OF SOCIAL NETWORK DATA - A method, system, and computer program product for aggregation of social network data on a user's local system are provided. The system at the user's local system includes: a processor; a private social network data collector for collecting private social network data relating to a user from applications on a user's local system; a receiver for receiving public social network data at the user's local system; and a local aggregator for combining the private social network data with the public social network data on the user's local system. The combined private and public social network data is only accessible by or with the permission of the user on the user's local system. The receiver may receive aggregated public social network data relating to the user from a public aggregator on a server system, wherein the aggregated public social network data is collected from public sources. | 07-21-2011 |
20110179162 | Managing Workloads and Hardware Resources in a Cloud Resource - Systems and methods to manage workloads and hardware resources in a data center or cloud. In one embodiment, a method includes a data center having a plurality of servers in a network. The data center provides a virtual machine for each of a plurality of users, each virtual machine to use a portion of hardware resources of the data center. The hardware resources include storage and processing resources distributed onto each of the plurality of servers. The method further includes sending messages amongst the servers, some of the messages being sent from a server including status information regarding a hardware resource utilization status of that server. The method further includes detecting a request from the virtual machine to handle a workload requiring increased use of the hardware resources, and provisioning the servers to temporarily allocate additional resources to the virtual machine, wherein the provisioning is based on status information provided by one or more of the messages. | 07-21-2011 |
20110179163 | METHOD AND APPARATUS FOR IDLING A NETWORK CONNECTION - The described embodiments include a system that configures a network interface. During operation, the system receives a signal from an operating system indicating that the network interface can be idled. The signal is sent from the operating system as soon as the operating system determines that a final route structure that depended on the network interface has expired and been deleted. The system then determines if an application has established a route that uses the network interface since the signal was sent from the operating system. If not, the system causes the network interface to be idled. Otherwise, the system leaves the network interface in a current operating state. | 07-21-2011 |
20110179164 | METHOD AND APPARATUS FOR IDENTIFYING MEMBERS OF A PEER-TO-PEER BOTNET - A peer-to-peer (P2P) bot(s) in a network is identified using an already identified P2P bot. More specifically, such embodiments may facilitate determining a candidate set of computers, which may be potential P2P bots, by identifying computers in a network that have a private mutual contact with a seed bot, which is a computer identified as a P2P bot, and identifying additional computers that have private mutual contacts with the identified computers. Further, a confidence level indicative of a certainty of a membership of each of the candidate computers in the P2P botnet is determined and responsive to a determination that the confidence level of the candidate computer exceeds a determined threshold confidence level, the candidate computer is identified as a P2P bot. | 07-21-2011 |
20110179165 | UNAFFILIATED WEB DOMAIN HOSTING SERVICE PRODUCT MAPPING - Based on usage patterns of clients who have purchased web domain offerings, providing a three dimensional visual representation that uses a visual element to represent the degree of similarity among different offerings. | 07-21-2011 |
20110179166 | MANAGEMENT OF PODCASTS - Improved techniques that facilitate the use of podcasts are disclosed. The improved techniques can pertain to publishing, hosting, accessing, subscribing, managing, organizing, searching, browsing, transferring, and/or playing podcasts. According to one aspect, tags are embedded into syndication feeds (e.g., RSS feeds) that may be made available for distribution by an online media store to facilitate the management of podcasts. Such tags can include a block tag that may be embedded into a syndication feed to indicate whether the feed is to be blocked from being included in the online media store. According to another aspect, management of podcasts may be facilitated by other mechanisms. In accordance with one embodiment, a user may challenge the ownership of a podcast to block or remove a podcast from the online media store. In accordance with another embodiment, images may be stored to allow efficient retrieval of the corresponding episode(s) of a podcast. | 07-21-2011 |
20110185055 | SYSTEM AND METHOD FOR CORRELATING NETWORK IDENTITIES AND ADDRESSES - The system and method for correlating network identities and addresses described herein may include a log correlation engine distributed on a network that identifies relationships between certain network identities and Internet Protocol (IP) and Ethernet addresses in the network. In particular, the log correlation engine may analyze various event logs that describe activity in a network to learn relationships between network identities and network addresses and generate alerts in response to discovering changes in the learned relationships. For example, the log correlation engine may identify authentication events described in the logs to map network identities to IP addresses, and may further analyze the logs to map the IP addresses to Ethernet addresses. Thus, the log correlation engine may discover new and changed relationships between the network identities, the IP addresses, and the Ethernet addresses. | 07-28-2011 |
20110185056 | INSIDER THREAT CORRELATION TOOL - Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a predictive threat rating for user accounts. In one implementation, a first threat score representing a first time period may be calculated. The first threat score may be compared with aspects of the same user accounts for a second time period. Weighting schemes may be applied to certain activities, controls, and/or user accounts. Further aspects relate to apparatuses configured to execute methods for ranking individual user accounts. Certain embodiments may not block transmissions that violate predefine rules, however, indications of such improper transmission may be considered when constructing a threat rating. Blocked transmissions enforced upon a user account may also be received. Certain activity, such as accessing the internet, may be monitored for the presence of a security threat and/or an ethics threat. | 07-28-2011 |
20110185057 | Apparatus And Method Of Administering Modular Online Environments - In a modular on-line virtual environment, in which each module of the on-line virtual environment has a plurality of parallel instances each able to host a limited number of users, a server arranged to administer the modular on-line virtual environment comprises a network communications arrangement operable to receive data representative of the actions of users within an instance of a first module of the modular on-line virtual environment, and to transmit to each user within that instance of that module data representative of the actions of each other user within that instance of that module, behaviour analysis means operable to analyse user behaviour within that instance of the first module, in which if the behaviour of two or more users satisfies a predetermined criterion then the two or more users are classified as belonging to a social group comprising the two or more users, module instance selection means operable to select an instance of a second module for a user when that user moves within the modular on-line virtual environment from the first module to a second module, in which the module instance selection means is operable to select an instance of the second module that has the capacity to accommodate the greatest number of the common social group once one member of that social group moves within the modular on-line virtual environment from the first module to the second module and the server is operable to place a subsequent respective member of the social group in that same selected instance of the second module if that member moves within the modular on-line virtual environment from the first module to the second module. | 07-28-2011 |
20110185058 | Method and Arrangement for Supporting Playout of Content - Methods and arrangements in a client node and a server node support a decision on decoding and playout of a certain content in the client node. The methods and arrangements relate to the determining, conveying and obtaining of information related to the characteristics (level) required for decoding and playing out the certain media content at a non-regular playout rate. The method and arrangement in the client node further relate to determining, based on the obtained information, which playout rate(s) is/are supported by the client node in regard of level. The methods and arrangements enable the client node to refrain from attempting to decode and play out of the content at a non-regular rate requiring a level which is not supported by the client node. | 07-28-2011 |
20110185059 | SYSTEM AND METHOD FOR DETECTING RF TRANSMISSIONS IN FREQUENCY BANDS OF INTEREST ACROSS A GEOGRAPHIC AREA - Wireless devices form a significant portion of equipment forming the source/destination of content transmitted over telecommunications infrastructure together with applications such as RF identification, smart tags, etc. As such the wireless spectrum supports these devices operating to multiple standards, both licensed and unlicensed. In many environments it would be beneficial for a network administrator to know whether the environment and network they are responsible for is compliant to policies established in dependence of the environment/network. The invention provides distributed wireless signal analyzers within the environment/network to provide signal/spectrum analysis and determine whether received signals by the wireless signal analyzer are compliant to the network administrator policy. Compliance may be based upon time or frequency domain measurements with different rules for different wireless spectrum regions. Non-compliance is communicated to remote servers and/or network administrator and allows local control of network equipment. | 07-28-2011 |
20110185060 | METHOD FOR ALLOWING AND BLOCKING A USER PC WHICH CAN USE INTERNET AT THE SAME TIME IN A PRIVATE NETWORK THEROF A METHOD FOR ANALYZING AND DETECTING A JUDGEMENT ABOUT WHETHER NAT(NETWORK ADDRESS TRANSLATION) CAN BE USED OR NOT USING A TRAFFIC DATA, AND THE NUMBER OF TERMINALS SHARING NAT - The present invention provides a method consisting of a step for analyzing a traffic receiving mirroring, a step for judging whether NAT (Network Address Translation) use of a client configuring and using a private network as well as a provided authorized IP (an Internet IP) is allowed or not, for analyzing and detecting the number of sharing terminals, a step for creating a database using data, and a step for formulating a policy by using information in database, so that when the users of a private network connect to Internet at the same time, permission or blocking of Internet use can be executed selectively. | 07-28-2011 |
20110191460 | System and a Method Relating to Network Management - The present invention relates to a node supporting networking and communication with other nodes by means of a layered communication protocol and group communication with other nodes controlled via a grouping protocol adapted to interact with said communication protocol. The node comprises a policy engine which is arranged separately from, but in communication with said grouping protocol. The policy engine is adapted to establish current and/or changing node, group and network related information and to use one or more grouping policies to automatically and dynamically control grouping related actions and adapt the grouping. The invention also relates to a system comprising a number of such nodes and a method of controlling grouping. | 08-04-2011 |
20110191461 | SYSTEMS AND METHODS FOR USING WORKLOAD CHARACTERISTICS FOR SIZING AND PLACEMENT FOR POWER-AWARE CONSOLIDATION - Embodiments of the invention provide power savings via performing application workload consolidation to servers using off-peak values for application workload demand. Embodiments of the invention are designed to achieve significant power savings while containing performance risk associated with server consolidation. | 08-04-2011 |
20110191462 | Method and system for operating an E-Commerce service provider - A method for operating a commissioned e-commerce service provider provides services to businesses on a computerized network such as the Internet in exchange for a small commission on the commercial transactions generated using those services. Unlike most ISPs that provide services to individuals and businesses, the e-commerce service provider preferably provides Internet services for businesses operating web sites based on the amount of service utilized by the individual or business. Instead of paying a monthly fee for the Internet services required to host a web site or operate and e-commerce site, the business contracts with the e-commerce service provider to provide these services based on usage of these services. Preferably, the usage rate is tiered in accordance with the amount of traffic at the site to provide a nominal level of service at a lower rate, yet allow for an exceptional volume of traffic to be accommodated by the site at a higher rate without having the site fail or the service become overwhelmed. | 08-04-2011 |
20110191463 | MANAGEMENT METHOD FOR INTERNET PROTOCOL SHARING COMMUNICATION MECHANISM - A management method for an Internet protocol sharing communication mechanism comprises the steps of: setting up a plurality of rules for an Internet protocol sharing communication mechanism; providing a schedule divided into different time slots; assigning one rule from the rules for the Internet protocol sharing communication mechanism for each time slot of the schedule; and conducting a network communication according to the assigned rules. | 08-04-2011 |
20110191464 | IMAGE FORMING APPARATUS AND CONTROL METHOD THEREFOR - When a document, printing of which is designated, does not have a printable file format, an image forming apparatus determines whether a document management server which manages the document exists on the same network as that of the image forming apparatus. When it is determined that the document management server does not exist on the same network, the image forming apparatus acquires a file format printable by another image forming apparatus present on the same network, and transmits it to the document management server. The document management server receives the file format printable by the other image forming apparatus, and notifies the image forming apparatus of a list of an image forming apparatus or apparatuses capable of printing the document. Upon receiving the notification, the image forming apparatus instructs an image forming apparatus capable of printing the document about substitute printing. The instructed image forming apparatus substitute-prints the document. | 08-04-2011 |
20110191465 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - A wireless network performance management system and method. The system includes at least one collection agent for collecting data related to at least one of service coverage; service quality; and usage of public and/or private data networks for enterprise clients, and a reporting unit to graphically represent the collected data to at least one of track, troubleshoot, and analyze the one of the service coverage; the service quality; and the usage of public and/or private data networks for the enterprise clients. | 08-04-2011 |
20110191466 | AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system. | 08-04-2011 |
20110191467 | Lawful Interception of NAT/PAT - The present invention relates to methods and arrangements for monitoring translation activities in an intermediate node NAT/PAT between a local network and a public network in a communication system. The intermediate node NAT/PAT rewrites addresses related to traffic sent between the networks. The method comprises steps of configuring the intermediate node NAT/PAT to operate as Intercepting Control Element ICE or Data Retention source, and steps of requesting translation information, and reporting translation information to a requesting authority. | 08-04-2011 |
20110191468 | INFORMATION PROCESSING TERMINAL DEVICE AND NETWORK CONNECTION METHOD - An information processing terminal device ( | 08-04-2011 |
20110191469 | TUNNELING REPORTS FOR REAL-TIME INTERNET PROTOCOL MEDIA STREAMS - A router, switch, or other network node generates reports that contain packet level statistics and other information for a monitored media stream. The media stream reports reduce the amount of bandwidth typically required for sending monitored media stream information back to a central analysis device. However the computation of other media stream analytics, such as long term statistical averaging or quality metric computation, is performed by the central analysis device to remove some of the processing burden from the individual network nodes. | 08-04-2011 |
20110191470 | NETWORK CONFIGURATION OPTIMIZATION - A method for optimizing a network configuration of network resources includes receiving service attribute data associated with network resources and the traffic demand, based at least in part on the service attribute data, determining one or more network resources for providing communication between end user devices and a carrier network, i.e., one or more metro and/or backbone networks, and determining an optimal configuration of the one or more network resources within the network, wherein the optimal configuration optimizes one or more predetermined criteria. A system for optimizing a configuration of network resources includes a computer-readable medium including service attribute data descriptive of a plurality of network resources, a preprocessing module operable to receive the one or more service attributes and determine a set of one or more resources and transmission modes between the end user devices and the carrier network, and an optimization module operable to determine an optimum configuration of the resources and transmission modes within the network. | 08-04-2011 |
20110191471 | System and Method for Sharing Web Performance Monitoring Data - A monitoring system is provided that allows owners of monitoring accounts to share web monitoring data collected under the direction of the monitoring account. Account owners are able to interact with the monitoring system to identify recipient accounts for shared web monitoring data and apply permissions at a granular level so that portions of monitored data can be shared with varying permission levels. Grouping can also be employed by an account owner to facilitate efficient sharing of monitoring data to many recipient accounts. The monitoring system also provides analysis utilities that can be used by a recipient account to aggregate shared with owned data and generate related reports as desired. | 08-04-2011 |
20110191472 | DYNAMIC LINE MANAGEMENT - A management device for use in an access network including a plurality of data connections between end user devices and an aggregation transceiver device where the connections are aggregated for onward connection through the access network, the access network storing in association with each data connection a Dynamic Line Management, DLM, profile which specifies a set of values for a plurality of parameters associated with the respective data connection, together with a stability level specifying a desired level of stability for the data connection. The device includes means for receiving monitoring data specifying the stability of each respective data connection over a predetermined period of time; means for selecting a DLM profile to be applied to the connection in dependence on both the monitoring data and the stored stability level associated with the data connection; and means for requesting an OSS system of the access network to apply the selected profile to the data connection. The DLM profile selection means disregards any resynchronizations or errors estimated to have occurred as a result of an area wide event such as a thunderstorm. It performs this estimation by detecting a large number of retrains and or errors occurring within a predetermined short test period. | 08-04-2011 |
20110191473 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMPUTER PROGRAM, AND STORAGE MEDIUM - Even if the roles of apparatuses are not decided in advance when automatically setting communication parameters, communication parameter setting processing and network joining processing are appropriately executed without requiring the user to select the roles of apparatuses. The invention is characterized by a communication method for a communication apparatus, including a first search step of searching for a communication partner apparatus on a predetermined communication channel, a second search step of searching for a communication partner apparatus on all communication channels available for communication, and a search control step of searching for a communication partner apparatus using the first and second search steps. | 08-04-2011 |
20110196957 | Real-Time Policy Visualization by Configuration Item to Demonstrate Real-Time and Historical Interaction of Policies - Multiple policy engines may be integrated with a change and configuration change database to enable coordination of multiple policies by an embodiment comprising: a data center having a plurality of configuration items and connected to a network; a database connected to the network; a plurality of policy engines connected to the network; wherein each of the plurality of policy engines is configured to apply one or more policies to the data center in accordance with an awareness of all configuration item changes made by all other policy engines connected to the network; wherein the awareness comprises a plurality of relationships, each relationship being between a policy data and a configuration item. | 08-11-2011 |
20110196958 | AUTOMATIC UPDATES TO FABRIC ALERT DEFINITIONS FOR FABRIC SEGMENTATION, FABRIC MERGE, AND FABRIC PRINCIPAL SWITCH CHANGES - The present disclosure provides techniques for updating fabric alert definitions defined for a fibre channel or other fabric-based network within a storage management system. One embodiment provides techniques for detecting fabric merges, fabric segmentations, and principal switch changes of the fabric and modifying fabric alert definitions as a result of these changes. Thus, any alert definitions scoped by fabric will remain relevant even after fabric structural changes, and duplicate and/or redundant alerts may be reduced within the storage management system. In a further embodiment, detection of fabric changes is performed by first storing relationships between fabrics and switches, and comparing the current relationships between the fabrics and the switches against the stored relationships. Upon recognition of changes within the fabrics, the fabric alert definitions may be automatically analyzed and updated. | 08-11-2011 |
20110196959 | MIDDLEWARE-DRIVEN SERVER DISCOVERY - The present invention describes a method and system for discovering of server devices. The system and method receive a list of known server devices. The system and method obtain middleware configuration data and/or log files for each of the known server devices in the list. The system and method derives dependencies on at least one other server device from the middleware configuration data and/or log files. The system and method determines whether the at least one other server device is a new server device not included in the list. Thus, the system and method discovers the new server device upon determining that the at least one other server device is not included in the list. | 08-11-2011 |
20110196960 | METHOD AND DEVICES FOR UPDATING PRESENCE INFORMATION IN A COMMUNICATION NETWORK - The present invention relates to a method and devices for updating presence information in a communication network comprising a first entity and a second entity, in particular a SIMPLE based communication network. The method comprises the steps of: selecting a plurality of services; providing a service element comprising metadata of the plurality of services; providing information within the service element, wherein the information identifies the plurality of services; and sending the service element to the second entity. Further, devices or entities as well as a computer program for performing the method are provided. | 08-11-2011 |
20110196961 | METHOD FOR NETWORK ANOMALY DETECTION IN A NETWORK ARCHITECTURE BASED ON LOCATOR/IDENTIFIER SPLIT - The present invention relates to a method for detecting Network Anomaly in network architectures based on locator/identifier split, the detection flow is as follows: initialization processing, and in ITR: processing data packets, sending a Map-Request, determining whether to send an additional Map-Request, sending the data packet, processing the Map_Reply, processing EID-to-RLOC Cache entry expired; in ETR: processing data packet, processing Map-Request, determining whether the traffic of the ITR currently sending the Map-Request is abnormal, replying to the ITR of which the query traffic is abnormal, replying to ITR of which the query traffic is abnormal. With respect to the characteristic that the network architecture based on locator/identifier split needs to query the relationship between the locator and the identifier for packet delivery, the present invention detects Network Anomaly based on query traffic instead of network data packet traffic. Thus the present invention has the advantages of effectively reducing the investment on detection device, The overhead of exchanging monitoring information and the detection system maintenance cost; facilitating cross domain coordination; and efficiently handling the failures occurring during network operation in time; effectively improve the reliability of the network, being suitable for a large-scale network. | 08-11-2011 |
20110196962 | Method for Obtaining Information from a Local Terminal Environment - The present invention relates to obtaining information (I | 08-11-2011 |
20110196963 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO USERS - A method, system, and program product for communicating with machines and end users connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and an end user or a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device by an end user to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if an urgent need of the end user is indicated, so that a communication may be sent either directly to the end user or to a device driver so that the device driver may communicate the message to the end user. For example, an end user may have exceeded a predetermined limit of resource usage, and needs to be informed. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information such as summary information regarding usage of network resources to the end user using e-mail. | 08-11-2011 |
20110196964 | MANAGING EVENT TRAFFIC IN A NETWORK SYSTEM - A network system and associated operating methods manage event storms. The network system comprises an event analysis and control engine that detects and manages events occurring on a network. The event analysis and control engine receives events from a plurality of agents, and analyzes the events according to policies specified in a policies templates database. The event analysis and control engine processes raw network packets directly with less than full packet parsing to generate a filtered stream of events based on the analysis. The event analysis and control engine propagates the filtered stream of events to a monitoring system. | 08-11-2011 |
20110202650 | METHOD AND SYSTEM FOR MONITORING DATA FLOWS IN A NETWORK - One embodiment of the present invention provides a switching system that facilitates data flow monitoring at the logical-unit level. The switching system includes a traffic monitoring mechanism configured to monitor a data flow between a host and a logical unit residing on a target device. The switching system further includes a storage mechanism configured to store data-flow statistics specific to the host and the logical unit and a communication mechanism configured to communicate the data-flow statistics to a traffic management module. | 08-18-2011 |
20110202651 | PRICE-AWARE NEIGHBORHOOD SELECTION FOR PEER-TO-PEER NETWORKS - A method and apparatus for peer-to-peer file sharing is provided. In some embodiments, the method includes receiving a request for a list of neighbor peers, where the request is made by a requesting peer device, and where the requesting peer device has a local internet service provider (ISP). The method may also include employing a server device to rank each neighbor peer in a plurality of neighbor peers based on whether the respective neighbor peer is external to the local ISP, and if the respective neighbor peer is external to the ISP, further based on a cost metric associated with a next ISP hop from the requesting peer device to the respective neighbor peer. The method may also include generating the list of neighbor peers based on the ranking of the neighbor peers, and enabling transmission of the list of neighbor peers to the requesting peer device. | 08-18-2011 |
20110202652 | METHOD AND APPARATUS FOR MONITORING A KAD NETWORK - A method and apparatus are described including determining if a received message is from a monitored peer, forwarding the received message to a coordinator responsive to said determination, determining if the received message is a request message, opening a port for the peer responsive to the second determination, forwarding the request message to a monitored peer via the opened port and forwarding a response message to the monitored peer responsive to the second determination. | 08-18-2011 |
20110202653 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SERVICE DETECTION OVER AN RX INTERFACE - According to one aspect, the subject matter described herein includes a method for communicating service data flow (SDF) event information. The method includes steps occurring at a policy charging and rules function (PCRF) node. The method also includes communicating, via an Rx interface, a request to a deep packet inspection (DPI) node to be notified when an SDF event occurs. The method further includes receiving notification from the DPI node that the SDF event has occurred. | 08-18-2011 |
20110202654 | CONFIGURABLE CONTENT INJECTION SERVICE SYSTEM - A configurable content injection service system and method of injecting a new content into data of a data traffic between a data source and a user device uses configuration information set by one or more content injection service users. The configuration information includes at least one condition related to the data traffic between the data source and the user device to inject the new content if the at least one condition is satisfied. | 08-18-2011 |
20110202655 | Data Center Manager - A computer-implemented data center manager includes an evaluation engine configured to receive information pertaining to an operating policy, a system manager configured to collect information pertaining to system devices and to communicate the collected system device information to the evaluation engine, and a facility manager configured to collect information pertaining to facility devices and to communicate the collected facility device information to the evaluation engine. The evaluation engine is configured to determine target policies for coordinated operations of the system devices and the facility devices to satisfy the operating policy. | 08-18-2011 |
20110208854 | DYNAMIC TRAFFIC CONTROL USING FEEDBACK LOOP - A feedback loop is created between a server and clients that provides the clients with health information of the server to assist in client-server traffic control. Health information is calculated for the server that measures a current health of the server. The health information is automatically provided to a client by the server in response to a request made by the client. The clients can utilize the received health information to determine when to request resources from the server. | 08-25-2011 |
20110208855 | Parameterized Computer Monitoring System - A computer monitoring system uses a set of parameterized models to gather information about monitored devices. The models include scripts for gathering information, as well as type validation and data validation functions. The parameters within the model are used to generate user interface prompts and to populate discovery scripts as well as data validation scripts. In some cases, the models may include localization settings that may customize the user interface and validation output for different languages. A processing engine may generate a user interface from the parameters defined in the models, customize the scripts from the user input, and cause the scripts to be executed. The data gathered by the scripts may be analyzed using type validation and data validation. | 08-25-2011 |
20110208856 | Method for Intermediating Network Operators and Developers - A method for intermediating a plurality of network operators and one or more developers is provided. The method includes the steps of: obtaining, by an obtaining unit, a requirement about a computer program required by each network operator; integrating, by an integration unit, mutually-related requirements among the obtained requirements into one requirement; generating, by a generation unit, information about the necessity for development of a computer program implementing the integrated requirement; and presenting, by a presentation unit, the one or more developers with the integrated requirement and the information about the necessity. | 08-25-2011 |
20110208857 | METHOD, SYSTEM, AND COMPUTER READABLE MEDIUM FOR GATHERING USAGE STATISTICS - The present disclosure enables remote device management. A programmatic interface is associated with each application plug-in. A web server included with the on-device agent provides access to the programmatic interfaces according to open standards such as HTML or XML. The present disclosure enables access to remote devices through existing infrastructure without the need for proprietary systems. An IT administrator or other administrator may remotely access and update software and hardware, track device data plan usage statistics, provide live support, and track current and historical device locations. The phone and messaging feature enables an administrator to access information regarding data plan and usage statistics of devices. This allows organizations to optimize data plans based on messaging, e-mail, and other data plan statistics. Further, the present disclosure allows access to network connectivity details of devices and logs of emails, text messages, and the like. | 08-25-2011 |
20110208858 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MONITORING DATA ACTIVITY UTILIZING A SHARED DATA STORE - In accordance with embodiments, there are provided mechanisms and methods for monitoring data activity utilizing a shared data store, These mechanisms and methods for monitoring data activity utilizing a shared data store can enable enhanced data monitoring, more efficient data storage, improved system resource utilization, etc. | 08-25-2011 |
20110208859 | Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals - A method for lawfully intercepting communication IP packets exchanged between terminals is provided. The method involves assigning an IP address associated with a telecommunication service provider to, for example, a sending terminal for use as its IP address in communications with a receiving terminal, the telecommunication service provider providing SIP proxy services for establishing communication between the sending and receiving terminals. The communication IP packets are intercepted in such a way that the terminals are unaware of the interception. | 08-25-2011 |
20110208860 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 08-25-2011 |
20110208861 | OBJECT CLASSIFICATION IN A CAPTURE SYSTEM - Objects can be extracted from data flows captured by a capture device. Each captured object can then be classified according to content. In one embodiment, the present invention includes determining whether a captured object is binary or textual in nature, and classifying the captured object as one of a plurality of textual content types based tokens found in the captured object if the captured object is determined to be textual in nature. | 08-25-2011 |
20110208862 | METHOD AND SYSTEM FOR PROFILING DATA TRAFFIC IN TELECOMMUNICATIONS NETWORKS - A method of profiling communication traffic of users in a data network, comprising: monitoring communication traffic originated by a user of a communication terminal; and assigning to the user of the communication terminal a unique and anonymous user traffic identifier, wherein the user traffic identifier is related to a user address assigned to the communication terminal in the data network. Also, the user traffic identifier is adapted to be included in the communication traffic with respect to that user. The method further includes communicating the unique and anonymous user traffic identifier to the user terminal and having the user communication terminal include the user traffic identifier in the user traffic, upon receipt of communication traffic including the user traffic identifier, obtaining a descriptor of the received communication traffic useful to describe the detected traffic and at least temporarily storing the obtained descriptor; and building an anonymous user profile related to the user's communication activities based on the stored descriptors. | 08-25-2011 |
20110213874 | LOST COMPUTING RESOURCE NOTIFICATION - Some embodiments of a system and a method to notify applications of lost computing resources have been presented. For instance, a processing device running on a client machine can monitor a computing resource used by an application, which also runs on the client machine. If the computing resource is lost, then the processing device can notify the application of the loss and provides details about the lost computing resource to the application so that the application can take appropriate action in response to the loss. | 09-01-2011 |
20110213875 | Methods and Systems for Providing Deployment Architectures in Cloud Computing Environments - A decision system for providing customized deployment architectures to users of a cloud computing environment. The decision system can identify one or more parameters for analyzing applications and processes running in a cloud, monitor the applications and processes executed in the cloud, and collect information such as usage of cloud resources, number and type of computing processes instantiated, software programs utilized by the computing processes. The decision system can then generate customized deployment architectures based on the collected information. | 09-01-2011 |
20110213876 | USING A SERVICE DISCOVERY REQUEST TO FIND AVAILABLE DEVICES - The described embodiments provide an electronic device for forming a network connection. In the described embodiments, a first electronic device determines that a network connection is to be made to at least one other electronic device to access a service on the other electronic device. The first electronic device then searches for available electronic devices that provide the service. Prior to finding a second electronic device that provides the service, the first electronic device receives a request from the second electronic device to access a related service provided by the first electronic device. In these embodiments, the request is received on a network connection formed by the second electronic device between the second electronic device and the first electronic device. Based on the received request, the first electronic device then uses the network connection formed by the second electronic device to communicate with the second electronic device. | 09-01-2011 |
20110213877 | Self Healing Networking Device Systems And Related Methods - In one embodiment, a networking system can comprise a networking device comprising an operating system module and performance management modules. The performance management modules can comprise at least one of a channel hopping module or a channel bonding module. The channel hopping module can switch the networking device from a first channel to a second channel having less interference than the first channel. The channel bonding module can toggle the networking device between a single-channel communications mode and a bonded channel communications mode via a plurality of bonded channels. The operating system module can actuate at least one of the performance management modules to sustain a performance level of the networking device in response to one or more triggering events from a performance review operation executed by the operating system module. Other examples and related methods are described herein. | 09-01-2011 |
20110213878 | METHOD AND SYSTEM FOR MONITORING A SECURITY-RELATED SYSTEM - A system for monitoring a security-related system has a monitoring device on which a first process occurs. The monitoring device generates a monitoring result which is transmitted to another device that forms at least part of the security-related system. Accordingly, a second monitored process of the security-related system returns the received monitoring result to the first process for testing in order to calculate a processing result. | 09-01-2011 |
20110213879 | Multi-level Decision Support in a Content Delivery Network - A content delivery network (CDN) is provided with a multi-tiered decision-support system. Client-side metrics managers collect link-performance data from client devices for formulating requests for network resources from the CDN. Network-node metrics managers broker the network resources from the CDN to the clients based on data collected from the client-side metrics managers. A node-cloud metrics manager distributes the network resources between a plurality of network nodes based on data collected from the network-node metrics managers. When the CDN includes a wireless network, formulating the requests and/or brokering the network resources may be adapted based on network performance data corresponding to the wireless network. | 09-01-2011 |
20110213880 | System and method for performing capacity planning for enterprise applications - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data. | 09-01-2011 |
20110213881 | Digital Living Network Alliance (DLNA) Enabled Portable Electronic Devices and DLNA Management Consoles - Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided. | 09-01-2011 |
20110219110 | System and Method for Managing the Delivery of Targeted Content - A system and method for managing the delivery of targeted content. When a user desires to opt-out of receiving targeted content, the user registers with a do-not-target (DNT) registry and is issued a DNT cookie. The DNT cookie is a domain cookie that is stored on a user network access device. A provider of targeted content may look for the DNT cookie stored on the user's network access device. When the DNT cookie is not found, then the provider may deliver targeted content to the user. When the DNT cookie is found, then the provider may not deliver targeted content to the user. A Web site may offer the user an “override” cookie that allows that Web site to provide targeted content, or selected targeted content, even when the user has a DNT cookie. Alternatively, a DNT header can be added to a Web page request that indicates that the user does not want to receive targeted content. The DNT header may be overridden by an override cookie. | 09-08-2011 |
20110219111 | SYSTEM AND METHOD FOR INTELLIGENT SERVICE ASSURANCE IN NETWORK MANAGEMENT - Systems and methods for intelligent service assurance testing provided herein include receiving network infrastructure information relating to a network, receiving one or more service assurance testing parameters, determining a test schedule of one or more service assurance tests for service assurance testing of the network, the test schedule being based at least in part on the network infrastructure information and the one or more service assurance testing parameters, and deploying the one or more service assurance tests on one or more devices of the network according to the test schedule. | 09-08-2011 |
20110219112 | DETECTION OF END-TO-END TRANSPORT QUALITY - In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol. The link quality may represent the quality of the end-to-end connection between client and server with upper and lower bounds on the injection of additional traffic used for measurement. In some embodiments, the measurement technique may be selected based on the type of measurement that is desired. Accuracy may be maintained by selecting the type of measurement used based on current and previous network conditions. In one embodiment, a state model is used to determine the frequency of measurement and to determine when the measurements have produced a stable estimate of the link quality. | 09-08-2011 |
20110219113 | METHOD AND SYSTEM FOR CLIENT ASSISTED STATEFUL HANDLING OF PACKETS IN A COMMUNICATIONS NETWORK - A method and system for stateful handling of packets in a network are described. In a client-server network environment, the stateful inspection of incoming protocols is offloaded from the server and distributed to the client device. The stateful inspection, as well as the provisioning of the client with the necessary functions required by the handlers, is referred to as Client Assisted Application Level Gateway (ALG). This version of ALG, in which the client performs or assists the server by performing at least some of the inspection and provisioning tasks, allows for a marked performance gain to the network gateway by reducing its packet inspection load. | 09-08-2011 |
20110219114 | POD-BASED SERVER BACKEND INFRASTRUCTURE FOR PEER-ASSISTED APPLICATIONS - A backend server for a peer-to-peer network manages nodes according to a pod-based management scheme. Each pod comprises a plurality of nodes and only nodes within the same pod can directly share data in the peer-to-peer network. The server dynamically allocates nodes to pods and dynamically allocates computing resources for pushing data to the pods based on characteristics of the incoming data stream and performance of the peer-to-peer sharing. By dynamically adjusting the pod structure and resources available to them based on monitored characteristics, the server can optimize performance of the peer-to-peer network. | 09-08-2011 |
20110219115 | COMPUTERIZED SYSTEM AND METHOD FOR LINKING A USER'S E-MAIL THAT TRACKS A USER'S INTEREST AND ACTIVITY - The present invention is a computerized system to link a user's e-mail openings and click throughs on the user's e-mail address to the user's online click stream that tracks the user's interests and activity behavior data on the user's destination websites. The system includes a dedicated tracking sub domain, a programmable tracking code embeddable on the destination site, a domain tracking cookie, a tagging engine and a template engine. The invention also includes a method for using the computerized system that generates a domain tracking cookie that is tied to an e-mail address, tracks the user on a destination site using a programmable tracking code, tracks and updates the user's interests and activity behavior data using the tracking code and takes the data to customize e-mails and the website to the user's interests and activity. | 09-08-2011 |
20110219116 | SYSTEM AND METHOD FOR NETWORK MANAGEMENT - A part of the elements discovered in a network are chosen to be monitored, and a user such as a network administrator is allowed to appropriately monitor desired elements. A network management server collects information on elements in the network, and displays collected information on a GUI screen. The user is allowed to choose an element based on the information displayed on the screen, and the element chosen by the user is then registered as an object to be monitored. Information is collected including elements which are not registered, and displayed on the screen along with a result of comparison to the registered elements. | 09-08-2011 |
20110219117 | Group Management in a Communication Network - A method of performing group management in a communication network. A network node receives from a requesting node a request to monitor a group that contains a plurality of group members. The request also includes at least one criterion to be monitored. The network node determines which group members fulfil the criterion, and sends to the requesting node a notification message including an identity of at least one group member fulfilling the criterion. The notification message also includes further criterion fulfilment information, the further criterion information including an identity of the criterion fulfilled. | 09-08-2011 |
20110219118 | Method and System for Determining Computer Resource Usage in Utility Computing - A universal platform for utility computing that allows service providers to charge clients for the services rendered according to a dimensionless cross-platform universal metric. The platform measures or monitors six metrics commonly used in software computing (MHz for CPU usage, Mbytes for memory usage, Kbytes/sec for I/O, Kbytes/sec for LAN, Kbits/sec for WAN and Gbytes for storage) and applies appropriate weighting and conversion factors to each consumption value to a value in the universal metric that can be applied agnostically to any system or application. The metric can also take other controllable variables into account, such as real estate cost, tax jurisdiction and electrical power. The metric effectively a metric makes diverse computing resources comparable. The total value of the resources consumed by a user determines the cost charged for the use of the computing services. | 09-08-2011 |
20110225285 | Minimizing Latency in Live Virtual Server Migration - Techniques are provided to facilitate faster live migration of a virtual server from one physical server to another physical server by pausing TO activity of the virtual server and slowing memory state changes for CPU-bound activity of the virtual server during the live migration. | 09-15-2011 |
20110225286 | REAL-TIME AUTOMATED VIRTUAL PRIVATE NETWORK (VPN) ACCESS MANAGEMENT - Provided is a method for managing virtual private network (VPN) access to a network that is partitioned into a plurality of subnetworks (subnets). The method includes providing first information associated with hardware hosted on one or more subnets of the network; providing second information associated with users for VPN access, where the VPN access for each user is determined by a list of hardware each user has permission to access; detecting a hardware triggering event corresponding to a modification of the first information; and responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information. | 09-15-2011 |
20110225287 | METHOD AND SYSTEM FOR DISTRIBUTED PROCESSING OF WEB TRAFFIC ANALYTICS DATA - A distributed analytics method and system for processing hit data and producing reports. The hit data includes attributes and values representing activities of a visitor on a web site. The distributed analytics system may include log processors to read and parse the hit data. Analytics generators are configured to read and process the parsed hit data and store the processed data in one or more analytics data stores, which are associated with bands. Analytics processors read and merge data from the analytics data stores associated with the bands, and produce intermediate report deltas. Report generators are configured to receive the intermediate report deltas and produce and store one or more report segments in report data stores. External data can be combined with the data being processed. Report processors are configured to read data from the report data stores and produce a final result based on the report segments. | 09-15-2011 |
20110225288 | METHOD AND SYSTEM FOR EFFICIENT STORAGE AND RETRIEVAL OF ANALYTICS DATA - A method and system for efficient storage and retrieval of current and historical analytics data. The method includes reading current event data and historical event data associated with a visitor from an analytics data store and producing one or more metrics based on the current or historical event data. Delta data is generated using the current and historical event data. The delta data is then combined with previously aggregated data to produce new aggregated data. A system includes an analytics data store. The analytics data store includes a plurality of analytics data store entities arranged chronologically in time. Each analytics data store entity includes a plurality of sub bands of data. Each sub band of data is associated with configurable data blocks. The analytics data store entities also include meta data portions for increasing the efficiency of storage and retrieval of information to and from the analytics data store entities. | 09-15-2011 |
20110225289 | Determining Differences in an Event-Driven Application Accessed in Different Client-Tier Environments - In one embodiment, a method includes dynamically crawling an event-driven application in a plurality of client-tier environments; for each of the client-tier environments, generating a behavioral model of the event-driven application based on the dynamic crawling; for each of the behavioral models, determining one or more pairwise equivalences with respect to one or more other ones of the behavioral models; and, for each of the client-tier environments, determining one or more differences in an end-user experience of the event-driven application in the client-tier environment with respect to one or more other end-user experiences of the event-driven application in one or more other ones of the client-tier environments. | 09-15-2011 |
20110225290 | TARGETING CONTENT CREATION REQUESTS TO CONTENT CONTRIBUTORS - An assignment system and method for generating content creation requests or “assignments” and targeting assignments to content contributors. The assignment system is part of a content distribution system that aggregates, manages, and distributes/syndicates multimedia content that is generated by content contributors. As part of the acquisition of content, the assignment system may compensate the content contributors for the content that they provide to the system. The assignment system generates assignments that are likely to result in content that will be of interest to content consumers. The assignment system targets the generated assignments to content contributors that are well-suited to generate content that will be successful among a target audience. The assignment system notifies those contributors of available assignments and allows contributors to claim assignments to fulfill. The assignment system also manages the flow of content submissions and verifies that submitted content meets the assignment's requirements. | 09-15-2011 |
20110225291 | USING SOCIAL NETWORKING TO HELP USERS PURCHASE MOBILE APPLICATIONS AND DEVICES - A social network helps mobile device users purchase applications for their devices and to purchase new mobile devices. The network utilizes information from a user's friends to effectively “recommend” applications and mobile devices, and in particular recommend mobile devices based on the applications recommended. The phone numbers of a user's contact list may be scanned by the system to identify friends of the user. A friend network database stores the user's information and friends' information throughout the network and supplies the information to an application store where users may download applications or purchase mobile devices. The information supplied by the database includes the applications and the mobile devices of friends or friends of friends. In response to a user inquiry, the store displays the amount and/or identities of friends and/or friends of friends who have downloaded a particular application or own a particular device. | 09-15-2011 |
20110225292 | NETWORK DEVICE AND PACKET TRANSMISSION METHOD - A network device is adapted to be connected to wired and wireless network interface modules for packet transmission therethrough, and includes a network interface selecting module including a connection status monitoring unit and a network interface selecting unit. The connection status monitoring unit transmits an address resolution protocol (ARP) request packet via the wired network interface module for determining a connection status of the wired network interface module through an ARP response packet received by the network device if the network device is configured with a device internet protocol (IP) address and a default IP address belonging to the same subnet, and transmits an internet control message protocol (ICMP) request packet via the wired network interface module for determining the connection status of the wired network interface module through an ICMP response packet received by the network device if otherwise. | 09-15-2011 |
20110225293 | SYSTEM AND METHOD FOR SERVICE BASED SOCIAL NETWORK - A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module. | 09-15-2011 |
20110225294 | RESOURCE-AWARE SYSTEM, METHOD AND PROGRAM PRODUCT FOR MANAGING REQUEST TRAFFIC BASED ON A MANAGEMENT POLICY - Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised. | 09-15-2011 |
20110225295 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF IP NETWORKS ELEMENTS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network. | 09-15-2011 |
20110225296 | AUTONOMOUS MANAGEMENT METHOD FOR PROCESSING UNEXPECTING EVENTS USING INTERACTION BETWEEN NODES IN SENSOR NETWORKS - The present invention relates to a sensor network, and more particularly, to a device and method for managing sensor nodes, in which with respect to predictable events and unpredictable events detected by sensors, the predictable events can be managed as existing policies and the unpredictable events can be managed by receiving policies for the unpredictable events from peripheral sensor nodes or peripheral sensor networks, i.e., both predicted events and unpredicted events can be intelligently managed. According to the method device for managing events detected by sensor nodes according to the present invention the present invention, in the case where unpredictable events are detected, policies for the detected unpredictable events received automatically from peripheral sensor nodes or peripheral sensor networks, so that both predictable and unpredictable events can be managed. Each time unpredictable events are detected, new policies for the detected unpredictable events are automatically generated, so that a manager does not need to update the policies for the unpredictable events every time. In addition, since both predictable and unpredictable events can be managed, the event management method of the present invention can be widely used in a variety of application fields requiring stability and accuracy. | 09-15-2011 |
20110231541 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 09-22-2011 |
20110231542 | INFORMATION PROCESSING DEVICE, SERVER DEVICE, AND PERIPHERAL DEVICE MANAGEMENT METHOD - A user terminal | 09-22-2011 |
20110231543 | Network management control program, network management control device, and network management control method - A network management control device includes a link information storing unit that stores information about connections between nodes belonging to respective networks that are controlled by different protocols. The network management control device receives an input of the configuration information about each of the networks. The network management control device then generates combined information between different protocols, based on the information stored in the link information storing unit about connections between nodes and the received network configuration information. After that, the network management control device performs provisioning in accordance with the generated combined information between the different protocols. | 09-22-2011 |
20110231544 | Providing a presence service in a communications system - The present solution provides a method in which, in response to receiving, in a first user terminal, presence status information on a second user terminal and a corresponding presence status information identifier, said presence status information and a related command element is displayed on the first user terminal. In response to recognising an act performed by the user of the first user terminal, said act comprising the user entering a presence comment by means of said command element, said presence comment and said presence status information identifier are transmitted from the first user terminal to a network apparatus. | 09-22-2011 |
20110231545 | COMMUNICATION NETWORK MANAGEMENT SYSTEM, METHOD AND PROGRAM, AND MANAGEMENT COMPUTER - A communication network management system has: a communication network including a plurality of nodes and a plurality of links connecting between the plurality of nodes; and a management computer that manages the communication network. The management computer has: a storage means in which a route information indicating a transfer route of frames in the communication network is stored; and a monitoring means configured to perform, based on the route information, transmission and reception of frames to and from the communication network. The monitoring means transmits a frame to the transfer route. Each of the plurality of nodes, when receiving a frame, not only forwards the received frame along the transfer route but also sends a reply to the management computer. The monitoring means identifies a location of failure occurrence on the transfer route, based on reception state of the reply from the plurality of nodes. | 09-22-2011 |
20110231546 | AUTOMOTIVE TELEMETRY PROTOCOL - Disclosed is a method of conveying vehicle operation data from a vehicle to a remote monitoring recipient, comprising the steps of establishing a data link between the vehicle and the remote monitoring recipient; collecting vehicle operation data from data sources in the vehicle; packaging the vehicle operation data in a data packet using protocol derived from SNMP; and conveying the data packet over the data link. | 09-22-2011 |
20110231547 | SEARCH METHODS APPLIED TO A PERSONAL NETWORK GATEWAY IN CONVERGED PERSONAL NETWORK SERVICE SYSTEMS AND RELATED CONVERGED PERSONAL NETWORK SERVICE SYSTEMS AND MOBILE DEVICES - A search method applied to a personal network gateway (PN-GW) in a converged personal network service (CPNS) system is provided. First, a search procedure to search for personal network elements (PNEs) in a specific zone of the CPNS system is periodically performed every search period. Upon expiration of each search period, whether any undetected PNE has entered the specific zone is determined and the search period is adaptively adjusted according to the determination result. | 09-22-2011 |
20110238815 | INTERRUPTIBILITY AWARENESS SERVICE - Interruptibility awareness service enables a requestor to learn whether a requestee is interruptible, for instance, by obtaining current social interaction information of a requestee; determining whether the requestee is interruptible based on the requestee's current social interaction information; and returning a response that indicates requestee's interruptibility. | 09-29-2011 |
20110238816 | METHODS AND APPARATUS FOR AUTOMATICALLY PROVISIONING RESOURCES WITHIN A DISTRIBUTED CONTROL PLANE OF A SWITCH - In some embodiments, a network management module is operatively coupled to a set of edge devices that are coupled to a set of peripheral processing devices. The network management module can receive a signal associated with a broadcast protocol from an edge device from the set of edge devices in response to that edge device being operatively coupled to a switch fabric. The network management module can provision that edge device in response to receiving the signal. The network management module can define multiple network control entities at the set of edge devices such that each network control entity from the multiple network control entities can provide forwarding-state information associated with at least one peripheral processing device from the set of peripheral processing devices to at least one remaining network control entity from the multiple network control entities using a selective protocol. | 09-29-2011 |
20110238817 | Network Monitoring Server And Network Monitoring System - A failure factor can be promptly carved up by effectively prioritizing the ports to which MEPs are assigned in a condition where the maximum number of MEPs is limited. A network monitoring server monitors a network having plural switch devices. The plural switch devices each have a communication confirmation function using transmission and reception of a monitoring frame between ports. An upper limit is set to the number of ports to which maintenance end points (MEPs) are assignable among the respective ports of the plural switch devices. The network monitoring server calculates, for each of the plural switch devices, a monitoring priority corresponding to the probability of failures of a device connected to a network path including the port or the port, and generates data for displaying the calculated monitoring priority of each port in association with each port. | 09-29-2011 |
20110238818 | BASEBOARD MANAGEMENT CONTROLLER AND NETWORK CONFIGURATION METHOD OF THE BASEBOARD MANAGEMENT CONTROLLER - A network configuration method of a baseboard management controller (BMC) reads network port information of the BMC. The BMC connects to a network via at least one network interface device that includes more than one network port. A current active network port is determined from network ports of the at least one network interface device according to the current network port information of the BMC. If the current active network port does not works properly, a new active network port is determined from the network ports. The network port information of the BMC is updated according to the new active network port. | 09-29-2011 |
20110238819 | APPARATUS AND METHOD FOR TRANSMITTING INFORMATION ON AN OPERATIONAL STATE OF THE SAME - A communication apparatus acquires current load information including at least one current load value each indicating magnitude of a type of load that is currently imposed on the communication apparatus. A monitoring terminal transmits, to the communication apparatus, a request signal for acquiring an operational state of the communication apparatus. The communication apparatus determines a usable transmission method that is to be used for receiving the request signal and transmitting information on the operational state of the communication apparatus, based on the acquired current load information, and notifies the monitoring terminal about the determined usable transmission method. The monitoring terminal transmits the request signal to the communication apparatus using the usable transmission method notified by the communication apparatus. Then, the communication apparatus transmits information on the operational state of the communication apparatus to the monitoring terminal using the usable transmission method. | 09-29-2011 |
20110238820 | COMPUTER, COMMUNICATION DEVICE, AND COMMUNICATION CONTROL SYSTEM - A physical server monitors a state of a virtual machine that runs on the server. When it is detected that the state of the virtual machine is changed, the physical server transmits information indicating the state change of the virtual machine to a physical switch accommodating the server and controlling communication between the server or the virtual machine and another device or another virtual machine. The physical switch stores configuration information of the virtual machine that runs on an information processing device accommodated by the server. When the physical switch receives the information indicating the state change of the virtual machine from the physical server, the physical switch updates the configuration information based on the received information. The physical switch controls the communication between the physical server or the virtual machine and another device or another virtual machine, based on the stored configuration information. | 09-29-2011 |
20110238821 | INFORMATION COMMUNICATIONS SYSTEM, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM - An information processing device in an information communications system in which a plurality of networks which are connected each other, each network including a plurality of node devices connected to the network, includes: a first acquisition unit configured to acquire an amount of data uploaded from the node device, connected to a first network of the plurality of networks, to a second network of the plurality of networks; a second acquisition unit configured to acquire a total amount of uploaded data acquired by the first acquisition unit; a first determination unit configured to determine whether the total amount of uploaded data acquired by the second acquisition unit is greater than a threshold; and a control unit configured to suppress contents from being uploaded by the node device connected to the first network if the first determination unit determines that the total amount of uploaded data is greater than the threshold. | 09-29-2011 |
20110238822 | DETECTION OF THE MOBILITY MANAGEMENT FUNCTION USED BY THE NETWORK - The invention relates to a method and mobile node capable of detecting whether or not the network to which the mobile node is attached is using a network-based mobility management function for the mobile node or not. In order to enable a mobile node to detect whether the network is using a network-based mobility function for the mobile node, upon establishment of a PDN connection or IP session, the mobile node sends a probe message to the network destined to itself and determines based on the modifications of the probe message returned to the mobile node whether the network is using a network-based mobility function for the mobile node or not. | 09-29-2011 |
20110238823 | COMMUNICATION APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - An apparatus receives and analyzes a packet transmitted via a network, and performs network setting according to data included in the packet. Further, if it is determined that the received packet is a packet addressed to the apparatus and is not a setting packet for the network setting, the apparatus is controlled not to analyze the packet. | 09-29-2011 |
20110238824 | Wireless Local Area Network Hotspot Registration - A wireless local area network ‘WLAN’ client device that has just connected to a WLAN detects that the WLAN is offered by a hotspot, where access to a public network is provided by the WLAN via a gateway. A browser application of the WLAN client device is launched, either automatically or in response to receiving an indication via a user input element of the WLAN client device to register at the hotspot. The browser application is launched with an Internet Protocol address that ought to trigger an Internet Protocol filtering rule of the gateway. | 09-29-2011 |
20110238825 | APPLICATION DATA FLOW MANAGEMENT IN AN IP NETWORK - Disclosed herein is a two-level, network-based application control (NBAC) architecture for monitoring services provided via a packet-based network. The NBAC architecture includes a Network Trigger System provided at a network level to analyze data flows relating to services to be monitored to detect occurrence of configurable events, and to generate and send event reports; and a Usage Status Engine provided at a control level to configure the Network Trigger System to detect occurrence of events of interest, and to receive and process the event reports from the Network Trigger System to monitor the services. | 09-29-2011 |
20110238826 | METHOD AND SYSTEM FOR ANALYSING A MOBILE OPERATOR DATA NETWORK - The present method and system relate for analyzing a mobile operator data network. The method and system dynamically collect and record information of mobile devices from Internet Protocol data sessions occurring on the mobile operator data network. The collected information is processed to detect and record at least one change in one of the mobile devices with a date of occurrence. The method and system then analyze the collected information and the recorded at least one change to generate metrics representative of evolution on the mobile operator data network. | 09-29-2011 |
20110238827 | System and method for monitoring and displaying radiology image traffic - An embodiment of the present invention includes a system and method for detecting and monitoring confidential and DICOM image traffic on a computing device in a PACS network. Embodiments of the present invention protect patient confidentiality by preventing the simultaneous display of confidential images and patient identification information when measuring and displaying the image data. The system detects and measures the transfer of confidential images and stores and displays information included in only the non-confidential headers of the images. The system monitors and warns (such as via email and/or pagers) PACS administrators of system slowdowns as a result of the data gathered. | 09-29-2011 |
20110238828 | REDIRECTING WEB CONTENT - A peer group can be established for sharing Web cache data among a set of computing devices through a peer-to-peer network. The Web cache data can be used by each of the computing devices to respond to requests issued over a client-server network from a Web browser running on that computing device. Web cache data can be exchanged among the peers of the peer group via the peer-to-peer network. A client request issued from a Web browser of one of the computing devices can be satisfied using Web cache data obtained from a different one of the computing devices in the peer group. The client request can be a request to one of the Web servers for Web content. The server associated with the request may never provide the Web content responsive to the client request, which is obtained instead from the different one of the computing devices. | 09-29-2011 |
20110238829 | ANONYMOUS AND SECURE NETWORK-BASED INTERACTION - The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom. | 09-29-2011 |
20110238830 | TRUSTED INDEX STRUCTURE IN A NETWORK ENVIRONMENT - Methods and apparatuses of a trusted index structure in a network environment. In one embodiment, a data processing system includes a master device and at least one slave device to communicate with each other through a network; and a master lock status of a shared storage device to determine the master device. | 09-29-2011 |
20110238831 | STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A management computer includes a memory storing toplogical information including identifiers of ports of computers, storage apparatuses, and switches. The management computer includes a processor, which is configured to: collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; evaluate that a certain access time among the plurality of access times exceeds a predetermined allowable range; search a first access path to which the certain access time corresponds; search at least one second access path starting from a first computer port on the first access path; and search performance information of certain ports which are on the at least one second access path in order to display the searched performance information. | 09-29-2011 |
20110246638 | METHOD AND SYSTEM FOR PROVIDING MONITORING OF NETWORK ENVIRONMENT CHANGES - An approach is provided for monitoring network environment changes. A plurality of events relating to activation of one or more network elements are tracked, wherein the events include movement of cables for the network element and activities corresponding to verification of connections over the cables. Event information relating to the events are stored. The event information includes status information of the verification of the connections. Access is provided to the stored event information for presentation via a portal. | 10-06-2011 |
20110246639 | System and Method for Redundant Object Storage - Systems and methods for redundant object storage are disclosed. A method may include storing at least two copies of each of a plurality of objects among a plurality of nodes communicatively coupled to one another in order to provide redundancy of each of the plurality of objects in the event of a fault of one of the plurality of nodes. The method may also include monitoring access to each object to determine a frequency of access for each object. The method may additionally include redistributing one or more of the copies of the objects such that at least one particular node of the plurality of nodes includes copies of only objects accessed at a frequency below a predetermined frequency threshold based on the determined frequency of access for each object. The method may further include placing the at least one particular node in a reduced-power mode. | 10-06-2011 |
20110246640 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 10-06-2011 |
20110246641 | MEASUREMENTS BASED ON PANEL AND CENSUS DATA - A first set of usage data for a first set of resources on a network and a second set of usage data for a second set of resources on a network are accessed. The first set of resources were accessed by a first group of client systems and the first set of usage data is determined based on information received from the first group of client systems sent as a result of beacon instructions included with the first set of resources. The second set of usage data is determined based on information received from monitoring applications installed on a second group of client systems that accessed the second set of resources. Users of the second group of client systems are a sample of a larger group of users that use resources on the network. Initial usage measurement data for a third set of resources on the network is determined based on the first set of usage data. The third set includes one or more common resources that are included in the first set of resources and the second set of resources. One or more adjustment factors are determined based on the second set of usage data and applied to the initial usage measurement data to generate adjusted usage measurement data. One or more reports are generated based on the adjusted usage measurement data. | 10-06-2011 |
20110246642 | Aggregating network activity using software provenance data - A method and system are described for receiving, at a first node, provenance data including at least a handle relating to a first software program active on a second node and executing one or more instructions received from the second node, on the first node. | 10-06-2011 |
20110246643 | DISTRIBUTED STORAGE SYSTEM, METHOD THEREOF AND COMPUTER READABLE MEDIUM STORING DISTRIBUTED STORAGE PROGRAM - A distributed storage system includes, a plurality of storages configured to store a plurality of items of block data obtained by dividing an original data in a distributed manner, a route planning unit configured to obtain unused bandwidth information of a plurality of networks that are connected to the plurality of storages, and a balancing control unit configured to obtain block data that is a target of data transfer among the plurality of the storages based on the unused bandwidth information of the plurality of networks, and position information indicating a position of the block data in the original data. | 10-06-2011 |
20110246644 | APPARATUS, SYSTEM, AND METHOD OF LOG MANAGEMENT, AND RECORDING MEDIUM STORING LOG MANAGEMENT PROGRAM - An apparatus to manage transmission of log data generated by a transmission terminal from the transmission terminal to a log management device obtains detection result data indicating whether a predetermined event is detected at the log management device, determines whether the log data is to be transmitted from the transmission terminal to the log management device based on the detection result data to generate a determination result, and transmits the transmission approval data having the determination result to the transmission terminal to cause the transmission terminal to process the log data according to the determination result of the transmission approval data. | 10-06-2011 |
20110246645 | PARTICIPANT RESPONSE SYSTEM AND METHOD - A method of using an assessment in a participant response system having a plurality of response devices includes locking an assessment portion to be loaded to create a locked assessment portion; transmitting the locked assessment portion to each response device for storage in each response device; unlocking the assessment portion on each response device at a time prior to a scheduled start time thereby to enable access to the assessment portion; and starting the assessment portion on each response device at the scheduled start time. | 10-06-2011 |
20110246646 | Locating Network Resources for an Entity based on its Digital Certificate - A method and apparatus are provided for locating network resources over a communication network. The method includes receiving a digital certificate identifying a first entity and extracting information from at least one predetermined field of the digital certificate. The extracted information is used as input to a location generation function to create a resource locator (e.g., a URL). The network resource is contacted over the communication network in accordance with a communication protocol using the resource locator to obtain requested information concerning the first entity. | 10-06-2011 |
20110246647 | METHOD FOR OPERATING AT LEAST ONE VIRTUAL NETWORK ON A SUBSTRATE NETWORK AND A VIRTUAL NETWORK ENVIRONMENT - For allowing an efficient consumption of resources of a physical substrate network a method for operating at least one virtual network on a substrate network is claimed, especially within a framework of a self-organizing model for optimizing resource consumption of the substrate network, wherein the virtual networks are including a plurality of virtual nodes each being assigned to respective substrate nodes of the substrate network and wherein two adjacent virtual nodes of the same virtual network are connected by a virtual link which is corresponding to one or more respective substrate node links, including the following steps: Identifying a traffic pattern within at least two substrate nodes with regard to the resources individually consumed by the virtual networks; reallocating of the resources depending on an evaluation of the identified traffic patterns for optimizing resource consumption within the substrate nodes, wherein the identifying step and the evaluation and decision to execute the reallocation of resources is performed locally at each individual substrate node. Further, an according virtual network environment on a substrate network is claimed, preferably for carrying out the above mentioned method. | 10-06-2011 |
20110246648 | COMPUTER SYSTEM AND A METHOD FOR MANAGING LOGICAL VOLUMES - A computer system manages logical volumes as operation map including a volume ID of the logical volume and a plurality of pieces of a predetermined operating information (for example, a path setting, main-volume, sub-volume, permanent storage setting, and storage period setting), when an operation is added to the logical volume, corresponding operating information is set to addition and when the operation is released, the information is set to release, and at a time when a predetermined operating information is all set to release, a corresponding logical volume to the volume ID is detected as being deletable, thereby detecting the deletable the logical volume automatically. | 10-06-2011 |
20110246649 | SYSTEM AND METHOD FOR LOCATING AND CAPTURING DESIRED MEDIA CONTENT FROM MEDIA BROADCASTS - A media agent that monitors multiple broadcast transmissions and a method for the same. The media agent establishes connections with broadcast transmissions and then identifies characteristics of the media content contained within the broadcast transmission. The association between the identified characteristic of the media content and the connected broadcast transmission is maintained to allow the information gathered from the broadcast transmission to be used meaningfully. | 10-06-2011 |
20110246650 | METHOD AND APPARATUS FOR OBTAINING AND REPORTING INSTANCE LABEL INFORMATION AND SYSTEM FOR PROCESSING INSTANCE LABEL INFORMATION - The present invention relates to the field of communication technologies, and discloses a method and an apparatus for obtaining and reporting instance label information and a system for processing instance label information. The method includes the following steps: a managing device sends a SearchLabel Request, where the Request carries information of an index label and the index label is used by the managing device for citing an object instance; the managing device receives a SearchLabel Response, where the Response carries information of an instance label corresponding to the index label information and the instance label is used by a managed device for citing the object instance. According to the present invention, the managing device calls the SearchLabel RPC method to search the managed device for the mapping relationships between index labels and instance labels, so that the managing device can obtain information of the mapping relationships of index labels on the managed device, thus improving the success ratio of configuration. | 10-06-2011 |
20110246651 | Recording and Serializing Events - Event information with respect to events that occur at a client is recorded. A current client real time clock (RTC) timestamp at the occurrence of each event is also recorded. Each event is assigned a unique sequence identification. Event data including the event information and the associated RTC timestamp and sequence identification information are transmitted to a server. The server reconstructs at least one of: a chronological order of the events on the client and the time when each event occurred at the client. | 10-06-2011 |
20110252124 | DATA REPLICATION TRACING - System, method, computer program product embodiments and combinations and sub-combinations thereof for data replication tracing are provided. In an embodiment, the data replication tracing includes identifying a replication environment within a multi-tier infrastructure of an enterprise data processing network, and monitoring operational performance within the replication environment. A path is rendered on a topology to display data flow for the replication environment based upon a configuration of the replication environment. The data flow may be represented relative to a target data node, relative to a source data node, and/or relative to a replication server. | 10-13-2011 |
20110252125 | Dynamic Syncing - Dynamic syncing may be provided. A server may be polled in a baseline mode for changes to a file. This baseline polling may comprise polling the server for changes to the file periodically at a first period. In addition, the server may be polled in an overdrive mode for changes to the file when polling the server in the baseline mode for changes to the file detects that changes have been made to the file. Polling the server in the overdrive mode may comprise polling the server for subsequent changes to the file periodically at a second period smaller that the first period and then at subsequent consecutively longer periods until one of the following occurs: i) a subsequent change to the file is detected; and ii) a subsequent consecutive longer period is greater than or equal to the first period. | 10-13-2011 |
20110252126 | CONTROLLING EMISSION OF EVENTS FROM MANAGED SYSTEMS TO EXTERNAL MANAGEMENT SYSTEMS - In an embodiment, an apparatus comprises one or more processors and a computer-readable storage medium storing one or more sequences of instructions which, when executed by the processors, cause the processors to perform generating relationship information based on relationships between one or more events that are generated by one or more managed systems. The computer-readable storage medium further comprises instructions which, when executed, cause sending the relationship information to the managed systems, wherein the relationship information allows the managed systems to determine whether reporting of the events, by the managed systems, should be suppressed; and receiving, from one or more managed systems, a report about an event when reporting of the event cannot be suppressed. | 10-13-2011 |
20110252127 | METHOD AND SYSTEM FOR LOAD BALANCING WITH AFFINITY - A method and system for distributing requests to multiple back-end servers in client-server environments. A front-end load balancer is used to send requests to multiple back-end servers. In appropriate cases, the load balancer will send requests to the servers based on affinity requirements, while maintaining load balance among servers. | 10-13-2011 |
20110252128 | COMMUNICATION MONITORING DEVICE - A communication monitoring device | 10-13-2011 |
20110252129 | APPARATUS AND METHOD FOR REGISTERING NODE AND SEARCHING FOR FLOATING INTERNET PROTOCOL ADDRESS USING DISTRIBUTED NETWORK - A method of registering a new node in a network and a method of searching for a floating Internet Protocol (IP) address through a distributed network are provided. The method of searching for the floating IP address may include receiving, by a representative node of a head network ring, from an external node, a message comprising an Identification (ID) of a target node, determining whether the ID of the target node is registered in the head network ring, based on a ring information table, and transferring the message to a representative node of a child ring having an address range of the target node among child rings, when the ID of the target node is not registered in the head network ring. | 10-13-2011 |
20110252130 | SYSTEM AND METHOD FOR MANAGING A NETWORK OF USER-SELECTABLE DEVICES - A system and method for managing a network of user-selectable devices, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims. | 10-13-2011 |
20110252131 | SYSTEM AND METHOD FOR AUTOMATICALLY MANAGING A NETWORK OF USER-SELECTABLE DEVICES - A system and method for automatically forming and/or maintaining a network of user-selectable devices, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims. | 10-13-2011 |
20110252132 | METHODS, APPARATUS AND SYSTEMS FOR PROVIDING AND MONITORING SECURE INFORMATION VIA MULTIPLE AUTHORIZED CHANNELS AND GENERATING ALERTS RELATING TO SAME - Display of and access to secure user-centric information via the construct of a channel grid framework serving as a desktop on a user device. Multiple authorized channels through which the user receives and/or interacts with respective portions of the secure user-centric information are implemented based on information access rights and/or security protocols respectively associated with the channels. Channel information is monitored to determine one or more events, conditions, logical workflows, discrete information values or signal data, based on one or more threshold conditions or parameters relating to the channel information. Actionable and/or non-actionable alerts may be generated on one or more authenticated user devices and/or other devices. Information relating to determination of one or more events, conditions, logical workflows, discrete information values or signal data may be transmitted to various devices and/or stored for archival purposes. | 10-13-2011 |
20110252133 | DISTRIBUTION SERVER, DATA DISTRIBUTION METHOD, AND PROGRAM - A distribution server includes an analysis unit for analyzing basic data used in statistics to generate statistical data, a control unit for receiving an acquisition request for the basic data and the statistical data from a communication terminal, a bandwidth monitoring unit for monitoring a bandwidth of a communication line connected to the communication terminal, a degree-of-multiplex calculation unit for calculating a degree of multiplex for simultaneously transmitting the basic data and the statistical data to the communication terminal via the communication line based on a data size of the basic data and the statistical data and an available bandwidth of the communication line, a separation unit for separating the basic data and the statistical data into prescribed units based on the degree of multiplex, and a transmission unit for transmitting the basic data and the statistical data separated into the prescribed units to the communication terminal. | 10-13-2011 |
20110252134 | STORAGE CAPACITY PLANNING - A system and methods for capacity planning of electronic systems storage are provided. Features include a non-invasive data discovery and collection mechanism, an adaptive grouping mechanism, a flexible analysis mechanism, predictive modeling and forecasting mechanisms, and a business metric and correlation mechanism. A discovery engine that ascertains the availability of collectable entities. A collection engine in turn gathers information from and about entities discovered by the discovery engine. A grouping module groups together entities according to parameters specified by the user. An analysis and forecasting module allows a user to create, modify and save forecast scenarios from which a model is generated by a modeling module. Correlations can be identified between specified key business metrics and historical data. Once a model has been created, a forecast is generated and can then be analyzed using Bold Freehand Extrapolation, time-series analysis, and business trend-based forecasting. | 10-13-2011 |
20110252135 | METHOD AND APPARATUS FOR LOCATING CANDIDATE DATA CENTERS FOR APPLICATION MIGRATION - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 10-13-2011 |
20110252136 | FUZZY ROUTING - A system and method optimizes the information flow regarding node location across a network by controlling the propagation of this information based on distance from the node. Location servers that are near to a node receive detailed information regarding the node's location; location servers that are farther from the node receive less detailed information. In like manner, periodic updates are provided less frequently to distant location servers, and preferably also based on the velocity of a mobile node, or on a priority associated with the mobile node. The location information provided in a message addressed to a node can be minimal when the message is transmitted, and additional detail can be added to this location information by routing nodes as the message is routed closer to its destination, based on information provided by the location servers. | 10-13-2011 |
20110252137 | Systems and Methods for Dynamically Provisioning Cloud Computing Resources - In one embodiment the present invention includes a computer-implemented method comprising specifying configuration information for creating one or more software servers as images on a cloud computing system, specifying a processing load threshold, and continuously monitoring a processing load on one or more software servers. If the monitored load exceeds the processing load threshold, a request to the cloud computing system may be generated to instantiate an instance of one of said images. The method further includes creating a server instance on the cloud in response to the request, distributing the processing load across the one or more servers and the server instance, and monitoring the processing load on the one or more servers and the server instance. | 10-13-2011 |
20110258308 | SYSTEM AND METHOD FOR DEDUCING PRESENCE STATUS FROM NETWORK DATA - An example method includes receiving network traffic associated with an end user and evaluating the network traffic to identify network activity associated with the end user. The method includes generating a presence status associated with the end user based on the network activity, the presence status is deduced automatically without involving active participation from the end user. In more specific embodiments, the presence status is integrated into a directory in which presence status for a plurality of end users is stored. Initially, the end user can be marked in an unavailable state, where authentication to a network causes the presence status to change to an available state. In other embodiments, calendar events and telephone events can be tracked for the end user in order to update the presence status. Additionally, at least one parameter associated with the presence status is hidden based on configurable end user privacy preferences. | 10-20-2011 |
20110258309 | PEER TO PEER MONITORING FRAMEWORK FOR TRANSACTION TRACKING - An approach is provided that transmits a load balance request from a first peer node to other peer nodes. Some of the peer nodes have assigned transaction tracking responsibilities. The transmitting is performed in response to identifying that the first peer node is performing at a non-optimal level. The first peer node receives responses from the other peer nodes. A determination is made as to whether to handover one or more of the first peer node's transaction tracking responsibilities. If a second peer node is identified to take some of the first peer node's responsibilities, then a handover message is sent from the first peer node to the second peer node that assigns at least one of the first peer node's assigned transaction responsibilities to the second peer node. | 10-20-2011 |
20110258310 | Multi-protocol adapter for in-vehicle and industrial communications networks - An adapter device for providing the user a remote access point for supporting interaction between the device and one or more target devices supporting one or more of several communication protocols for automotive and industrial automation applications employing user-selectable protocols, such as multiplexed communication networks. | 10-20-2011 |
20110258311 | MONITORING APPARATUS, MONITORING METHOD AND COMPUTER READABLE MEDIUM FOR MONITORING - There is provided a monitoring apparatus including a monitoring unit that monitors an operating situation of nodes over a network based on a predetermined monitoring parameter, a memory that records the operating situation monitored by the monitoring unit, and a changing unit that changes the monitoring parameters based on a past operating situation recorded by the memory. | 10-20-2011 |
20110258312 | SYSTEM AND METHOD FOR MONITORING AND CONTROLLING SERVER SYSTEMS ACROSS A BANDWIDTH CONSTRAINED NETWORK - A method, an apparatus comprising a network manager and a system for communicating with at least one server across a network includes at least one group identifier unit for determining if a communication is intended for a server by determining if a unique identifier included with a communication received by the server identifies a group in which the server is a member. In at least one embodiment, the network manager is configured to define at least one group of servers, determine a unique identifier for the at least one group of servers and include, with a communication to the servers connected to the network, the determined unique identifier for the group of servers for which the communication is intended. Accordingly, a communication is only accepted by a server which is identified as a member of the intended group of servers for which a communication is intended. | 10-20-2011 |
20110258313 | NETWORK-ASSISTED PEER DISCOVERY - Techniques for performing network-assisted peer discovery to enable peer-to-peer (P2P) communication are described. In one design, a device registers with a network entity (e.g., a directory agent) so that the presence of the device and possibly other information about the device can be made known to the network entity. The network entity collects similar information from other devices. The device sends a request to the network entity, e.g., during or after registration. The request includes information used to match the device with other devices, e.g., information about service(s) provided by the device and/or service(s) requested by the device. The directory agent matches requests received from all devices, determines a match between the device and at least one other device, and sends a notification to perform peer discovery. The device performs peer discovery in response to receiving the notification from the network entity. | 10-20-2011 |
20110258314 | Monitoring System for Proactive Service of Devices - In one embodiment, a method for monitoring operation of a device is provided. Monitoring of the device at a source using a gateway is activated. The device is coupled to the source to receive power from the source for operation of the device. The gateway monitors an electrical characteristic of the source coupled to the device. Monitored information of the electrical characteristic is captured from the source when an event occurs at the device. The monitored information is correlated as being associated with the device. The monitored information is used in an analysis to analyze whether a variance in the monitored information violates a threshold to trigger an indication of a problem in the operation of the device. | 10-20-2011 |
20110258315 | NETWORK ANALYSIS SYSTEM AND METHOD UTILIZING COLLECTED METADATA - A system, method and computer program product are provided for analyzing network traffic associated with network services. Initially, network traffic and metadata are collected from a network. Thereafter, the network traffic is analyzed utilizing the metadata. | 10-20-2011 |
20110264787 | CAPTURING WEB-BASED SCENARIOS - This patent application pertains to capturing web-based scenarios. One example detects execution of a web application. This example also automatically captures non-deterministic events of the execution in a manner that is transparent to a user of the web application. | 10-27-2011 |
20110264788 | Mechanism for Guaranteeing Deterministic Bounded Tunable Downtime for Live Migration of Virtual Machines Over Reliable Channels - A mechanism for guaranteeing deterministic bounded tunable downtime for live migration of virtual machines (VMs) over reliable channels is disclosed. A method of the invention includes receiving a maximum downtime of a VM during a live migration of the VM from a source host machine to a destination host machine, determining a capacity of a network channel on which the VM is live migrated to the destination host machine, calculating a number of memory pages of the VM left to be transferred as part of the live migration before the VM is stopped, wherein the calculating of the number of memory pages is based on the received maximum downtime and the determined capacity of the network channel, and stopping the VM when the calculated number of memory pages remain to be transferred in order to transfer those memory pages to the destination host machine. | 10-27-2011 |
20110264789 | DYNAMIC SETTING OF MBUF MAXIMUM LIMITS - A data processing system stack initializes a first mbuf chain limit to a pre-set level. It receives at least one packet. The system receives at least one packet. The system returns an mbuf data structure in response to receiving at least one packet from an IP address. The system measures a health of the network connection to determine whether the network connection satisfies a first health criterion. The system reduces the mbuf chain limit to a second mbuf chain limit, responsive to the health of the network connection not satisfying the first health criterion. The system measures the health of the network connection to determine whether the network connection meets a second health criterion. | 10-27-2011 |
20110264790 | Method And Apparatus For Measuring Business Transaction Performance - A method for measuring business transaction performance, includes the steps of, at a top-level component, assigning a correlation tag and original time stamp to a server request, passing the original time stamp with any server requests from the top-level component to one or more subsequent components, and computing an aggregate latency over a predetermined interval at the top-level component and at each subsequent component based on the original time stamp. | 10-27-2011 |
20110264791 | Provisioning for Enterprise Service - Identifying an incoming call as from a mobile device of an enterprise communication system. Creating a first list relating mobile devices of the enterprise communication system with Public Land Mobile Network (PLMN) number of the device. Creating a hashmap comprising keys. Each key comprising the last n digits assigned as a PLMN number to at least one mobile device of the enterprise communication system. The hashmap further comprising a plurality of buckets. Each bucket corresponding to a key, and comprising a second list identifying each enterprise-associated mobile device having a PLMN number ending with the key. Receiving an Automatic Number Identification (ANI) number of an call incoming to the enterprise communication system. Retrieving at least one bucket corresponding to a key comprising the last n digits of the ANI number. Searching the retrieved bucket for the unique identifier associated with the full PLMN number. | 10-27-2011 |
20110264792 | MULTIPEER - Provided are methods and systems for creating an optimal set of reflector peers, comprising detecting a plurality of reflector peers, retrieving a plurality of static metrics from each of the plurality of reflector peers, ranking the plurality of reflector peers based on the plurality of static metrics, selecting a top predetermined number of peers from each static metric, establishing the selected reflector peers as the optimal set of reflector peers, determining dynamic metric for each of the plurality of reflector peers, and adjusting the optimal set of reflector peers based on the dynamic metric. | 10-27-2011 |
20110264793 | Capturing Internet Content - A method and system for capturing digital content that is accessible at predetermined times from the Internet is herein disclosed. At least one embodiment of a method includes receiving data related to scheduled Internet content and providing at least a portion of the received Internet data as a schedule, the schedule including one or more content listings corresponding to the scheduled Internet content. Some embodiments include, in response to receiving a selection of at least one of the listings, scheduling a recording of the corresponding Internet content. | 10-27-2011 |
20110264794 | System and method to publish information from servers to remote monitor devices - To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page. | 10-27-2011 |
20110264795 | Communication network managment system, method and program, and management computer - A communication network management system has: a communication network including a plurality of nodes and a plurality of links connecting between the plurality of nodes; and a management computer connected to the plurality of nodes. A loop-shape communication route in the communication network is a loop route. The management computer transmits a frame to one node on the loop route. When receiving the frame, each node on the loop route forwards the received frame to a subsequent node along the loop route and, if a predetermined condition is satisfied, returns a response back to the management computer. The management computer determines whether or not a failure is occurring, based on reception state of the response. | 10-27-2011 |
20110264796 | SEARCH AND NAVIGATIONAL RATING SYSTEM FOR ONLINE SOCIAL ENVIRONMENT - The subject application involves enhancing search and navigation through a social virtual environment through the use of a ratings system. The environment is comprised of smaller communities or villages. The rating of a village is determined in part by the activities performed in a village, by the user who is performing the activity, and the duration and recurrence of the activity. Another element that affects a village's current rating is the state of decline or decay to which it is subjected. Certain activities that are performed can effectively delay or negate an amount of decay to the rating, but even so, village ratings are in a continual state of decline. To increase or maintain a particular rating, village residents need to perform activities. | 10-27-2011 |
20110264797 | INTEGRATED NETWORK DATA COLLECTION ARRANGEMENT AND METHODS THEREOF - An arrangement for storing data pertaining to network data traffic flowing through a network is provided. The arrangement includes a set of network cluster arrangements. Each network cluster arrangement of the set of network cluster arrangements includes a plurality of network devices configured for receiving and sending the network data traffic, and a set of monitoring network appliances configured for monitoring at least a portion of the network data traffic flowing between the plurality of network devices. The arrangement also includes a set of network data collection arrangements configured for at least storing the data pertaining to the network data traffic. | 10-27-2011 |
20110264798 | HOST-LEVEL POLICIES FOR GLOBAL SERVER LOAD BALANCING - In a network, a user can configure host-level policies usable for load balancing traffic to servers of a domain. A global server load balancing (GSLB) switch provides load balancing to the servers, and is configured with the GSLB host-level policies. Users can define a host-level policy (alternatively or additionally to a globally applied GSLB policy) and apply the host-level policy to hosts in domains configured on the GSLB switch. Thus, the user can enable different policies for different hosts. This allows the user to have the flexibility to control metrics used for selection of a best address for querying clients, as well as the metric order and additional parameters used in the GSLB process, at the host level. | 10-27-2011 |
20110264799 | METHOD FOR MEASURING THE PERFORMANCE OF AN IP NETWORK AND ASSOCIATED SYSTEM - The invention relates to a method for measuring the performance of a network ( | 10-27-2011 |
20110264800 | METHOD AND APPARATUS FOR A CLIENT CONNECTION MANAGER - A method and apparatus for a connection manager have been disclosed. By providing for persistent connections with clients, the connection manager allows for servers to communicate with clients, which would otherwise be inaccessible. | 10-27-2011 |
20110264801 | NETWORK TRANSACTION DISCOVERY - Disclosed herein is a computer implemented technique for discovering the information technology resources that are involved in a particular networked business transaction. The system comprises three basic components. A robotic transaction playback client records the various steps in a particular transaction and can repetitively execute these steps to analyze the results. A network record collector observes the traffic throughout the network in response to the repeated instances of the transaction executed by the robotic transaction playback client. A backend processor analyzes the observations of network traffic to determine which ones are possibly tied to the transaction, and from this information determine which network components are part of the transaction being analyzed. Event timing information from a plurality of executions of a particular transaction are used to determine resource usage and paths. | 10-27-2011 |
20110264802 | OPTIMIZED MIRROR FOR P2P IDENTIFICATION - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, by the network node, a packet belonging to an IP flow; when the IP flow is a flow for which content information is to be sent to the content identification device, performing the steps of: determining, using deep packet inspection, that the packet contains a value for at least one field of interest, determining whether all fields of interest needed by the content identification have been seen by the network node among a plurality of packets belonging to the IP flow, and communicating the value of the at least one field of interest to the content identification device. | 10-27-2011 |
20110270963 | SYSTEM AND METHOD FOR EVALUATING APPLICATION SUITABILITY IN EXECUTION ENVIRONMENT - An evaluation system evaluates the suitability of an application in a plurality of types of application execution environments based on the characteristics of this application and the usage of this application by a user. The evaluation system displays information denoting the result of this evaluation. | 11-03-2011 |
20110270964 | USING DNS REFLECTION TO MEASURE NETWORK PERFORMANCE - A top level domain name system (DNS) server receives a DNS query from a local DNS resolver, the DNS query requesting a network address corresponding to a domain name. The top level DNS server reflects the local DNS resolver to a reflector DNS server. The reflector DNS server reflects the local DNS resolver to a collector DNS server, which in turn returns the network address to the local DNS resolver. The reflector DNS server and collector DNS server are both in the same data center, and one or more network performance measurements for communications between the local DNS resolver and the data center are determined based on the communications between the local DNS resolver and both the reflector DNS server and the collector DNS server. | 11-03-2011 |
20110270965 | Methods for Web Site Analysis - A specification of a target web site is received. A number of field web sites related to the target web site are identified. Data values are acquired for a set of metrics for the target and each field web site. These data values are processed to evaluate a standing of the target web site relative to the field web sites, while maintaining anonymity of the field web sites. An average web site is determined by respectively averaging data values for the field web sites. A bounding web site is characterized by the best data values from among all field web sites. Target web site data values are compared to average and/or bounding web site data values at a given time. Variations in differences between target web site data values and corresponding average and/or bounding web site data values over time determines improvement and/or success of the target web site. | 11-03-2011 |
20110270966 | DYNAMIC PERFORMANCE MONITORING - A management server uses one or more performance monitoring data collectors to generate SNMP queries. Each collector can be configured to specify one or more performance parameters. Using each configured collector, the management server can collect performance parameter data for managed devices in a network. When the management server receives performance data, the management server traverses through each response to look for performance values associated with each performance parameter. The management server can dynamically create and destroy performance monitoring instances supported by each collector to accommodate components added to or removed from the devices in the managed network. | 11-03-2011 |
20110270967 | METHOD AND APPARATUS FOR MITIGATING AN OVERLOAD IN A NETWORK - A method and apparatus for managing an overload condition in a network are disclosed. For example, the method monitors the network for a traffic overload condition, and determines whether a more severe traffic overload condition or a less severe traffic overload condition is detected by using a network monitor and controller. The method then selects using a network monitor and controller agent in response to a command from the network monitor and controller, a different bandwidth preservation scheme if the more severe traffic overload condition or the less severe traffic overload condition is detected, wherein the different bandwidth preservation scheme is based on a selection of a codec type and is applied to a portion of the traffic. | 11-03-2011 |
20110270968 | DECISION SUPPORT SYSTEM FOR MOVING COMPUTING WORKLOADS TO PUBLIC CLOUDS - An automated approach to analyzing computer workloads and cloud computing environments to support moving and hosting the workloads within the cloud computing environments. A workload may be identified and analyzed based upon business and technical attributes to determine whether the workload is suitable for moving to a cloud computing environment. Similarly, public clouds may be identified and analyzed based upon their business and technical attributes to determine whether the public clouds are suitable for hosting a workload. The analysis of the public clouds may be based on a particular workload, a category of workloads, or irrespective of workloads or workload categories. A best-fit public cloud may be identified for a workload determined to be suitable for moving to a public cloud environment based upon the analyses. | 11-03-2011 |
20110270969 | VIRTUAL SERVER AND METHOD FOR IDENTIFYING ZOMBIE, AND SINKHOLE SERVER AND METHOD FOR INTEGRATEDLY MANAGING ZOMBIE INFORMATION - Provided are a virtual server and method for identifying a zombie, and a sinkhole server and method for integratedly managing zombie information. The virtual server includes an authentication processing module authenticating a host using a CAPTCHA test and providing a cookie to the authenticated host when a web server access request message received from the host does not include a cookie, a cookie value verification module for extracting a cookie value from the web server access request message and verifying the extracted cookie value when the web server access request message includes a cookie, a web page access inducement module for inducing the host to access a web server when the cookie value is verified, and a zombie identification module for blocking access of the host when the cookie value is not verified, and identifying the host as a zombie when the number of blocking operations exceeds a threshold value. | 11-03-2011 |
20110270970 | NETWORK DEVICE TESTING SYSTEM AND METHOD - A testing method tests a network device using a testing system by determining whether the network device is turned on via a second port of the network device. When the network device is turned on, the testing system logs onto the network device via the second port. A network service application of the network device is implemented and an IP address of the network device is obtained. Accordingly, a network connection to the network device is established. The testing system implements additional service applications of the network device and tests features of additional applications via a first port of the network device. | 11-03-2011 |
20110270971 | SYSTEMS FOR AND METHODS OF USER DEMOGRAPHIC REPORTING USABLE FOR IDENTIFYING USERS AND COLLECTING USAGE DATA - Several ways of identifying users and collecting demographic information and market information are disclosed, including branding a browser with a unique identification in each user request, identifying a user by his key strokes or mouse clicks, gathering demographic information using multiple data sets and by monitoring network traffic. Additionally, user requested content is distinguished from other, non-user content, and the performance of a server can be monitor and analyzed from a client a client perspective. Further, an Internet user's Internet data is routed to a known domain on the Internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's data requests to the domain, and database servers, which filter and build a database of the user's Internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures. | 11-03-2011 |
20110270972 | VIRTUAL TOPOLOGY ADAPTATION FOR RESOURCE OPTIMIZATION IN TELECOMMUNICATION NETWORKS - Some embodiments described in this disclosure provide methods and apparatuses for managing a network, e.g., by performing virtual topology adaptation for resource optimization. In some embodiments, a system can monitor traffic on the network to identify heavily loaded and/or lightly loaded links in the network. In response to identifying a lightly loaded link, the system can shift traffic from the lightly loaded link to one or more other links in the network. After the traffic has been shifted, the system can move circuitry associated with the lightly loaded link into a low-power state. In response to identifying a heavily loaded link, the system can activate a new link in the network by moving circuitry associated with the new link from a low-power state into a high-power state. After the new link has been activated, the system can shift traffic from the heavily loaded link to the new link. | 11-03-2011 |
20110270973 | METHODS FOR MONITORING AND REPORTING MTC EVENTS - MTC event monitoring methods and the network servers thereof. The MTC event monitoring method comprises configuring, by the network server, a detection sensitivity threshold, determining, by the network server, an MTC event at an MTC device and an associated detection sensitivity parameter, and reporting, by the network server, the MTC event to an MTC server only when the associated detection sensitivity parameter equals to or exceeds the detection sensitivity threshold. | 11-03-2011 |
20110270974 | SYSTEM AND METHOD FOR PROVIDING AUTOMATICALLY UPDATED PRODUCT INSERTS - Systems, apparatuses, and methods can provide parameters of operating results for control products used in biological reactions. For example, automatically updated inserts containing such parameters for clinical quality controls can be provided. A customer can log into a website, provide lot number of quality control products, information about instruments, and tests being performed and then receive updated parameters for the products. The product inserts can be customized for or by a particular customer. | 11-03-2011 |
20110270975 | CONFIGURABLE FRAME WORK FOR TESTING AND ANALYSIS OF CLIENT-SIDE WEB BROWSER PAGE PERFORMANCE - The present invention features methods, computer program products and apparatuses for measuring client-side computer system performance that features identifying one of a plurality of uniform resource locator addresses contained on a server computing system, with each of the uniform resource locator addresses being associated with computing resources. The computing the computing resources associated with any one of the plurality of uniform resource locator addresses being different from the computer resource corresponding to the remaining uniform resource locator addresses. The computing resources are accessible through a web-browser that accesses the same the computing resources associated with the one of the plurality of uniform resource locator addresses. Measured are metrics of the interactions between the web-browser and the computing resources associated with the one of the plurality of uniform resource locator addresses. It is determined whether the metrics satisfy pre-determined operational requirements. | 11-03-2011 |
20110270976 | NETWORK PROTOCOL PROCESSING SYSTEM AND NETWORK PROTOCOL PROCESSING METHOD - In a network protocol processing system in which variables of each of TCP transmission processing and TCP reception processing depend on each other, asynchronous parallel processing is realized between a transmission processing block and a reception processing block for updated protocol processing. Specifically, the system includes a high priority queue for transferring control data to be processed with high priority, a low priority queue for control data other than the above control data, and priority control means for distributing the control data to two kinds of queues. When a request for session establishment and the session disconnection of a new TCP session is issued from an application during transmission of TCP data, data related with the session establishment and the session disconnection is notified preferentially through the high priority queue, and other control data is transferred through the low priority queue. | 11-03-2011 |
20110270977 | ADAPTATION SYSTEM FOR LAWFUL INTERCEPTION WITHIN DIFFERENT TELECOMMUNICATION NETWORKS - A lawful interception architecture for an operator of communication networks (NWO) comprising sets of interception probes (SON | 11-03-2011 |
20110270978 | Method and Apparatus to Migrate Transport Protocols - The invention comprises a method for migrating control plane data transport between a control node ( | 11-03-2011 |
20110270979 | Reducing Propagation Of Message Floods In Computer Networks - A computer network ( | 11-03-2011 |
20110270980 | WIRELESS COMMUNICATION SYSTEM - Apparatus identification information about wireless access apparatuses judged to be able to communicate with a monitoring apparatus, among multiple wireless access apparatuses, is stored in a neighborhood database. If there is apparatus identification information that is not stored in the neighborhood database, among apparatus identification information stored in a registration database in which apparatus identification information about wireless access apparatuses registered as monitoring targets of the monitoring apparatus is stored, it is judged again for a wireless access apparatus to which the apparatus identification information is given whether communication is possible, after a predetermined time elapses. On the other hand, if there is no such apparatus information, or if the judgment is performed again for a predetermined number of times, the apparatus identification information stored in the neighborhood database is copied to the registration database. | 11-03-2011 |
20110270981 | METHOD FOR MONITORING ACCESS NETWORKS - A technique enabling an access node to undertake more responsibility and render multicast streaming more effective by utilizing streaming service control messages SSCP which contain important information such as Quality of Experience or Quality of Service. The access node itself or in cooperation with a processing/monitoring entity may be enabled to analyze QOE data in SSCP report messages from different access network receivers, to identify specific receivers which encounter problems and to indicate the problems to the provider of the network. | 11-03-2011 |
20110270982 | SYSTEM AND METHOD FOR UPDATING INFORMATION USING LIMITED BANDWIDTH - A system and method detects an amount of data attributed to a device including reports sent to the device, and reduces the amount of data being used to provide reports to the device if the amount of data attributed to the device exceeds an amount assigned to the device. Data uploaded from the device is also minimized. | 11-03-2011 |
20110270983 | Network Response Time Measurements in an Asymmetric Routing Environment - In one embodiment, a method can include: (i) receiving flow records from a plurality of network devices on asymmetric paths; (ii) reconstructing a network transaction from the received flow records; and (iii) deriving response times using the reconstructed network transaction. | 11-03-2011 |
20110276679 | DYNAMIC BINDING FOR USE IN CONTENT DISTRIBUTION - Provided are methods and systems for dynamic binding in the context of content delivery. For example, the methods and systems may be implemented as a dynamic binding process that maps a content provider to a first set of content servers in a content distribution network. The dynamic binding process may then facilitate the content to be received from the content provider so that the content can be distributed by the first set of content servers in the content distribution network. The dynamic binding process further monitors network traffic associated with the content from the content provider and determines at least one metric associated with the network traffic. Additionally, the dynamic binding process can remap the content provider to a second set of content servers in the content distribution network based on at least one of the metrics. | 11-10-2011 |
20110276680 | METHOD AND SYSTEM OF MANIPULATING DATA BASED ON USER-FEEDBACK - A method and system for providing content data to a user that includes providing a sample that is previewed by the user. The content data includes e-books, albums, games, videos and other electronic data. The user can then decide whether to accept the content based on the sample. If the sample is rejected, the user profile is updated to reflect the rejection. If the sample is accepted, the entire content is provided to the user. The amount of the content viewed or listened to by the user is tracked to determine how much of the content was actually listened to or viewed. | 11-10-2011 |
20110276681 | SYSTEM AND METHOD FOR MONITORING WEB CONTENT - A system and method of monitoring content stored at a plurality of locations in a location set are provided. The method comprises: determining two or more historic attributes for a first feature associated with each location; for each location in the location set, determining a first predicted attribute for the first feature associated with that location based on the historic attributes for that first feature and that location; determining a monitoring schedule in accordance with the first predicted attribute; and monitoring the content at the locations in the location set according to the monitoring schedule. | 11-10-2011 |
20110276682 | System and Method for Determining Application Dependency Paths in a Data Center - A method and a system are disclosed for determining application dependency paths in a data center. The method and the system captures application traffic volume data on the servers with switches and monitoring agents; generates an application traffic matrix of all the components of the applications based on the application traffic volume data; estimates the number of the applications in the data center from the traffic matrix with a Rank Estimation via Singular Value Decomposition or Power Factorization Residue Errors process; and decomposes the traffic matrix into a first matrix and a second matrix with a non-negative matrix factorization process using the estimated number of applications. The first matrix represents a set of the components belonging to each of the applications and the second matrix represents the amount of traffic generated by each application over time. Any noise in the first and second matrices is removed with a concurrent volumes ratios based correlation process. | 11-10-2011 |
20110276683 | DISTRIBUTED DATA REVOCATION USING DATA COMMANDS - A policy proxy intercepts a data stream between a data server and a user or other device, identifies the user device, and identifies a policy in an integrated policy server applicable to the user device based on the identity of the user device. The policy proxy may identify one or more of the policy elements based on the user device, and translate the policy elements into actions involving the data stream between the data server and the user device so as to implement at least one aspect of the identified policy. The actions can comprise permitting normal exchange of data between the data server and the user device, preventing communication between the data server and the user device, or modifying the data stream between the data server and the user device. | 11-10-2011 |
20110276684 | METHODS AND SYSTEMS FOR DISCOVERING CONFIGURATION DATA - Systems and methods for discovering configuration data are disclosed. In accordance with one method, network configuration tokens for a system are identified. Further, potential configuration files are obtained by identifying running processes in the system, restarting the processes and monitoring the restarted processes to discover files opened by the restarted processes. In addition, files that include the identified network configuration tokens are selected from the potential configuration files. Moreover, the method includes determining, by a hardware processor, that a given token from the identified tokens is a true token by replacing the given token with a test token in at least one of the selected files, restarting the identified processes that read the given token, and identifying a change in at least one of system call activity or network activity in the system. | 11-10-2011 |
20110276685 | CLOUD COMPUTING AS A SERVICE FOR ENTERPRISE SOFTWARE AND DATA PROVISIONING - A system, including a central server, remotely install server agents, and administrative agents, is disclosed for provisioning software and updates, maintenance directives, and data to client machines within a central domain or a remote disjoint domain. By monitoring network traffic through various network nodes, a focal point of network traffic for all machines in the domain may be identified by the central server. A server agent is installed at the focal point network node for identifying all machines in the domain. Administrative agents are installed on all identified machines. The administrative agents facilitate the copying and distribution of files needed for software and data provisioning and maintenance. | 11-10-2011 |
20110276686 | CLOUD COMPUTING ASSESSMENT TOOL - A system is described for providing a cloud computing assessment tool. The system may include a memory, an interface, and a processor. The processor may receive a data center configuration from the user. The data center configuration may include a compute and storage capacity. The processor may determine a cloud computing configuration equivalent to the data center configuration. The processor may identify a time period for transitioning from the data center to cloud computing. The processor may identify a plurality of trend values representing changes in the compute capacity and storage capacity over the period of time. The processor may generate a strategy to transition from the data center to cloud computing over the period of time. The strategy may account for the changes in the compute capacity and the storage capacity. The processor may provide a graphical output and a numerical output of the strategy to the user. | 11-10-2011 |
20110276687 | PROCESS FOR ASSOCIATING DATA REQUESTS WITH SITE VISITS - A process is disclosed for associating particular data requests from a user's computing device with particular site visits. The process includes determining whether the data requests are “forced content” requests, such as requests for advertisements. Such forced content requests, even if directed to a different domain from that of a site being visited, preferably are not treated as the end of the site visit or the start of a new site visit. The process may also consider other information regarding the data requests, such as whether they are requests for images, and whether they are directed to hosts associated with an open site visit. | 11-10-2011 |
20110276688 | MONITORING NETWORK PERFORMANCE TO IDENTIFY SOURCES OF NETWORK PERFORMANCE DEGRADATION - A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation. | 11-10-2011 |
20110276689 | SOCIAL NETWORK FOR MONITORING USER ACTIVITY - Systems and methods for social networking. Location-related data and other behavioral and exogenously generated characteristics are used to replace or supplement self-generated profiles in order to enhance the quality and trustworthiness of the matches made using the system and facilitate the inputting of profile information. | 11-10-2011 |
20110282986 | NETWORK TRAFFIC OPTIMIZATION - A method of optimizing network traffic includes, in part, measuring amounts of traffic exchange between each of a multitude of hosts disposed in the network, identifying a network domain to which each of the multitude of hosts is connected, calculating a net increase or decrease in inter-domain traffic associated with moving each of the multitude of hosts among the network domains in order to generate a list, and ranking the list of moves by net saving in the inter-domain traffic. The highest ranked move may be automatically applied so as to change the network domain to which the host associated with the highest ranked move is connected. The hosts may be virtual machines. Optionally, a change in the inter-domain traffic as a result of moving a first host in accordance with the list occurs only if one or more conditions are met. | 11-17-2011 |
20110282987 | COMMUNICATION METHOD, SYSTEM, AND PROGRAM - A communication method between service modules in a system in which service modules operating on a plurality of information processing apparatuses connected with a network operate in collaboration with each other, the system includes a monitoring apparatus that is provided with a monitor module monitoring a connection between service modules in the system and that has connection management information including identifier information for uniquely identifying an information processing apparatus in which a service module is operating in the system, and connection information including external connection information for the service module to perform communication using an external network between the information processing apparatuses and internal connection information for the service module to perform communication using an internal network of the information processing apparatus. | 11-17-2011 |
20110282988 | GEOGRAPHIC LOCATION SYSTEM AND METHOD - A method for determining a derived geographic location of a target Internet host includes identifying plural landmark Internet hosts communicatively coupled with the target Internet host by a network. The method also includes measuring network latencies of probe packets transmitted to the target and landmark Internet hosts along different network pathways and calculating relative distances between the target Internet host and one or more of the landmark Internet hosts based on the network latencies. The method further includes comparing the relative distances to identify at least one of the landmark Internet hosts that is geographically closer to the target Internet host than one or more other landmark Internet hosts and determining the derived geographic location of the target Internet host based on a geographic location of the at least one of the landmark Internet hosts that is geographically closer to the target Internet host. | 11-17-2011 |
20110282989 | RESOURCE COORDINATION FOR PEER-TO-PEER GROUPS THROUGH DISTRIBUTED NEGOTIATION - Techniques for determining resources to use for peer-to-peer (P2P) communication are disclosed. In an aspect, a network entity may receive feedback information (e.g., resource usage information and/or channel state information) from P2P devices and may perform resource partitioning based on the feedback information to allocate some of the available resources for P2P communication. The allocated resources may observe little or no interference from devices engaged in wide area network (WAN) communication. In another aspect, P2P groups may perform resource negotiation via a WAN connection (e.g., with little or no involvement by the WAN) to assign the allocated resources to different P2P groups. In yet another aspect, a device may autonomously determine whether to communicate with another device directly or via a WAN, e.g., whether to initiate P2P communication with another device and whether to terminate P2P communication. In yet another aspect, a network entity may participate in resource negotiation by P2P devices. | 11-17-2011 |
20110282990 | Method and system for constraining server usage in a distributed network - A “velvet rope” mechanism that enables customers of a shared distributed network (such as a content delivery network) needing to control their costs to control the amount of traffic that is served via the shared network. A given server in the distributed network identifies when a customer is about to exceed a bandwidth quota as a rate (bursting) or for a given billing period (e.g., total megabytes (MB) served for a given period) and provides a means for taking a given action based on this information. Typically, the action taken would result in a reduction in traffic served so that the customer can constrain its usage of the shared network to a given budget value. | 11-17-2011 |
20110282991 | NETWORK REAL ESTATE ANALYSIS - A method can be used to analyze the “real-estate” performance of content items within a network site. The method can comprise determining the click distance to reach each content item and determining the performance of each content item. The method can also comprise calculating a predicted value for performance based on statistical relationship between location and performance observed in a population of content items. The method can comprise comparing the predicted and actual performance. If a content item has an actual performance greater than its predicted performance, then it may be promoted to a better location in the site and the converse for poorer performing content. | 11-17-2011 |
20110282992 | Method and Apparatus for Usage Estimation and Prediction in Two-Way Communication Networks - Methods, apparatus, and network oriented systems are discussed for estimating system, e.g. web site, usage removed from the web site, as well as scheduling and directing a data broadcast source to provide content based on web site usage estimates and predictions in a broadcast data stream. | 11-17-2011 |
20110289203 | SIP MONITORING AND CONTROL ANCHOR POINTS - The concept of anchor points is introduced. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be shared by any application. The use of an anchor point allows for applications to become aware of and control a communication late or cease monitoring and controlling a communication session early without disrupting the session or introducing a significant amount of control or media delay. | 11-24-2011 |
20110289204 | Virtual Machine Management Among Networked Servers - Virtual machine management among networked servers coupled for data communications with a data communications network that includes a network device and a Virtual Machine Management Module (‘VMMM’), where VM management includes: monitoring, by the network device, network traffic of applications executing in virtual machines of the servers; determining, in dependence upon the monitored network traffic, whether a particular application's network traffic exceeds a predetermined threshold, the particular application executing in a particular virtual machine of a particular server; if the particular application's network traffic exceeds the predetermined threshold, allocating, by the VMMM, an additional virtual machine in a different server; and instantiating, by the VMMM, in the additional virtual machine at least one application. | 11-24-2011 |
20110289205 | Migrating Virtual Machines Among Networked Servers Upon Detection Of Degrading Network Link Operation - Migrating virtual machines among networked servers, the servers coupled for data communications with a data communications network that includes a networking device, where migrating includes: establishing, by a virtual machine management module (‘VMMM’), one or more virtual machines on a particular server; querying, by the VMMM, the networking device for link statistics of a link coupling the network device to the particular server for data communications; determining, by the VMMM in dependence upon the link statistics, whether the link coupling the network device to the particular server is degrading; and if the link coupling the network device to the particular server is degrading, migrating a virtual machine executing on the particular server to a destination server. In some embodiments, migrating occurs is carried out only if non-degrading link is available. If no non-degrading links are available, the network device, rather than the link, may be failing. | 11-24-2011 |
20110289206 | AUTOMATIC ENTERPRISE SERVICE BUS DEPLOYMENT AT THE LEVEL OF INDIVIDUAL SERVICES - A method and system for automatic ESB deployment at the level of individual services is described. | 11-24-2011 |
20110289207 | METHOD AND APPARATUS FOR PROCESSING NETWORK VISUALIZATION - A method, system and computer program product for processing network visualization. The network visualization processing method includes: obtaining main-information-dimension-based topological data of an analytic object in a network; performing visualization processing to the main-information-dimension-based topological data of the analytic object so as to reveal change of a relationship between an analytic node and a neighboring node in the analytic object along the main information dimension. The network visualization processing method and apparatus according to the present invention can display dynamic change of the network based on main information dimension within a single view, and provide a better graphical resolution, so as to facilitate a user to perform analysis to the network and to reduce comprehension overhead of the user. | 11-24-2011 |
20110289208 | SESSION TERMINAL APPARATUS AND NETWORK SESSION SYSTEM - A session terminal apparatus constitutes a network session system together with another session terminal apparatus. In the session terminal apparatus, a back performance instruction part instructs reproduction of back performance information. A back performance control part transmits the back performance information, when the reproduction thereof is instructed by the back performance instruction part, to another session terminal apparatus, and controls a performance reproduction part to start reproducing the back performance information when a monitor delay time corresponding to a communication delay time between the session terminal apparatus and another session terminal apparatus has elapsed after the reproduction of the back performance information was instructed. | 11-24-2011 |
20110289209 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 11-24-2011 |
20110289210 | CONNECTING PORTS OF ONE OR MORE ELECTRONIC DEVICES TO DIFFERENT SUBSETS OF NETWORKS BASED ON DIFFERENT OPERATING MODES - A connection apparatus includes at least one module to connect network ports of one or more electronic devices to network ports that are connected to respective networks, and a manager to create at least one profile for a particular one of the one or more electronic devices. The at least one profile specifies that the particular electronic device is to be connected to different subsets of the networks for corresponding different modes of operation of the particular electronic device. | 11-24-2011 |
20110289211 | MONITORING NETWORK USAGE - A method of determining whether a user has complied with a service level agreement (SLA) with a network operator, comprising collecting a set of data values representative of the user's service usage and comparing the set of data values to the service level agreement. The data values collected provide the operator with sufficient information so that it can determine whether a SLA is being complied with and to plan provision of network services. A method of monitoring a user's usage of a network service and a service usage indicator is also disclosed. | 11-24-2011 |
20110289212 | Virtual Interface - A virtual interface is disclosed. A method may include allowing upper layer software to transparently access the capabilities of a network device via a virtual interface as if the network device were in a computing device in which the upper layer software is resident. A communication channel may be established with a computing device. A virtual interface to a network device in the computing device is created. Incoming data units directed to the network device are received via the communication channel, and are made available via the virtual interface. Outgoing data units directed to the virtual interface may be forwarded to the network device via the communication channel. The methods may be implemented on computing devices that include network cards, including computers and/or network testing systems. | 11-24-2011 |
20110289213 | TRACKING LOCALLY BROADCAST ELECTRONIC WORKS - A method, system, and program for tracking locally broadcast electronic works are provided. According to one aspect of the invention, a sending player locally broadcasts an electronic work. In particular, the local broadcast may be a wireless broadcast creating an ad-hoc radio system. At least one recipient player receives the localized broadcast of the electronic work and accepts a distribution cookie for tracking distribution of the electronic work. The at least one recipient player updates the distribution cookie with tracking information about the broadcast of the electronic work, including ratings by users at the second player and purchase of the broadcast electronic work. Each of the at least one recipient players may in turn become a sending player that broadcasts the electronic work to other recipient players and requires the other recipient players to accept a copy of the distribution cookie updated by the second player. Then, responsive to detecting a network connection to a statistics server, the at least one recipient player provides the distribution cookie to the statistics server, such that localized broadcast distribution of the electronic work is tracked. | 11-24-2011 |
20110289214 | Content delivery network map generation using passive measurement data - A routing method operative in a content delivery network (CDN) where the CDN includes a request routing mechanism for routing clients to subsets of edge servers within the CDN. According to the routing method, TCP connection data statistics are collected are edge servers located within a CDN region. The TCP connection data statistics are collected as connections are established between requesting clients and the CDN region and requests are serviced by those edge servers. Periodically, e.g., daily, the connection data statistics are provided from the edge servers in a region back to the request routing mechanism. The TCP connection data statistics are then used by the request routing mechanism in subsequent routing decisions and, in particular, in the map generation processes. Thus, for example, the TCP connection data may be used to determine whether a given quality of service is being obtained by routing requesting clients to the CDN region. If not, the request routing mechanism generates a map that directs requesting clients away from the CDN region for a given time period or until the quality of service improves. | 11-24-2011 |
20110295994 | METHOD AND DEVICE FOR OPERATING A GROUP SERVICE IN A COMMUNICATIONS NETWORK - A method operates a group service or several group services in a communications network. The method involves detecting specific group service and/or specific group event-related data items in an event-recording unit, transmitting at least a part of specific group service and/or specific group event-related data items from the event-recording unit to a group lists-generating unit, evaluating said specific group service and/or specific group event-related data items and generating specific group lists by said group lists-generating unit, wherein said specific group lists indicate the current participation state of the group participants to the group service or to each group service. | 12-01-2011 |
20110295995 | METHOD AND APPARATUS FOR CONTROLLING LOAD ADMISSION RATE OF AN APPLICATION SERVER - A method and system for controlling load admission rate of an application server is provided. In the method, actual heap utilization and load admission rate of the application server in current control cycle are detected; based on the detected actual heap utilization and load admission rate, load characteristics variation parameters of the application server are estimated; and control gain of a feedback controller is calculated based on the load characteristics variation parameters; the feedback controller calculates desired load admission rate of the application server in next control cycle by using the calculated control gain. The load admission rate of the application server can be adaptively controlled by tracking changes in workload characteristics of the application server, such that the actual heap utilization of the application server is maintained at or close to target heap utilization. | 12-01-2011 |
20110295996 | METHODS TO IMPROVE OVERLOAD PROTECTION FOR A HOME SUBSCRIBER SERVER (HSS) - A system and methodology that facilitates improving performance of a Home Subscriber Server (HSS) during overload conditions, by embedding a unique Application Session Identifier (app session ID) within multiple requests associated with a single call processing session is provided. Moreover, the system includes an overload protection component that identifies whether an incoming request is associated with previously processed requests based in part of the app session ID embedded within the incoming request. When the HSS is overloaded, the incoming requests that initiate a new call processing session and are not associated with previously processed requests are rejected/dropped before incoming requests that are associated with requests that have been previously processed. | 12-01-2011 |
20110295997 | PRESENTING CONTENT PACKAGES BASED ON AUDIENCE RETARGETING - A present technology intelligently retargets invitational content to a user by maintaining a user profile that includes data descriptive of the user's interaction with invitational content previously presented to the user and making decisions regarding retargeting based on an analysis of the user profile. The information in the user profile is not limited to whether or not the user completed a conversion action associated with invitational content presented. Rather, the profile is expanded to include such information as where on the conversion continuum the user abandoned the process and details of how the invitational content was presented to the user, e.g. colors used, situation, and message. When presented with a request for invitational content, the system uses the profile information to influence which content is selected and how it is presented to the user. This enables the system to re-present invitational content in a form and/or situation where the user is more likely to complete the conversion action. | 12-01-2011 |
20110295998 | SYSTEMS AND METHODS FOR CROSS-CLOUD VENDOR MAPPING SERVICE IN A DYNAMIC CLOUD MARKETPLACE - Embodiments relate to systems and methods for a cross-cloud vendor mapping service in a dynamic cloud marketplace. The cloud marketplace system receives bids from a user for the provisioning of applications or other software in the cloud, and registers selected provisioning clouds to deliver the requested software. The set of provisioning clouds can be re-selected on a scheduled and/or other ongoing basis, creating a sequence of provisioning clouds. A vendor mapping service can be abstracted and provided external to the cloud marketplace system, and track the user's software usage across the shifting sets of provisioning clouds. The vendor mapping service can aggregate the usage history over time, and generate billing and/or other subscription reports. The cloud marketplace system need only register the user ID, software applications, and/or other subscription data to the vendor mapping service one time, after which the service can track the user's software usage history automatically. | 12-01-2011 |
20110295999 | METHODS AND SYSTEMS FOR CLOUD DEPLOYMENT ANALYSIS FEATURING RELATIVE CLOUD RESOURCE IMPORTANCE - A decision system and methods for providing customized deployment architectures that take into account the importance of various cloud resources. The decision system can monitor the applications and processes executed in the cloud, and collect utilization information identifying the cloud resources used, the amount of usage, and trends in usage. Resource importance data can then be obtained from the utilization information and/or from other sources, such as a system user. The decision system can then generate customized deployment architectures based on the collected utilization information and the resource importance data. | 12-01-2011 |
20110296000 | SYSTEMS AND METHODS FOR EXPORTING USAGE HISTORY DATA AS INPUT TO A MANAGEMENT PLATFORM OF A TARGET CLOUD-BASED NETWORK - Embodiments relate to systems and methods for exporting usage history data as input to a management platform of a target cloud-based network. A usage export service can be abstracted and provided external to a host cloud-based network, which can capture the usage history of software or resources by one or more users in the host cloud-based network. Those user(s) or others may wish to export some or all of the usage history to a target cloud or clouds, to perform management or configuration actions in the target cloud(s). The selective subset of the usage history can be transmitted to the cloud management system of the target cloud-based network. The selective subset can be used for management actions in the target cloud(s), such as for instance, to instantiate or configure a set of virtual machines for failover or re-clouding purposes, or to aggregate usage history from the host and target cloud(s). | 12-01-2011 |
20110296001 | Privileged Activity Monitoring through Privileged User Password Management and Log Management Systems - A system and method is provided for allowing seamless auditing compliance and investigations of privileged account access and activities. Account access information and privileged activity information may be stored in a central data repository. The central data repository may be queried to determine who was granted access to a privileged account, the timeframe that the access was granted, and/or what actions were performed by the user who was granted access. | 12-01-2011 |
20110296002 | Stateful Flow Information Table Method and System for Packet Inspection System - A packet processing system comprises two packet inspection systems for tracking packet flows between a first network and a second network. A memory is accessible by each of the packet inspection systems for storing flow entries. Each of the flow entries includes a flow key characterizing a packet flow associated with flow entry, a flow identifier. State information is further maintained indicating ownership of the flow identifiers among the two packet inspection systems. Using stateful identifiers ensures that two packet processing systems do not become incoherent and properly indicate the status of free flow identifiers. | 12-01-2011 |
20110296003 | USER ACCOUNT BEHAVIOR TECHNIQUES - User account behavior techniques are described. In implementations, a determination is made as to whether interaction with a service provider via a user account deviates from a model. The model is based on behavior that was previously observed as corresponding to the user account. Responsive to a determination that the interaction deviates from the model, the user account is flagged as being potentially compromised by a malicious party. | 12-01-2011 |
20110296004 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO RANK USERS IN AN ONLINE SOCIAL NETWORK - Methods, apparatus, and articles of manufacture to rank users in an online social network are described. An example method to rank in an online social network includes determining a connectedness of a user on a social networking site based on a number of contacts of the user, determining a number of first interactions directed from the user to at least one of the contacts, determining a number of second interactions associated with the first interaction and at least one of the contacts, and ranking the user with other users on the social networking site based on the connectedness, the first interactions, and the second interactions. | 12-01-2011 |
20110296005 | Method and system for monitoring control signal traffic over a computer network - A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor. The controller is constructed and arranged to respond to the plurality of alert signals by tracking attributes related to the one or more control signal anomalies to at least one source, and to block the one or more control signal anomalies using a filtering mechanism executed in close proximity to the at least one source. | 12-01-2011 |
20110296006 | COOPERATIVE BANDWIDTH AGGREGATION USING MULTIPATH TRANSPORT - A method of wireless communication includes communicating with a server through a first MPTP path using a first IP address; communicating with the server through a second MPTP path using a second IP address, the communication with the server through the second MPTP path being through a wireless node at the second IP address; and communicating with the wireless node through peer-to-peer communication. | 12-01-2011 |
20110296007 | METHOD AND DEVICE FOR IDENTIFYING AN SCTP PACKET - A method for identifying a Stream Control Transmission Protocol (SCTP) packet is provided, which includes: acquiring a feature tuple of a received SCTP packet, in which the feature tuple includes at least one piece of the following information: a source Internet Protocol (IP) address, a destination IP address, and a verification tag (V_tag); matching the acquired feature tuple of the SCTP packet with a SCTP tuple identification table, in which the SCTP tuple identification table includes a mapping relation between a feature set tuple and an SCTP association, and the feature set tuple includes at least one piece of the following information: a source IP address set, a destination IP address set, and the V_tag; and acquiring an SCTP association to which the SCTP packet belongs, if the acquired feature tuple of the SCTP packet matches one or more records of the SCTP tuple identification table. Correspondingly, a device for identifying an SCTP packet, a system for identifying an SCTP packet, and a method for establishing an SCTP tuple identification table are further provided, capable of reducing missed identification of an SCTP stream. | 12-01-2011 |
20110296008 | IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, AND METHOD THEREFOR - An image processing apparatus capable of requesting a service providing apparatus via an external network to perform processing and communicating with an information processing apparatus via an internal network includes an activation unit configured to activate a check unit configured to check a status of the processing acquired by the information processing apparatus, a stopping unit configured to stop the check unit if the check unit activated by the activation unit recognizes that the status of the processing is not a stopped state, and a request unit configured to request the service providing apparatus to perform the processing if the check unit is stopped. | 12-01-2011 |
20110296009 | SYSTEM AND METHOD FOR WAVELETS-BASED ADAPTIVE MOBILE ADVERTISING FRAUD DETECTION - In accordance with embodiments, there are provided mechanisms for methods and systems for the detection of fraudulent advertisement views of advertiser supported content on mobile devices through the analysis of data and of data exchange between groups of mobile devices and an advertising server. The data analysis is carried out by comparing statistical data spectra of different mobile device groups to detect unusual levels of advertisement views within a mobile device group. The data analysis provides a high guarantee of fraud detection of illegitimate advertisement views for sponsoring advertisers. Embodiments detect non-meaningful ad display requests or clickthroughs, identify bots among application users and provide an estimate of the number bots. | 12-01-2011 |
20110296010 | FILE TRANSFER APPARATUS AND CONTROL METHOD THEREOF - In one embodiment, a file transfer apparatus includes a storing device, a determination unit, and a notification unit. The storing unit stores transfer information between the file transfer apparatus and a second file transfer apparatus. The determination unit determines an insufficient state when the latest value of a numerical value which varies depending on a use situation of the region meets a predetermined condition. The notification unit notifies, as a response to the determination of the insufficient state by the determination unit, the gist thereof to a user. | 12-01-2011 |
20110296011 | SHARED HEARTBEAT SERVICE FOR MANAGED DEVICES - Systems, methods, and apparatuses for facilitating communication between remote services and applications installed on a device are described. In accordance with embodiments, each of a plurality of remote services generates an application-specific message intended for processing by a corresponding application installed on a device and transmits the application-specific message to a device management system (DMS) server, where it is queued. A DMS client installed on the device sends heartbeat messages to the DMS server indicating that the device is available to receive messages. In response to receiving the heartbeat messages, the DMS server transmits the application-specific messages to the DMS client. The DMS client then publishes each application-specific message to the particular application that the application-specific message was intended for. | 12-01-2011 |
20110296012 | MULTI-TIER MESSAGE CORRELATION - A system and method determines correlations within multi-tier communications based on repeated iterations/episodes of executions of a target application. Content-based correlations are determined by encoding the content using a finite alphabet, then searching for similar sequences among the multiple traces. By encoding the content to a finite alphabet, common pattern matching techniques may be used, including, for example, DNA alignment algorithms. To facilitate alignment of the traces, structural and/or semantic breakpoints are defined, and the encoding in each trace is synchronized to these breakpoints. To facilitate efficient processing, a hierarchy of causality among tier-pairs is identified, and messages at lower levels are ranked and temporally filtered, based on activity intervals at higher levels of the hierarchy. | 12-01-2011 |
20110296013 | SYSTEM AND METHOD FOR PROVIDING HYBRID ON DEMAND SERVICES TO A WORK UNIT - The present document describes a method and system for providing Hybrid On Demand (HOD) software and/or data to a plurality of normal nodes associated with a work unit. The normal nodes are serviced via two or more parent nodes using different communication networks. Normal nodes, which are connected to the Local Area Network (LAN) of the work unit, may receive software and/or data services from a local node via the LAN, and normal nodes which are outside of the LAN may receive software and/or data services from a SUPR node via a Wide Area Network (WAN) such as the internet. After synchronization with one the normal nodes, the parent nodes synchronize the updated data with each other, and then they push the updated data to all the normal nodes associated with the work unit to mirror the same data on all the normal nodes. Frequencies of synchronization and provision of software and/or data services and/or updates is governed by a set of synchronization rules that are embedded in the business layer of the nodes. This scenario may also be used for synchronizing data in a cache cloud manner between the different nodes of the wide and the local networks. | 12-01-2011 |
20110296014 | COMPUTER PROGRAM PRODUCT AND METHOD FOR ESTIMATING INTERNET TRAFFIC - Site metrics are presented in association with search results. The site metrics are derived from site analytics that uses clickstream data collected from a panel of internet users to generate and present internet activity metrics. Data collected from a community of internet users may be augmented by clickstream data store content, third party content, search results, and other sources to form estimates of internet activity, such as traffic, that is structured and analyzed to produce metrics of nearly any internet web site or domain. The data may be further augmented with ratings, such as web site trust ratings, retail deals, and analysis of web site content to form a comprehensive set of data that is mined to formulate various metrics of internet activity about web sites. Metrics of internet activity, a.k.a. site analytics, provides analysis that represents aspects of internet user access to a web site. Such aspects may include activity related to visitors, engagement, growth, trust, deals, and the like. | 12-01-2011 |
20110296015 | EVENT SOURCE MANAGEMENT USING A METADATA-DRIVEN FRAMEWORK - The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data. | 12-01-2011 |
20110296016 | RESOURCE STATE MONITORING METHOD, DEVICE AND COMMUNICATION NETWORK - A resource state monitoring method, device and communication network are provided. The method includes: acquiring network event state information of a node in a network running process, detecting a data plane resource state of the node and a control plane resource state of the node when it determines that the network event state information of the node meets a resource state detection triggering condition, and reporting a detection result to a management plane of the node. The device includes an acquiring unit, a checking unit, a triggering unit, a detecting unit and a reporting unit. The network includes several nodes, a communication control device and a resource state monitoring device. | 12-01-2011 |
20110302291 | METHODS AND SYSTEMS FOR PRIORITIZING NETWORK ASSETS - Methods and systems for restoring networks to normal behavior are disclosed. For example, in various embodiments an apparatus for addressing device abnormalities in a network may include node monitoring circuitry configured to monitor device abnormalities in the network, and ranking circuitry that may receive information from the node monitoring device and, upon receiving information from the monitoring circuitry that multiple devices in the network are compromised, may provide ranking information as to which of the multiple compromised devices in the network is to be attended to first. | 12-08-2011 |
20110302292 | SYSTEMS AND METHODS FOR SERVICE ASSURANCE USING VIRTUALIZED FEDERATED PRESENCE INFRASTRUCTURE - Systems, methods, apparatuses and program products configured to provide a topology-service tool are described. A presence-federation solution asset is leveraged to address topology-federation problems. A network topology tool takes as input network endpoints, for example caller and callee telephone numbers, determines a network service flow used to connect the network endpoints, and develops a network topology view of the service flow along with associated network device related information. | 12-08-2011 |
20110302293 | RECOGNITION SYSTEM FOR SHARING INFORMATION - A system and method for sharing information between users based on recognition of the users and their associated processing devices in a scene. Interactions can be physical, verbal or a combination of physical and verbal gestures. Movements of the user and other users are tracked and interactions detected between them. User processing devices are connected by detecting users within view of a capture device, the capture device detecting motion tracking data for the user, such as a skeletal model. Information sharing may be controlled by the processing devices directly, by an intermediary server, or by a combination of the processing device and an intermediary server. | 12-08-2011 |
20110302294 | SERVICE QUALITY EVALUATOR HAVING ADAPTIVE EVALUATION CRITERIA - An improved method is provided for evaluating service quality of a software application residing in a computing environment. The method includes: monitoring first and second metrics indicative of performance of the software application; evaluating the first metric in relation to a first evaluation criterion; evaluating the second metric in relation to a second evaluation criterion different than the first evaluation criterion; and determining the state of service for the software application based in part on the evaluation of the second metric. Over time, the second evaluation criterion is adapted based on the outcome of the evaluation of the first metric. | 12-08-2011 |
20110302295 | SYSTEM AND METHOD FOR MODELING INTERDEPENDENCIES IN A NETWORK DATACENTER - The system and method described herein may include a discovery engine that scans a network datacenter to inventory resources in the datacenter and populate a configuration management database with the resource inventory. One or more destination listeners created from the resource inventory may then selectively sample monitored flows in the datacenter to model interdependencies between the inventoried resources. For example, any monitored flows originating outside the datacenter or failing to correlate with the inventoried resources may be dropped, whereby the interdependencies may be modeled from a deliberately reduced sample of the monitored flows that have information relevant to modeling relationships between resources within the datacenter. Furthermore, directionalities for the monitored flows may be determined, wherein the directionalities provide further information relevant to modeling the relationships between the resources within the datacenter. | 12-08-2011 |
20110302296 | METHOD AND SYSTEM FOR PROVIDING SECURE TRANSACTIONS VIA A BROADBAND GATEWAY - A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway. The transaction may be handled by the broadband gateway. The authorizations may be performed based on information associated with the accounts, whose storage may be controlled by the broadband gateway. The broadband gateway may block and/or terminate transactions failing authentication and/or validation, which may be performed based on the stored information. The transactions may be initiated within a network serviced by the broadband gateway. The transactions may also be initiated outside the serviced network. The stored information may comprise a user profile, which may comprise a plurality of settings for controlling and/or managing authorization performed by the broadband gateway. The user profiles may be configurable by users, wherein configuration may comprise initializing and/or modifying one or more of the transaction related settings. | 12-08-2011 |
20110302297 | Agent-less Follow-me Service for Cloud-based Applications - Technologies are generally described herein for providing an agent-less follow-me service. An example web browser may be configured to receive a first link to a reference table from a portable token. The web browser may be configured to retrieve a second link to an on-going web application from the reference table. The second link may reflect a first state of the on-going web application. The web browser may be configured to open the on-going web application corresponding to the second link. As a user interacts with the on-going web application, the on-going web application may be configured to transition from the first state to a second state. The web browser may be configured to update the second link in the reference table to reflect the second state of the on-going web application. | 12-08-2011 |
20110302298 | METHOD AND SYSTEM FOR TESTING MULTIPLE COMPONENTS OF A MULTI-TENANT, MULTI-DOMAIN, MULTI-TIERED WEBSITE - Embodiments are described for a system and method for testing a plurality of web resources, such as web sites and/or web servers in a distributed client-server computer network. Embodiments include a method of configuring a proxy server to forward incoming HTTP requests back to a fixed port on the IP address of the sender of the incoming HTTP request to effectively remove the requirement of domain name resolution from the test environment. A reflective proxy server reflects requests from a source IP address back to that same IP address on a specific port on the testing computer to permit the testing of arbitrary web site domain names without performing DNS resolution at any step in the process, thus removing the need to modify the testing computer's host's file. | 12-08-2011 |
20110302299 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DETERMINING A RATE AT WHICH AN ENTITY IS POLLED - In accordance with embodiments, there are provided mechanisms and methods for determining a rate at which an entity is polled. These mechanisms and methods for determining a rate at which an entity is polled can enable decreased overall server load, improved efficiency, an increased perception of responsiveness, etc. | 12-08-2011 |
20110302300 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An apparatus and method provide logic for formatting electronic content. In one implementation, an apparatus includes an identification unit configured to identify a plurality of devices associated via a network, and a receiving unit configured to receive information corresponding to the associated devices. The information includes a function provided by the associated devices and performance data corresponding to the associated devices. A generation unit is configured to generate a first value of an execution metric describing at least one of an execution of the function by the associated devices or the performance data corresponding to the associated devices, based on at least the received information, and an output unit is configured to output the first metric value. | 12-08-2011 |
20110302301 | CAPACITY CONTROL - There are described a system, apparatus and/or method according to which collected history data from monitorable and/or manageable entities within a server estate or data centre is used to tailor a model to the past behaviour and/or loading upon individual ones or parts of ones of the entities. The tailored model can then be used to predict a future value for one or more metrics included in the history data for an entity or part of an entity under consideration. The predicted value can then be used to determine whether some form of corrective action is required in respect of the entity, entity part or some other entity or entity part. Alternatively or in addition, predicted values for more than one entity or entity part can be aggregated to determine whether some form of corrective action is required in respect of the entity, entity part or some other entity or entity part. A corrective action can be applied on an automated or on a manual basis. | 12-08-2011 |
20110302302 | ADAPTIVE MOBILE CLOUD SYSTEM USING PRIVATE VIRTUAL INTANCE AND CONSTRUCTION METHOD THEREOF - An adaptive mobile cloud system using a private virtual instance (PVI) includes: a PVI automatic provisioning for generating a PVI by providing a hardware resource, an operating system and an application which are requested by a user terminal; a PVI image manager for storing and managing an image of an execution state of the PVI by checking a state of the PVI; a mobile interface adaptor that is adaptively operated according to an input/output device and resources of the user terminal; and an adaptive application manager for executing an application by adaptive cooperation between the user terminal and the PVI according to the resource of the user terminal. | 12-08-2011 |
20110302303 | System & Method for Managing Transfers of Digital Assets Over a Network - Digital media assets are managed within an electronic network distribution system. A management computing system coupled to the network prepares a digital asset for transfer over the network in accordance with a set of distribution rules. A modified version of the digital asset includes a unique identification number associated with a first instantiation of the digital asset. The management computing system tracks transfers of the digital asset based on separate instantiations of the asset created for each transfer occurring over the network. | 12-08-2011 |
20110302304 | SERVICE PROVIDER OPTIMIZATION OF CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers. The processing device may also consider service provider selection criteria obtained from the original content provider. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of service providers with respect to specific resource requests are also provided. | 12-08-2011 |
20110302305 | ROOT CAUSE ANALYSIS METHOD, APPARATUS, AND PROGRAM FOR IT APPARATUSES FROM WHICH EVENT INFORMATION IS NOT OBTAINED - In the system management server, an information processing apparatus that is an event-information acquisition target is registered as a monitored apparatus in configuration information; event information that complies with a rule stored in advance is identified from among a plurality of pieces of event information stored in the system management server; a server apparatus for a network service related to the event information is identified; and a message is displayed which indicates that the cause of the event that occurred in a client information processing apparatus which has generated event information is an event related to the network service, which occurred in the server apparatus. | 12-08-2011 |
20110302306 | SYSTEMS AND METHODS FOR TRACKING WEB ACTIVITY - Systems and methods of tracking activity over networks and, in particular, tracking web activity over the Internet are described. Exemplary systems and methods may include a receiver for receiving a request from a visitor for a data object, a processor for providing a cookie to track the visitor's web activity, and a transmitter for transmitting the cookie to the visitor in response to the request. The cookie may comprise tracking information for a plurality of web sites visited by the visitor. | 12-08-2011 |
20110302307 | REPORTING PROCESSING METHOD, ORIGIN SERVER AND USER CLIENT FOR USER AGENT PROFILE INFORMATION - The present invention discloses a reporting processing method for User Agent Profile (UAP) information including: issuing, by an origin server, a reporting policy to a user client to instruct the user client to report UAP information according to the reporting policy; and reporting, by the user client, the UAP information according to the reporting policy issued by the origin server. The invention also discloses an origin server including a reporting policy issuing unit adapted to issue a reporting policy to a user client to instruct the user client to report UAP information according to the reporting policy; and a UAP user client including a UAP information reporting unit adapted to report UAP information of the user client according to a reporting policy issued by the origin server. The invention can enable the user client in a UAP system to report the UAP information with more flexibility and diversity. | 12-08-2011 |
20110307598 | AUTOMATED CALENDAR RECONCILIATION - There is provided a computer implemented method of providing data reconciliation on a first delegate device associated with an assigned task. The method comprises the steps of: determining a likelihood of failure of the first delegate device associated with the task defined in a first data entry thereon to complete the task, the first data entry associated with a start time and a task location; determining a replacement delegate device for completing the task in response to detecting task information for the replacement delegate device indicating suitability for the task; and updating respective data entries for the first delegate device and the replacement delegate device to associate the replacement delegate device for the task. | 12-15-2011 |
20110307599 | PROXIMITY NETWORK - A proximity network architecture is proposed that enables a device to detect other devices in its proximity and automatically interact with the other devices to share in a user experience. In one example implementation, data and code for the experience is stored in the cloud so that users can participate in the experience from multiple and different types of devices. | 12-15-2011 |
20110307600 | SYSTEM AND METHOD FOR ASSIGNING NETWORK BLOCKS TO SENSORS - A system includes a processor device. The processor device is configured to detect a physical topology of a network comprising hosts and sensors in the network. The processor device is also configured to generate a sensor policy for assignment of the sensors to network blocks of the hosts, that balances a processing load and accuracy of the sensors in the network based on physical closeness of the sensors to different divisions of hosts within a same network block. | 12-15-2011 |
20110307601 | SERVER ARRAY CAPACITY MANAGEMENT CALCULATOR - Server array capacity calculator systems and methods are provided for estimating capacity based on diagnostic data. For example, a system comprising a database and an estimator computing device comprising a graphical user interface (GUI) and a capacity management module stored in memory and executed on a processor comprising instructions to receive diagnostic data from a plurality of servers of different server types, receive user input via the GUI, and in response to the user input, and for each of the server types, compute a current reference number of servers from current server efficiency estimates and a current number of utilized servers; calculate a growth multiplier from a ratio of the projected number of users and a count of the current concurrent users; generate a projected number of servers by multiplying the current reference number of servers with the growth multiplier, and display the projected number of servers on the GUI. | 12-15-2011 |
20110307602 | RECORDING MEDIUM STORING ANALYSIS PROGRAM, ANALYZING METHOD, AND ANALYZING APPARATUS - An analyzing apparatus calculates a time-series change in an average process time per process of a server belonging to a first tier of a plurality of tiers and a time-series change in an average process time per process of a server belonging to a second tier of the plurality of tiers, referring to a storage unit that stores, with respect to each transaction executed in a multi-tier system in which a plurality of servers coordinate with each other to execute the transaction, information indicating periods in which the server in each of the plurality of tiers executes processes for the transaction. The apparatus determines the presence/absence of a correlation between the time-series change in the average process time of the server belonging to the first tier and the time-series change in the average process time of the server belonging to the second tier. | 12-15-2011 |
20110307603 | BROKER NODE AND EVENT TOPIC CONTROL METHOD IN DISTRIBUTED EVENT DISTRIBUTION SYSTEM - A broker node transmits an event in a distributed event distribution system. In order to flexibly deal with fluctuations in event transmission load, the broker node includes monitoring means that monitors fluctuations in event transmission load on the broker node for each event rule, and control means that dynamically changes an event topic to transmit the event in accordance with fluctuations in transmission load and notifies another node of an instruction of the change using a control message (event Topic control message). | 12-15-2011 |
20110307604 | COMMUNICATION PROCESSING DEVICE, COMMUNICATION PROCESSING SYSTEM, COMMUNICATION PROCESSING METHOD AND PROGRAM - There is provided a communication processing device including a sender report transmitting unit which transmits to a client a sender report including transmission information of transmission data on a regular basis separately from a rate change report, an extended receiver report receiving unit which receives from the client an extended receiver report which includes the transmission information and which is transmitted from the client when the client receives the sender report, and a rate controlling unit which controls a transmission rate of transmission data for the client, based on the transmission information stored in a transmission information storing unit and the transmission information included in the extended receiver report received from the client. | 12-15-2011 |
20110307605 | SERVER SESSION MANAGEMENT APPLICATION PROGRAM INTERFACE AND SCHEMA - Application program interfaces (APIs), schemas and procedures manage multiple sessions within a server system has a create session request call for establishing a session between a client and a server within the server system. Each of plurality of sessions among the servers is persisted within a database operatively coupled to the servers. Each session is associated with a unique session identification which uniquely identifies the session among the plurality of sessions. A management request call for managing one of the sessions is performed according to the unique session identification. | 12-15-2011 |
20110307606 | THIRD PARTY VERIFCATION USING OVERRIDE IP ADDRESSES - Techniques for third party verification using override IP addresses is described, including detecting a request header from an endpoint, the request header being associated with a request for a media file, initiating a download of the media file to the endpoint, evaluating the request header to identify an address associated with the endpoint, generating a notification comprising the address, the notification being configured to indicate the address overrides a source address identified by a field in a packet associated with the request header, and sending the notification to report data associated with the media file, wherein the address overrides the source address to identify a source of the request. | 12-15-2011 |
20110307607 | MANAGING NAVIGATION HISTORY FOR INTRA-PAGE STATE TRANSITIONS - An intra Web-page navigation history mechanism allows history points to be tracked even for state transitions within the same Web page. A Web page may be subjected to a number of different state changes as the Web application executes. Along the way, a number of the state changes may be tracked as history points. When a history point is created, associated state is also recorded. When the history point is again navigated to, a navigation event may be raised along with the associated state for the history point. Various components (whether on the server or client) may listen to that event and reconstruct their respective states by using selective portions of the reconstruction state. | 12-15-2011 |
20110307608 | Parallel Packet Processor with Session Active Checker - Apparatus, processes, and computer readable storage media for processing received packets. A session memory, coupled to and shared by a plurality of packet processors, may store configuration and statistics information for a plurality of communication sessions. A session active memory may store session identifiers corresponding to packets currently being processed by the plurality of packet processors. A comparator may compare a session identifier extracted from a received packet with the stored session identifiers to determine if another packet belonging to the same session as the received packet is currently being processed. Forwarding logic may distribute received packets among the plurality of packet processors. In the case that another packet belonging to the same session as the received packet is currently being processed, the forwarding logic may wait until the processing of the another packet is complete before sending the received packet to one of the packet processors. | 12-15-2011 |
20110314141 | METHOD AND APPARATUS FOR ENABLING COMMUNICATION BETWEEN iSCSI DEVICES AND SAS DEVICES - A method and apparatus for enabling communication between iSCSI/SAS host devices and iSCSI/SAS target devices via an iSCSI/SAS router is disclosed. In one embodiment, an iSCSI/SAS router includes iSCSI interfaces, SAS interfaces, and a mapping and routing logic. The mapping and routing logic is coupled to the iSCSI interfaces and the SAS interfaces. The mapping and routing logic virtualizes one or more SAS host and target devices to communicate with discovered one or more iSCSI host and target devices. Further, the mapping and routing logic virtualizes the one or more iSCSI host and target devices to communicate with discovered one or more SAS host and target devices. | 12-22-2011 |
20110314142 | REFERRED INTERNET TRAFFIC ANALYSIS SYSTEM AND METHOD - Methods and a system for exploiting the secondary traffic generated by social networking sites are disclosed. Traffic on a commercial website is constantly monitored by a web analytics tool, which collects traffic measurements of hits, button presses, enquiries, purchases etc, as well as the referrer URL of a site such as a social networking site through which the commercial website is accessed. The collected measurements are forwarded to a Referred Traffic Analysis System. Concurrently, the Referred Traffic Analysis System crawls the Internet and collects a large number of social networking sites, analyses their content by extracting insight terms and phrases from them. In a third step, the collected traffic measurements are correlated with the collected insights from the social networking sites, and the top insights that reoccur frequently enough to appear to be a driver for the measurements observed, are presented to the client. A corresponding system is also provided. | 12-22-2011 |
20110314143 | SYSTEM AND METHOD FOR RESOLVING OPERATING SYSTEM OR SERVICE IDENTITY CONFLICTS - A system includes a processor device. The processor device is configured to receive reports of operating system identities for a single host; determine which of the operating system identities are an intersection of the reported operating system identities; and assign the intersection of the reported operating system identities as a resolved operating system identity. | 12-22-2011 |
20110314144 | EVENT DETECTION AND RESPONSE USING RICH NETWORK CONTENT - A server device may receive a notification indicating that an event has occurred, where the notification specifies an area associated with the event. The server device may further send a request for network content in response to the notification; receive the network content for each of a group of user devices, where the network content includes a location for each of the group of user devices and incident information for each of the group of user devices; generate geo fence information based on the area associated with the event, the geo fence information including boundaries for a geo fence that surrounds the location of the event; generate state information, associated with the geo fence, for a user device, of the group of user devices, located within the boundaries for the geo fence, where the state information includes the location for the user device; and send, to another server device, the state information for the user device. | 12-22-2011 |
20110314145 | Device-assisted services for protecting network capacity - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 12-22-2011 |
20110314146 | DISTRIBUTION MONITORING SYSTEM, DISTRIBUTION MONITORING METHOD, AND PROGRAM - A network distribution monitoring method is executed by a computer which configures each of a plurality of nodes, in a network which comprises the plurality of nodes which are connected with a management network. The network distribution monitoring method includes: generating a first detection message by detecting a first traffic on an object network of a corresponding one of a plurality of first predetermined applications, in each of first probe nodes of the plurality of nodes; transmitting the first detection message to a node determined from a first hash value to only a first function identifier showing a kind of the corresponding one or the first function identifier and address data of the first traffic; generating a first mediation processing result by performing first mediation processing on the first detection message to the plurality of first applications, in a first mediation node of the plurality of nodes; and storing a result of the first mediation processing in a first collector node of the plurality of nodes. In this way, the distribution monitoring system is provided in which it is possible to monitor the advanced function. | 12-22-2011 |
20110314147 | SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED WIRELESS ACCESS POINTS - Unauthorized wireless access points are detected by configuring authorized access points and mobile units to listen to all wireless traffic in its cell and report all detected wireless devices to a monitor. The monitor checks the reported devices against a list of authorized network devices. If the reported wireless device is not an authorized device, the monitor determines if the reported device is connected to the network. If the reported device is connected to the network and is not an authorized device, the monitor alerts the network operator or network manager of a rogue device connected to the network and attempts to locate and isolate the rogue device. | 12-22-2011 |
20110314148 | LOG COLLECTION, STRUCTURING AND PROCESSING - Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing platforms or “log managers” using any appropriate rule base to identify “events” (i.e., log messages of somewhat heightened importance), and one or more “event managers” may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms. | 12-22-2011 |
20110314149 | Method and Apparatus for Managing Proxy and Non-Proxy Requests In A Telecommunications Network - A method is disclosed for determining attributes of a client connection configured for use with a telecommunications network; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison; wherein the method is performed by one or more computing devices. | 12-22-2011 |
20110314150 | TECHNIQUES FOR MEASURING PEER-TO-PEER (P2P) NETWORKS - Techniques for measuring Peer-To-Peer (P2P) networks are provided. P2P are initially seeded with links to feigned content. As a P2P participant accesses a link metrics are recorded about the P2P network being used by the participant. The metrics are used to form measurements to compare different P2P networks relative to one another. | 12-22-2011 |
20110314151 | BACKGROUND TASK EXECUTION OVER A NETWORK - Network activity of a client device that is coupled to a data network is monitored, to detect network activity idle time. Based upon detecting the idle time, an application running in the client device is automatically signaled that its background task be executed over the data network. Other embodiments are also described and claimed. | 12-22-2011 |
20110320582 | ONLINE PRESENCE MANAGEMENT SYSTEM - Systems and methods of online presence management are described herein. The online present management systems and methods provide for creating, managing, controlling, and parking accounts on websites such as social networking sites. The embodiments disclosed herein may be used by interested parties and entities to manage their online presence, profiles, and personalities. In other embodiments, the online presence management system may be used to manage ownership of domain names and other online assets. | 12-29-2011 |
20110320583 | MONITORING USER ACTIVITY ON A MOBILE DEVICE - Monitoring user activity on a mobile device is described. In one aspect, video content is received and played to a user of the mobile device. The monitoring activity detects an interruption of playback of the video content and determines an event associated with the interruption. The event is stored in the mobile device and communicated to a remote device. | 12-29-2011 |
20110320584 | METHOD FOR DETERMINING A PCC RULE WAITING FOR PCEF ACTION - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a policy and charging rules node from a first requesting device, a first message including a first set of information regarding an application request; generating a set of PCC rules for fulfilling the application request based on the first set of information; determining whether the PCRN should wait for a period of time for at least one PCC rule to receive a second message including a second set of information regarding the application request; and if the PCRN should wait for the period of time: waiting for the period of time to receive a second message including a second set of information regarding the application request, determining, after the time has elapsed, whether the second message has arrived, and if the second message has not arrived, initiating a cleanup procedure. | 12-29-2011 |
20110320585 | PROVIDING STATE INFORMATION AND REMOTE COMMAND EXECUTION IN A MANAGED MEDIA DEVICE - Systems and methods for providing state information and remote command execution using Extensible Messaging and Presence Protocol (XMPP), Session Initiation Protocol (SIP) or any other protocol that provides for authentication, presence and messaging. A device may exist within a managed or unmanaged network and sign on to a managed network and provide presence information augmented with state information to provide near real-time state information to the managed network. The network may also discover remote command support in endpoint devices to command and control the devices remotely, while traversing unmanaged networks and components. | 12-29-2011 |
20110320586 | Flexible and Safe Monitoring of Computers - Described is a server monitoring technology that is scalable to large numbers of servers, e.g., in a datacenter. Agents on servers run queries to monitor data sources for that server, such as performance counters and other events. The agents monitor their resource usage and those of monitored events to stay within an administrator-specified resource budget (policy), e.g., by modifying the running queries and/or monitoring parameters. A controller receives results of the monitoring, analyzes the results, and takes action as needed with respect to server operation and monitoring. The controller may dynamically update an agent's queries, monitoring parameters and/or monitored data post-processing operations. The controller may issue alerts and reports, including alerts indicative of inter-server problems between two or more servers. | 12-29-2011 |
20110320587 | REAL-TIME DETERMINATION OF SOFTWARE INSTALLATION STATUS - A computer-implemented method for real-time determination of software installation status is described. The determination is performed for multiple computing devices. The method includes accepting a list of computing devices connected to a network. Further, the method includes receiving an identifier for a software component and determining installation status for the software component based on the identifier. The determination being performed on each computing device in the list in real-time. Further, the method includes producing a software installation report based on the determined installation status. | 12-29-2011 |
20110320588 | System and method for wireless network offloading - Wireless offloading provides tools to a service provider to encourage or direct a subscriber to offload from a first network, e.g., a cellular network, to a second network, e.g., a Wi-Fi network. The cellular service provider can use network data to determine wireless offloading priorities for cellular subscribers on an individual or group basis. The cellular service provider may use wireless network data it has and/or wireless network data it learns about networks from the wireless devices (which may obtain Wi-Fi network data from beacon frames of Wi-Fi networks or active scanning and which may report to the cellular service provider). Each wireless device can be given scanning assignments to ensure that the reporting task is shared among subscribers or adjusted to fill in gaps in data. With the network data, the cellular service provider is capable of generating useful prioritized network lists for wireless devices, either individually or as a group. Preferences can be encouraged in the form of incentive offers to subscribers to, e.g., offload from the cellular network to a Wi-Fi network. Incentive offers can include offers to lower service costs or provide additional or improved services. | 12-29-2011 |
20110320589 | METHOD AND DEVICE FOR PROCESSING DATA IN A NETWORK - A method and a device for processing data in a network are provided. The method includes using a gateway for modifying a communication from a first network component to a second network component by indicating a reason for a service change and/or by indicating a change of the service. Furthermore, a communication system is suggested containing this device. | 12-29-2011 |
20110320590 | DATA TRANSMISSION METHOD AND SERVER FOR SUBSTATION MONITORING CONTROL SYSTEM - According to one embodiment, a server | 12-29-2011 |
20110320591 | ACCESS NODE MONITORING CONTROL APPARATUS, ACCESS NODE MONITORING SYSTEM, ACCESS NODE MONITORING METHOD, AND ACCESS NODE MONITORING PROGRAM - Disclosed is an access node monitoring control apparatus for monitoring a plurality of access node devices that each include one or more interface cards corresponding respectively to a plurality of users. This apparatus includes SLA information storage means for storing information about reliability-related SLAs signed by the users; fault information receiving means for receiving information about faults in a device used to provide communication services to the users; fault history storage means for storing a history of faults indicated by the information received by the fault information receiving means in association with the users affected by the faults; and next maintenance operation determination means for determining the next maintenance operation in accordance with information about a currently faulty device, information about an SLA for a user affected by a fault in the faulty device, and a fault history associated with the user. | 12-29-2011 |
20110320592 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CONTENT DELIVERY USING DEEP PACKET INSPECTION - Methods, systems, and computer readable media for content delivery using deep packet inspection are disclosed. According to one method, steps are performed at a packet inspection (PI) module that is distinct from a cache module. The method includes receiving a request for content. The method also includes inspecting the request to obtain information about the content. The method further includes determining, by comparing the obtained information with traffic management policy information based on a dynamically derived content access profile, whether the cache module is to process the request. The method also includes, in response to determining that the cache module is to process the request, sending the request towards the cache module. | 12-29-2011 |
20110320593 | EQUIPMENT MANAGING APPARATUS, EQUIPMENT MANAGING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - An equipment managing apparatus manage equipments via a data channel. Management information for grouping an equipment to be managed according to a condition is retained, and request process content information indicating contents of a request process and equipment information is acquired from event information. The equipment managing apparatus updates the management information based on the request process content information and the equipment information, in order to register or delete data of the management information. | 12-29-2011 |
20110320594 | PROACTIVE SEEDING OF DATA IN A PEER TO PEER NETWORK - A method of proactive seeding of data in a peer-to-peer computer network is provided. The method may include the following steps: monitoring, in a peer-to-peer computer network, a plurality of agents and a plurality of files by tracking an availability of each agent and tracking a status of each file respectively; evaluating each agent, based at least partially on respective past performance and specified rules; encoding each file into portions; matching the portions into agents to yield a specified distribution of loads among the agents based at least partially on their respective evaluation, wherein at least one of the monitoring, the evaluating, the encoding, the and the matching is executed by at least one processor. | 12-29-2011 |
20110320595 | MEDICAL INFORMATION PROCESSING DEVICE AND SOFTWARE DISTRIBUTING SYSTEM - This embodiment involves a medical information processing device comprising: a storage part; a configuration information storage part; a determination part; and a controller. The storage part stores a plurality of application programs. The configuration information storage part stores configuration information for an execution environment that is quality guaranteed, corresponding to the application program. The determination part, based on the configuration information, determines whether it is possible to run the application program. The controller, if it is determined at the determination part that the application program cannot be run, causes a function corresponding to this application program to be run on a server. | 12-29-2011 |
20110320596 | Method and Apparatus for Protecting Networks from Unauthorized Applications - A traffic controller is provided which integrates black-box tests of unauthorized applications to extract application characteristics from associated Internet traffic, exploits the networking information learned by host clients, actively scans and controls hosts on the corporate network, and dynamically configures a corporate firewall to block traffic to and from critical application network elements. As a result, the traffic controller effectively manages unauthorized applications and their associated traffic in a corporate environment. | 12-29-2011 |
20120005328 | COMPUTER NETWORK SOFTWARE AND HARDWARE ASSET CONFIGURATION AND DISCOVERY SYSTEM AND METHOD - A method, system, and network for interfacing the work-flow monitoring and reporting of a host computer, a local network of information technology devices, a community of network users, and a global information technology community. This includes the processes and system features for initiating an inventory of a plurality of information technology devices associated with the local network of information technology devices. The present disclosure further includes determining needs of the local network of information technology and associating the needs to similar needs of the community of network users, and solution product and services of the global information technology community. The system directs the host computer to research and purchase resources similar in temperament of the needs of the local network of the information technology devices, and drive the global information technology community advertisements of the needs of the local network to the user of the host computer. | 01-05-2012 |
20120005329 | Sampling from Distributed Streams of Data - The present disclosure is directed to systems, methods, and computer-readable storage media for sampling from distributed data streams. Data elements are received at site servers configured to collect and report data to a coordinator device. The site servers assign a binary string to each of the data elements. Each bit of the binary strings can be independently set to a 0 or a 1 with a probability of one half. The binary string is used to sample from the received data elements, and the data elements and/or the sampled data elements can be transmitted to a coordinator device. The coordinator device can examine one or more bits of the binary string to draw samples of the received data elements in accordance with desired probabilities. | 01-05-2012 |
20120005330 | Organizing Individual Java Client Request Flows into a Single Server Transaction - An information handling device detects that multiple flows each include a common transaction-specific identifier. The transaction-specific identifier corresponds to a transaction and is generated in response to receiving a request over a computer network. The information handling device, in turn, logs data pertaining to each of the detected plurality of flows in a storage area. When the information handling device identifies a completion of the transaction, the information handling device calculates a total cost of the transaction using the logged data pertaining to each of the plurality of flows. | 01-05-2012 |
20120005331 | METHOD AND SYSTEM TO IDENTIFY A SOURCE OF SIGNAL IMPAIRMENT - A method and system for managing performance of over a multimedia content distribution network (MCDN), such as a digital subscriber line network, involves receiving an indication of an impairment in network performance from an MCDN client. The MCDN node associated with the client may be identified and a community of MCDN clients coupled to the MCDN node may be further identified. Impairment information, representative of MCDN equipment, may be collected for each of the MCDN clients. Detailed network diagnostics and field service may be performed for MCDN clients based on a characterization of the impairment parameters. After remediation of the MCDN node, collection of the impairment information may be terminated. | 01-05-2012 |
20120005332 | METHOD AND SYSTEM TO PROACTIVELY IDENTIFY DEGRADED NETWORK PERFORMANCE - A method and system for managing performance of a multimedia content distribution network (MCDN), such as a digital subscriber line network, involves monitoring maximum data transfer rates and current data transfer rates for one or more MCDN clients. A ratio of the current data transfer rate to the maximum data transfer rate may be evaluated with respect to a threshold. When the ratio is less than the threshold, an associated MCDN node may be designated as a degraded node and subject to enhanced surveillance by an MCDN operator. | 01-05-2012 |
20120005333 | METHOD AND SYSTEM TO DETECT A PREDICTIVE NETWORK SIGNATURE - A method and system for monitoring a multimedia content distribution network (MCDN) includes receiving an indication that a network impairment has been detected at an MCDN node. MCDN clients associated with the MCDN node may be analyzed to detect an impairment signature, representing correlated impairments among the MCDN clients. Subsequent incoming service requests for the MCDN node may be bundled into a master service ticket. Users of the MCDN clients may be notified of the detected network impairment and of a status of ongoing remediation efforts. | 01-05-2012 |
20120005334 | SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm. | 01-05-2012 |
20120005335 | Computer product , verification support apparatus, and verification support method - A computer-readable, non-transitory medium storing therein a verification support program that causes a computer to execute a process that includes detecting a point in time when data of any one transaction among a series of transactions that are to be transmitted in a prescribed sequence from a device under verification, is skipped; detecting a point in time when the data is first transmitted after the detected point in time when the data is skipped; computing time elapsing from the detected point in time when the data is skipped until the detected point in time when the data is transmitted; and outputting a computation result obtained at the computing. | 01-05-2012 |
20120005336 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, CONTROL METHODS THEREFOR, AND COMPUTER PROGRAMS - Provided are an information processing system that detects a firewall between an MFP and a Web server, and changes a network connection method depending on whether a firewall exists, and a control method therefor. To accomplish this, this information processing system includes an image processing apparatus and an information processing apparatus connected via a network. The image processing apparatus requests the information processing apparatus for existence/absence information indicating whether a firewall exists on a communication path between the image processing apparatus and the information processing apparatus. The information processing apparatus detects whether a firewall exists on the communication path between the image processing apparatus and the information processing apparatus, adjusts a communication method so as to employ a first communication method if a firewall exists and so as to employ a second communication method if a firewall does not exist, and notifies the image processing apparatus of the result. | 01-05-2012 |
20120005337 | REMOTE CONTROL DEVICE, REMOTE CONTROL SETTING METHOD, AND PROGRAM - There is provided a remote control device including: a communication unit that can perform communication through a network; a remote control unit that can transmit one or more control commands to a controlled device in response to an operation by a user; a storage unit that stores control command information specifying the one or more control commands to be transmitted from the remote control unit; and a setting unit that sets the control command information to the storage unit based on a result of communication by the communication unit with a controlled device through the network, wherein the setting unit detects a controlled device connected to the network by transmitting a device search signal from the communication unit, acquires device information of the detected controlled device from the controlled device, and decides the control command information to be set to the storage unit based on the acquired device information. | 01-05-2012 |
20120005338 | System and Method for Service Assurance in IP Networks - A system and method for providing service assurance in a data network is provided. Resource control points are positioned throughout a data network, such as an IP data network. The resource control points obtain network topology information and correlates that information with information associated with a particular service session. The resource control points utilize the correlated information to generate quality service records and to provide status information regarding the network topology and particular sessions. The information collected by the resource control points may also be utilized to provide reports regarding resource management for services within the data network, the path used by the session across the data network, fault information for the session in the context of the network topology and congestion information as concerns the resources in the data network used by the session. | 01-05-2012 |
20120005339 | UTILIZING CAPTURED IP PACKETS TO DETERMINE OPERATIONS PERFORMED ON PACKETS BY A NETWORK DEVICE - Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are captured and forwarded through the network device. Operations performed on the captured IP packets are logged. | 01-05-2012 |
20120005340 | MEDIATION DEVICE, MEDIATION METHOD AND MEDIATION SYSTEM - Hiding a service providing server from an authentication server is incompatible with involving the service providing server in the selection of the authentication server. An authentication mediation server ( | 01-05-2012 |
20120011242 | GENERATING ALERTS BASED ON MANAGED AND UNMANAGED DATA - Concepts and technologies are described herein for generating informational alerts. Notifications are received from both unmanaged devices and managed services. The received notifications may be annotated to create annotated notations. The notifications may be annotated with privacy data that defines the terms under which the notifications may be provided to others. The notifications may also be annotated with compensation data that defines the financial terms under which the notifications may be provided to others. Standing and ad-hoc queries may be performed against the annotated notifications. The results of the queries may be provided to one or more user devices as an informational alert. | 01-12-2012 |
20120011243 | UNIFORM RESOURCE LOCATOR (URL) CHECK - Check code and a uniform resource locators (URL) are sent from a server to a computer. The check code, when executed on the computer, lists a reference to the URL so that an attribute of the listed reference to the URL varies depending on whether the URL is in a list indicating URLs visited by the computer, and forwards to the server, based on the attribute of the listed reference to the URL, an indication as to whether the URL is in the list indicating URLs visited by the computer. Content to be sent to the computer is selected based on the indication. | 01-12-2012 |
20120011244 | METHOD FOR REDISTRIBUTING LICENSE TOKENS FOR A SERVICE ACROSS A CLOUD COMPUTING ENVIRONMENT - The invention relates to a method for redistributing license tokens for a service to license servers across a cloud computing environment. The method comprises the steps of acquiring current license tokens information of the license servers for the service, detecting a need for redistribution of the license tokens to the license servers and redistributing the license tokens to the license servers across the cloud computing environment according to the need for redistribution and according to the current license tokens information of the license servers for the service. | 01-12-2012 |
20120011245 | MONITORING COMMUNICATIONS - Methods, computer readable media, and apparatuses for monitoring communications are presented. A first username may be compared with a second username. The first username may be associated with a sender of a communication, and the second username may be associated with a recipient of the communication. Thereafter, based on the comparing, the probability that the first username and the second username are both associated with a single entity may be determined. In at least one arrangement, in response to determining that the probability exceeds a threshold, it may be determined that the first username and the second username are both associated with the single entity. In at least one additional arrangement, the threshold may be modified automatically based on previously analyzed incident data. | 01-12-2012 |
20120011246 | COOKIE INVALIDATION OR EXPIRATION BY A SWITCH - A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided. | 01-12-2012 |
20120011247 | HYBRID MODES FOR PEER DISCOVERY - Techniques for performing peer discovery in a wireless network are described. A device may perform peer discovery to detect and identify other devices of interest. In an aspect, the device may perform peer discovery based on a hybrid mode that includes autonomous peer discovery and network-assisted peer discovery. In another aspect, the device may perform peer discovery based on a push mode and a pull mode. For the push mode, the device may occasionally transmit and/or receive a peer detection signal. For the pull mode, the device may transmit and/or receive a peer discovery request when triggered. In yet another aspect, the device may perform event-triggered peer discovery (e.g., for the pull mode). In yet another aspect, the device may perform peer discovery using both a downlink spectrum and an uplink spectrum. In yet another aspect, the device may transmit a peer detection signal in a manner to improve detection and/or increase payload. | 01-12-2012 |
20120011248 | METHOD AND SYSTEM FOR IMPORTING AN APPLICATION AND SERVER MAP TO A BUSINESS SYSTEMS MANAGER DISPLAY - An automated system displays enables a user to observe the activities in a system based on information in the display. From this display, the user can quickly identify the source of problems for the purpose of troubleshooting without the need to manually determine the source and nature of the problem. In this system, data about the system is gathered through a plurality of agents positioned throughout the network. This data is analyzed and a system monitor deployment configuration is developed. This monitor deployment information along with information about the various devices in the system and any relationships of devices in the system are imported to the display system. The display system then displays this information showing the present relationships of the devices in the system. | 01-12-2012 |
20120011249 | SECURED AND EFFICIENT WEB CONFERENCE SYSTEM WITH VIRTUAL HOST AND REDUNDANCY CONTROL - A web conferencing server, including a conferencing module, a monitoring module and a control module, is provided. The conferencing module enables a plurality of participants to attend a web conference and further provides a first participant with a conference right, which allows the first participant to issue a conference command. The monitoring module monitors the status of the first participant in order to generate a status notification. In response to the status notification, the control module issues a control command to the conferencing module, to withhold the conference right from the first participant. | 01-12-2012 |
20120011250 | COMMUNICATION PROGRAM, COMMUNICATION METHOD, AND ELECTRIC APPARATUS - An apparatus includes an information transmission part that transmits first information including an allocated IP address and a group identifier identifying a group to another apparatus that manages communication by the group, when connecting to the Internet; and a list reception part that receives a list in which IP addresses used for performing intercommunication in the group identified by the group identifier in the first information are listed, as a response to the first information from the computer. A communication part of the apparatus performs communication by using the IP addresses listed in the received list. | 01-12-2012 |
20120011251 | COMPUTER NETWORK SOFTWARE AND HARDWARE EVENT MONITORING AND REPORTING SYSTEM AND METHOD - A method, system, and network for providing a method, system, and network, for network and device event monitoring and reporting. The disclosed subject matter associates with a host computer, a local network of information technology devices, a community of network users, and a global information technology community. The present disclosure initiates an inventory of a plurality of information technology devices associated with a local network of information technology devices. The method, system and apparatus determine change in the operational status of the plurality of the information technology devices associated with the local network. Then, the present disclosure monitors for changes in the operational status of the plurality of the information technology devices associated with the local network. The disclosed subject matter then presents to the host computer information relating changes in the operational status of the information technology devices associated with the local network. The present method and system associate changes to the operational status with a plurality of products from a set of product vendors, and those changes to the operational status with a plurality of advertisements presented in association with plurality of products. | 01-12-2012 |
20120011252 | PRIORITIZING NETWORK TRAFFIC - Methods and systems for operation upon one or more data processors for prioritizing transmission among a plurality of data streams based upon a classification associated with the data packets associated with each of the plurality of data streams, respectively. Systems and methods can operate to allocate bandwidth to priority data streams first and recursively allocate remaining bandwidth to lesser priority data streams based upon the priority associated with those respective lesser priority data streams. | 01-12-2012 |
20120011253 | SYSTEM AND METHOD FOR NETWORK MONITORING OF MULTIPLE MEDICAL DEVICES - The present invention provides for a system an method of monitoring the status of a plurality of medical devices connected to a central computer or server using a wired or wireless network, and displaying information representative of the status of the medical devices to a user on a display screen using both graphics and text. The system is also capable of determining when a condition or alarm warranting notification of the care giver to correct the condition exists, and displaying information about the condition or alarm on the display, including associating a warning graphic or icon representative of the condition or alarm with an icon representing a specific medical device or portion of a medical device. The system includes a rules data base and decision engine that may be used to determine the existence of conditions that require notification to the care giver. | 01-12-2012 |
20120016977 | Secure data transfer in a virtual environment - In one embodiment, a method includes receiving at one of a plurality of servers, a request from a client for a secure communication session, storing context information associated with the secure communication session at a virtual context server in communication with the servers, and establishing the secure communication session between one of the servers and the client. The context information includes a session identifier, a secret, and a session state. The stored context information is available to the servers to allow the secure communication session to move between the servers. An apparatus for secure data transfer in a virtual environment is also disclosed. | 01-19-2012 |
20120016978 | Method and Apparatus for Performing Services in a Network Data Processing System - A method, computer, and computer program product for performing a service. A processor unit identifies information about a network data processing system for performing the service. The processor unit identifies a plurality of steps used to perform the service. The processor unit identifies a set of software tools needed in each step in the plurality of steps to perform the service on the network data processing system. The set of software tools is identified based on the information identified. The information comprises at least one of a type of optimization performance system, a type of cluster, and a configuration of the cluster. | 01-19-2012 |
20120016979 | PROPAGATING CHANGES IN TOPIC SUBSCRIPTION STATUS OF PROCESSES IN AN OVERLAY NETWORK - A method of updating statuses of processes in a network is provided. The method may include the following steps: connecting N processes on a K-connected overlay network of nodes which is in operative association with a computer network; determining an update of subscription and un-subscription statuses of at least some of the processes; generating update messages reflecting the subscriptions and the un-subscriptions, the update messages being differences between previous update and current update; and propagating the update messages through the K-connected graph, such that at least some of the processes transfer the update to its respective K neighboring nodes, wherein at least one of the connecting, the subscribing, the unsubscribing, the generating, and the propagating is executed by at least one processor. | 01-19-2012 |
20120016980 | SYSTEM AND METHOD FOR MANAGING NETWORK RESOURCE REQUESTS - Systems and methods for managing network resource requests are described herein. Servers may be configured to operate in communication with a network. A server, in accordance with embodiments described in the present disclosure, includes a resource request handling program that is stored in a memory device. The resource request handling program is configured to extract an abbreviated resource request into at least an abbreviated site name and a page symbol. The server also includes a database that is configured to store a first relationship between the abbreviated site name and a web site. The database may also store a second relationship between the page symbol and a Uniform Resource Locator (URL) address of a web page associated with the web site. | 01-19-2012 |
20120016981 | CONTINUOUS AUTONOMOUS MONITORING OF SYSTEMS ALONG A PATH - In an embodiment, a method comprises initiating a monitoring session for a communication path including creating and storing monitoring session state data; sending, to a first responder computer of the communication path, a first request to initiate a first state servlet that is configured to monitor continuously during the monitoring session one or more characteristics of one or more processes that the first responder computer may perform; sending, to the first responder computer, monitoring instructions to monitor the one or more characteristics of the one or more processes; while the monitoring session is active and the first responder computer is in the communication path, receiving and collecting monitored information from the first responder computer; in response to determining that the first responder computer is not in the communication path or that the monitoring session has become inactive, automatically and autonomously ending the monitoring session. | 01-19-2012 |
20120016982 | Direct response and feedback system - The invention provides methods and systems for analyzing and routing items. | 01-19-2012 |
20120016983 | Synthetic Transactions To Test Blindness In A Network System - Synthetic transactions for a network system are generated based on monitoring of the network system to determine whether the network system may be blind to traffic. A process determines whether an application within an application server in a network system is processing traffic received by the application server, and whether a web server within the network system and in communication with the application server is receiving traffic that requires processing by the application. The process determines that the network system may be blind to the traffic, and, in response, generates a synthetic transaction instruction and a corresponding synthetic transaction to test whether the network system is blind to the traffic. Based on a response of the network system to the synthetic transaction, the process determines whether there is a malfunction of the application server or a period of low traffic activity of the application server. | 01-19-2012 |
20120016984 | FACILITATING NETWORK COMMUNICATIONS WITH CONTROL SERVER, HOSTING SERVER, AND DEVICES UTILIZING VIRTUAL NETWORK CONNECTIONS - A method includes communicating network connection information from a control server to each of a first subset of devices for enabling an open network connection between each of the devices of the first subset; spawning, by each of a plurality of devices, a plurality of virtual machines for network connections that virtualize network capabilities of the device; establishing, by each of the devices, a respective open network connection with each of the other devices using a respective spawned virtual machine and network connection information received from a control server; receiving, by each device, data from a hosting server and data from one or more of the open network connections that are established with that device; processing, by each device, the received data; and providing a user experience, by each device, based on the processed data. | 01-19-2012 |
20120016985 | MONITORING SYSTEM AND METHOD FOR CONNECTING A MONITORING DEVICE TO A SERVICE SERVER - A method for connecting a monitoring device to a service server includes retrieving an address relating to a control server from a memory of the monitoring device and, sending a connection message from the monitoring device to the address relating to a control server in response to a connecting event. At the control server, an identifier is extracted from the communication between the monitoring device and the control server, a service server associated with the extracted identifier is identified and an address relating to the identified service server is sent from the control server to the monitoring device. A connection message from the monitoring device is sent to the identified service server in response to the receipt of the address related to the identified service server. A service connection is established between the monitoring device and the identified server. | 01-19-2012 |
20120016986 | POLICING IN DATA NETWORKS - Apparatus and methods for policing flows of data units ( | 01-19-2012 |
20120016987 | Gateway, Control Method Thereof, Application Server, and Control Method Thereof - The present invention generally relates to a gateway, a method for controlling the gateway, an application server, and a method for controlling the application server. The present invention particularly relates, but is not limited to, a technology that facilitates the formation of a single network from a plurality of local networks. | 01-19-2012 |
20120016988 | SUPERVISION OF LI AND DR QUERY ACTIVITIES - The present invention relates to a method for supervising log activities in a Communication Service Provider's domain (CSP) comprising a monitoring system (DR, LI) and a Log System. The method comprises steps of sending a request for log activities and receiving a result via standard defined interfaces (HIXA, HIXB, HIA, HIB; HIX | 01-19-2012 |
20120023219 | SYSTEM MANAGEMENT METHOD IN COMPUTER SYSTEM AND MANAGEMENT SYSTEM - To enable the setting of a suitable threshold for a component of each of apparatuses configuring a system. By using management software, a threshold for monitoring the performance of an apparatus to be monitored is set beforehand. When an acquired performance value exceeds the threshold, the acquired performance value is detected as a performance fault event. Further, the management software has a correlation analysis rule representing a causal relationship between the performance fault events in the managed apparatus. When detecting an event, the management software performs fault cause analysis processing to specify a fault cause apparatus and an apparatus (affected apparatus) affected by the fault from a plurality of received events. | 01-26-2012 |
20120023220 | AUTOMATIC TESTING SYSTEM OF DYNAMIC HOST CONFIGURATION PROTOCOL SERVER - An automatic testing system of a dynamic host configuration protocol server is used for performing a quality assurance test of the dynamic host configuration protocol server, and the automatic testing system includes a packet processing unit, an automatic testing module and an operating unit connected to the automatic testing module. The packet processing unit is used for generating, analyzing and transmitting a plurality of packets, and the automatic testing module is connected to the packet processing unit and the dynamic host configuration protocol server, and the packet processing unit tests and analyzes a packet to the dynamic host configuration protocol server, and the operating unit is provided for a user to operate and set up the automatic testing module, such that the testing system can test the dynamic host configuration protocol server automatically, and prevent errors and damaged caused by inexperience and negligence of a manual testing. | 01-26-2012 |
20120023221 | EVENT CORRELATION IN CLOUD COMPUTING - The present invention pertains to cloud computing systems and handling of events that occur in the cloud. A correlation system obtains and analyzes various events to obtain comprehensive information about the behavior of the cloud. An event repository receives and maintains time-stamped events, which may be obtained from the cloud itself or from external sources reporting on the cloud. A query engine is employed to select, filter and aggregate events from the event repository. The query engine may take into account metadata which describes relationships between different parts of the cloud. Results from the query engine may be presented on a display or otherwise reported. Using such information, the system may fix known problems or change certain parameters to improve the cloud computing process. | 01-26-2012 |
20120023222 | MOVING DEPLOYMENT OF IMAGES BETWEEN COMPUTERS - In an embodiment, a unit workload comprises an average processor speed and an average memory amount required by execution of images. If an integer multiple of the average processor speed required minus a free processor speed at a source computer is greater than a first threshold amount, an integer multiple of the average memory amount required minus a free memory amount at the source computer is greater than a second threshold amount, the integer multiple of the average processor speed required minus a processor speed requirement of a source image at the source computer is less than a third threshold amount, and the integer multiple of the average memory required minus a memory requirement of the source image at the source computer is less than a fourth threshold amount, then deployment of the source image is moved from the source computer to a destination computer. | 01-26-2012 |
20120023223 | PREDICTIVE CONTEXT-BASED VIRTUAL WORKSPACE PLACEMENT - A method, information processing system, and computer program product manage virtual workspace migration. A set of information associated with a user is analyzed. A future virtual workspace demand associated with the user is predicted based on the analyzing. At least a portion of at least one virtual workspace associated with the user is migrated from a first location to at least a second location based on the future virtual workspace demand that has been predicted. | 01-26-2012 |
20120023224 | METHOD AND SYSTEM FOR MEASURING INDIVIDUAL NETWORK ROUND-TRIP DELAYS IN IP GATEWAYS - An IP gateway, attached to a source network and a destination network, handles an application session between a source client device and a destination client device. Application-level control messages in the existing application session may be time stamped by the IP gateway. Individual network round-trip delays (RTDs) associated with the attached networks may be calculated or determined utilizing the resulting time stamps. The IP gateway may time stamp one or more of the application-level control messages in the existing application session whenever transmission and/or reception of the application-level control messages occurs at the IP gateway. The resulting gateway related time stamps such as the gateway-to-source receive time stamp and the gateway-to-destination transmit time stamp may be stored. An individual RTD associated with the destination network may be calculated or determined utilizing the stored gateway related time stamps and processing delay measurement extracted from one of the application-level control messages from the destination client device. | 01-26-2012 |
20120023225 | ENERGY MANAGEMENT SYSTEM AND METHOD - According to an aspect of the disclosure, an energy management system and method includes managing energy use of a site comprising the steps of: acquiring a network device data from a network device joined to a wireless energy network; translating the network data into device report data comprised of at least one Java based object; detecting an interval to generate a site report of the wireless energy network; translating the device report data into site report data comprised of XML formatted data; and generating the site report including the site report data at the interval. A wireless energy network communication device is configured to communicate with a wireless energy network and a processor is operably coupled to the wireless energy communication device and configured to perform the steps of managing energy use of the site. | 01-26-2012 |
20120023226 | PREDICTION OF ACTIVITY SESSION FOR MOBILE NETWORK USE OPTIMIZATION AND USER EXPERIENCE ENHANCEMENT - Systems and methods for prediction of activity session for mobile network use optimization and user experience enhancement are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system for enhancing user experience with a mobile application on a mobile device including, using user activity characteristics at a mobile device and server activity characteristics of a host server to anticipate a future activity session at the mobile device and transferring impending content from the host server the mobile device to pre-cache content on the mobile device to support predicted data activity for the future activity session that has been predicted. | 01-26-2012 |
20120023227 | Method for Providing Node Information, Method for Acquiring Node Information, and Device - The present invention discloses a method for providing node information, a method for acquiring node information, a Device Management (DM) server and a terminal device. The method for providing node information includes: receiving a command including a Management Object Identifier (MOI) and node object information ( | 01-26-2012 |
20120023228 | METHOD, APPARATUS, SIGNALS, AND MEDIUM FOR MANAGING TRANSFER OF DATA IN A DATA NETWORK - A method and apparatus for managing a transfer of data in a data network identifies data associated with a communication session between a first node and a second node in the data network. Further processing of the communication session occurs when a portion of the communication session meets a criterion and the communication session is permitted to continue when the portion of the communication session does not meet the criterion. | 01-26-2012 |
20120023229 | METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - An example system disclosed herein comprises a web browser monitor to extract textual information from a captured image comprising at least a portion of content displayed by a web browser implemented by a monitored device, and determine color scheme information for a region of the captured image comprising at least a portion of the content displayed by the web browser. The example system also comprises a central processing facility to process the extracted textual information received from the web browser monitor, and compare the color scheme information received from the web browser monitor to reference color schemes associated with reference web pages to determine web sites accessed using the web browser. | 01-26-2012 |
20120023230 | NETWORK TOPOLOGY - A method of determining the topology of at least part of a network comprising the steps of: monitoring traffic to and/or from a plurality of computers in the network; storing information relating to the monitored traffic for each of the plurality of computers, the information including an identifier of a requested service; selecting a first computer of the plurality of computers; reading the stored information related to the first computer and identifying, using the stored identifier of the requested service, at least one traffic flow to or from the first computer that corresponds to the requested service; using the stored information to identify the destination or origin of the identified traffic flow for the first computer, which traffic flow information includes the identifier of the requested service; using the identified destination or origin to identify one or more computers that are immediately upstream or downstream of the first computer, and determining a topology based on the identified one or more upstream or downstream computers. | 01-26-2012 |
20120030341 | Transparent Header Modification for Reducing Serving Load Based on Current and Projected Usage - A method and system for dynamically altering the delivery of web content to end users based on server load. Responsive to receiving a client request for web content, utilization metrics are collected from each device involved in delivering the web content. A device load level is determined for each device based on the utilization metrics, a system load level is determined for a subset of the devices having the same device type based on the device load levels, and a service level to provide to the client is determined based on the system load level. The request header is modified to specify the service level to provide to the client, wherein the service level indicates the web content variant to deliver. The request is sent with the modified header to a selected device which serves the web content according to the service level to the client. | 02-02-2012 |
20120030342 | CLUSTERHEAD SELECTION IN A COMMUNICATION NETWORK - Technologies are generally described for clusterhead selection in a communication network. In an example, a first node may be configured to send a first responsibility and availability. In some examples, the first responsibility indicates a responsibility attributed to the second node to be the clusterhead for the first node. In some examples, the first availability indicates an availability of the first node to be the clusterhead for the second node. In some examples, the first node is effective to receive a second responsibility and availability; the second responsibility indicating a responsibility attributed to the first node to be the clusterhead for a second node; the second availability indicating an availability of the second node to be the clusterhead for the first node. In some examples, the first node is effective to determine the clusterhead based on the first and second responsibility and the first and second availability. | 02-02-2012 |
20120030343 | DYNAMIC MIGRATION WITHIN A NETWORK STORAGE SYSTEM - This is directed to providing access to content stored on a personal cloud. In particular, a personal cloud can be constructed by sharing the resources of several devices owned by a user and by other users trusted by the user. To add a device to a personal cloud, the device can identify its owner to a librarian, which can provide addressing information for other devices forming a cloud on behalf of the owner. The new device can establish a communications path with the other devices, and configure itself based on the services or data required for the personal cloud (e.g., as determined from communications with the other devices). Services operating on individual devices of the personal cloud can migrate dynamically and automatically to ensure that a user can remove a device from the personal cloud at will without adversely affecting the operation of the personal cloud. | 02-02-2012 |
20120030344 | NETWORK MONITORING SYSTEM - A system to monitor an overlay network may include a plurality of publishers, a plurality of subscribers, and a plurality of brokers. The system may also include an overlay network linking the publishers, the subscribers, and the brokers. The overlay network includes a first computer network having a first network protocol carried by a second computer network having a second network protocol. The system may further include an inspection unit to monitor message topics sent over the overlay network amongst the publishers, the subscribers, and the brokers. | 02-02-2012 |
20120030345 | SYSTEMS AND METHODS FOR NETWORK AND SERVER POWER MANAGEMENT - The present disclosure includes a system and method for managing network and server power. In an example of managing network and server power according to the present disclosure, routing network traffic is routed onto a number of core networks based on core network statistics, capacity requirements are determined based on core network statistics for the number of core networks and for a number of servers operating a number of virtual machines on the number of core networks, wherein the number of core networks include a number of core switches and a number of edge switches, and the capacity is set for the number of core switches based on the capacity requirements for the number of core networks and for the number of servers based on the capacity requirements for the number of servers. | 02-02-2012 |
20120030346 | METHOD FOR INFERRING EXTENT OF IMPACT OF CONFIGURATION CHANGE EVENT ON SYSTEM FAILURE - A management system, which manages multiple monitoring target apparatuses, computes a certainty factor denoting the probability that a certain configuration change is the root cause of a performance failure that has occurred in a certain monitoring target apparatus based on rule information, computer system performance information, and a configuration change history, and displays management information from the standpoint of the configuration change based on the computation result. | 02-02-2012 |
20120030347 | System and Method for the Application of Psychrometric Charts to Data Centers - A system and method of displaying the temperature and relative humidity data of sensors on a psychrometric chart. The system and method operate to display an environmental envelope on the psychrometric chart in order to compare the data of the sensors to the environmental envelope of the psychrometric chart, in order to ensure safe operating conditions for data center equipment. | 02-02-2012 |
20120030348 | SYSTEM AND METHOD FOR CATCHING TOP HOSTS - Disclosed are a system and a method for catching top users. The system may comprise: a filter ( | 02-02-2012 |
20120030349 | CONTROL DEVICE, METHOD AND PROGRAM FOR DEPLOYING VIRTUAL MACHINE - A control device includes a storage unit that stores a correspondence relationship between a first information processing device and attribute information of a first virtual machine provided by the first information processing device, and a correspondence relationship between a second information processing device and attribute information of a second virtual machine provided by the second information processing device; and a processor that refers to the storage unit and deploys a deployment object virtual machine to the first information processing device when the number of the first virtual machines with the same attributes as the attributes of the deployment object virtual machine among the first virtual machines provided by the first information processing device is detected to be fewer than the number of second virtual machines with the same attributes as the attributes of the deployment object virtual machine among the second virtual machines provided by the second information processing device. | 02-02-2012 |
20120030350 | PROCESSING APPARATUS, PROCESSING METHOD, AND COMMUNICATION SYSTEM - A processing apparatus includes: an address converter configured to return an address in response to a search request from a server; and a substitute controller configured to control the address converter to return a first address in response to a first search request from a first server when the address converter has not received a second search request for a second address from a second server, and return the second address in response to the first search request from the first server when the address converter has received a second search request for the second address from the second server. | 02-02-2012 |
20120030351 | MANAGEMENT SERVER, COMMUNICATION CUTOFF DEVICE AND INFORMATION PROCESSING SYSTEM - An inspection system | 02-02-2012 |
20120030352 | METHOD AND SYSTEM FOR MANAGEMENT OF SAMPLED TRAFFIC DATA - A method for management of sampled traffic data is described herein. For each network device of a plurality of network devices, one or more data sources of the network device is determined. Each of the one or more data sources is associated with a local identifier. A sampler proxy receives a sampling configuration from a data collector, The sampling configuration includes a selection of a data source of a network device of the plurality of network devices. The selected data source is identified by a global identifier. The sampling configuration is translated to a local sampling configuration and is provided to the selected data source. | 02-02-2012 |
20120030353 | Method and Equipment For Accessing a Telecommunication Network - A method for accessing a network in a telecommunication system which comprises at least one terminal and a plurality of networks in which information sets describing settings needed to access networks and their resources are stored in the terminal. The terminal scans for information about available networks. Available information sets are determined by comparing the information about available networks to the stored information sets. At least one network is accessed based on the settings defined in the available information sets. | 02-02-2012 |
20120036249 | AUTONOMOUS INTELLIGENT WORKLOAD MANAGEMENT - Apparatus, systems, and methods may operate to create a hypergraph of weighted vertices comprising computing resources and storage resources, and nets comprising workloads; to receive a plurality of requests to be addressed by a network associated with the hypergraph, at least some of the requests associated with data objects; to calculate partition schemes for the network based on the requests and the data objects according to an ant colony optimization heuristic; and to autonomously reallocate the workloads to the computing resources and/or the storage resources according to the partition schemes. The workloads may act as ants following a path defined by the vertices of the hypergraph. Further activities may thus include depositing pheromones along hyperedges of the hypergraph, wherein the hyperedges are used for swapping the vertices between the workloads. Additional apparatus, systems, and methods are disclosed. | 02-09-2012 |
20120036250 | System, Method and Program for Detecting Anomalous Events in a Utility Network - A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 02-09-2012 |
20120036251 | METHOD AND SYSTEM FOR END-TO-END QUALITY OF SERVICE IN VIRTUALIZED DESKTOP SYSTEMS - A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective. | 02-09-2012 |
20120036252 | OSGI-BASED HETEROGENEOUS SERVICE INTEGRATING SYSTEM AND METHOD - The present invention provides an OSGi-based heterogeneous service integrating system comprising a Java virtual machine and an OSGi container, the system further comprises a service management module, a handler management module, a monitor module, a service discovery module and a handler module that are running on said OSGi container, wherein: said service management module is adapted to monitor requests for registering and using of a remote service, to manage different types of services, and to notify said handler management module to make corresponding publishing and calling for different service configuration types; said handler management module is adapted to manage said handler module and to publish service to and call service from remote end points, and to call the corresponding handler module based on information delivered by the service management module, and to maintain information of currently published services and adopted remote services; said monitor module is adapted to monitor a local service registry in said OSGi container and to obtain information to be monitored from the service management module; said service discovery module is adapted to make remote service discovery; and said handler module is adapted to realize access of a module within the OSGi container to a service outside the OSGi container. | 02-09-2012 |
20120036253 | Minimising Network Resource Overhead - A mechanism is provided for minimising network resource overhead consumption by reports from one or more agents distributed in an electronic data network of nodes having a hierarchical reporting structure. Reports are received from other nodes in an electronic network of nodes or one or more agents further from a network root node in the electronic network of nodes. The reports are submitted to another node closer to the network root node in response to another node existing between the node and the network root node. The reports are submitted to the network root node in response to no other node existing between the node and the network root node. The node is adapted to only report variations in the expected report flow associated with the received reports. | 02-09-2012 |
20120036254 | CONNECTION MANAGEMENT SYSTEM, AND A METHOD FOR LINKING CONNECTION MANAGEMENT SERVER IN THIN CLIENT SYSTEM - An exemplary object of the present invention is to suppress the load on each server and network traffic. To achieve this, a plurality of connection management servers are installed so that any of the connection management servers executes acceptance of a connection request from a thin client terminal. Further, the connection management servers manage the states of clients in order to hold the states of the respective clients, and each of the connection management servers searches a client that can be connected by the thin client terminal according to a connection request from this thin client terminal, and replies with the search result to the thin client terminal, and a range of the connection management servers for executing the search of the client is limited for each connection request from the thin client terminal to the thin client server. | 02-09-2012 |
20120036255 | Network Centric Structured Communications Network - The present invention is a network centric management and communications system and method enabling users with commitments to communicate, manage, notify, assign, link, and/or collaborate with other users. The system includes a database storing one or more user accounts corresponding to nodes on a network, user accounts connected by interdependencies forming social connections between individual users having responsibilities and structuring communications via dependency links between interdependent users. The system includes a data server, receiving responsibility data comprising requirements data for creating interdependencies, transmitting assigned commitments, and updating responsibility data. The system further includes a communications link to provide status updates and/or notifications of responsibilities to affected users regarding their status that appropriate corrective action may be taken before one or more commitments to requirements are broken, wherein one or more commitments of a responsibility are modified and/or updated. The system can host multiple projects simultaneously in the data server. | 02-09-2012 |
20120036256 | SESSION ANALYSIS SYSTEMS AND METHODS - A method and system analyze session data. In some embodiments, the method accesses session data, identifies multiple sessions contained in the session data, and identifies multiple events that occurred within each of the multiple sessions. The method determines a temporal relationship between the multiple events in each session and analyzes the multiple sessions to aggregate events associated with the multiple sessions. The method then generates a graphical representation of the aggregated events. | 02-09-2012 |
20120036257 | DIAMETER SESSION AUDITS - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining by the network device that an S9 session should be audited; determining that the S9 session is a suspect session; transmitting an S9 message to a partner device, wherein the S9 message includes an innocuous instruction; receiving, at the network device, a response message from the partner device; determining, based on the response message, whether the suspect session is orphaned; and if the suspect session is orphaned, removing an S9 session record associated with the suspect session. | 02-09-2012 |
20120036258 | STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A management computer includes a memory storing toplogical information including identifiers of ports of computers, storage apparatuses, and switches. The management computer includes a processor, which is configured to: collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; evaluate that a certain access time among the plurality of access times exceeds a predetermined allowable range; search a first access path to which the certain access time corresponds; search at least one second access path starting from a first computer port on the first access path; and search performance information of certain ports which are on the at least one second access path in order to display the searched performance information. | 02-09-2012 |
20120036259 | Use of Behavioral Portraits in Web Site Analysis - A method is provided for determining a website user behavioral portrait based on navigation on the website and dynamically reconfiguring web pages based on those portraits. In accordance with the method, data relating to the progress of a user through a website is recorded, and an ongoing behavioral portrait of the user is built based on the data. The portrait is then used to dynamically reconfigure web content. | 02-09-2012 |
20120036260 | Tracking Changes to Content on an External Source in an Online Social Network - In one embodiment, a method includes accessing a profile page of a user of an online social network, determining whether content on an external web site has been update by the user, and if the content on the external web site has been updated, then updating the profile page of the user to include the content. | 02-09-2012 |
20120042060 | SYSTEMS AND METHODS FOR QUALITY OF SERVICE OF ICA PUBLISHED APPLICATIONS - The present invention is directed towards systems and methods for providing discovery of applications for classification of a network packet for performing QoS and acceleration techniques. Remote display protocol traffic associated with a new application not previously included in a list of predetermined applications may be parsed for application information, and the new application may be added to the application list. The remote display protocol traffic may then be classified according to the new application, and network performance may be enhanced and optimized by providing QoS and acceleration engines with packet- or data-specific information corresponding to the newly identified application. | 02-16-2012 |
20120042061 | CALIBRATING CLOUD COMPUTING ENVIRONMENTS - In general, embodiments of present invention provide an approach for calibrating a cloud computing environment. Specifically, embodiments of the present invention provide an empirical approach for obtaining end-to-end performance characteristics for workloads in the cloud computing environment (hereinafter the “environment”). In a typical embodiment, different combinations of cloud server(s) and cloud storage unit(s) are determined. Then, a virtual machine is deployed to one or more of the servers within the cloud computing environment. The virtual machine is used to generate a desired workload on a set of servers within the environment. Thereafter, performance measurements for each of the different combinations under the desired workload will be taken. Among other things, the performance measurements indicate a connection quality between the set of servers and the set of storage units, and are used in calibrating the cloud computing environment to determine future workload placement. Along these lines, the performance measurements can be populated into a table or the like, and a dynamic map of a data center having the set of storage units can be generated. | 02-16-2012 |
20120042062 | METHOD AND SYSTEM FOR PARTITIONING DIRECTORIES - A method of partitioning directory. Accesses, e.g., shared/exclusive, and/or waiting requests, e.g., shared/exclusive, to access one or more files with a directory are monitored, e.g., incrementing/decrementing respective counters. The waiting requests are queued to be granted at a later time. The directory is determined to be primed for partitioning if a number of waiting requests to access the directory is greater than a threshold value of a plurality of heuristics and optionally further based on satisfying the condition for at least a programmable time threshold period. A trigger signal is automatically generated if the directory is primed for partitioning. The trigger signal causes a file system to partition the directory. It is appreciated that the plurality of heuristics is user programmable. | 02-16-2012 |
20120042063 | METHOD AND SYSTEM FOR LINK COUNT UPDATE AND SYNCHRONIZATION IN A PARTITIONED DIRECTORY - A method of updating a link count in a partitioned directory shared by a plurality of computers within a cluster. The partitioned directory is traversed once by a first computer to obtain a link count. The link count is stored in the first computer and broadcast to a cluster of computers. A total number of allocated links is less than a maximum limit on link count minus the link count. A respective number of links is allocated to each computer within the cluster. Delta values of each computer are updated in real-time as subdirectories are created/erased. A delta value associated with each of the plurality of computers is received. A delta value represents a net number of links created or removed by each computer. The link count is updated based on the previous link count and further based on each of the delta values and further based a delta value associated with the first computer. The updated link count is stored by the first computer and broadcast to the plurality of computers. | 02-16-2012 |
20120042064 | MONITORING BASED ON CLIENT PERSPECTIVE - According to one general aspect, a method may include receiving, via a first network tap point included by a first network segment, a first portion of network communication data between a client computing device and a server computing device. The method may include receiving, via a second network tap point included by a second network segment, a second portion of network communication data between the client computing device and the server computing device. The method may include attempting to correlate each sub-portion of the first portion of network communication data to corresponding sub-portion of the second portion of network communication data. The method may also include analyzing the correlated network communication sub-portions to generate at least one set of metrics regarding the performance of the network communication between the client computing device and server computing device. | 02-16-2012 |
20120042065 | SYSTEM, APPARATUS, METHOD, AND COMPUTER PROGRAM FOR INFORMATION PROCESSING RESOURCE ADJUSTMENT - Information relating to the state of an apparatus making processing requests regarding jobs is acquired, and resources are adjusted based on the acquired information. | 02-16-2012 |
20120042066 | Managed Network Device - A network appliance may be configured to transmit data over a multiple networks from one or more client applications, for example, enterprise business applications. The network appliance may receive and analyze information regarding the multiple different networks transmitting over different transmission media, e.g., terrestrial and wireless, and to switch a client application from a primary network to a backup network based on a detected change in network availability. For example, the determination to switch transmission networks may be based on an outage of a primary network, or based on an efficiency or cost analysis, along with other factors. The network appliance may be in communication with an appliance network server, for example, to receive and compile statistics and remotely reconfigure a plurality of network appliances installed in remote locations. | 02-16-2012 |
20120042067 | METHOD AND SYSTEM FOR IDENTIFYING APPLICATIONS ACCESSING HTTP BASED CONTENT IN IP DATA NETWORKS - The present relates to a method and a system for identifying applications accessing HTTP (Hyper Text Transfer Protocol) based content in IP data networks. The method and system collects, by means of at least one collecting entity, real time data from IP data traffic occurring in an IP data network. The method and system extracts information from the collected real time data, the information comprising parameters related to an application accessing HTTP based content in the IP data network. And, the method and system transmits the information from the at least one collecting entity to an analytic system. The method and system further processes the information, at the analytic system. The processing comprises: analyzing the parameters related to an application accessing HTTP based content to identify the application. | 02-16-2012 |
20120042068 | COMMUNICATION PERIOD MANAGEMENT IN A COMMUNICATION SYSTEM - A method for communication period management in a communication system is disclosed. The method may involve determining a duration of a communication period that is scheduled between two electronic devices. The method may then involve determining whether the duration exceeds a threshold. If the duration does not exceed the threshold, the communication period may be unscheduled. Furthermore, the unscheduled time may be rescheduled with another communication period to another electronic device. The method may also involve determining whether a conflict exists between the communication period and any other communication periods that are scheduled to involve either of the electronic devices. If a conflict exists, the communication period may be unscheduled. | 02-16-2012 |
20120042069 | FAILOVER METHOD THROUGH DISK TAKEOVER AND COMPUTER SYSTEM HAVING FAILOVER FUNCTION - When a primary server executing a task fails in a computer system where a plurality of servers are connected to an external disk device via a network and the servers boot an operation system from the external disk device, task processing is taken over from the primary server to a server that is not executing a task in accordance with the following method. The method for taking over a task includes the steps of detecting that the primary server fails; searching the computer system for a server that has the same hardware configuration as that of the primary server and that is not running a task; enabling the server, searched for as a result of the search, to access the external disk device; and booting the server from the external disk device. | 02-16-2012 |
20120042070 | SYSTEM AND METHOD FOR PROMOTING AND TRACKING PHYSICAL ACTIVITY AMONG A PARTICIPATING GROUP OF INDIVIDUALS - A system and method of tracking physical activity of a person in order to help motivate that person to add more exercise to their lives. Each participant is provided a motion sensor that detects forces incurred by the participant. The motion sensor creates electronic data that corresponds to the forces detected. The data is analyzed to determine whether or not exercise has been performed. The analysis can also determine the type of exercise performed, when the exercise was performed, and the duration of the exercise performed. | 02-16-2012 |
20120047247 | SYSTEM AND METHOD FOR ALLOWING DATA TRAFFIC SEARCH - A system and method for allowing data traffic search involves capturing data traffic to and from a user device on at least one communication path between the user device and end devices and indexing data of the captured data traffic based on parameters, wherein the data of the captured data includes data of different types of data traffic with respect to at least one of protocol and application. As a result, the system and method allows a user to search the indexed data for the different types of data traffic to and from the user device. | 02-23-2012 |
20120047248 | Method and System for Monitoring Flows in Network Traffic - A method and system for correlating web content with content providers to determine the origin of the content such that it is not necessary to look inside the information exchange. The method and system maintains sequences of reference points, which are ordered lists of content providers accessed by subscribers over time, and correlates the internet content applications, such as video, found in network traffic to the sequence of reference points accessed by subscribers to determine the origins of the content even when the content being delivered by third-party content delivery networks. | 02-23-2012 |
20120047249 | METHOD OF DETERMINING EQUIVALENT SUBSETS OF AGENTS TO GATHER INFORMATION FOR A FABRIC - Techniques for identifying and selecting equivalent sets of agents with defined capabilities to perform certain actions are disclosed herein. In one embodiment, determining agents to gather information for a storage area network fabric may be performed through the use of fabric discovery operations which identify agents capable of performing various actions within the fabric. From the determined capabilities of the agents, a dynamic capability grid may be populated to assist with the generation of a list of equivalent subsets to perform the various actions. The most efficient set of agents from each equivalent subset may then be selected to perform actions, with other sets of agents in the equivalent subset available as secondary choices in case of an unexpected failure. For example, a fabric probe may be executed in a storage area network using discovered agents from a list of equivalent subsets to most efficiently accomplish network operations such as zoning and topology. | 02-23-2012 |
20120047250 | SCALABILITY BREAKPOINT CALCULATOR FOR A SOFTWARE PRODUCT - During a technique for estimating a scalability breakpoint of a software product, performance load tests of the software product are performed with different numbers of simulated concurrent users. For a given number of simulated concurrent users, a performance load test may include an associated set of transactions that are executed by the software product. Furthermore, during the performance load tests performance metrics for the transactions in the associated sets of transactions are measured. Then estimated total performance metrics for the transactions in the associated sets of transactions for the different numbers of simulated concurrent users are determined based on the measured performance metrics and the associated sets of transactions. Next, using the determined estimated total performance metrics, the estimated scalability breakpoint is calculated. | 02-23-2012 |
20120047251 | MONITORING DOMAIN ALLOCATION PERFORMANCE - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance metric information to determine an allocation of one or more domains to be associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent requests for the two or more embedded resources using each of a variety of alternative allocations of domains associated with the two or more embedded resources. The processing device may also consider a number of factors, including domain selection criteria obtained from an original content provider. Aspects of systems and methods for generating recommendations to use a particular allocation of domains to process a subsequent request corresponding to the two or more embedded resources are also provided. | 02-23-2012 |
20120047252 | SYSTEM FOR DETECTION OF CONTENT SERVERS AND CACHING POPULAR CONTENT THEREIN - An apparatus comprising a network interface to at least a first portion of a network and at least a second portion of a network. A deep-packet-inspection (DPI) unit identifies at least a source of content, the DPI unit further inspecting one or more packets provided from the identified at least a source of content over the first portion of the network, each packet having at least a specific source address and a specific destination address. A storage stores at least a portion of the content. A content delivery unit receives a request from the second portion of the network for requested content from the identified at least a source of content and responsive thereto provides the requested content, or portions of the requested content, from the storage to the second network if the requested content, or portions of the requested content, is stored in the storage, or otherwise sending the request over the first portion of the network to the identified at least a source of content for the requested content, or missing portions of the requested content. | 02-23-2012 |
20120047253 | NETWORK TOPOLOGY DETECTION USING A SERVER - Various technologies and techniques are disclosed for automatically detecting whether a local network that a computer is connected to is a public or private network by utilizing a trusted online service and/or heuristics. Techniques are also described for detecting whether or not two computers are connected to the same local area network. | 02-23-2012 |
20120047254 | MEDIATION SYSTEM AND METHOD FOR PROCESSING EVENT RECORDS - A mediation method and a mediation system divided into independent node components that process event records independently of the other components of the system. In addition, the system is provided with at least one node manager component that monitors the functioning of the node components. Each of the independent node components operates according to its own settings and is thus self-contained and capable of continuing operation even though some of the other components are temporarily inoperative. The system comprises audit counters providing counts relating to the processed event records, and the node manager is configured to check whether the counts of the audit counters match, in order to ensure that no event records are lost in the mediation system. | 02-23-2012 |
20120047255 | PROBLEM DETERMINATION IN DISTRIBUTED ENTERPRISE APPLICATIONS - Problem determination in an enterprise computer system in a distributed environment is provided. Information is obtained regarding the enterprise applications, and high-level information is presented to a user, with one or more prompts provided to the user for more detailed information. In response to a request from a user for more detailed information about the application, more detailed information is provided to the user. Several levels of more detailed information about applications, including information as to individual threads, is available. The method also includes the steps of receiving instructions from an administrator to establish an account for a user, associating one or more servers with the account, and providing access to the corresponding user only to the associated servers. In the method, searches may be conducted for strings and requests, and identified strings and requests may be sorted by a variety of criteria. | 02-23-2012 |
20120047256 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR DETERMINING AN EVENT GENERATOR TYPE - Human interaction with a webpage may be determined by processing an event stream generated by the client device during the webpage interaction. A classification server receives the event stream and compares components of the event stream, including components of an event header message, with prerecorded datasets. The datasets include prerecorded event streams having a known interaction type. Training clients may be provided for generating the prerecorded datasets. | 02-23-2012 |
20120047257 | SYSTEM AND METHOD FOR PROCESSING USER INTERFACE EVENTS - A system and method to detect and prevent non-human interaction between a client and a web server invokes an effect to change the event generation behavior at the client. Subsequent event streams from the client to the server are analyzed to determine whether the event streams contain events corresponding to expected reactions of a human operator at the client to the effect. Indications of non-human behavior may invoke more direct human testing, for example using a dynamic CAPTCHA application, or may cause a termination of the client/URL interaction. | 02-23-2012 |
20120059927 | APPARATUS AND METHOD FOR WIRELESS AUTONOMOUS INFANT MOBILITY DETECTION, MONITORING, ANALYSIS AND ALARM EVENT GENERATION - Systems and methods for detecting, monitoring and profiling/correlating a subject's motions, such as rollovers, falls, shaking and tremors are disclosed. In particular, an infant's mobility event may cause critical event processing indicating that an infant has rolled over and may be suffocating. Such an event is classified as a Sudden Infant Death Syndrome (SIDS)-like event. The system may include a wireless pendant device and a wireless monitor server. The wireless pendant device is configured to measure acceleration motion of a subject, to generate acceleration data from the acceleration motion and to communicate the acceleration data with the wireless monitor server. The wireless monitor server is configured to analyze the acceleration data communicated by the wireless pendant device and to provide an output related to the analysis. | 03-08-2012 |
20120059928 | Mobile Communication Terminal and Network System Including the Same - A mobile communication terminal includes a network knowledge manager collecting information required to seize an opportunity to execute an application by forming a network with a plurality of mobile communication terminals, and when a condition for executing a specific application is satisfied through the collected information, informing that the condition is satisfied, and a network instance manager generating a network instance which is a component of a network supporting the specific application, and performs management of the generated network instance including maintenance of the network instance when the specific application is executed by the network knowledge manager. A network can be promptly and ephemerally formed for a plurality of mobile communication terminals including smart phones to execute one application simultaneously, thereby reducing network management traffic required to form and maintain the network. | 03-08-2012 |
20120059929 | TECHNIQUES FOR MAINTAINING CURRENT CONTENT - Techniques, including systems and methods, for maintaining current content are described and suggested herein. In an embodiment, information from a plurality of information sources is received. Communications between the computer system and a network are monitored. Subsequent to an inability to communicate over the network, an ability to communicate over the network is detected. Responsive to detecting the ability to communicate over the network, information from one or more of the information sources is requested. The one or more information sources may be servers providing web pages. | 03-08-2012 |
20120059930 | REACTIVE MONITORING OF GUESTS IN A HYPERVISOR ENVIRONMENT - A system, method and computer program product for detecting and reacting to a network discrepancy within a data center network environment. The method comprises monitoring network traffic between a first computer configured as a first hypervisor inter-networked within the data center network environment and a second computer inter-networked within the data center network environment in order to detect a presence of a predetermined condition representing a presence of the network discrepancy in the data center network environment between a recorded state of the data center network environment and an observed state of the data center network environment. The monitoring includes determining the observed state of the data center network environment using one of: polling, event-based or a combination thereof. The method also comprises rectifying, upon the detection of the presence of the predetermined condition, an effect associated with the presence of the predetermined condition in the data center network environment. | 03-08-2012 |
20120059931 | SYSTEM AND METHODS FOR A REPUTATION SERVICE - A system comprises a processor and storage containing software. When executed, the software causes the processor to receive a set of metrics to be monitored, cause to be monitored the set of metrics, and filter the monitored metrics per a sharing policy to produce a subset of the set of metrics. | 03-08-2012 |
20120059932 | APPLYING HOME NETWORK TECHNOLOGIES TO A WIDE AREA NETWORK - In a first embodiment of the present invention, a method for allowing a device on a home network to access a service outside the home network is provided, the method comprising: receiving, at a server outside the home network, a registration message from the service; storing details about the service in a storage accessible by the server, wherein the details include an address for the service; receiving, at the server, a request to locate a service, wherein the request is received from the home network; locating details about a matching service stored in the storage, wherein the matching service meets criteria specified in the request from the home network; and providing the details about the matching service to the home network, enabling the device to directly contact the matching service using the address specified in the details about the matching service. | 03-08-2012 |
20120059933 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK - Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data. | 03-08-2012 |
20120066370 | BUSINESS PROCESSES TRACKING - Systems, methods, and machine readable and executable instructions are provided for business process tracking. Business process tracking can include collecting data from network traffic. Instances of the data can include a number of events, a session identifier, and user information. The data can be filtered to a reduced number of events with a network monitoring engine. A number of business process event identifiers corresponding to the reduced number of events can be defined in a network adaptor. An individual instance of the business process can be distinguished according to the session identifier and the user information. The individual instance of the business process can be tracked independent of a number of applications running on the network. | 03-15-2012 |
20120066371 | Server Load Balancer Scaling for Virtual Servers - Techniques are provided herein for receiving information at a device in a network indicating a load level for one or more server load balancers that are configured to manage network traffic load for a plurality of servers. The information represents an aggregate load across the plurality of servers. A determination is made as to whether the load level for one or more of the server load balancers exceeds a predetermined threshold. In response to determining that the load level for one or more of the server load balancers exceeds the predetermined threshold, an additional load balancer is activated that is configured to manage network traffic load for the plurality of servers. In response to determining that the load level for one or more of the server load balancers does not exceed the predetermined threshold, an additional load balancer is deactivated that was configured to manage network traffic load for the plurality of servers. | 03-15-2012 |
20120066372 | SELECTIVE REGISTRATION FOR REMOTE EVENT NOTIFICATIONS IN PROCESSING NODE CLUSTERS - An event notification system for distributed processing systems provides remote and local node event notification in systems that require local registration of an event consumer in order produce an event notifications. To provide notification of an event occurring on a remote node, either event consumers on all nodes in the cluster register locally to receive event notifications and specify that the event is a cluster event, in which case the nodes send notification of their locally-occurring events to all nodes, or remote registrations are accepted at nodes and if a local consumer for the event is not present, a listener thread registers as an event consumer. The listener thread sends the event notifications to the remote nodes registered as consumers for the event by observing communication between the event producer and the local consumer, or receiving the event notifications directly if there is no local consumer. | 03-15-2012 |
20120066373 | PERSONAL CLOUD COMPUTING WITH SESSION MIGRATION - Methods and systems associated with personal cloud computing (PCC) are disclosed herewith. In embodiments, a method may include receiving, by a PCC client device, a message from a PCC server. The message may include information for migrating a session of an application executing on another PCC client device off the other client device. In response, an application may be launched, by the client device, to migrate the session onto the client device, using the information included in the message. In embodiments, a PCC server may be configured to receive a request from a PCC client device to migrate a session of an application executing on the client device off the client device; and in response, to send a message to another PCC client device equipped to launch an application on the other client device to migrate the session onto the other client device. The message may include information for the migration. Other embodiments are also disclosed and claimed. | 03-15-2012 |
20120066374 | LOCATING NETWORK RESOURCES - A method for locating network resources includes determining a distance between a client device and each of a plurality of network resources. For each of the network resources, a subset of a plurality of location tags is selected. The subset for a given network resource is selected according to the distance between the client device and that network resource. The method also includes, for each of the network resources, causing a display by the client device, of values for the subset of location tags selected for that network resource. | 03-15-2012 |
20120066375 | Combining Data Associated with Hardware Resources and Application Transactions - To monitor networked application transactions, the application transactions are sampled and data related thereto are collected. The collected data is associated with a global network identifier corresponding to one or more physical or virtual network interface devices. One or more subsets of the collected data are transmitted in packets. The global network identifier may be a layer | 03-15-2012 |
20120066376 | MANAGEMENT METHOD OF COMPUTER SYSTEM AND MANAGEMENT SYSTEM - To provide a fault analysis result classification function capable of reducing the time required to eliminate a fault in a monitoring target apparatus. The fault analysis results (fault cause candidates) obtained during the fault analysis processing are classified for the influence range of each of the fault cause candidates by analyzing which of the other fault cause candidates relate to the fault events of the apparatus abnormal state, which are used as the basis to derive the each of the fault cause candidates. Further, the classification results are displayed on a GUI. | 03-15-2012 |
20120066377 | MANAGED DEVICE AND SELF-OPTIMIZATION METHOD AND SYSTEM - A managed unit device, a self-optimization method and system are provided. The method includes: executing, by a managed unit, a self-optimization according to a self-optimization trigger rule. The self-optimization trigger rule is created by a managing unit according to a self-optimization capability supported by the managed unit. The technical solution avoids completing the self-optimization in a mode in which a user sends a corresponding configuration modification command, thereby greatly reducing the complexity of a self-optimization process the manual processing time of the self-optimization. | 03-15-2012 |
20120066378 | GENERIC, MULTI-INSTANCE METHOD AND GUI DETECTION SYSTEM FOR TRACKING AND MONITORING COMPUTER APPLICATIONS - Presented is a system and method for monitoring events derived from a computer target application presentation layer including the steps of providing, independent of recompiling the target application's source code, a script running at a level within the target application. The script scans run-time instantiations of objects of the target application, and allocates structures in real-time to the object instantiations. These allocated structures are adapted to create a reflection of the target application structure, which is used along with detected object instantiations that match a predetermined object structure to capture a portion of an environmental spectrum of the detected object. Further, the system can process state machine events occurring on at least one of a server machine and a client/localized machine, correlate the state machine events with the environmental spectrum, and deduce a user experience based on the correlated state machine events. | 03-15-2012 |
20120066379 | METHOD AND SYSTEM FOR NOTIFYING NETWORK RESOURCE UPDATES - A method is disclosed for notifying a user of network resource updates for a terminal with a browser. The method includes identifying a plurality of network resources from multiple sources to be dynamically monitored and dynamically monitoring the identified network resources based on a trigger mechanism. The method also includes determining whether there are updates in the monitored network resources and, when it is determined that there are updates in the monitored network resources, notifying the user according to a preset update notification means and the multiple sources of updated network resources. | 03-15-2012 |
20120066380 | UPDATE NOTIFICATION METHOD AND SYSTEM - An update notification method is provided. The method includes taking snapshots of a network resource and capturing specific contents of the network resource. The method also includes comparing specific contents of two consecutive snapshots of the network resource and, if there is a change in the specific contents of the network resource, notifying a user that contents of the network resource have been updated. | 03-15-2012 |
20120066381 | NETWORK DNA - Network DNA may be determined for a computer network that taxonomically classifies the computer network. Network DNA may include derived network DNA components and raw network DNA components. Raw network DNA components may be acquired from local or remote sources. Derived network DNA components may be generated according to derived network DNA component specifications. Derived network DNA component specifications may reference raw network DNA components. Network DNA determined for the computer network may include a network species component capable of indicating network species classifications for computer networks. Network species classifications may include enterprise network, home network and public place network. Network species classifications may be determined as a function of network security, network management and network addressing. One or more network DNA stores may be configured to store network DNA for computer networks. Network DNA stores may store network DNA history as well as current network DNA. | 03-15-2012 |
20120066382 | Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals - A method for lawfully intercepting communication IP packets exchanged between terminals is provided. The method involves assigning an IP address associated with a telecommunication service provider to, for example, a sending terminal for use as its IP address in communications with a receiving terminal, the telecommunication service provider providing SIP proxy services for establishing communication between the sending and receiving terminals. The communication IP packets are intercepted in such a way that the terminals are unaware of the interception. | 03-15-2012 |
20120066383 | METHOD AND APPARATUS FOR MONITORING FUNCTIONS OF DISTRIBUTED DATA - A method and system of monitoring computer network activity including determining a first phase frequency estimate, associated with a first frequency vector, determined in response to receiving first bits from a first plurality of remote computer network devices. The first bits received from the first plurality of remote devices in response to satisfying a first activity threshold. Also, determining a second phase frequency estimate associated with a second frequency vector and determined in response to receiving second bits from a second plurality of remote devices. The second bits received from the second plurality of remote devices in response to a second activity threshold being satisfied. The second phase frequency estimate determined in response to the first phase frequency estimate exceeding a global threshold. Further, providing a frequency moment F | 03-15-2012 |
20120066384 | HOME APPLIANCE MONITORING SYSTEM - A home appliance monitoring system includes: a plurality of home systems respectively including a central managing device configured to collect monitoring information from a home appliance; and a center server connected to the central managing device of each home system. The center server calculates the current load amount, and sends an activating instruction signal or a deactivating instruction signal to each central managing device on the basis of the current load amount. The central managing device sets its communication status to an activated status in response to receiving the activating instruction signal, and sets its communication status to a deactivated status in response to receiving the deactivating instruction signal. The home system stores the monitoring information while the communication status is the deactivated status. The home system sends the stored monitoring information to the center server when the communication status is switched from the deactivated status to the activated status. The home system sends the monitoring information to the center server while the communication status is the activated status. The center server stores the monitoring information received from the home system. | 03-15-2012 |
20120072570 | Modifying Network Site Behavior - Disclosed are various embodiments for modifying network site behavior. At least one session-level performance metric associated with a client is determined. The one or more session-level performance metrics are determined from one or more latency times. Each one of the latency times represents a time elapsed between a sending of a network page request in the client and a rendering in the client of a network page received from a network page server in response to the network page request. A response to a next network page request from the client is modified according to the one or more session-level performance metrics in order to adjust a next latency time for the client. | 03-22-2012 |
20120072571 | VALIDATING THE RESILIENCY OF NETWORKED APPLICATIONS - Techniques are disclosed for validating the resiliency of a networked application made available using a collection of interacting servers. In one embodiment, a network monitoring application observes each running server (or application) and at unspecified intervals, picks one and terminates it. In the case of a cloud based deployment, this may include terminating a virtual machine instance or terminating a process running on the server. By observing the effects of the failed server on the rest of the network application, a provider can ensure that each component can tolerate any single instance disappearing without warning. | 03-22-2012 |
20120072572 | Methods for Balancing Brand Perception on Computer Network Information Sources - Method of present invention provides for subscribing subscribers to a brand notification service, monitoring the computer network information sources for the brand mention, determining references located on the computer network information sources and containing the brand mention, scoring the references according to a predetermined scoring approach resulting in a brand mention score, determining whether the brand mention score is within a predetermined score range, and if the score is within the predetermined score range, then notifying the subscribers of the brand mention and supplying the subscribers with links to the references containing the brand mention. | 03-22-2012 |
20120072573 | Systems for Balancing Brand Perception on Computer Network Information Sources - System of present invention comprises means for subscribing subscribers to a brand notification service, means for monitoring the computer network information sources for the brand mention, means for determining references located on the computer network information sources and containing the brand mention, means for scoring the references according to a predetermined scoring approach resulting in a brand mention score, means for determining whether the brand mention score is within a predetermined score range, and means for notifying the subscribers of the brand mention and supplying the subscribers with links to the references containing the brand mention. | 03-22-2012 |
20120072574 | Method and System for Detecting Common Attributes of Network Upgrades - A system and method identify a set of rules for determining a commonality of attributes across different behavior changes for a network. The system performs the method by receiving a set of data correlating network triggers to performance changes of one or more network devices. The set of data further includes an indication of a sign of the performance change for each of the network devices based on the triggers. The method further includes extracting a set of rules relating to a set of relationships between the triggers and the performance changes. The rules identify a commonality of the performance changes for multiple network devices based on the triggers. | 03-22-2012 |
20120072575 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR AGGREGATING NETWORK APPLICATION PERFORMANCE METRICS BY PROCESS POOL - Provided are methods and computer program products for aggregating and reporting network application performance metrics by process pool. Methods may include mapping ones of a plurality of processes into one of at least one process pool; and aggregating, for each of the process pools, performance metrics generated for each of the plurality of processes mapped into that process pool. | 03-22-2012 |
20120072576 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR STORING GENERATED NETWORK APPLICATION PERFORMANCE DATA - Provided are methods and computer program products for monitoring application performance in a networked device. Methods may include collecting performance data corresponding to at least one application running on the networked device; generating multiple metrics based on the collected performance data; generating an event incorporating at least one of the multiple metrics; and storing the event and an associated timestamp in a persistent data store. Methods may also include transmitting a listing of one or more persistent data store files responsive to receiving a query from a network health data processing application for existing persistent data store files, and transmitting a specified persistent data store file responsive to receiving a request for the specified persistent data store file by a network health data processing application. | 03-22-2012 |
20120072577 | NETWORK DEVICE MANAGEMENT WITH SELF LEARNING CAPABILITY TO EXTRACT INFORMATION FROM A DEVICE - A method and apparatus for extracting information from a network device. The method includes retrieving first device information from the network device using a first communication protocol, and attempting to determine a parameter value of interest based on the first device information. When the step of attempting to determine the parameter value of interest based on the first device information is unsuccessful, second device information is retrieved from the network device using a second communication protocol, and an attempt is made to determine the parameter value of interest based on the first device information and the second device information. | 03-22-2012 |
20120072578 | INTEGRATING EXTERNAL AND CLUSTER HEAT MAP DATA - The present invention extends to methods, systems, and computer program products for integrating external and cluster heat map data. Embodiments of the invention include a proxy service that manages (e.g., asynchronous) communication with cloud nodes. The proxy service simulates packets to on-premise services to simplify the integration with an existing heat map infrastructure. The proxy maintains a cache of performance counter mappings and timestamps on the on-premise head node to minimize the impact of latency into heat map infrastructure. In addition, data transfer is minimized by mapping a fixed set of resource based performance counters into a variable set of performance counters compatible with the on premise heat map infrastructure. | 03-22-2012 |
20120072579 | MONITORING CLOUD-RUNTIME OPERATIONS - The present invention extends to methods, systems, and computer program products for monitoring cloud-runtime operations. Embodiments of the invention include an infrastructure for initiating and monitoring (e.g., asynchronous) cloud-runtime operations. In some embodiments, cloud-runtime operations are included in a sequence of operations (e.g., in a workflow) for deploying or purging cloud based resources for a customer premise. Accordingly, monitored operations include creating cloud deployments, growing cloud deployments, shrinking cloud deployments, and deleting cloud deployments. Cloud deployments can be reliably deleted when a workflow is aborted, to prevent accrual of unexpected charges. | 03-22-2012 |
20120072580 | SYSTEM AND METHOD FOR IDENTIFYING TRANSIENT FRIENDS - A system and method for identifying transient friends for a social network of a user are provided. A transient friend processing function obtains locations of a number of users or locations otherwise associated with the number of users. In order to identify transient friends for a first user, the transient friend processing function identifies other users associated with locations within a proximate area of the first user. For each of the identified users, the transient friend processing function compares a user profile of the first user to a user profile of the identified user to determine whether to add the identified user as a transient friend of the first user. If the transient friend processing function determines that the identified friend is to be added as a transient friend of the first user, the identified friend is then added as a transient friend of the first user. | 03-22-2012 |
20120072581 | GENERIC CONTROL LAYER IN A CLOUD ENVIRONMENT - A computing system implemented method, in one embodiment, can include a cloud control module receiving a constraint for cloud architecture. In addition, the method can include the cloud control module receiving a plurality of cloud service provider capabilities. Furthermore, the method can include the cloud control module filtering the plurality of cloud service provider capabilities to identify a cloud service provider capable of satisfying the constraint. Moreover, the method can include the cloud control module outputting an instruction for a resource from the cloud service provider. | 03-22-2012 |
20120072582 | METHOD, APPARATUS AND PROGRAM STORAGE DEVICE FOR SCHEDULING THE PERFORMANCE OF MAINTENANCE TASKS TO MAINTAIN A SYSTEM ENVIRONMENT - A method, apparatus and program storage device for scheduling the performance of maintenance tasks to maintain a system environment is disclosed. A parameter for a computer system is monitored to detect a need to perform at least one maintenance task. At least one maintenance task is performed when the monitoring detects the need to perform at least one maintenance task or at least once within a predetermined period. | 03-22-2012 |
20120072583 | REAL-TIME ACTIVITY MONITORING AND REPORTING - In order to track activities in a computerized system with client-server or other communications, a system configuration is needed which monitors, logs and reports traffic. This is somewhat akin to but not entirely similar a firewall. Thus, the invention contemplates a real-time, platform-independent, rule-based activity monitor for detecting a particular activity of interest as it occurs and for reporting such activity and the user substantially as fast. | 03-22-2012 |
20120072584 | COMPUTER PRODUCT, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD - A computer-readable, non-transitory medium stores therein a management program that causes a computer to execute a procedure. The procedure includes detecting an increase in access frequency of a first apparatus by a second apparatus; changing a first process of acquiring from the first apparatus and independently for each access of the first apparatus by the second apparatus, information indicating access particulars, to a second process of collectively acquiring from the first apparatus, the information indicating access particulars, if an increase in the access frequency is detected at the detecting; and acquiring the information indicating access particulars, where the information indicating access particulars is acquired independently according to the first process, and is acquired collectively according to the second process, after the first process is changed to the second process at the changing. | 03-22-2012 |
20120072585 | PCC Control at PCRF Failure - A method for policy control in an infrastructure network comprising a Gateway (GW) an Access Function (AF), and at least one Policy and Charging Rules Function (PCRF) is provided. In some embodiments, the method includes: (a) the GW establishing a Gx or Gxx session in order to set the current PDN connection under PCC control, (b) the GW further providing information about the current PDN connection to a first PCRF, (c) the first PCRF performing authorization and policy decision based on the PDN connection information and sends it together with restoration instructions to the GW, (d) the GW when detecting that the first PCRF is not available, applying the restoration instructions, said instructions requiring the GW to try to regain PCC control and/or requiring the GW to gracefully delete the services associated with the PCC control. | 03-22-2012 |
20120072586 | MANAGEMENT APPARATUS, CONTROL METHOD THEREOF AND INFORMATION PROCESSING SYSTEM - In order to efficiently manage the operating information of a network device while maintaining the accuracy, a management apparatus that acquires operating information from a network device and manages an operating history, the apparatus comprises a storage unit that stores a first table, a second table and a third table, the first table storing, for each identifier, first information indicating a time when the usage frequency information was first acquired and second information indicating a time when the usage frequency information was last acquired, the second table storing the usage frequency information per identifier acquired from the network device, and the third table storing, as history information, information indicating a time when the usage frequency information per identifier acquired from the network device was acquired as well as the usage frequency information per identifier. | 03-22-2012 |
20120072587 | MANAGED DEVICE, DEVICE MANAGEMENT APPARATUS, AND DEVICE MANAGEMENT SYSTEM - A device management system includes a managed device and a device management apparatus. The managed device includes a detection unit detecting a status change indicating a power-on or a network setting change of the managed device, a generating unit generating alert information based on the detected status change, and a transmitting unit configured to transmit the generated alert information to the device management apparatus. The device management apparatus includes a registration/update determining unit comparing the alert information with device management information and determining, based on the comparison result, whether it is necessary to perform a registration process or an update process on the device management information, and a registration/updating unit registering information extracted from the alert information in the device management information or updating a corresponding information item in the device management information with the information extracted from the alert information according to the determination result. | 03-22-2012 |
20120072588 | SYSTEMS AND METHODS FOR LOAD BALANCING VIA A PLURALITY OF VIRTUAL SERVERS UPON FAILOVER USING METRICS FROM A BACKUP VIRTUAL SERVER - The present invention provides methods and systems for performing load balancing via a plurality of virtual servers upon a failover using metrics from a backup virtual server. The methods and systems described herein provide systems and methods for an appliance detecting that a first virtual server of a plurality of virtual servers having one or more backup virtual servers load balanced by an appliance is not available, identifying at least a first backup virtual server of a one or more backup virtual servers of the first virtual server is available, maintaining a status of the first virtual server as available in response to the identification, obtaining one or more metrics from the first backup virtual server of a one or more backup virtual servers, and determining the load across the plurality of virtual servers using the metrics obtained from the first backup virtual server associated with the first virtual server. | 03-22-2012 |
20120072589 | Information Processing Apparatus and Method of Operating the Same - Using a service server list containing addresses of servers within a service system and an application list containing names of active applications within the service system, addresses of servers on which the active applications are running, and communication source addresses and communication destination addresses of the active applications, the following processes are carried out: specifying applications of a first layer in the service system from among applications lying within the service system; specifying applications of a second or subsequent layer in the service system from the application list and from addresses of servers on which the applications of the first layer are running; and judging applications having the same application name among applications belonging to the same layer as being of the same role for aggregation. | 03-22-2012 |
20120072590 | Real-Time Notification of Presence Availability - Embodiments of the present invention provide a system and method for providing presence status information of a first user to a second user. The system includes a presence server for storing presence status information of the first user. The presence server is configured to detect a change in the presence status of the first user. The presence server also informs a notification server of a change in the presence status of the first user. The notification server sends a notification message to a communication device of the second user. The notification message contains current presence status information of the first user. Other systems and methods are also provided. | 03-22-2012 |
20120072591 | Method and System To Optimize Efficiency When Managing Lists of Untrusted Network Sites - A computer readable storage medium including a set of instructions executable by a processor, the set of instructions operable to determine if a network location included in a request to connect to the network location, is included in a first list of untrusted network locations stored on the client computer and send a request to determine if the network location is included in a second list of untrusted network locations stored remotely from the client computer when it is determined that the network location is not included in the first list. | 03-22-2012 |
20120072592 | Method and Arrangement for Implementing Policy Rules in Peer-to-Peer Communication - Method and apparatuses for controlling a peer-to-peer communication involving media communication between a subscriber (A) and one or more opposite peers (B, C, D). When a policy node ( | 03-22-2012 |
20120072593 | MULTIMEDIA CONTENT FILE MANAGEMENT SYSTEM FOR AND METHOD OF USING GENETIC INFORMATION - A multimedia content file management system for and a method of monitoring copyright and watching ratings in real time under the circumstance of the multimedia file sharing service using genetic information are disclosed. | 03-22-2012 |
20120079094 | System and Method for Data Transfer of Object Properties - A system, method, and computer readable medium. A method includes monitoring calls from a client system to a server system for properties associated with an object, each call having a context. The method includes storing call data related to the calls as a property-retrieval history, including storing the context of each call. The method includes analyzing a policy associated with at least one context based on the property-retrieval history. The method includes updating the policy associated with the at least one context based on the analysis, and transferring data corresponding to the at least one context based on the policy. | 03-29-2012 |
20120079095 | CLOUD-BASED DEVICE SYNCHRONIZATION - A logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices. Such communication enables content such as applications and data to be synchronized between various devices, where the synchronization takes into account the capabilities of each device to provide versions and/or formats of that content that are appropriate for each device. A user purchasing an additional device, for example, can have various applications and other content automatically installed or copied over to the additional device, but with versions or formats that take advantage of, and are appropriate for, the capabilities of that additional device. Further, the intelligent communication via a logically centralized service can enable such devices to interact even though those devices might utilize different protocols and/or formats, and might otherwise not be able to communicate or have ever have been tested together. | 03-29-2012 |
20120079096 | NETWORKED DEVICES FOR MONITORING UTILITY USAGE AND METHODS OF USING THE SAME - Systems, methods, and devices are presented herein for monitoring usage of at least one utility by a utility consuming system. One aspect of the present disclosure is directed to a method of managing information in a utility monitoring system that includes a host computer and an array of monitoring devices operatively coupled together on a peer-to-peer network. The array of monitoring devices includes first and second monitoring devices each with a respective memory. The first and second monitoring devices are configured to receive and transmit data. The method includes: storing data received by the first monitoring device in the first memory; storing data received by the second monitoring device in the second memory; responsive to the first memory being below a threshold storage capacity, transferring data received by the second monitoring device to the first monitoring device; and storing the transferred data in the first memory. | 03-29-2012 |
20120079097 | PROACTIVE IDENTIFICATION OF HOTSPOTS IN A CLOUD COMPUTING ENVIRONMENT - The present invention proactively identifies hotspots in a cloud computing environment through cloud resource usage models that use workload parameters as inputs. In some embodiments the cloud resource usage models are based upon performance data from cloud resources and time series based workload trend models. Hotspots may occur and can be detected at any layer of the cloud computing environment, including the server, storage, and network level. In a typical embodiment, parameters for a workload are identified in the cloud computing environment and inputted into a cloud resource usage model. The model is run with the inputted workload parameters to identify potential hotspots, and resources are then provisioned for the workload so as to avoid these hotspots. | 03-29-2012 |
20120079098 | Performance Monitoring of a Computer Resource - A method, computer program product, and system for performance monitoring of a computer resource utilized by a user community. The computer resource is monitored, and sets of performance metrics characterizing a state of the computer resource are collected and analyzed to detect performance incidents. External information such as contextual information and user annotations are also collected and analyzed. If a performance incident is detected, its set of performance metrics and associated external information are used to search a data repository of past performance incidents for related incidents, in order to identify critical performance incidents, determine recommended solutions for the performance incidents, and determine performance forecasts for the computer resource. | 03-29-2012 |
20120079099 | SYSTEM AND METHOD FOR A CONTEXT-BASED RICH COMMUNICATION LOG - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user. The context-based rich communication log can be used as part of at least one of a predictive contacts application, a topic analyzer, a conferencing application, and a personal communication assistant, for example. | 03-29-2012 |
20120079100 | ELECTRONIC DEVICE DIAGNOSTIC SYSTEMS AND METHODS - Embodiments of methods of evaluating a wireless communication device using a computing system are provided. The embodiments include establishing a data connection between the wireless communication device and the computing system, and receiving device-specific information associated with the wireless communication device. The device-specific information includes at least one identifier associated with the wireless communication device. The device-specific information is provided to a server over a network, and additional device-specific information associated with evaluating the wireless communication device is received in response to providing the device-specific information to the server. Finally, in response to receiving the additional device-specific information, diagnostic-related information and a representation of the additional device-specific information are displayed on the computing system. | 03-29-2012 |
20120079101 | Behavioral Classification of Network Data Flows - Methods, apparatuses and systems facilitating enhanced classification of network traffic based on observed flow-based and/or host-based behaviors. | 03-29-2012 |
20120079102 | Requester Based Transaction Status Reporting in a System with Multi-Level Memory - A system has memory resources accessible by a central processing unit (CPU). One or more transaction requests are initiated by the CPU for access to one or more of the memory resources. Initiation of transaction requests is ceased for a period of time. The memory resources are monitored to determine when all of the transaction requests initiated by the CPU have been completed. An idle signal accessible by the CPU is provided that is asserted when all of the transaction requests initiated by the CPU have been completed. | 03-29-2012 |
20120079103 | METHOD AND SYSTEM FOR TRACKING SCREEN ACTIVITIES - Techniques to facilitate a system to capture, process, and archive a series of user interactive events and subsequently retrieve the stored user interactive events are disclosed. The captured information is indexed and stored for future access either on a terminal device or an accessible remote server device. | 03-29-2012 |
20120079104 | SYSTEM AND METHOD OF MIDDLEBOX DETECTION AND CHARACTERIZATION - A computer-implemented system and method to detect and characterize middleboxes is disclosed. Embodiments of the system and method include a middlebox detection engine to provide a plurality of middlebox detection modules, and to use at least one middlebox detection module of the plurality of middlebox detection modules to determine if a middlebox exists on a path between a first communicating entity of a network and a second communicating entity of the network. | 03-29-2012 |
20120079105 | Application Processor Apparatus and Method for Monitoring A Wireless Communication Network - An application processor of a distributed architecture for monitoring mobile communication in a wireless communication network is claimed. Systems and methods enable receiving reporting data related to events that occur in a wireless network from the perspective of the wireless device. The data management system is capable of generating a data reporting profile and communicating with a wireless device. The application processor is capable of monitoring and reporting a plurality of conditions within the wireless device and sending and receiving communications from the data management system. The baseband processor is capable of monitoring and reporting plurality of conditions on the wireless network and sending and receiving communications with the application processor. Both the application processor and the baseband processor monitor and report the conditions of the device and the network by applying a series of logical rules found within the data reporting profile. | 03-29-2012 |
20120079106 | System and Method for Interfacing with Heterogeneous Network Data Gathering Tools - A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server invokes the heterogeneous information sources via a uniform communications interface to gather information about the network, and converts the information gathered by the information sources into a normalized data format such as, for example, into XML (Extensible Markup Language). The converted information is then stored in an audit repository for security and regulatory policy assessment, network vulnerability analysis, report generation, and security improvement recommendations. | 03-29-2012 |
20120079107 | System and Method for Interfacing with Heterogeneous Network Data Gathering Tools - A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server invokes the heterogeneous information sources via a uniform communications interface to gather information about the network, and converts the information gathered by the information sources into a normalized data format such as, for example, into XML (Extensible Markup Language). The converted information is then stored in an audit repository for security and regulatory policy assessment, network vulnerability analysis, report generation, and security improvement recommendations. | 03-29-2012 |
20120079108 | SYSTEM AND METHOD FOR COLLECTING APPLICATION PERFORMANCE DATA - Systems and methods are provided for collecting application performance data. The system ( | 03-29-2012 |
20120079109 | SYSTEM AND METHOD OF ANALYSING TRANSFER OF DATA OVER AT LEAST ONE NETWORK - A system and method are disclosed for analysing transfer of data over at least one network, including a device configured to select a subset of users from a user base of at least one network. The system can include a device configured to analyse data relating to potential unlicensed data transfer by the subset of users, and a device configured to generate an estimate of unlicensed data transfer by the user base based on the analysis of data of the subset of users. | 03-29-2012 |
20120084429 | Methods and Apparatus for Identifying Peers on a Peer-to-Peer Network - Methods and apparatus are provided for identifying participants in a peer-to-peer network, such as an Ares P2P network. Peers are identified by sending a bootstrap request message to at least one peer; receiving a response from the at least one peer to the bootstrap request, wherein the response identifies one or more additional peers; and repeating the sending and receiving steps for the one or more additional peers until the bootstrap response satisfies one or more predefined criteria. The predefined criteria can be that the bootstrap response does not identify at least one new peer within a predefined period of time, or that the bootstrap response does not identify at least one new peer at all. The bootstrap requests are generally sent only to peers that have not been previously contacted. The bootstrap request message may comprise, for example, only one packet and requests that the recipient identify a predefined number of random peers. A list of identified peers can be presented to a user, for example, based on one or more demographic criteria. | 04-05-2012 |
20120084430 | METHODS AND APPARATUS TO MEASURE MOBILE BROADBAND MARKET SHARE - Methods and apparatus are disclosed to measure mobile broadband market share. A disclosed example method involves receiving first information indicative of a first network interface device used at a first time, receiving second information indicative of a first Internet protocol (IP) address used at the first time, and identifying an instance of mobile broadband data card Internet access when the first network interface device is a broadband data card and the first IP address is associated with a first broadband Internet service provider (ISP). | 04-05-2012 |
20120084431 | PROFILING OF COMPOSITE PHYSICAL DEVICES FOR MONITORING/CONTROL SYSTEMS - A system and methods for creating a logical profile for physical devices in a system to interface with a monitoring system is disclosed. A profile identity is selected. A plurality of physical devices from the system is selected. The physical devices such as a meter or a circuit breaker include an output or an input. An input or output is classified for at least one of the plurality of selected physical devices as a tag. The plurality of selected physical devices are represented to the monitoring system by the profile identity and the at least one tag of the selected physical devices. | 04-05-2012 |
20120084432 | METHOD AND APPARATUS FOR PROTOCOL EVENT MANAGEMENT - A protocol event management capability is depicted and described herein. The protocol event management capability is provided by enhancing current network element behavior and coupling the enhancements to the management system managing the network element. A first enhancement is use of protocol event capture, in which the network element logs protocol events locally at the network element. A protocol event logged for an event related to a protocol includes a description of the event related to the protocol and an association of the event related to the protocol to at least one object impacted by the event related to the protocol. The logged protocol events may be provided to the management system in any suitable manner. A second enhancement is use of protocol event suppression, in which the network element suppresses protocol events using protocol event suppression rules, and the management system reconstructs the suppressed protocol events using knowledge of the protocol event suppression rules applied at the network element. The protocol event capture function and protocol event suppression function may be used independently or in combination. | 04-05-2012 |
20120084433 | WEB TEST GENERATION - Technologies are described herein for generating a suite of web tests that are then combined into a load test. A log file is received. The log file may contain one or more requests received at a web server. Relevant information is extracted from the log file into a data file. A web test template is retrieved. The web test template is populated with the relevant information from the data file to generate the web test. | 04-05-2012 |
20120084434 | SELF-GOVERNING MEDICAL PEER RATING SYSTEM FOR HEALTH MANAGEMENT CONTENT - A self-governing medical peer rating system for evaluating and rating health management content includes a subject matter expert (SME) registration module that accepts a subscription from an SME to an application for contribution of content by entering credentials of the SME into the medical peer rating system, a SME verification module that verifies a profile of the SME created by the SME, a SME approval module that approves the SME as a verified SME based on at least one of a positive feedback, a negative feedback, and a neutral feedback from a group of verified SMEs, a community member, and a member of an editorial board. A content creator module that creates the content contributed by the SME. A content approval module that approves the content upon the content being discussed or reviewed by any of the verified SMEs, the community member, and the member of the editorial board. | 04-05-2012 |
20120084435 | Smart Real-time Content Delivery - A method, a computer program product, and a system is provided to monitor several continuously transmitted content channels, each providing video information and audio information, or a combination thereof with text information; simultaneously convert the monitored content from each channel to provide data stream feeds for each of these channels; simultaneously analyze each channel feed to determine if a user provided topic is included in any of these feeds; and send an alert to the user when a channel feed includes a user provided topic. In a further embodiment, the method includes delivery of content from the channel feed to a user device, upon request, in a user designated transmission format (such as video, audio or text). | 04-05-2012 |
20120084436 | MECHANISM FOR ACCESSING AND PROCESSING MONITORING DATA RESULTING FROM CUSTOMIZED MONITORING OF SYSTEM ACTIVITIES - A mechanism for accessing and processing monitoring data resulting from customized monitoring of system activities. A method of embodiments of the invention includes invoking, via a Command-Line Interface (CLI) shell console, a performance monitor at a host computer system to perform monitoring of activities of a plurality of system components of one or more computer systems. The CLI shell console provides an abstraction layer for interfaces and further provides host performance information via a common interface independent of operating systems, monitoring use-cases, monitoring tools, or programming languages employed at the host computer system. The method further includes accessing monitoring data generated from monitoring of the activities by the performance monitor. | 04-05-2012 |
20120084437 | REPLAYING CAPTURED NETWORK INTERACTIONS - A user interface event monitor captures user interface events executed by a client during a network session. A network session monitor captures network data exchanged between the client and a web application during the network session. A replay device identifies control events in the network session that require execution before replaying associated user interface events. Replay of the user interface events are delayed by the replay device until the associated control events have been fully executed. | 04-05-2012 |
20120084438 | Secure Device Data Records - Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM). | 04-05-2012 |
20120084439 | INSTRUCTION SYSTEM, METHOD, AND RECORDING CONTROL APPARATUS - A system including a first apparatus including a first processor, a first storage device, and a first communication interface and a second apparatus including a second processor and a second communication interface is provided. The first processor measures traffic of data communicated via a predetermined communication path in each of a plurality of time ranges, stores the data communicated in each of the plurality of time ranges in the first storage device, and performs a control processing to cause the first communication interface to transmit the measured data traffic to the second apparatus, and when the second processor receives the measured data, the second processor performs control processing to cause the second communication interface to transmit to the first apparatus designation information designating one of the plurality of time ranges in which protection target data not to be deleted from the first storage device has been communicated. | 04-05-2012 |
20120084440 | DATA INTEGRITY FOR COMMUNICATION WITH COEQUAL SUBSCRIBERS - A communication device for a subscriber in a communication network of coequal subscribers, which communication device has a communication unit and a control unit. The received messages are checked for rule compliance. If a message does not comply with a particular rule, a disconnection signal is sent to the transmitter of the message. | 04-05-2012 |
20120084441 | PRIORITIZING NETWORK TRAFFIC - Methods, systems and apparatus, including computer programs encoded on a computer storage medium, for receiving, at a global server system, from each of a plurality of local network devices, network data specifying network communication activity at the local network device, wherein the plurality of local network devices collectively provide backbone communications facilities for multiple networks; aggregating, at the global server system, the network data from each of the local network devices; analyzing, at the global server system, the aggregated network data to identify network activities; generating, at the global server system, update data based on the analysis of the aggregated network data, the update data including instructions for the local network devices for processing network communications to or from the local network devices; and transmitting from the global server system the update data to the local network devices. | 04-05-2012 |
20120084442 | COMMUNICATION TERMINAL, ADDRESS RESOLUTION SERVER, AND COMPUTER PROGRAM - A communication terminal ( | 04-05-2012 |
20120089723 | PROVIDING A MONITORING SERVICE IN A CLOUD-BASED COMPUTING ENVIRONMENT - Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to the monitoring service. The monitor workflow may correspond to the monitoring service. A first call to a finder application is executed over a communications network to retrieve data points according to the monitor workflow. A second call to an analyzer application is executed over the communications network to identify a relevant data point in the data points. A third call to a notifier application is executed over the communications network to notify the user of the relevant data point. | 04-12-2012 |
20120089724 | DIAGNOSIS OF APPLICATION SERVER PERFORMANCE PROBLEMS VIA THREAD LEVEL PATTERN ANALYSIS - Performance of server that is managing a group of servers, such as in a cloud, is analyzed by identifying patterns of threads executed in the server. A command is issued, repeatedly over a time period, to an operating system of the server to return a resource consumption value representative of the amount of computing resources consumed by one or more threads. The returned resource consumption values are stored and used to generate points on a graph which depicts the amount of computing resources consumed by the one or more threads over the time period and provide task breakdowns and latency information for each of the tasks. | 04-12-2012 |
20120089725 | METHODS AND SYSTEMS FOR VERIFYING SERVER-STORAGE DEVICE CONNECTIVITY - Methods and systems for verifying server-storage device connectivity in a storage area network (SAN) environment are provided. One system includes determining which of a plurality of storage devices a server is physically connected and determining which of the plurality of storage devices a zoning configuration in the SAN environment enables the server to access. The method further includes returning to a user an indication of each storage device in the plurality of storage devices that the server is both physically connected and includes zoning access. One system includes a server, a plurality of storage devices, a switch fabric coupling the server to the plurality of storage devices, and a processor coupled to the server, the plurality of storage devices, and each device in the switch fabric. In this system, the processor is configured to perform the method discussed above. | 04-12-2012 |
20120089726 | AUTOMATED SERVICE LEVEL MANAGEMENT OF APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT - Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers. Automated dynamic migration of applications in a cloud computing environment comprises deciding to migrate an application, obtaining application resource requirements, identifying application server candidates, selecting an application server from one of the candidates, and migrating the application. | 04-12-2012 |
20120089727 | SERVICE DESIGN CENTER FOR DEVICE ASSISTED SERVICES - A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls. | 04-12-2012 |
20120089728 | MONITORING DATAGRAMS IN A DATA NETWORK - A communication session over a network is facilitated. A signaling datagram from a source device having a source identity may be intercepted by a network device, and a response datagram may be generated for instructing the source device to send a subsequent datagram to the network device. The signaling datagram may be forwarded to a SIP server, where the SIP server associates the source identity with the network device acting on behalf of the source device, and where the SIP server operates to connect a destination device with the source device to establish a communication session over the network. The subsequent datagram may be received from the source device, and the subsequent datagram may be made available to the destination device via the network. | 04-12-2012 |
20120089729 | SYSTEMS AND METHODS FOR ABSTRACTING STORAGE VIEWS IN A NETWORK OF COMPUTING SYSTEMS - A storage tool can determine and provide an abstract view of storage systems in a network of computing system. The storage tool can utilize the abstract view in order to identify the storage systems based on the performance and capabilities of the storage systems without regard to the configuration of the storage system, storage devices in the storage system, or the details of the storage devices. | 04-12-2012 |
20120089730 | MODIFYING COMMAND SEQUENCES - A method of modifying a command sequence comprising a plurality of commands, the commands having a schedule by which they are to be executed, comprising the steps of transforming the commands into in-time sub-commands which have to be executed according to the schedule and preparation sub-commands which are not constrained to be executed according to the schedule; and adjusting the order of the sub-commands so that estimated periods during which the sub-command components of the second type are executed do not overlap with the periods during which the sub-command components of the first type are executed. | 04-12-2012 |
20120089731 | TERMINAL APPARATUS AND METHOD OF REGISTERING THE SAME - A terminal apparatus includes: a transmission unit transmitting, to a master device, a first registration request indicating a request for registration as a new control target terminal; a reception unit receiving registration request acknowledgement information transmitted from the master device in response to reception of the first registration request; a notification unit notifying the outside of the terminal apparatus of notification information included in the registration request acknowledgement information and indicating the master device has received the first registration request; a detection unit detecting another terminal apparatus that is to transmit, to a master device, a second registration request indicating a request for registration as a new control target terminal; and a registration control unit controlling, when the detection unit detects the other terminal apparatus, at least a time when the first registration request is transmitted. | 04-12-2012 |
20120096142 | SYSTEM AND METHOD FOR IDENTIFICATION OF BUSINESS PROCESS APPLICATION SERVICE GROUPS - One or more business process application service groups may be categorized. An ontological definition of an enterprise network can then be analyzed to identify one or more structures within the enterprise network that correlate to the one or more categorized business process application service groups. | 04-19-2012 |
20120096143 | SYSTEM AND METHOD FOR INDICATING THE IMPACT TO A BUSINESS APPLICATION SERVICE GROUP RESULTING FROM A CHANGE IN STATE OF A SINGLE BUSINESS APPLICATION SERVICE GROUP NODE - A primary application comprising one or more executables is defined, and a network ontology for the primary application is determined and stored in a database, where the network ontology comprises one or more nodes of an enterprise network that communicate during execution of the one or more executables. Next, a change of state for at least one of the nodes is detected and used to determine one or more elements of the network ontology for the primary application that have a changed state. Further, an impact summary view is generated to indicate the elements of the primary application that have a changed state, and the impact summary view is displayed to a user. | 04-19-2012 |
20120096144 | METHOD AND APPARATUS FOR FETCHING DATA BASED ON NETWORK CONDITIONS - An approach is provided for fetching data based on network conditions. A network management platform determines an anticipated availability of one or more networks associated with a device. The network management platform then determines one or more data requests, one or more anticipated data requests, or a combination thereof of one or more applications associated with the device. Based, at least in part, on the anticipated availability, the network management platform determines to generate a schedule for completing the one or more data requests, the one or more anticipated data requests, or a combination thereof | 04-19-2012 |
20120096145 | MULTI-TIER INTEGRATED SECURITY SYSTEM AND METHOD TO ENHANCE LAWFUL DATA INTERCEPTION AND RESOURCE ALLOCATION - A system, method, and apparatus for intercepting data streams such as packets on a network. In one embodiment, the method includes: receiving at a network surveillance system (NSS), a target to be intercepted on the network; creating a target identification (target ID) for the target, wherein the target ID is unique to the NSS in order to track data streams of the target during subsequent processing, such as extraction of content and metadata, in the NSS; intercepting the data streams of the target on the network; tagging the data streams of the target that are intercepted from the network with a respective target ID; transmitting the data streams of the target to the NSS for subsequent analysis; and distributing the data streams across a scalable quantity of data processing engines in the NSS. | 04-19-2012 |
20120096146 | System and method for aligning data frames in time - A method and apparatus for merging data acquired by two or more capture devices from two or more points in a computer system, frames are compared for duplicates, then duplicate frames are analyzed to determine the time difference between the timestamps of a first capture device and a second capture device. If the duplicate frames are the first set of duplicate frames discovered, then all previous timestamps and all subsequent timestamps from the second capture device are adjusted by the time difference. If duplicate frames are again discovered, the time difference is recalculated and all subsequent frames from the second capture device are adjusted by the recalculated time difference. After all the frames have been analyzed and the timestamps adjusted, the frames are merged together and put into chronological order to simulate a single capture of data encompassing all of the points where the data was collected. | 04-19-2012 |
20120096147 | MANAGEMENT APPARATUS, MANAGEMENT APPARATUS CONTROL METHOD, AND STORAGE MEDIUM - An apparatus includes a storage device configured to store a map image of one or more floors on which a network device is installed, positional information about an installation location of the network device on the map image, and configuration information about the network device, a setting unit configured to set a region on the map image and a rule that the network device complies with in the region, a moving unit configured to designate a movement destination for moving the network device by changing the positional information, a determination unit configured, if the positional information has been changed, to determine a content of a change of a configuration required to be executed to the network device when the network device is moved, and a notification unit configured to notify to an operator the content of the change of the configuration. | 04-19-2012 |
20120096148 | SYSTEM AND METHOD FOR REPRESENTING USER INTERACTION WITH A WEB SERVICE - Disclosed is a system and method for representing user interaction with a web service. The method comprises the steps of: acquiring a representation of the actions of a user performing a task with the web service; analysing the acquired actions to determine semantics and at least one variable describing the user to actions; and representing the semantics and the at least one variable in at least one script file, the at least one script file supporting performance of user interaction with the web service based on the semantics and a value provided for the variable. | 04-19-2012 |
20120096149 | CLOUD FEDERATION IN A CLOUD COMPUTING ENVIRONMENT - Various methods, devices, and systems are described for cloud federation in a cloud computing network including bridging computing resources between an enterprise and a cloud or among multiple clouds. These techniques involve generating an image of the host system and decoupling it from its underlying computing resources so that it can be migrated across disparate computing resources in a seamless manner. In one embodiment, an enterprise workload can be bridged with cloud resources to receive software as a service. In other embodiments, bridging is performed across multiple public or private clouds, each potentially having disparate computing resources. In addition, users can access and use these cloud services through a web browser or other network interface anywhere in the cloud computing network as if the services were installed locally on their own computer. | 04-19-2012 |
20120096150 | METHOD AND SYSTEM FOR PROVIDING NETWORK MONITORING, SECURITY EVENT COLLECTION APPARATUS AND SERVICE ABNORMALITY DETECTION APPARATUS FOR NETWORK MONITORING - A network monitoring system includes: a traffic information generating apparatus for generating traffic information. Further, the network monitoring system includes a security event collecting apparatus for collecting the traffic information generated by the traffic information generating apparatus by referring to pre-stored traffic information, grouping the collected traffic information, and then extracting service information. Furthermore, the network monitoring system includes a service abnormal condition detecting apparatus for detecting a port number of a transport layer of service information extracted from the security event collecting apparatus and the occurrence frequency of the transport layer, determining the continuity of the port number and the uniformity of the occurrence frequency, and displaying a service abnormal condition. | 04-19-2012 |
20120096151 | METHOD AND SYSTEM FOR INDICATING AND DOCUMENTING ASSOCIATIONS, DISCLOSURES AND INSTRUCTIONS USING VISUALLY IDENTIFIABLE DESCRIPTION REFRENCES AND A STANDARDIZED FRAMEWORK OF CODED INSTRUCTIONS, HYPERLINKS AND RELATED VISUAL DISPLAY ELEMENTS - Methods and system for a unique coding framework used to create, manage and track instructions for documentation and dissemination of instructions, indicate a particular association or activate a given process. In one example, the present disclosure relates to the online publishing of documentation to demonstrate relationships of parties and compliance with regulatory and other requirements. The present disclosure uses URL hyperlinks, badges, watermarks, icons and visual displays that are representative of a given function and that may be identified by reference of unique coding structure. The present disclosure relates to the publishing and display of relevant visual codes or images for viewing by members of the public, (human readable) as well as machines. The present disclosure enables the tracking and measurement of uses of coded representations in public or private channels. Structured hyperlink codes allow brief messages to be sent in shortened form to instruct or deliver messages or processes. | 04-19-2012 |
20120096152 | METHOD, APPARATUS, AND COMPUTER PROGRAM FOR PROCESSING INFORMATION - A switcher, residing in a memory, detects a connectable network when a terminal is powered on. When a network is detected, a communication unit issues a message to a processor. The processor detects whether the terminal has ever been connected to the detected network and whether the profile of the network is registered. If the processor determines that the profile of the network is registered, a connection to the network is established in accordance with the profile. If the processor determines that no profile of the network is registered, a new profile of the network is produced, and then registered. The present invention is applicable to personal computers. | 04-19-2012 |
20120096153 | Dynamic Isolation of Shared Resources - Shared resources can be isolated such that abuse of the resource by one user does not significantly affect the use of that resource by another user. A combination of access and flow control can be used, wherein a control gateway or other such component sits along a path between the user and the resource, such that the user obtains connections or access to the resource through the gateway. In this way, the gateway can control aspects such as the number of concurrent threads or channels granted to a user, as well as any delay in providing these threads or channels to the resource. A closed feedback loop can provide real-time information such that adjustments can be made dynamically, preventing abuse by users while also preventing the resource allocations from being underutilized. | 04-19-2012 |
20120096154 | Information Processing Method and System, and Mobility Management Network Element - An information processing method and system, and a mobility management network element are provided by the embodiments of the present invention. Wherein, the information processing method includes: receiving a message that includes data information of a user equipment UE; determining that the UE is a UE of low data usage; and sending the received data information of the UE to a machine type control server. By using the method, no bearer is activated, and the network side does not need to allocate bearer resources for data transmission of the UE. Therefore, the network load is reduced. | 04-19-2012 |
20120096155 | Subscription-based Temporally Sequenced Recommendations - A method and system for temporally-sequenced recommendations in subscription-based systems delivers to users of a subscription-based system multiple recommended objects that are arranged in a temporal sequence. The delivered recommended objects are in accordance with user subscriptions and/or inferences of preferences that are based, at least in part, on usage behaviors. Variations of the system and method include delivering recommended objects in accordance with the contents of the objects and user direct feedback with regard to the objects. Information as to why objects were delivered to users may be provided to the users. | 04-19-2012 |
20120096156 | METHOD AND ARRANGEMENT IN A COMMUNICATION NETWORK - A method and apparatus for providing labelling information to a third party regarding terminal users in a communication network. A labelling unit receives communication related data generated from executed communications of the terminal users, and fetches stored labelling rules which have been configured specifically for the third party. The labelling unit then converts the communication related data into labelling information, where a communication habits vector is determined by applying the fetched labelling rules on the received communication related data, and the labelling information is determined for the terminal user(s) based on the resulting communication habits vector. The determined labelling information is finally delivered to the third party. | 04-19-2012 |
20120102183 | PROCESSING REQUESTS IN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a distributed approach to request processing. Specifically, in a typical embodiment, a request is received via a cloud dispatcher, which generates and places a corresponding message in a cloud manager queue associated with a set (at least one) of cloud managers. The message is then placed in a cloud node queue associated with a set of cloud nodes that process the message and provide state information related to request processing in an audit queue associated with an audit database. In addition, cloud manager state information is placed in a dispatcher queue associated with the cloud dispatcher. This state information is used by the cloud dispatcher to determine where to place incoming requests. Under these embodiments, each cloud resource runs self-contained management code and performs actions by receiving instructions from a queue. Thus, the messages may be directed to a specific resource or broadcasted to a “pool” of resources of which any resource can take the request and process it. | 04-26-2012 |
20120102184 | APPARATUS AND METHOD FOR ADAPTIVE STREAMING OF CONTENT WITH USER-INITIATED QUALITY ADJUSTMENTS - According to one embodiment of the invention, a digital device comprises adaptive streaming logic to control a manual setting of play parameters that are used to adjust a display resolution of the incoming content and a data rate at which the streaming content is downloaded to the content interface unit. Hence, very low resolution content or greatly varying resolution which can be annoying to a viewer caused by excessive network congestion can be avoided or mitigated. | 04-26-2012 |
20120102185 | RESOURCE MANAGEMENT OF SERVER HOSTS IN ONLINE GAME ENVIRONMENT - Managing resources of server hosts in an online game environment, including: monitoring metrics data of the online game environment including configurable thresholds and rules defined for a game title; processing and analyzing the metrics data; determining whether the metrics data indicates an over or under capacity of the server hosts in the online game environment; sending a first request to locate, deploy, connect, and register additional game servers to the online game environment to support increasing load, when the metrics data indicates the under capacity of the server hosts; and sending a second request to isolate, remove, disconnect, and un-register surplus game servers from the online game environment to make them available to support the player load in other game titles, when the metrics data indicates the over capacity of the server hosts. Keywords include resource management, online gaming, and server architecture. | 04-26-2012 |
20120102186 | GOAL STATE COMMUNICATION IN COMPUTER CLUSTERS - Goal state indicators can be communicated from a fabric controller of a computer cluster to each of multiple compute instances in the computer cluster managed by the fabric controller. The goal state indicators can be formatted according to a structured protocol that defines multiple possible goal states. Additionally, status reports can be received from the compute instances. Each of the status reports can indicate a current state of one of the compute instances relative to a goal state previously indicated in a goal state indicator communicated to that one of the compute instances. | 04-26-2012 |
20120102187 | Storage Workload Balancing - Storage workload balancing in a data processing environment is provided by detecting automatically overloaded storage providers and automatically transferring storage subsystems from overloaded storage providers to storage providers with available capacity. This automatic workload balancing prevents some storage providers experiencing reduced performance while other available storage providers have unused excess capacity. If all of the available storage providers are overloaded, a new storage provider may be added automatically to a server and operating system instance that is best able to handle extra work. | 04-26-2012 |
20120102188 | MECHANISM FOR TRACKING HOST PARTICIPATION IN MULTICAST GROUPS - A method performed in a network element coupled between a subscriber end station and a multicast source for tracking a history of IGMP report messages. The network element receives and IGMP report message from the subscriber end station and determines a multicast group address and multicast source IP address corresponding to a multicast group to which the network element is a member. The network element builds an IGMP report history record indicating the subscriber end station's identity and comprises the multicast group address, the multicast source IP address, and a time stamp corresponding to the date and time at which the network element received the IGMP report message. This record is then stored in an IGMP report history database along with a plurality of other IGMP report history records so that the network element can maintain a history of IGMP report messages received from the subscriber end station. | 04-26-2012 |
20120102189 | DYNAMIC HETEROGENEOUS COMPUTER NETWORK MANAGEMENT TOOL - Method and apparatus for managing a network includes assigning a plurality of processors to a plurality of network connected computing groups, wherein each processor in an assigned computing group receives task types over the network that are different from task types received over the network by processors assigned to any other computing group. A network monitor detects a workload of each of the computing groups and sets an upper threshold and a lower threshold for each of the plurality of computing groups. If it detects that a workload of a computing group is equal to or higher than its set upper threshold and that a workload of another computing groups is equal to or lower than its set lower threshold, it will initiate a reassignment procedure for reassigning a processor from the lower workload computing group to the higher workload computing group. | 04-26-2012 |
20120102190 | INTER-VIRTUAL MACHINE COMMUNICATION - A computer implemented method is provided, including monitoring network traffic among virtual machines that are allocated to a plurality of compute nodes on a network, and identifying first and second virtual machines having inter-virtual machine communication over the network in an amount that is greater than a threshold amount of the network traffic. The method further comprises migrating at least one of the first and second virtual machines so that the first and second virtual machines are allocated to the same compute node and the inter-virtual machine communication between the first and second virtual machines is no longer directed over the network. In one embodiment, each compute node is coupled to an Ethernet link of a network switch, and data is obtained from a management information database of the network switch to determine the amount of network bandwidth that is being utilized for communication between the first and second virtual machines. | 04-26-2012 |
20120102191 | USING PAUSE ON AN ELECTRONIC DEVICE TO MANAGE RESOURCES - An electronic device for using pause to manage resources is described. The electronic device includes a processor and instructions stored in memory. The electronic device monitors a pause duration and determines whether to perform a resource management operation based on the pause duration. The electronic device performs the resource management operation based on the pause duration. | 04-26-2012 |
20120102192 | NETWORK SYSTEM - The disclosed DNS server apparatus monitors whether each service providing server apparatus is active or inactive and collects load information. When the monitored apparatus is active but congested or is unable to offer services, a virtual IP address assigned to a Sorry server apparatus is sent back as a response. When service providing server apparatuses in active state are congested or unable to provide services, the DNS server apparatus sends a server activation instruction and an IP addresses for services to the service providing server apparatuses on standby to activate them. Each service providing server apparatus on standby activates server software in response to the server activation instruction and assigns the received IP address to a network interface as a virtual IP address, thus activating the interface. | 04-26-2012 |
20120102193 | System and Method for Transitioning to cloud Computing Environment - System and method for assessing the transitioning of computing components to a cloud computing environment is described. The system and method comprises of identifying at least one category of service in an organization to be transitioned to a cloud computing environment; collecting relevant information about the category from one or more service category owners and/or users; analyzing the information received based on pre-defined parameters; and classifying the services into high cloud ready, moderate cloud ready, or limited cloud ready based on the analyzed information. | 04-26-2012 |
20120102194 | System Monitoring - Disclosed are methods, systems and products, including a method that includes monitoring one or more service providing components implemented using at least one processor-based device, the one or more service providing components being connected to an interfacing system configured to control requests for service received from client units that require servicing from at least one of the one or more service providing components. The interfacing system is also configured to assign the requests to the one or more service providing components. The monitoring is initiated by equipment associated with one or more of the interfacing system and at least one of the one or more service providing components. The method also includes generating information regarding the operability of at least one of the one or more service providing components based on data generated in response to monitoring the one or more service providing components. | 04-26-2012 |
20120102195 | SYSTEM AND METHOD FOR PROVIDING INFORMATION RELATING TO AN EMAIL BEING PROVIDED TO AN ELECTRONIC DEVICE - The disclosure relates to a system and method for associating an item in an electronic transmission with information. The system may be implemented in a server that associates information relating to an item embedded in an electronic transmission addressed to an electronic device. The server comprises: a first process to identify the item (and perhaps categorize it); a second process to execute a database search for additional information for the item; a third process to retrieve results from the search and associate the results with a new transmission for the item, the new transmission including data from the electronic transmission; and a fourth process to transmit the new transmission to the device. | 04-26-2012 |
20120102196 | CONTENT PATTERN RECOGNITION LANGUAGE PROCESSOR AND METHODS OF USING THE SAME - A device for detecting network traffic content is provided. The device includes a processor configured to receive a signature associated with content desired to be detected, and execute one or more functions based on the signature to determine whether network traffic content matches the content desired to be detected. The signature is defined by one or more predicates. A computer readable medium for use to detect network traffic content is also provided. The computer readable medium includes a memory storing one or more signatures, each of the one or more signatures associated with content desired to be detected. Each of the one or more signatures is defined by one or more predicates, and each of the one or more predicates can be compiled into a byte code stream that controls a logic of a network traffic screening device. | 04-26-2012 |
20120110160 | SYSTEM AND METHOD FOR DETERMINING TOPOLOGY OF MONITORED ENTITIES - Devices and methods may allow for a first process associated with a probe process to receive a message transmitted across a network from a second process, the message including data and an identifier for the second process. The probe process may transmit identifiers for the first and second process to a server. A server may receive a message from a probe process including entity identifiers, and update a record recording a connection between the entities. | 05-03-2012 |
20120110161 | Relevant Alert Delivery In A Distributed Processing System - Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system. | 05-03-2012 |
20120110162 | METHOD AND SYSTEM FOR RESOURCE-AWARE DYNAMIC BANDWIDTH CONTROL - Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead. | 05-03-2012 |
20120110163 | METHOD AND SYSTEM FOR DATA PACKET QUEUE RECOVERY - Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead. | 05-03-2012 |
20120110164 | MANAGING A WORKLOAD OF A PLURALITY OF VIRTUAL SERVERS OF A COMPUTING ENVIRONMENT - An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform. | 05-03-2012 |
20120110165 | EVALUATION OF DNS PRE-REGISTRATION DATA TO PREDICT FUTURE DNS TRAFFIC - Methods and systems analyze historical NXD traffic to predict future DNS traffic. In one embodiment, a system may count NXD responses generated by an Authoritative DNS server during a particular time period and calculate the variance in NXD traffic for domains over time. The system may then generate a coefficient of variance (CoV) value for each domain observed. Finally, the system may predict positive domain traffic based upon the calculated CoV data. In other embodiments, the system may also base the prediction on the classification of domains as “original” domains or “re-registered” domains. In another embodiment, the system may also base the prediction on the “size” of name servers. Additionally, or alternatively, the system may determine the number of unique name servers for a domain and base the prediction on the number of unique name servers for a particular domain name. | 05-03-2012 |
20120110166 | METHOD AND APPARATUS FOR GENERATING TRAFFIC - A method and apparatus for generating traffic generation is provided. The method for generating traffic may include: analyzing and modeling traffic generated between a server and a client and generating a packet and an inter-departure time (IDT) based on the analysis; and combining the generated packet with the generated inter-departure time by synchronization, storing the combined packet and inter-departure time in a memory, and transmitting the packet based on the inter-departure time. Therefore, it is possible to accurately model the traffic in various patterns using a method with low complexity, and thus it is possible to accurately test the server by a simpler method than the existing server testing methods. | 05-03-2012 |
20120110167 | DEVICE WITH VIDEO BUFFER MODELING AND METHODS FOR USE THEREWITH - A device includes a frame data analyzer that generates buffer increment data based on frame data sent from the media server to the media client and further based on acknowledgement data sent from the media client to the media server. A playback data generator generates playback data based on frame data buffer contents and further based on player state data. A frame buffer model generator generates a buffer fullness indicator and the frame data buffer contents, based on the buffer increment data and the playback data. A player state generator generates the player state data, based on the buffer fullness indicator and further based on media client data, media server data and player command data. | 05-03-2012 |
20120110168 | ANALYZING WEBPAGE USERS' WEB ACCESS ACTIONS BY USING A DEFINED FOCAL REGION - A method, system and computer program product for web access analytics. Date related to the users' access to page elements is received. The page elements accessed by the users which are capable of being mapped to a defined webpage focal region are determined. The users' access to the webpage focal region is analyzed based on the determined page elements capable of being mapped to the webpage focal region. | 05-03-2012 |
20120110169 | Method And System For Registering Deep Packet Inspection (DPI) Device - The present invention provides a method for registering a Deep Packet Inspection (DPI) device. The method comprises: a DPI device sends registration information to a linkage information control center and requests to register with a network; when the DPI device is valid, the linkage information control center classifies the DPI device into a corresponding device group, and reports the registration information to a DPI linkage policy decision module; the DPI linkage policy decision module distributes a corresponding performing policy and/or identifying template to the DPI device according to the registration information; and the linkage information control center notifies a DPI information collection database to add an information item corresponding to the DPI device, to complete the registration of the DPI device. The present invention also provides a system for registering a DPI device to realize the registration of the DPI device, so as to facilitate the uniform management of the DPI device. | 05-03-2012 |
20120110170 | MALICIOUS CALL DETECTION APPARATUS, MALICIOUS CALL DETECTING METHOD AND COMPUTER PROGRAM FOR DETECTING MALICIOUS CALLS - To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed. | 05-03-2012 |
20120110171 | APPLICATION AND NETWORK-BASED LONG POLL REQUEST DETECTION AND CACHEABILITY ASSESSMENT THEREFOR - Systems and methods for application and network-based long poll request detection and cacheability assessment therefore are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a distributed proxy and cache system, including, determining relative timings between a first request initiated by the application, a response received responsive to the first request, and a second request initiated subsequent to the first request also by the application, and/or using the relative timings to determine whether requests generated by the application are long poll requests. The relative timings can be used to determine whether the second request is immediately or near-immediately re-requested after the response to the first request is received. The relative timings can also be compared to request-response timing characteristics for other applications to determine whether the requests of the application are long poll requests. | 05-03-2012 |
20120110172 | METHOD AND APPARATUS FOR PROVIDING MISSION SERVICE BASED ON USER LIFE LOG IN WIRELESS COMMUNICATION SYSTEM - A method and an apparatus provide a customized service based on a user log in a wireless communication system. A method of a terminal collects user data existing inside a terminal. The method transmits the user data to a log manage server. The method receives a mission determined based on user data from the log manage server. The method transmits performance results regarding the mission to the log manage server. | 05-03-2012 |
20120110173 | DISTRIBUTED MANAGEMENT OF KEEP-ALIVE MESSAGE SIGNALING FOR MOBILE NETWORK RESOURCE CONSERVATION AND OPTIMIZATION - Systems and methods for distributed management of keep-alive message signaling for mobile network resource conservation and optimization are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of monitoring rates of data communications with a mobile device, sending a periodic message to indicate operational state to the mobile device in response to a decrease in the rates of data communications with the mobile device, sending subsequent periodic messages to indicate operational state to the mobile device at increasing intervals between the subsequent periodic messages to decrease a number of periodic messages sent over the wireless network, and acknowledging to the mobile device that the subsequent periodic messages will be sent at increased intervals, or in a manner that conserves use of the mobile network. | 05-03-2012 |
20120110174 | SYSTEM AND METHOD FOR A SCANNING API - Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided. | 05-03-2012 |
20120110175 | SYSTEM AND METHOD FOR ANALYZING WEB PATHS - A method for analyzing web page paths associated with accesses to one or more web pages associated with one or more websites is disclosed. The method includes storing, for each instance of a web page access of the one or more web pages, time of access data, page access data, and entity data. The method further includes, for each entity reflected in the storage, determining one or more web page paths traversed by the entity based at least on the time of access data and the page access data, wherein each path includes accesses to at least two web pages. The method additionally includes analyzing at least one of the one or more websites or at least one of the one or more web pages, based on the determined one or more web page paths, and providing the analysis to one or more users or software processes. | 05-03-2012 |
20120110176 | METHOD AND PROGRAM FOR INITIATING A SECOND SERVICE IN DEPENDENCY OF A FIRST SERVICE - A method for initiating a second service in dependency of a first service using individually configured event-driven state-machines includes executing the first service in a first communication space; transmitting a first event to an operator unit in dependency of the first service; triggering a first event-driven state-machine of the operator unit by the first event; generating a second event by the first event-driven state-machine; transmitting the second event to at least one of the first communication space and a second communication space; and initiating the second service in the at least one of the first communication space and the second communication space by the second event. | 05-03-2012 |
20120117221 | PREVIEW-BASED CONTENT MONITORING AND BLOCKING SYSTEM - Systems and methods are disclosed for enabling an administrator to monitor and control usage of media content in a locale. In one embodiment, the locale includes one or more media devices that have access to media content from one or more local and/or remote content sources. Usage data defining usage of the media content by a user is obtained. A pattern including two or more media segments consumed by the user is detected based on the usage data and one or more predefined pattern detection rules. The administrator is then enabled to review the pattern and choose whether to block usage. Usage of at least one of the media segments included in the pattern is then blocked at the one or more media devices at the locale in response to the administrator choosing to block usage of the at least one of the media segments included in the pattern. | 05-10-2012 |
20120117222 | RECORDING INTERNET VISITOR THREAT INFORMATION THROUGH AN INTERNET-BASED PROXY SERVICE - An Internet-based proxy service server accesses a set of visitor characteristics for multiple visitors to a set of one or more domains operated by a customer. The set of visitor characteristics are reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains. The service server causes the set of visitor characteristics to be displayed through a threat reporting interface that allows the customer to report visitors as posing an Internet security threat. The service server receives input from the customer through the threat reporting interface that at least one of the visitors poses an Internet security threat, and records that visitor as an Internet security threat in one or more threat databases that are used by the proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers. | 05-10-2012 |
20120117223 | CHANGING AN EVENT IDENTIFIER OF A TRANSIENT EVENT IN AN EVENT NOTIFICATION SYSTEM - An event notification system for distributed processing systems provides for replacement of event identifiers associated with transient objects, such as processes within the processing system. An event management interface receives a notification from an event producer that an identifier of an event produced by the event producer is no longer valid. The event management interface blocks event notification for the event and dissociates an event registration entry associated with the event from the event identifier. A new event identifier is received from the event producer by the event management interface, which associates the registration entry with the new event identifier. Event notification for the event is then resumed. | 05-10-2012 |
20120117224 | UNIVERSAL STATE-AWARE COMMUNICATIONS - A communications system for general business environments that exploits knowledge of user state to provide advantages of efficiency and control for individual users and for the business. The communications system also provides particular advantages in environments where users have multiple communication devices and for communications of a business with external parties. In other aspects, the communication system provides features of application flexibility and system fault-tolerance with broad applicability to communication systems. The communication system includes a controller that receives requests for establishing communications when a user is in an appropriate state to receive communications and communicates state of the user to other users. The controller receives a user request for establishing a communication when the user is not in the appropriate state for communication, receives a user request for a state change to the appropriate state to receive the communication, and initiates the communication without changing state of the user. | 05-10-2012 |
20120117225 | METHODS AND APPARATUS FOR PROVIDING A MEDIA STREAM QUALITY SIGNAL - Systems, methods and apparatus are provided for computing quality scores for a media session delivered using an adaptive streaming protocol, where the quality score may be an estimate of a mean opinion score. The quality score reflects the impact of network delivery on a viewer's quality of experience (QoE). In particular, the quality score is generally based on the effects of stream switch events, as stream switches may be the result of impaired network delivery. Other network events, such as re-buffering events may also be incorporated in the score. | 05-10-2012 |
20120117226 | MONITORING SYSTEM OF COMPUTER AND MONITORING METHOD - There is provided a monitoring system capable of representing relationships of computer resources that virtual servers use in a tree structure and aggregating the performance statistics of the virtual resources sharing physical resources. The monitoring system has: a virtualization module that makes virtual computers operate; and a monitoring module for monitoring the physical computers and components of the virtual computers. The monitoring module designates the physical computer and the components of the virtualizing module as base resources, manages the components of the virtual computers as virtual resources, generates a platform tree by extracting a tree structure from the virtual resources and the components of the base resources for predetermined platforms, generates a service provision tree by extracting a tree structure having the base or virtual resources as starting points, and establishes a reference relationship for the components contained in the platform tree and also contained in the service provision tree. | 05-10-2012 |
20120117227 | METHOD AND APPARATUS FOR OBTAINING FEEDBACK FROM A DEVICE - An apparatus and method for utilizing user feedback of a user device. The method includes obtaining usage data of a user device using an application programming interface (API) and creating a data file based on the obtained usage data. The data file is uploaded from the user device to an external server device where data analysis of the data file is performed and a result of the data analysis is generated. This result is presented using a display unit. | 05-10-2012 |
20120117228 | DYNAMIC TRAFFIC MANAGEMENT IN A DATA CENTER - A network element in a data center includes a plurality of servers and a switch. The switch includes a plurality of physical ports, a packet-forwarding table, and an application program interface (API) for modifying a packet-forwarding behavior of the switch. The packet-forwarding table determines a packet-traffic distribution across the servers by mapping packet traffic arriving at the switch to the plurality of ports. Each port of the plurality of physical ports is in communication with one of the servers. The network element further includes means for determining in real time the packet-traffic distribution across the servers, and means for dynamically changing the packet-traffic distribution across the servers in response to the determined packet-traffic distribution by modifying the packet-forwarding behavior of the switch through the API of the switch. | 05-10-2012 |
20120117229 | Virtualization Layer in a Virtual Computing Infrastructure - A cloud computing environment having a plurality of computing nodes is described. The plurality of computing nodes may be organized into a plurality of clusters, each of the plurality of clusters including a cluster controller. A virtual computing environment is created on each of the plurality of computing nodes. Communication with the virtual computing environment is enabled. An authorization to service a launch plan is received from a user. The launch plan includes at least one instance to launch. Bandwidth information is requested from each of the cluster controllers of the plurality of clusters. A score is computed for each of the plurality of clusters that responded to the requested bandwidth information. The launch plan is assigned to a cluster from the plurality of clusters based on the computed scores. | 05-10-2012 |
20120117230 | SYSTEM AND METHOD FOR PROVIDING AND MANAGING A TARGET LIST ON BEHALF OF A USER AGENT CLIENT - A method and system for managing a target list on behalf of a user agent client, the method receiving a subscription request from the user agent client, the subscription request containing at least one uniform resource identifier identifying a resource; providing a subscription request to a an information owning enabler; receiving a notification containing information associated with a candidate uniform resource indicator set; evaluating information associated with the candidate uniform resource indicator set to create a selected uniform resource indicator set; and notifying the user agent client of the selected uniform resource indicator set. | 05-10-2012 |
20120117231 | MODEL-BASED DATA CENTER MANAGEMENT - Computer-readable media, systems, and methods for model-based data center management. In embodiments, a request to perform a management operation on a device in a data center is received and available paths to the device are determined. The paths are determined based on an artifact storing a topology of the data center. Further, a current favored path that is one of the available paths is determined based on a policy and the device is bound for performance of the management operation using the current favored path. In embodiments, the model-based data center management is configured to provide a generic description of the data center architecture and a generic description for one or more devices in the data center. The generic description provides for dynamic runtime data center configuration. | 05-10-2012 |
20120117232 | Device Identification and Monitoring System and Method - A method and system for collecting and recognizing information from a monitoring device is provided. On a mobile computer device a user can capture an image of a monitoring device. The image captures at least two aspects: (1) monitored data tracked or acquired by the monitoring device, and (2) a portion of the monitoring device sufficient to recognize the monitoring device. Recognition functions are provided for: (1) recognizing and converting the monitored data visible in the captured image into quantifiable data, and (2) for recognizing the monitoring device. A note taking function can be provided to allow a user to create notes. The notes can be enriched with the quantifiable data and/or the recognized monitoring device (or vice versa). A suggestion function can be provided for suggesting services where the quantifiable data, the recognized monitoring device, and/or the notes can be bound. | 05-10-2012 |
20120117233 | USING SMART OBJECTS IN A VIRTUAL UNIVERSE TO CONSERVE COMPUTING RESOURCES - Described herein are some embodiments that use smart objects in a virtual universe to conserve computing resources. Some embodiments describe a first object that detects an indication to reduce resource usage of a computing resource that supports a virtual universe. Some embodiments further describe reducing, based on detection of the indication to reduce resource usage, display quality of the first virtual object according to an order of degrees of display quality reduction that corresponds to one or more degrees of resource reduction required for the computing resource. Further, some embodiments describe a second virtual object that is not reduced in display quality while simultaneously the first virtual object is reduced in display quality. | 05-10-2012 |
20120117234 | METHOD AND SYSTEM TO RECOGNIZE AND INVENTORY APPLICATIONS - There is provided a system and method to inventory application program files. An exemplary method comprises searching a managed device in a computer network and discovering a program file on the managed device. The exemplary method also comprises identifying an installed package that includes the program file. The exemplary method additionally comprises applying one or more rules to normalize a representation of the installed package. | 05-10-2012 |
20120117235 | Method, Apparatus and Computer Program for Enforcing Policy Across Associated Sessions Taking Into Account a Total Usage Quota for Associated User - A server configured to provide a policy decision point for a packet-based communication network. The server comprises a user account manager for maintaining and/or determining, for each of a plurality of users, an available total usage quota and a set of registered, linked connection identifiers. A request handler is provided for receiving from a policy enforcement point, a request for allocation of a quota in respect of a packet session associated with a specified connection identifier. A quota determiner responds to receipt of a quota request by determining a quota for said packet session taking into account the total usage quota for the associated user and any currently ongoing sessions associated with other connection identifiers belonging to the same set as said specified connection identifier. A responder is provided for sending the determined quota to said policy enforcement point. | 05-10-2012 |
20120124192 | USING BEHAVIORAL DATA IN RATING USER REPUTATION - In a system and method for using user behavior and interaction data to rate a reputation of a user, a processor-implemented tracking component tracks an interaction of a user with a network-based publisher. A processor-implemented reputation component generates a reputation value for the user from the tracked user interaction. | 05-17-2012 |
20120124193 | Identification of Critical Web Services and their Dynamic Optimal Relocation - A web service executing on a web server is monitored by detecting metadata generated for various performance characteristics of the web service. A relocation policy is consulted in response to detecting the performance characteristics exceeding a first predetermined threshold. The relocation policy specifies a target web server as a new location for the web, and instructions for relocating the web service to the target web server if the performance characteristics exceeding a second predetermined threshold. The web service is relocated to the target web server based on the relocation policy and without human intervention. | 05-17-2012 |
20120124194 | Method and Apparatus for Efficiently Managing Network Distance between Physical Computers in a Computing Cloud - The invention provides faster and more efficient placement recommendations for virtual machines within a computing cloud. By mapping cloud resources as points on a two-dimensional surface and using well known geometric algorithms based on Voronoi Diagrams and Delaunay Triangulation, the present invention takes advantage of the geometric proximity information inherent in those models to complete processing that normally requires Order N-squared computations in less than Order log(n) computations. The invention maintains weights on the edges of the Delaunay Triangulation representing dynamic changes in network performance. These weights modify the basic distance calculations to achieve optimal placement. This proximity information also enables consideration of durability constraints which require distance separation of virtual machines to assure uncorrelated failure. | 05-17-2012 |
20120124195 | Reducing Redundant Error Messages In A Computing System - Reducing redundant error messages in a computing system, including: determining whether an endpoint in the computing system is being monitored by two or more management systems; selecting, from among the two or more management systems, a primary management system that is responsible for monitoring the endpoint; and assigning the primary management system to monitor the endpoint. | 05-17-2012 |
20120124196 | DATA BUNDLING AND FAST DORMANCY BASED UPON INTELLIGENT APPLICATION LEARNING - A system and methodology that performs data bundling and controls fast dormancy based on application monitoring and classification is provided. Moreover, the system provides a balance between saving battery power of a user equipment (UE) and reducing signaling and processing load in a radio resource controller (RRC). Specifically, the system observes data flow related behavior of applications on the UE. On receiving a first data flow request, an arrival time of a next data flow request is predicted based on an analysis of the behavior, and the system determines whether the two data flows can be bundled together and transmitted over a single connection. Additionally, on completion of the first data flow, the arrival time of the next data flow request is predicted based on the analysis, and the system determines whether a fast dormancy timer can be disabled to transmit the next data flow over the current connection. | 05-17-2012 |
20120124197 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING NETWORK DATA FLOW ANALYSIS AND ROUTING - Data flow analysis and routing processes include monitoring a process of a workflow, intercepting data traffic for data entered for the process, and identifying a communication path of a destination location for the data traffic. The method also includes verifying compliance of the process by applying business rules to the data, and notifying an entity of any non-compliance identified from the verification. | 05-17-2012 |
20120124198 | METHOD AND MANAGEMENT APPARATUS FOR DETECTING COMMUNICATION APPARATUS COUPLED TO COMMUNICATION NETWORK - A management apparatus stores attribute/protocol management information denoting each attribute/protocol relationship (the corresponding relationship between a communication apparatus attribute and a management protocol that is inferred to be optimum for the communication apparatus that has this communication apparatus attribute). The management apparatus, for each of multiple addresses prior to inputting the credential used to detect the communication apparatus, (A) issues a query that specifies an address, (B) upon receiving a response to this query from the communication apparatus at the address specified in this query, writes, to a storage resource, query result information denoting the corresponding relationship between the address specified in this query and the communication apparatus attribute acquired based on the response, (C) identifies the management protocol corresponding to the communication apparatus attribute denoted by the query result information from the attribute/protocol management information, and (D) decides the optimum management protocol for the address based on the identified management protocol. | 05-17-2012 |
20120124199 | PERFORMANCE OPTIMIZATION THROUGH RUN-TIME QUALITY GOVERNANCE - The present invention provides a method and system for optimizing the performance of a service according to the load on the service. The invention includes altering the quality of various sub-ordinate services that are a part of the service and in turn achieving systemic service performance levels that satisfy prescribed service level agreements. | 05-17-2012 |
20120124200 | REAL TIME DISTRIBUTED NETWORK MONITORING AND SECURITY MONITORING PLATFORM (RTD-NMS) - A platform to support real time passive distributed network monitoring and security monitoring applications wherein the platform will use the open architecture concept for other application developers to add functionality or extend existing functionalities; wherein the platform proposes three new concepts in real time passive network monitoring and security monitoring; the | 05-17-2012 |
20120124201 | METHODS OF OPERATING NETWORKS, APPLICATION SERVERS, AND WIRELESS DEVICES SUPPORTING MACHINE-TO-MACHINE APPLICATIONS - A machine-to-machine application server may provide a machine-to-machine application. A machine-to-machine application identification from a machine-to-machine service device may be provided at the machine-to-machine application server. The machine-to-machine application identification may identify a machine-to-machine application provided by the machine-to-machine application server, and the machine-to-machine application identification may identify a communication path between the wireless device and the machine-to-machine application server. Service may be provided according to the machine-to-machine application from the machine-to-machine application server to the machine-to-machine service device using the machine-to-machine application identification to identify the communications path between the machine-to-machine application server and the machine-to-machine service device. | 05-17-2012 |
20120124202 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING AND TRACKING SOCIAL IDENTITIES - Embodiments disclosed herein provide a control logic that can identify and track social identities of users belonging to a private network. The control logic may be implemented as a middleware communicatively connected to network user devices and to social networking platforms. The middleware can programmatically identify and extract particular pieces of information from requests and/or responses monitored at a network proxy server and correlate the extracted pieces of information to identify social identities across social networking platforms. The correlated information for each identified social identity may be stored in an identity database as a cohesive user identity record. Information stored in the identity database can be used to consistently apply and enforce policies that are applicable to individual users in the private network. | 05-17-2012 |
20120124203 | Group Monitoring System and Method - An interne based social networking system, the system including: a number of video sensors monitoring a specified environment and streaming video into the system; a series of system users collectively monitoring the video streams and analyzing events generated in relation to the video stream; and a reporting system for reporting actions taken by the system users among the system users. | 05-17-2012 |
20120124204 | APPLICATION INFRASTRUCTURE PLATFORM (AIP) - Disclosed is an application infrastructure platform (AIP) having an application service provider (ASP) environment including multiple ASP systems providing application services to customers, and a common services environment including hardware and software and management systems providing to the ASP systems applications and integrated application, back-office, and management services used by the ASP systems in delivering their application services to their customers. In another aspect, the AIP is associated with a development and test bed environment which conducts product and service development and testing. | 05-17-2012 |
20120124205 | SYSTEM AND METHOD FOR TRACKING UNIQUE VISTORS TO A WEBSITE - A system and method for analyzing traffic to a website is provided that is based on log files and that uses both server-side and client-side information channeled through one source to create a more complete picture of activity to a website. In one preferred embodiment, a sensor code is embedded in a requested web page, and sends information back to the web server where the website resides. This additional information is logged along with normal requests. | 05-17-2012 |
20120124206 | METHOD FOR CROSS-DOMAIN TRACKING OF WEB SITE TRAFFIC - Web traffic reporting methods that rely upon third-party cookies suffer in accuracy when those tracking cookies are frequently refused by web users or deleted once they have been accepted. The invention described herein circumvents this problem by employing first-party cookies instead. This is accomplished by a client-side script that maintains the first-party cookie (as placed by the web site in question) and sends a site-maintained visitor ID to a tracking service for analysis. The effect is to improve the accuracy of traffic statistics that rely on that cookie. | 05-17-2012 |
20120124207 | INVESTIGATING A COMMUNICATION ASPECT OF A DATA FLOW - The invention relates to a method, device ( | 05-17-2012 |
20120131171 | INVITE ABUSE PREVENTION - Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and/or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and/or other interactions between the clients using the one or more resources. | 05-24-2012 |
20120131172 | MANAGING SERVICE LEVEL AGREEMENTS USING STATISTICAL PROCESS CONTROL IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to the use of event processing (e.g., for complex events) in a cloud infrastructure using Statistical Process Control (SPC) techniques to detect changes in a holistic system. Specifically, events (e.g., complex events that occur over multiple layers in the architecture) may be detected and/or correlated by an event processor. Thereafter, an SPC engine will determine if the events impact a set of SLAs based on a set of Key Performance Indicators (KPIs), which are measurements indicating actual performance of the cloud computing environment versus stated goals. The SPC engine will then determine if a set of actions is needed to address the events to avoid the SLAs terms from not being met. If so, a provisioning engine can carry out any needed actions. | 05-24-2012 |
20120131173 | SYSTEMS AND METHODS FOR MIGRATING SOFTWARE MODULES INTO ONE OR MORE CLOUDS - Embodiments relate to systems and methods for migrating software modules into one or more target clouds. The systems and methods can analyze system data to determine software modules supported by the system, and target cloud data to determine which target clouds have a capacity to support a migration of the software modules. In embodiments, benefits of migrating any or all of the software modules to the target clouds can be determined. Based on the benefits, the software modules of the system can be segmented and migrated into systems associated with the multiple target clouds. | 05-24-2012 |
20120131174 | SYSTEMS AND METHODS FOR IDENTIFYING USAGE HISTORIES FOR PRODUCING OPTIMIZED CLOUD UTILIZATION - Embodiments relate to systems and methods for identifying usage histories for producing optimized utilization in a cloud-based network. In particular, a target cloud can receive usage histories corresponding to end user usage in a respective set of other clouds. In embodiments, the target cloud can simulate an execution of the usage histories on resources in the target cloud to generate a set of utilization ratios. Further, the target cloud can determine a desirable usage history from the set of utilization ratios based on highly optimized resource usage within the target cloud. In embodiments, an administrator of the target cloud can provide a deployment recommendation to an administrator of the cloud associated with the desirable usage history. | 05-24-2012 |
20120131175 | Cooperative neighboring hardware nodes determination - A hardware node locates one or more neighboring hardware nodes. The hardware node maintains a general list of the neighboring hardware nodes. The hardware node can determine one or more selected neighboring hardware nodes within the general list with which the hardware node is interested in cooperating, such as to create an interest list of the selected neighboring hardware nodes. The hardware node contacts each selected neighboring hardware node, such as each node within the interest list, to determine a corresponding level of cooperation of each selected neighboring hardware node. The hardware node generates a cooperating list that includes the corresponding level of cooperation of each selected neighboring hardware node, after contacting each selected neighboring hardware node. | 05-24-2012 |
20120131176 | SYSTEMS AND METHODS FOR COMBINATORIAL OPTIMIZATION OF MULTIPLE RESOURCES ACROSS A SET OF CLOUD-BASED NETWORKS - Embodiments relate to systems and methods for combinatorial optimization of multiple resources across a set of cloud-based networks. In aspects, a set of usage histories can store patterns for users in a host cloud-based network recording the consumption of processor, memory, storage, operating system, application, or other resources subscribed to by the user. The user can be a corporation or other collective user. A deployment engine can identify similar target resources available in a set of target clouds. The engine can receive selection criteria for selecting target clouds for a migration of the user's deployment. In the combinatorial selection, each target cloud can independently supply one or more target resources. The engine can thus identify a series of combinations of target resources and target clouds supplying those resources to discover combinations of target clouds and target resources that can satisfy or optimize the selection criteria, such as cost or others. | 05-24-2012 |
20120131177 | SNOOPING DNS MESSAGES IN A SERVER HOSTING SYSTEM PROVIDING OVERLAPPING ADDRESS AND NAME SPACES - A server hosting system provides managed servers for tenants of the server hosting system. Managed servers for different tenants can have the same IP addresses and fully-qualified domain names (FQDNs). Furthermore, the server hosting system provides routers for the tenants. The router for a tenant can receive a Domain Name System (DNS) update message. The DNS update message is a request for a DNS server to associate a tenant-side FQDN with a tenant-side IP address. This tenant-side IP address can concurrently be an IP address of a managed server of another tenant. In response to receiving the DNS update request, the router sends a DNS data message to a management system for the server hosting system. The DNS data message indicates the IP address, the tenant-side FQDN, and an IP address only associated with the given tenant. | 05-24-2012 |
20120131178 | Multimedia Aware Cloud for Mobile Device Computing - Techniques for configuring and operating a multimedia aware cloud, particularly configured for mobile device computing, are described herein. In some instances, clusters of servers are organized for general computing, graphic computing and data storage. A load balancing server may be configured to: identify multimedia types currently being processed within the multimedia edge cloud; determine desired quality of service levels for each identified multimedia type; evaluate individual abilities of devices communicating with the multimedia edge cloud; and assess bandwidth of each network over which the multimedia edge cloud communicates with a mobile device. With that information, multimedia data may be adapted accordingly, to result in an acceptable quality of service level when delivered to a specific mobile device. In one example of the techniques, graphic computing server clusters may be configured to process workload using a configuration that includes elements of both parallel and serial computing. | 05-24-2012 |
20120131179 | METHOD AND SYSTEM FOR REMOTE OS INSTALLATION CAPABLE OF MONITORING AN INSTALLATION PROCEDURE - A method for remote OS installation capable of monitoring an installation procedure, is applied to a host computer installing an OS remotely on at least one client computer, wherein the host computer includes a control platform, and the method includes: enabling the client computer to connect to the control platform of the host computer through a Pre-Boot execution environment (PXE) to obtain an IP address; enabling the control platform to transmit a virtual platform installation file to the client computer and installing a virtual platform on the client computer; enabling the host computer to obtain administration authority of the client computer through the virtual platform and establishing a control connection and a monitoring channel between the control platform and the virtual platform; and enabling the host computer to install the OS on the client computer via the control connection and obtaining displays of the installation procedure of the client computer via the monitoring channel. | 05-24-2012 |
20120131180 | SERVER SYSTEM AND METHOD FOR MANAGING THE SAME - Provided is a technique for adequately allocating hardware resources of physical hardware to virtual hardware that operates on the physical hardware, and achieving a server integration effect in accordance with the performance of the physical hardware. According to the present invention, before resources are added to the virtual hardware, the residual amount of the resources in the entire physical hardware and resources that will run short in the virtual hardware are predicted, so that a server configuration is changed in accordance with the prediction result, and resources that are actually running short in the virtual hardware are supplemented. | 05-24-2012 |
20120131181 | WORKLOAD MANAGEMENT IN HETEROGENEOUS ENVIRONMENTS - A system for managing a workload in a heterogeneous environment comprising at least one application, an interoperability layer for inter-application communication, and at least one adapter for connecting the at least one application to the interoperability layer, is disclosed. Such a system includes a self-adapting application connector management component which includes the following: a monitoring component for monitoring the performance and workload characteristics of one or more applications and/or one or more adapters; a computing component for computing a configuration change based on the monitored performance and workload characteristics; a change component for changing the configuration of the one or more adapters in accordance with the computed configuration change; and a change component for changing the configuration of the one or more applications in accordance with the computed configuration change. | 05-24-2012 |
20120131182 | Background synchronization - Systems, methods and computer program products for determining a schedule for synchronizing a server and a client are described herein. The method operates by tracking user usage of the client to develop usage patterns. A sync schedule is generated using the usage patterns, where the sync schedule enhances at least one of sync usefulness and sync transparency. The server and client are synchronized according to the sync schedule. More particularly, a sync fitness measure for an interval t is determined. The sync fitness measure is based on at least one of (a) sync transparency; and (b) sync usefulness. It is determined whether the sync fitness measure satisfies a threshold. If the sync fitness measure satisfies the threshold, then the server and client are synchronized during interval t. | 05-24-2012 |
20120131183 | INTERACTING WITH A SUBSCRIBER TO A SOCIAL NETWORKING SERVICE BASED ON PASSIVE BEHAVIOR OF THE SUBSCRIBER - In an embodiment, an application server is configured to manage privacy settings of a subscriber for one or more social networking services. The application server determines a set of privacy settings (e.g., a manually configured or default set of privacy settings) of the subscriber for the one or more social networking services, and then receives, from the subscriber, permission to dynamically modify the set of privacy settings. The application server monitors, responsive to the received permission, passive behavior of the subscriber that is separate from interactions between the subscriber and the one or more social networking services (e.g., calls, text messages, instant messages made to/from the subscriber, a location of the subscriber, etc.). The application server triggers a modification to the set of privacy settings based on the monitored passive behavior of the subscriber. | 05-24-2012 |
20120131184 | ALIGNING DATA TRANSFER TO OPTIMIZE CONNECTIONS ESTABLISHED FOR TRANSMISSION OVER A WIRELESS NETWORK - Systems and methods for aligning data transfer to optimize connections established for transmission over a wireless network are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for aligning data transfer to a mobile device to optimize connections made by the mobile device in a cellular network. The method includes batching data received in multiple transactions directed to a mobile device for transmission to the mobile device over the cellular network such that a wireless connection need not be established with the mobile device every time each of the multiple transactions occurs. For example, the data received in the multiple transactions for the mobile device can be sent to the mobile device, in a single transaction over a single instantiation of wireless network connectivity at the mobile device. | 05-24-2012 |
20120131185 | Advanced Intelligence Engine - An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like. | 05-24-2012 |
20120131186 | SERVERS FOR DEVICE IDENTIFICATION SERVICES | 05-24-2012 |
20120131187 | COMPUTER PROGRAM PRODUCT AND METHOD FOR ESTIMATING INTERNET TRAFFIC - Site metrics are presented in association with search results. The site metrics are derived from site analytics that uses clickstream data collected from a panel of internet users to generate and present internet activity metrics. Data collected from a community of internet users may be augmented by clickstream data store content, third party content, search results, and other sources to form estimates of internet activity that is structured and analyzed to produce metrics of nearly any internet web site or domain. The data may be further augmented with ratings, retail deals, and analysis of web site content to form a comprehensive set of data that is mined to formulate various metrics of internet activity about web sites. Metrics of internet activity, provides analysis that represents aspects of internet user access to a web site. Such aspects may include activity related to visitors, engagement, growth, trust, deals, and the like. | 05-24-2012 |
20120131188 | NETWORK CONCENTRATOR AND METHOD OF CONTROLLING THE SAME - Provided is a method of controlling a network concentrator | 05-24-2012 |
20120136985 | DETECTING CONTROVERSIAL EVENTS - A method, device, and computer-readable storage medium storing instructions are provided for detecting controversial events that are reflected in user-generated content items. In a single-step approach, user-generated content items are received and analyzed by a controversial event detection module, which determines the likelihood that sets of content items reflect controversial events. In one example, public posts by users of a social networking service are grouped into snapshots of posts that are associated with an entity and were generated during a window of time. An event detection module may determine the likelihood that snapshots reflect events. In a two-step approach, event snapshots are provided to a controversy detection module, which determines the likelihood that event snapshots are controversial. In a blended approach, snapshots are provided to a controversy detection module, which determines the likelihood that snapshots are controversial events based in part on the event score. | 05-31-2012 |
20120136986 | Supervision Timer Control Mechanisms - Controlling a device having a shared processing resource includes ascertaining a supervision timer value for a client service that uses the shared processing resource. The client service is caused to make a server request and a supervision timer is set to cause a timeout after a supervision timer value time period. Ascertaining the supervision timer value includes ascertaining which of a number of use scenarios represents an operation state of the device, the use scenarios being at least in part distinguished from one another by which services are presently active, including the client service. Each of the plurality of services utilizes the shared processing resource when active. One supervision timer value is selected from a number of values each associated with the client service, selection being made at least partly as a function of the ascertained use scenario. The value is retrieved from the set of stored supervision timer values. | 05-31-2012 |
20120136987 | MANAGING TAG CLOUDS - A method, data processing system, and computer program product for managing tags. A computer system identifies one or more groups of similar tags from a multiplicity of tags proposed for inclusion in a tag cloud. The computer system identifies one or more representative tags to represent the respective one or more groups of similar tags. The computer system displays the one or more representative tags in the tag cloud instead of all the similar tags in the one or more groups of similar tags, and concurrently displays other tags in the multiplicity of tags that are not included in the one or more groups of similar tags. | 05-31-2012 |
20120136988 | DYNAMIC BANDWIDTH OPTIMIZATION FOR REMOTE INPUT - A method and system for optimizing network bandwidth usage in a remote desktop system. A client generates a stream of input events that contain position information of a cursor shown on a display of the client. The client estimates characteristics of a network that couples the client to a server. Based on estimation of the characteristics, the client adjusts the number of input events batched into a packet to be sent from the client to the server over the network. | 05-31-2012 |
20120136989 | SYSTEMS AND METHODS FOR RECLASSIFYING VIRTUAL MACHINES TO TARGET VIRTUAL MACHINES OR APPLIANCES BASED ON CODE ANALYSIS IN A CLOUD ENVIRONMENT - Embodiments relate to systems and methods for reclassifying a set of virtual machines in a cloud-based network. The systems and methods can analyze virtual machine data to determine performance metrics associated with the set of virtual machines, as well as target data to determine a set of target machines to which the set of virtual machines can be reassigned or reclassified. In embodiments, benefits of reassigning any of the set of virtual machines to any of the set of target virtual machines can be determined. Based on the benefits, the systems and methods can reassign or reclassify appropriate virtual machines to appropriate target virtual machines. | 05-31-2012 |
20120136990 | SYSTEMS AND METHODS FOR PROVIDING RESOURCE ALLOCATION IN A NETWORKED ENVIRONMENT - Systems and methods are described for adjusting an item characteristic. An illustrative system includes a first network interface, a database storing information regarding a plurality of items, a load balancer, a web proxy processor configured to selectively block or route an inbound user browser request, a cache cluster system configured to cache data and states for access by other system components, and program code stored in computer readable memory, which, when executed is configured to receive a plurality of requests for items from corresponding users, wherein the plurality of requests are associated with corresponding offer amounts and determine what the users are to provide for the items based at least in part on how many requests were received, how many items are allocated to users, and/or how many unallocated items are available, wherein at least a portion of the users are to provide an amount different than their corresponding offer amount. | 05-31-2012 |
20120136991 | METHOD AND DEVICE FOR IMPROVING A BROWSING EXPERIENCE - A wireless communication device ( | 05-31-2012 |
20120136992 | USAGE-SENSITIVE POLICY AND CHARGING CONTROL METHOD, SERVERS, SYSTEMS AND COMPUTER PROGRAMS - In a policy and charging control method carried out by a server including a policy and charging enforcement function (PCEF), identification information for identifying a particular service instance of a particular service type is obtained. When a packet is received, the PCEF determines whether the packet belongs to the particular service instance by using the identification information and by inspection of at least one of Open Systems Interconnection (OSI) layer n control information of the packet, wherein n is an integer equal to or larger than 3, and the packet's payload. If it is determined that the packet belongs to the particular service instance, the PCEF updates a usage parameter representing an accumulated usage associated with the particular service instance. The PCEF then makes available to a policy and charging rules function (PCRF), the usage parameter or information derived therefrom. | 05-31-2012 |
20120136993 | MONITORING AN INFORMATION TECHNOLOGY SYSTEM - The present invention relates to the technical field of performance management for IT systems. More particularly, the present invention relates to a technology of performing monitoring on demand for a complex IT system. According to one aspect of the present invention, there is provided a method of system monitoring that includes: monitoring a performance parameter of a client of the system, determining, based on the performance parameter of the client, whether to monitor a service endpoint directly called by the client, locating the service endpoint to be monitored in response to a determination to monitor the service endpoint directly called by the client, and monitoring a performance parameter of the service endpoint. | 05-31-2012 |
20120136994 | INTERNET PROVIDER SUBSCRIBER COMMUNICATIONS SYSTEM - A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a provider of Internet services, comprising a first device, and a second device communicably coupled to the first device, wherein the first device: accesses only subscriber upstream traffic to a destination web site requested by the subscriber, wherein the first device inter-connects between the at least one subscriber and the destination web site, identifies the at least one subscriber's identification based on the accessed subscriber upstream traffic automatically provided by the subscriber, and provides the unique subscriber identification to the second device located at the provider of Internet services providing data services and management control to the first device, wherein the second device determines the subscriber associated with the unique subscriber identification. | 05-31-2012 |
20120136995 | Selective User Notification Based on IP Flow Information - An example embodiment of the present invention provides a process that uses IP flow information to selectively notify users of an application server of the server's unavailability. In the example embodiment, the process, which might run on a system comprising a router, monitors IP flow records as to dropped packets and learns that an application server has become unavailable. The process then uses the IP flow records to identify active users of the application server, for example, by passing a source IP address to a presence service. Once the process has identified an active user, the process determines a means of notification for the user, which might be through the presence service, and transmits a notification to the user as to the unavailability of the application server. In the example embodiment, the process transmits a later notification as to the availability of the application server, using reverse camp-on functionality. | 05-31-2012 |
20120136996 | METHOD FOR MANAGING NETWORK AND FOR PROVIDING SERVICE QOS - Provided is a network management method of a network manager. The network management method includes monitoring events including state information of a managed element wherein the events are published by the managed element included in a network, and generating commands for an action performed in the managed element according to the events, wherein the events are subscribed by the network manager managing the network. | 05-31-2012 |
20120144013 | Discovery of on-path services for media flows - In one embodiment, a method includes receiving at a session call manager, service information transmitted from one or more service points on a path for a media flow between a source and a receiver, selecting from the service information, services to apply to the media flow at the service points, and signaling the service points to apply the selected services to the media flow. An apparatus is also disclosed. | 06-07-2012 |
20120144014 | DIRECTING DATA FLOWS IN DATA CENTERS WITH CLUSTERING SERVICES - Techniques are provided for implementing clustering services in a virtual data center or other virtualized infrastructure in a manner that allows packets to be directed to a particular service engine of a service engine cluster. | 06-07-2012 |
20120144015 | System and Method for Distributing Application Traffic to Servers Based on Dynamic Service Response Time - A service gateway processes a service request received from a host by: relaying the service request from the service gateway to a server over a service session between the service gateway and the server; determining a service request time for the service session; receiving by the service gateway a service response from the server; determining by the service gateway a service response time; calculating by the service gateway a service processing time for the service request from the service request time and the service response time; comparing the service processing time with an expected service processing time; and updating a server busy indicator for the server in response to the comparing. If the service processing time exceeds the expected service processing time, the server busy indicator is updated to indicate that the server is busy. Otherwise, the server busy indicator is updated to indicate that the server is not busy. | 06-07-2012 |
20120144016 | System and Method for Counting Network Users - Embodiments presented herein provide methods, systems and computer program products for determining a count of network users. One method identifies one or more login access requests, from one or more server logs. Each of the one or more login access requests comprises a login cookie, and a user identifier. The method then forms one or more connected components based on the one or more login access requests. Each connected component comprises one or more user identifiers, wherein each of the one or more user identifiers is associated with one or more login cookies. The method finally determines a count of login users based, at least in part, on the user identifiers in the one or more connected components. | 06-07-2012 |
20120144017 | Modeling and Reducing Power Consumption in Large IT Systems - The power consumed by a large IT system may be managed by individual servers calculating a set of predictors of the resources of the large IT system that may be required for a future time period, and weighting factors for those predictors. The predictors and weighting factors may be based on historical data showing actual resources used and past values of the predictors and weighting factors. An estimate of the resources required for the large IT system is then produced based on the predictors and weighting factors and the estimate is then used to determine excess resources of the individual server that may be put into a low power state in the future time period to minimize the power used. If too much resource is excess, the server may enter a soft off state. | 06-07-2012 |
20120144018 | Dynamic Rate Heartbeating for Inter-Node Status Updating - A scheme for monitoring node operational status according to communications transmits messages periodically according to a heartbeat rate among the nodes. The messages may be gossip messages containing the status of the other nodes in the pairs, are received at the nodes and indications of the communications delays of the received messages are stored, which are used to compute statistics of the stored communications delays. Parameters of the node status monitoring, which are used for determining operational status of the nodes, are adjusted according to the statistics, which may include adjusting the heartbeat rate, the maximum wait time before a message is considered missed, and/or the maximum number of missed messages, e.g., the sequence number deviation, before the node is considered non-operational (down). | 06-07-2012 |
20120144019 | MULTICHANNEL CONNECTIONS IN FILE SYSTEM SESSIONS - A multi-connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound to multiple connections to enable communication over multiple transports. During the initial negotiation of a session, a client and a server determine whether multiple connections are supported between the client and the server within a session. After establishing an initial connection, additional connections can be established and bound to the existing session. The multiple connections can be used for failover and/or load balancing. The multi-connection information system provides a protocol for discovering a capability to establish multiple channels within a session and information about the available connections between two particular resources. | 06-07-2012 |
20120144020 | Dynamic Administration Of Event Pools For Relevant Event And Alert Analysis During Event Storms - Dynamic administration of event pools for relevant event and alert analysis during event storms including receiving, by an events analyzer from an events queue, a plurality of events from one or more components of the distributed processing system, each event including an occurred time and a logged time; creating, by the event analyzer, an events pool; determining whether an arrival rate of the events from the components of the distributed processing system is greater than a predetermined threshold; if the arrival rate is greater than the predetermined threshold, assigning, by the events analyzer, a plurality of events to the events pool in dependence upon their occurred time; and if the arrival rate is not greater than the predetermined threshold, assigning, by the events analyzer, a plurality of events to the events pool in dependence upon their logged time. | 06-07-2012 |
20120144021 | Administering Event Reporting Rules In A Distributed Processing System - Methods, systems and products are provided for administering event reporting rules in a distributed processing system that includes identifying that one or more nodes of the distributed processing system is idle; for each identified idle node, collecting by the idle node any suppressed events and logged data from the node; sending the suppressed events and logged data to a database of events; and changing the event reporting rules for one or more components on the identified idle node in dependence upon the suppressed events and the logged data. | 06-07-2012 |
20120144022 | CONTENT RECOMMENDATION THROUGH CONSUMER-DEFINED AUTHORITIES - A method for recommending content to a consumer in a manner proactively controlled by the consumer. The method is based on subscription to one or more consumer-identified authorities that receive content of potential interest to the consumer. The method comprises identifying an authority that shares an interest of the consumer, and establishing a communication channel through which information about the authority is passed to the consumer. The method further comprises monitoring a consumption activity of the identified authority, and offering one or more content recommendations to the consumer based on such monitoring. | 06-07-2012 |
20120144023 | METHOD AND SYSTEM FOR VALIDATING CONFIGURATION DATA IN A MULTI-TENANT ENVIRONMENT - Validation systems and methods are described to validate domain name services (DNS) or other configuration data for multiple network services provided by a common multi-tenant application server. A validation system suitably receives configuration data from the multi-tenant application server for each of the services provided. The validation system also performs a validation query to a domain name services or other public service on the network to obtain public data about each service. The publicly-available information is compared to the data received from the multi-tenant application server, and any anomalies are reported and/or repaired as appropriate. | 06-07-2012 |
20120144024 | METHOD AND SYSTEM FOR USER SESSION DISCOVERY IN A MULTI-TENANT ENVIRONMENT - Systems and methods are described to validate user connections to one or more application servers within a multi-tenant application system. A domain-level cookie at the client identifies any active connections for that client. As the client requests a connection to a particular application, the cookie is provided to a validation server that determines if any previously-established sessions with the multi-tenant system exist, and/or if such sessions remain active. If an active session already exists, then the client can be redirected to a particular server to continue the previously-established session. If no valid prior sessions are available, then the client can be validated and a new connection to an appropriate server can be established, as appropriate. | 06-07-2012 |
20120144025 | Method and an Arrangement For Enabling User Traffic Classification Configuration - A method of enabling traffic flow classification on a node, which may be used for controlling the traffic flows on the same node or on another node of a communication network. A first mapping process is configured to manage an operation for linking an application process to a class, and a second mapping process is configured to manage an operation for linking an application process to a unique signature. A third mapping process is configured to manage a record of accumulated linking information, such that a traffic flows associated with an application process may be identified and such that a classification of the respective traffic flow can be recognised. The accumulated classification information may then be used for controlling purposes. | 06-07-2012 |
20120144026 | Monitoring Connections - Apparatus for processing requests from a plurality of connected clients for data stored by a plurality of connected servers comprising a processor, memory, storage, a network interface, and a user input device is disclosed. The processor is configured to receive requests from the connected clients via the network interface, select a connected server to route each requests to, thereby defining a selected server per request, create a connection per request to its selected server using the network interface, route the requests to their selected servers using the connections, and monitor the connections whilst the selected servers service the requests, so as to create monitored connection data for each connection. The monitored connection data is stored in data structures that are referenced by a buffer, and upon creation of a data structure relating to the most recently created connection, reference to the oldest data structure in the buffer is removed. | 06-07-2012 |
20120144027 | Performance Management Implementation Method and Network Management System - A method for implementing performance management and a network management system are disclosed in the present invention. The method for implementing performance management includes the following steps of: a network management system obtaining a performance management information model which is used for describing related information of all performance data that need to be collected; the network management system instantiating the performance management information model according to a current telecommunication network in application to obtain a performance management information model instance; the network management system collecting the performance data according to the performance management information model instance. The present invention may be applied in performance management in various specialized telecommunications networks. | 06-07-2012 |
20120144028 | MONITORING PROCESSES IN A COMPUTER - A monitoring program is run on a computer to identify a process running on the computer, and, for the identified process, determine whether or not one or more predetermined characteristics of the process complies with respective reference characteristics. This allows the program to automatically distinguish whether the process is likely to be a productive process or a non-productive process. For each characteristic a certainty value is incremented or decremented depending on whether the characteristic complies with the reference characteristic. Examples of characteristics are the time pattern of running of a process and the use of hardware resources by the process. Other characteristics include receiving input from a user and connections to known IP addresses. The monitoring process may be used to control power consumption to detect and run non-productive processes in a low power state. | 06-07-2012 |
20120144029 | NON-INTRUSIVE MONITORING OF SERVICES IN A SERVICES-ORIENTED ARCHITECTURE - A system for monitoring a service provided in a service-oriented architecture may include a computing device configured to submit a subscription request to a plurality of intermediaries in the service-oriented architecture from which to receive monitored data related to the service. An application operating on the computing device may determine which ones of the plurality of intermediaries to rely upon for monitoring the service based at least in part on a probability value associated with each intermediary. The probability value is a function of at least a frequency of messages associated with the service processed by the intermediary and a time period since a last message associated with the service was processed by the intermediary. The system may also include an output device to present the monitored data in response to the monitored data being received by the computing device from the determined ones of the plurality of intermediaries. | 06-07-2012 |
20120144030 | Probe Election In Failover Configuration - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type. | 06-07-2012 |
20120144031 | SYSTEM FOR NETWORK DEPLOYMENT AND METHOD FOR MAPPING AND DATA FORWARDING THEREOF - The invention discloses a system for network deployment and a method for mapping and data forwarding thereof. The system for network deployment comprises Distributed Hash Table (DHT) servers and DHT border servers, wherein at least one DHT border server and one DHT server are connected to form a server ring which constitutes a distributed mapping database used for storing a mapping relationship between Endpoint Identifiers (EIDs) and Routing Locators (RLOCs), and the server rings are connected with each other through the DHT border servers, wherein the DHT border server is configured to notify the EID prefix information in a present server ring to other server rings and monitor the DHT messages of the distributed mapping database. By the present invention, the network deployment and cross-domain data forwarding based on the DHT are achieved. | 06-07-2012 |
20120144032 | Monitoring System - A monitoring unit having at least one interface to receive information from at least one device to be monitored, the monitoring unit further having a data transmitter operable wirelessly to communicate information relating to the at least one device to a remote server, accessible by a user remote from the server. | 06-07-2012 |
20120144033 | METHOD AND SYSTEM FOR OPTIMIZING PERFORMANCE AND AVAILABILITY OF A DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) SERVICE - A system and computer program product for monitoring and optimizing performance and availability of a Dynamic Host Configuration Protocol (DHCP) service are provided by one or a plurality of DHCP servers in an Internet Protocol (IP) network comprising one or a plurality of IP subnetworks. The system implemented in hardware, comprises a computer infrastructure operable to define one or a plurality of groups of subnetworks, each group of subnetworks comprising one or a plurality of subnetworks. The computer infrastructure is further operable to retrieve information related to resources, in particular IP addresses, allocated within a DHCP server to each group of subnetworks. The computer infrastructure is further operable to transfer the information to a DHCP service monitoring system, the DHCP service monitoring system comprising means for retrieving the information from the one or a plurality of DHCP servers and means for aggregating the information for each group of subnetworks. | 06-07-2012 |
20120151031 | REAL-TIME, SELF-DIRECTING UPDATING OF ASSET STATE - A system allows a remote asset, via an Intelligent Device and interconnected Central Data Server to autonomously, and continuously monitor and update its status on various parameters; and from these, to calculate an overall asset state that may be caused by various combinations of the parameters. | 06-14-2012 |
20120151032 | Detecting And Measuring Network Route Reconvergence Using In-Band Data Probes - The present disclosure is directed to systems and methods for detecting and measuring network route reconvergence using in-band data probes. The probes are generated and inserted into the network. The probes are routed to an insertion point, corresponding to a beginning of a measurement line, via an in-band connection such as a virtual private network. The in-band connection is configured such that the time-to-live field of the probes is not affected by network path changes occurring in the in-band connection. The probes are routed through the measurement line to measure network route reconvergence. The measurement line is configured to affect the time-to-live field of the probes to reflect network path changes occurring along the measurement line. The probes are extracted from an extraction point corresponding to an end of the measurement line and routed back to the measurement device for analysis. | 06-14-2012 |
20120151033 | MOBILE BOTNET MITIGATION - Mitigation of bot networks in wireless networks and/or on mobile devices is provided. A botnet detection component is provided that inspects data traffic and data flows on the wireless network to identify mobile devices that are suspected of behaving as bots. A traffic profile of the suspected bot behavior can be generated and forwarded to the mobile devices that are suspected of behaving as bots. The mobile device can correlate data traffic on the device to the traffic profile in order to identify applications responsible for the suspected bot behavior, and remove the identified applications. | 06-14-2012 |
20120151034 | METHOD AND SYSTEM FOR CONFIGURING INSTRUMENTATION DEVICES - A method and system for managing an instrumentation device include accessing an image of the instrumentation device. Based on the image, an identity for the instrumentation device is determined. The identity is used to register the instrumentation device by configuring a gateway at a multimedia content distribution network client location to access and communicate with the instrumentation device. The identity of the instrumentation device and the gateway may be stored for future configuration of the gateway. | 06-14-2012 |
20120151035 | METHOD AND APPARATUS FOR WIRELESS NETWORK PERFORMANCE DIAGNOSTICS VIA USER EQUIPMENT - A method, computer readable medium for diagnosing wireless network performance via a customer endpoint device are disclosed. For example, the method receives a request to perform a wireless network performance diagnostic test that is initiated by a customer endpoint device, establishes a session with the customer endpoint device, performs the wireless network performance diagnostic test in response to the request via the session using a packet generated by the customer endpoint device and provides diagnostic test data gathered from the wireless network performance diagnostic test to the customer endpoint device. | 06-14-2012 |
20120151036 | IDENTIFYING STRAY ASSETS IN A COMPUTING ENVIROMENT AND RESPONSIVELY TAKING RESOLUTION ACTIONS - In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed. | 06-14-2012 |
20120151037 | Adaptive Download Bandwidth Allocation System, Apparatus and Method - Apparatus for controlling the downloading conditions of software objects from a carousel server to a population of remotely-located, in-service, software-configurable consumer devices communicating via a network is disclosed. The apparatus includes an electronic controller programmed to automatically generate an announcement over the network to a target population of consumer devices. The announcement concerns the availability of a software object loaded for download on the carousel server. The controller receives replies from the target population of consumer devices and analyzes the replies to determine a quantity of the consumer devices in the target population that require the download and to determine an optimal allocation of bandwidth for the download based on information provided by the replies. A download system and method are also provided. | 06-14-2012 |
20120151038 | SYSTEM AND METHOD FOR PROVIDING TCP PERFORMANCE TESTING - A system and method for providing Transmission Control Protocol (TCP) performance testing is disclosed. The system may comprise an input configured to receive configuration information for performance testing of a network element. The system may also comprise an output configured to transmit traffic generation information based on the configuration information to a traffic generator to generate continuous streams of bidirectional TCP traffic to the network element and to output results of performance testing based on analysis of network element response. The system may also comprise a processor configured to analyze network element response to the continuous streams of bidirectional TCP traffic, wherein the results of performance testing are based on analysis of network element response. | 06-14-2012 |
20120151039 | Multicast Distribution of Incrementally Enhanced Content - A client system includes a processor configured to obtain multicast information for a content item, the multicast information including information about a multicast session for a base stream and additional multicast sessions for available incremental streams. The processor is also configured to determine an available bandwidth, and to join a set of initial multicast sessions based on the available bandwidth, the set of initial multicast sessions including the multicast session for the base stream and at least one of the additional multicast sessions for the incremental streams. The processor is also configured to monitor a network condition, and to perform an action based on the network condition, the action selected from the group consisting of joining another of the additional multicast sessions, leaving one of the initial multicast sessions, and a combination thereof. | 06-14-2012 |
20120151040 | COMPUTER INVENTORY DATA CONSOLIDATION - Remaining trust levels (RTLs) are computed for respective computer-inventory data sets. The computations involve applying decay formulae to initially assigned trust levels (ATLs). The data sets can then be consolidated so as to reconcile apparently inconsistent data by comparing respective RTLs. | 06-14-2012 |
20120151041 | INTELLIGENT MOBILITY APPLICATION PROFILING TOOL - Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user. | 06-14-2012 |
20120151042 | Apparatus, System and Method for Resolving Bandwidth Constriction - An apparatus, system and method are disclosed for resolving bandwidth constriction using multiple bandwidths and/or multiple content delivery paths. The apparatus, system and method may include recording requested video content and/or delivering the recorded video content to resolve bandwidth constriction using alternate bandwidths or delivery paths. | 06-14-2012 |
20120151043 | System for Internet Scale Visualization and Detection of Performance Events - A system for visualization of performance measurements is disclosed. The system may include an electronic data processor configured to receive a stream of the performance measurements and select a maximum number of leaf nodes of a plurality of nodes for use in an adaptive decision tree. Additionally, the electronic processor may be configured to determine a depth of each branch in the adaptive decision tree needed to differentiate performance among internet protocol addresses in an internet protocol prefix of each node. Each of the plurality of nodes may be annotated with a predicted latency category and the processor may be configured to generate the adaptive decision tree based on the maximum number of leaf nodes selected, the depth of each branch determined, the predicted latency category, and on the stream of performance measurements associated with the network. Moreover, the processor may display the adaptive decision tree. | 06-14-2012 |
20120151044 | DISTRIBUTED CACHING FOR RESOURCE AND MOBILE NETWORK TRAFFIC MANAGEMENT - Systems and methods for distributed caching for resource and mobile network traffic management are disclosed. In one aspect, embodiments of the present disclosure include a distributed proxy and cache system, including, means for, detecting a first data request made by a first mobile application on a mobile device; means for, retrieving cached elements stored in a local cache on the mobile device to respond to the first data request; means for, detecting a second data request made by a second mobile application on the mobile device, and/or means for, establishing connectivity of the mobile device to the wireless network to satisfy the second data request made. | 06-14-2012 |
20120151045 | SYSTEM AND METHOD FOR IMPROVED DETECTION AND MONITORING OF ONLINE ACCOUNTS - A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal computing device, receiving identifying information associated with at least one of an account, email address, site, and service from the personal computing device via the online-monitoring agent, and monitoring via a network the at least one of the account, email address, site, and service based on the identifying information received via the online-monitoring agent. | 06-14-2012 |
20120151046 | SYSTEM AND METHOD FOR MONITORING AND REPORTING PEER COMMUNICATIONS - A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal computing device, receiving identifying information associated with at least one of an account, email address, site, and service from the personal computing device via the online-monitoring agent, and monitoring via a network the at least one of the account, email address, site, and service based on the identifying information received via the online-monitoring agent. | 06-14-2012 |
20120151047 | COMMUNICATION MONITORING SYSTEM AND METHOD ENABLING DESIGNATING A PEER - A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal computing device, receiving identifying information associated with at least one of an account, email address, site, and service from the personal computing device via the online-monitoring agent, and monitoring via a network the at least one of the account, email address, site, and service based on the identifying information received via the online-monitoring agent. | 06-14-2012 |
20120151048 | COMMUNICATION DEVICE, APPARATUS, SYSTEM, AND METHOD OF SETTING COMMUNICATION DEVICE, AND COMMUNICATION DEVICE SETTING PROGRAM - A communication device is assigned with a first address that is uniquely assigned to the communication device, and a second address that is commonly assigned to communication devices of the same type. An information processing apparatus, which is connected to the communication device through a network, sends a communication packet that is addressed to the second address and includes a request for setting device settings information of the communication device. The communication device, when it is determined to respond to the communication packet, sends a communication packet including current device settings information of the information processing apparatus to the information processing apparatus. | 06-14-2012 |
20120151049 | METHOD, SYSTEM, AND APPARATUS FOR ENTERPRISE WIDE STORAGE AND RETRIEVAL OF LARGE AMOUNTS OF DATA - A scalable network of mobile data storage containers that are connected in peer-to-peer networks to archive large data storage capacities. The various embodiments provide a method of extracting a large amount of data from a variety of sources and storing the extracted data in mobile, storage units. The various embodiments provide storage units housed in mobile containers that can store multiple days/weeks of sensor data in the order of petabytes (1024 terabytes). The various embodiments, integrate high performance computing devices into the mobile storage containers that are able to perform critical extraction, pattern, and index processing on the sensor data. The various embodiments, provide a method for the efficient physical transport of the mobile storage containers from current locations to a center analysis location for re-connecting in another peer-to-peer network for integration into a central enterprise data warehouses. | 06-14-2012 |
20120151050 | PROACTIVE INTELLECTUAL PROPERTY ENFORCEMENT SYSTEM - A proactive intellectual property enforcement system is disclosed. File sharing services may be disrupted by uploading a collection of multiple modified versions of a media file. The collection of modified copies may each include a distinct portion of modified and unmodified content. However, even though each modified copy includes a distinct variation of modified and unmodified content, the set of modified files are constructed such that some common portion (or portions) of the media file are always created as the modified version. Thus, a complete, unmodified copy of the media title cannot be reconstructed from the set of modified copies. | 06-14-2012 |
20120151051 | METHOD, SYSTEM AND DEVICE FOR SEARCHING ACTIVE PEER IN P2P STREAMING MEDIA SYSTEM - Disclosed is a method, system and device for searching active nodes in P2P(peer to peer) streaming media system. Selectable nodes briefly and efficiently report their own subblocks information to a tracker device, such as the number of the continuous buffered subblocks, the sequence number of the first subblock of the continuous subblocks and the total number information of the buffered subblocks; the tracker device can select suitable candidate nodes for a request node according to the subblocks information of the selectable nodes, therefore the request node can determine active nodes without sending a large amount of detections to the candidate nodes; the waste of communication resources is avoided and the bandwidth cost is reduced; also, the selectable nodes can report characters of the networks where they locate, and the tracker device can select nodes in wired network to be candidate nodes first, therefore, the transmission speed of the whole P2P system is improved and the waiting delay of the request node is reduced. | 06-14-2012 |
20120151052 | MONITORING SYSTEM - A monitoring system comprising a plurality of computers (PC | 06-14-2012 |
20120151053 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT SYSTEM, DATA PROCESSING METHOD, AND OPERATIONS MANAGEMENT PROGRAM - An operations management apparatus which acquires performance information for each of a plurality of performance items from a plurality of controlled units and manages operation of the controlled units includes a correlation model generation unit which derives a correlation function between a first element and a second element of the performance information, generates a correlation model between the first element and the second element based on the correlation function, and obtains the correlation model for each element pair of the performance information, and a model searching unit which searches for the correlation model for each element between an input element and an output element among elements of the performance information in series, and predicts a value of the output element from a value of the input element based on the searched correlation model. | 06-14-2012 |
20120158942 | METHODS AND APPARATUS FOR FORWARDING-STATE TRANSPORT IN A DISTRIBUTED CONTROL PLANE - In some embodiments, a system includes a first network control entity, a second network control entity and a third network control entity. The first network control entity and the second network control entity are associated with a first network segment. The third network control entity is associated with a second network segment. The first network control entity is operable to send to the second network control entity an identifier of the first network segment and forwarding-state information associated with a data port at a first network element. The second network control entity is operable to receive the identifier of the first network segment and the forwarding-state information. The second network control entity is operable to send the forwarding-state information to a second network element. The first network control entity does not send the identifier of the first network segment and the forwarding-state information to the third network control entity. | 06-21-2012 |
20120158943 | Augmenting Personal Availability Using a Mobile Device - An online presence may be augmented by leveraging mobile computing device sensors in a mobile computing device. State change and/or rate of change data measured by the mobile computing device sensors may be received. The state change and/or rate of change data may be compared with a set of rules to determine a matching online presence state for the mobile computing device. The set of rules may describe different online presence states associated with a user of the mobile computing device. A current online presence associated with the user of the mobile computing device may then be updated to the matching online presence state. | 06-21-2012 |
20120158944 | DETERMINING WHETHER A DEVICE IS INSIDE A NETWORK - A network address of a computing device is obtained, and an unencrypted request is sent to a resource access manager of a particular network. If both a response is received from the resource access manager and the computing device has a network address within a desired range of network addresses, then a determination is made that the computing device is inside the particular network. Otherwise, a determination is made that the computing device is outside the particular network. | 06-21-2012 |
20120158945 | SERVER LOAD BALANCING USING DYNAMIC LOG-ON GROUPS - One or more dynamic logon group parameters can be retrieved. The dynamic logon group parameters can be associated with an originator of requests for server processing by a computing system that includes a plurality of server instances, can be established prior to runtime, and can include an abstract definition of server instance characteristics required or preferred for handling the requests from the originator without designating specific server instances for handling the requests from the originator. One or more server instances can be selected from the plurality of server instances such that the one or more selected server instances satisfy the abstract definition of server instance characteristics. At runtime, the one or more selected server instances can be assigned to respond to the requests from the originator. Related articles of manufacture, systems, and methods are described. | 06-21-2012 |
20120158946 | WORK UNIT ADAPTERS - A method including receiving a work flow for the ingestion, transformation, and distribution of content, wherein the work flow includes one or more work unit tasks; retrieving work unit task information pertaining to the one or more work unit tasks; identifying one or more network elements to execute one of the one or more work unit tasks based on the work unit task information; translating the work unit task information from a format used by one or more devices to another format that is used by the one or more network elements based on one of an object adapter pattern or a class adapter pattern; and send the translated work unit task information to the one or more network elements. | 06-21-2012 |
20120158947 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost aware network behavior. An operating system of the mobile computing device may associate data for transmission with a entity and, based on a policy applicable to that entity and information on data usage, determine appropriate processing for the data. The processing may include transmitting the data, with or without throttling, or blocking transmission of the data. The policy, for example, may be supplied by a user or may be encoded in a tag supplied with the data for transmission. The policies may be specified for entities such as an application, an operating system service, a user account or a category of applications. Enforcement of the determined processing may be based on action within the stack or a separate enforcement mechanism, such as a firewall. | 06-21-2012 |
20120158948 | AUTO-CONFIGURATION OF NETWORK PARAMETERS FOR MULTIMEDIA TRAFFIC USING SESSION DESCRIPTION PROTOCOL - In an example embodiment, a wireless distribution system obtains data for advertised data flows, such as multimedia traffic flows, by snooping attribute details of session description protocol (SDP) announcements. The wireless distribution system can use the data for functions such as admissions control, load balancing, and/or multicast to unicast conversion decisions. | 06-21-2012 |
20120158949 | NETWORK SYSTEM FOR POLICING RESOURCE INTENSIVE BEHAVIORS - A system may include a network traffic policing system configured to monitor resource intensive users and applications of a wireless communication network. The network traffic policing system may include a processing device configured to determine policy actions; and a plurality of policy nodes in communication with the processing device and configured to: gather statistics regarding key variables of the wireless communication network, the statistics including at least one non-data usage variable, forward updated information relating to the key variables to the processing device, and enforce at least one policy action determined by the processing device. | 06-21-2012 |
20120158950 | METHOD AND A SYSTEM FOR MANAGING A WEBSITE USING PROFILE KEY PATTERNS - A method and a system for managing a website are disclosed, the website being arranged on a server. The method comprises the steps of selecting a set of n profile key parameters, said set of n profile key parameters defining an n-dimensional profile key, and creating content for the website while assigning profile key values to the content, each profile key value being associated to a profile key parameter. A plurality of visitors are allowed to visit the website. For each visitor, the behaviour of the visitor is monitored, and a profile key for the visitor is generated by continuously adjusting profile key parameter values in accordance with content viewed and/or actions taken by the visitor, and in accordance with the profile key values assigned to the content of the website. The generated profile key thereby reflects behaviour and preferences of the visitor. | 06-21-2012 |
20120158951 | METHOD AND A SYSTEM FOR ANALYSING TRAFFIC ON A WEBSITE - A method and a system for analysing traffic on a website are disclosed, the website being arranged on a server. The method comprises the steps of allowing a visitor to visit the website, and monitoring navigations and/or actions performed by the visitor during the visit while accumulating value points in accordance with content viewed by the visitor and actions performed by the visitor, and in accordance with predefined value point settings associated with content of the website, thereby obtaining an accumulated value point score for the visit. An origin of the visit, leading the visitor to the web site, is registered and stored along with the accumulated value point score. Finally, the stored information is categorised in accordance with two or more predefined categories of origin. Thereby the web site owner obtains information regarding where value generated during visit originates from. | 06-21-2012 |
20120158952 | METHOD AND A SYSTEM FOR ANALYSING TRAFFIC ON A WEBSITE BY MEANS OF PATH ANALYSIS - A method and a system for analysing traffic on a website are disclosed, the website being arranged on a server. The method comprises the steps of allowing a plurality of visitors to visit the website; for each visit, registering a sequence of pages viewed by the visitor and/or actions performed by the visitor during the visit; for each visit, monitoring navigations and/or actions performed by the visitor during the visit while accumulating value points in accordance with content viewed by the visitor and actions performed by the visitor, and in accordance with predefined value point settings associated with content of the website, thereby obtaining an accumulated value point score for the visit; and defining a set of visits from the plurality of visits. Path patterns are built based on the visits of the set of visits, where the registered sequences form the path patterns, the path patterns including one or more full path patterns, each full path pattern corresponding to a complete registered sequence of at least one visit, and for each full path pattern, a total path value is calculated being the sum of accumulated value point scores for all visits with registered sequences forming said full path pattern. | 06-21-2012 |
20120158953 | SYSTEMS AND METHODS FOR MONITORING AND MITIGATING INFORMATION LEAKS - Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization's web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer's servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization's web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization's network which will obscure an intent the organization has with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space. | 06-21-2012 |
20120158954 | METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Example methods and apparatus to determine media impressions using distributed demographic information are disclosed. A disclosed example method to monitor media content exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer, sending, from the first internet domain, a response to the client computer, the response to instruct the client computer to send a second request to an intermediary associated with a sub-domain of a second internet domain, the second request to be indicative of the access to the media at the client computer, the intermediary to transmit an indication of the second request to an entity of the second internet domain, and logging an impression of the media. | 06-21-2012 |
20120158955 | APPARATUS AND METHOD FOR LAWFUL INTERCEPTION - A lawful interception apparatus of a service providing system inquires of a trust server in which a law execution server commissions lawful interception authority whether a terminal that connects to a service connection point is an interception target, determines whether a terminal that connects to a service connection point is an interception target, and if a terminal that connects to a service connection point is an interception target, and the lawful interception apparatus intercepts communication traffic that is related to the terminal. | 06-21-2012 |
20120158956 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREOF AND PROGRAM - The present invention provides an information processing apparatus that, when a particular event that is different from an operation event made on an operation screen provided by a web server has occurred, actively transmits a notification of the event to the web server and a control method thereof. To accomplish this, the information processing apparatus is configured such that, when a particular event that is different from operation events made on the operation screen provided by the web server has occurred in the information processing apparatus, the information processing apparatus determines whether or not the web server is waiting for notification of the particular event and if the web server is waiting for notification of the particular event, the information processing apparatus notifies the web server of the particular event. | 06-21-2012 |
20120158957 | RELAY APPARATUS AND COMMUNICATION METHOD - A relay apparatus performing communication between a first processing apparatus and a second processing apparatus through another relay apparatus, the relay apparatus includes a transmission unit to transmit transmission data to the other relay apparatus, a calculation unit to measure a round trip time (RTT) from transmission of data to the other relay apparatus to receiving of a response, and calculate a transmission time on a basis of the RTT, and a scheduler unit to control transmission times of transmission data to the other relay apparatus outputs, when the scheduler unit detects the transmission data and a size of the detected transmission data is not larger than a specified value, the transmission data to the transmission unit after a time from the detection of the transmission data has passed the transmission time. | 06-21-2012 |
20120158958 | IN-PLACE OBJECT MODEL ANALYSIS AND TRAVERSAL SYSTEM AND METHOD THEREOF - A method, system, and computer program product for in-place object model analysis and traversal of third party objects/types in a cloud-based environment. Information is received from a third party system, including a plurality of third party objects and/or types. The information may pertain to both run-time structure and/or compile time structure. The received objects/types are analyzed at run-time without accessing the third party object model and/or source code. A re-usable meta schema is created and cached based on the analysis, including determining attributes, methods or supertypes for the objects/types. A type hierarchy may be pre-computed for the plurality of analyzed object models. The re-usable meta schema may then be used for run-time object/type traversal without accessing the third party object model/source code. | 06-21-2012 |
20120158959 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 06-21-2012 |
20120158960 | MIXED-MODE ANALYSIS - A network analyzer determines, analyzes, and displays in streaming and non-streaming modes to provide analysis of specific transactions in that make sense within a primarily streaming or asynchronous flow of data, providing useful and accurate measurements. | 06-21-2012 |
20120158961 | SYSTEM FOR ENABLING RICH NETWORK APPLICATIONS - The present invention generally provides methods, systems and articles of manufacture that provide an autonomous system for enabling rich network applications. Embodiments of the invention may monitor an existing network application and generate a profile on the network application based on what responses and data updates are triggered by various requests from a user. Embodiments of the invention may refactor the existing network application into a rich network application based on the profile created for that network application. | 06-21-2012 |
20120158962 | Collecting Information Regarding Consumer Click-Through Traffic - A method and system for providing the centralized collection of click-through traffic information. The method includes receiving a DNS query for a domain name at a third party auditing service from a requesting computing resource. The domain name is configured to include click-through information as a subdomain, and wherein a URL associated with the domain name provides content. The click-through information is parsed from the domain name without establishing a connection between said third party auditing server and any web server providing the content. An IP address for the web server associated with the domain name is sent to the requesting computing resource. | 06-21-2012 |
20120158963 | TUNNELING SSL OVER SSH - A system and method for enabling single-socket server applications to receive information via multiple ports. In one embodiment, a system includes a network tunnel configured to receive traffic at a first port of an application server and to communicate the received traffic to a second port of the application server. The system further includes a single-socket application, coupled to the second port of the application server, to monitor for incoming traffic at the second port, and to receive the traffic destined for the first port and communicated to the second port via the network tunnel. | 06-21-2012 |
20120166616 | System and method for energy performance management - A system for resource performance management, comprising a network-connected data collection service adapted to receive data from a plurality of resources, a network-connected data aggregation and reporting service adapted to aggregate resource-related data on at least temporal, organizational, geographic, and resource-specific dimensions, a network-connected initiative modeling service adapted to facilitate modeling by a user of a plurality of resource-related initiatives, and a network-connected initiative monitoring service adapted to receive data from one of the data collection service and the data aggregation and reporting service, and further adapted to measure performance of a plurality of resource-based initiatives, wherein a plurality of resource-based initiatives are assembled within the initiative modeling service into a plurality of initiative portfolios, and the plurality of initiative portfolios are modeled under a variety of forecast scenarios to determine an optimal initiative portfolio from among the plurality of portfolios, is disclosed. | 06-28-2012 |
20120166617 | GLOBAL REAL-TIME NETWORK RESOURCE AND TIMER SYNCHRONIZATION - A device receives, from multiple network elements, status information for a user equipment (UE) connection associated with a wireless core network and updates, based on the status information received from the network elements, a database record for the UE connection. The device receives, from an application server, a request for information associated with the UE connection and constructs, based on the request and from the database record, a resource message that includes real-time information about the UE connection. The device sends the resource message to the application server. The device also provides a disconnect message to the application server and/or the network elements when the status information received from the network elements indicates that the UE has been disconnected from the wireless core network. | 06-28-2012 |
20120166618 | ADAPTIVE INTELLIGENT ROUTING IN A COMMUNICATION SYSTEM - This disclosure relates to a system and method for routing data packets adaptively in a communication system. As the proliferation of data rich content and increasingly more capable mobile devices has continued, the amount of data communicated over mobile operator's networks can continue to exponentially increase. One way to accommodate increased data traffic and provide high quality data communication services to end users is by utilizing network resources efficiently. This disclosure provides systems and methods for efficiently utilizing network resources by providing adaptive intelligence to data packet routing systems. | 06-28-2012 |
20120166619 | LICENSING AND METERING OF VIRTUALIZED APPLICATIONS - When a request is received to execute a virtualized application, a licensing/metering component determines whether a valid license exists for the requested application. If the licensing/metering component determines that a valid software license exists for the requested application, the application virtualization server component streams the virtualized application to a client device and permits the application to be executed. If the licensing/metering component determines that a valid software license does not exist for the requested application, the application virtualization server component prevents the virtualized application from being streamed to the client device. Once the virtualized application is streamed to the client device, the licensing/metering component monitors usage of the virtualized application. | 06-28-2012 |
20120166620 | SYSTEM AND METHOD FOR INTEGRATED REAL TIME REPORTING AND ANALYTICS ACROSS NETWORKED APPLICATIONS - Embodiments of the present invention may provide a system and method for providing real time analytics and reporting across networked applications. The real time analytics and reporting across networked applications may be provided by extending the reporting metadata and the corresponding design- and runtime-tools. Based on a cross NWAs MDAV-Definition, the corresponding metadata (subview and subquery definitions) may be generated and assigned to the corresponding NWA-Layer (NWA software component). At deployment and configuration time, the relevant views may be activated depending availability of underlying data. At runtime, an MDAV executer (e.g., a MDAV runtime engine) may run a distributed and optimized provisioning of reporting and analytics data. The data provisioning scheme may depend on selection parameters, filters, join conditions between parts in different NWAs, analytical functions defined in the report, and the locality of the data (local or remote). | 06-28-2012 |
20120166621 | Sharing the Status of S-CSCF Nodes Across I-CSCF Nodes in a Communications Network - Methods and apparatuses, including computer program products, are described for sharing the status of S-CSCF nodes across a plurality of I-CSCF nodes in a communications network. The system includes a first I-CSCF node of the plurality of I-CSCF nodes configured to monitor status of one or more S-CSCF nodes connected to the first I-CSCF node, wherein the one or more S-CSCF nodes connected to the first I-CSCF node comprise a subset of the S-CSCF nodes in the network, and transmit the monitored status of the one or more S-CSCF nodes connected to the first I-CSCF node to a second I-CSCF node. The second I-SCSF node is configured to monitor status of one or more S-CSCF nodes connected to the second I-CSCF node, wherein the one or more S-CSCF nodes connected to the second I-CSCF node comprise a subset of the S-CSCF nodes in the network. | 06-28-2012 |
20120166622 | AUTOMATED SERVICE PROVIDER NETWORK SELECTION USING A WIRELESS AIR-TIME AUCTION - A system is configured to store user preferences relating to selection of a network, from a group of networks, via which to establish a connection, where the user preferences includes information for selecting the network based on rates and information for selecting the network based on signal strength or quality levels; receive, from a server device that communicates with the group of networks, a set of rates associated with use of the group of networks; detect signals transmitted by the group of networks; determine, for the group of networks, signal strength or quality levels associated with the signals transmitted by the group of networks; select a particular network, of the group of networks, based on the user preferences, the set of rates, and the signal strength or quality levels; and establish a connection via the particular network. | 06-28-2012 |
20120166623 | PERFORMING DEPENDENCY ANALYSIS ON NODES OF A BUSINESS APPLICATION SERVICE GROUP - A method and apparatus of determining enterprise network component dependency in a business application service group is disclosed. An example method may include collecting performance data of present operating conditions of a plurality of network components operating in the enterprise network and storing the performance data in memory. The method may also include extracting ontological component data of the plurality of network components from the collected performance data, and comparing the collected performance data with predefined service tier threshold parameters. The method may also include establishing direct and indirect relationships between the plurality of network components based on the determined operational relationships, and assigning a steady state to the established direct and indirect relationships. | 06-28-2012 |
20120166624 | AUTOMATIC DETERMINATION OF REQUIRED RESOURCE ALLOCATION OF VIRTUAL MACHINES - Virtual machine resources may be monitored for optimal allocation. One example method may include monitoring a virtual machine operating in a network to determine whether at least one predefined service tier threshold has been exceeded for a predefined amount of time, initiating a query to determine current performance threshold data of the at least one predefined service tier threshold from a database, determining at least one component state of at least one component of the virtual machine based on the at least one service tier threshold assigned to the at least one component, and reallocating the resource provided by the virtual machine when the component state indicates a high warning state. | 06-28-2012 |
20120166625 | AUTOMATIC BASELINING OF BUSINESS APPLICATION SERVICE GROUPS COMPRISED OF VIRTUAL MACHINES - An example method of automatically establishing a baseline of virtual machines operating in a network may include parsing service group ontology information stored of an established service group to determine components of a business application service group that are communicating with one another. The example method may also include tracking the current state of the business application service group to determine if any changes have occurred since a previous service business application service group configuration, and, if so, updating the ontology information to reflect those changes, and generating a list of candidate virtual machines that are candidates for participating in the established baseline. | 06-28-2012 |
20120166626 | Updating Traffic Rate for MSRP Sessions - A system and method is provided for adjusting a traffic rate for a Message Session Relay Protocol (MSRP) session established between two network nodes at a per session level. Each MSRP session has a traffic rate for which MSRP messages are transmitted over the MSRP session. The traffic rate per session can be adjusted, and the adjusted traffic rate per session can be communicated to adjacent nodes. | 06-28-2012 |
20120166627 | MONITORING AND MANAGING A HTTP SESSION INDEPENDENT OF CLIENT AND SERVER CONFIGURATIONS - Methods and apparatuses for monitoring the state of a HTTP session between a client and a server and managing the session utilizing a session server independent of the client or server configurations are provided. Using the session information gathered from the session server, system resources that may have been reserved for quality of service considerations can be released independent of client or server configurations. The method and apparatuses disclosed can be used for HTTP streaming of live broadcasts or prerecorded content, for example. | 06-28-2012 |
20120166628 | SYSTEM AND METHOD FOR AGGREGATE MONITORING OF USER-BASED GROUPS OF PRIVATE COMPUTER NETWORKS - A system for aggregate monitoring of private computer networks includes a plurality of monitoring servers for monitoring a plurality of private networks. Each private network has at least one monitoring server configured for monitoring the private network by collecting statuses of devices associated with the private network. A central server is coupled to each of the monitoring servers via a wide area network (WAN) and stores information pertaining to a plurality of users. The information associates each of the users with a group of one or more of the private networks. The central server may receive a request from a remote device via the WAN, determine the group of private networks associated with the requesting user, automatically generate a set of statistics according to only the statuses collected for each private network in the group associated with the requesting user, and send the set of statistics to the remote device. | 06-28-2012 |
20120166629 | INFORMATION PROCESSING DEVICE, ADDRESS DUPLICATION HANDLING METHOD, AND COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM - A sensor device | 06-28-2012 |
20120166630 | DYNAMIC LOAD BALANCING SYSTEM AND METHOD THEREOF - Disclosed is a dynamic load balancing system. The dynamic load balancing system includes a resource management master managing bare servers that do not execute services and having a hierarchical structure and a service master dynamically allocating the bare servers to a load balancing server or a service execution server or dynamically releasing the pre-allocated load balancing server or service execution server by the bare servers, in consideration of monitoring information on a state or performance of a server and service requirements to be provided. | 06-28-2012 |
20120166631 | DEVICE AND METHOD FOR MONITORING, RATING AND/OR TUNING TO AN AUDIO CONTENT CHANNEL - Devices, methods and computer-readable code for simultaneously monitoring the content of at least two streaming audio content channels are disclosed. In some embodiments, the monitored content is analyzed, and one or more features of the monitored content channels are computed, including but not limited to music classification features, content genre features, and spoken content features. These computed features may be used, for example, to compute a rating or score for each monitored audio channel, for example, a rating computed relative to user listening preferences, expressed, for example, in preference rules. In some embodiments, the presently disclosed device includes a channel selector for automatically tuning, for example, to a channel assigned a higher rating at a given time. Alternatively or additionally, content rating scores may be displayed to a user who manually selects and tunes to an audio content channel. | 06-28-2012 |
20120166632 | UNIFIED SYSTEM LIFECYCLE FOR COMPONENTS IN AN INTEGRATED SOFTWARE AND HARDWARE SYSTEM - An integrated software and hardware system is described that implements a unified lifecycle for the hardware and the software components therein. In the context of adding, removing or moving a hardware appliance, this allows the system to create, coordinate and manage a single lifecycle for each appliance together with its software processes, that is being moved or changed. The system includes a chassis with multiple enclosures for computing blades. Each blade in the chassis is assigned either a worker or bootstrap role. The worker blades perform the core processing of the service broker functionality and the bootstrap blades are used to provide the bootstrapping and administration of the worker blades. In particular, the administration features include an administration console that is provided by the bootstrap blade, which provides hardware management and process management. | 06-28-2012 |
20120166633 | OPTIMIZING CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a CDN service provider for alternatively hosting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative CDN service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of CDN service providers with respect to specific resource requests are also provided. | 06-28-2012 |
20120166634 | MONITORING PERFORMANCE AND OPERATION OF DATA EXCHANGES - A system and method for monitoring the performance associated with fulfilling resource requests are provided. One or more client computing devices obtain an original resource request and associate a record identifier with the original resource request. The one or more client computing devices also determine performance data associated with processing each embedded resource request included in a response to the original resource request. Each embedded resource request is associated with a component record identifier that is associated with, but different from, the record identifier of the original resource request. The one or more client computing devices can then transmit the determined performance data with the record identifier to another processing device. | 06-28-2012 |
20120166635 | WORKFLOW PROCESSING PROGRAM, INFORMATION PROCESSING DEVICE AND WORKFLOW PROCESSING METHOD - A hook section ( | 06-28-2012 |
20120166636 | METHOD OF MONITORING THE PERFORMANCE OF A SOFTWARE APPLICATION - A method of monitoring the level of performance of a software application running on a network-attached computing device, comprises monitoring information exchange at least one station on the network; measuring at least two performance indicator metrics, such as delay, jitter, loss, response time, throughput, goodput, and object size; and deriving an indicator parameter from a non-linear combination of the indicator metrics. A transformation may be applied to each indicator metric to obtaining a corresponding derived value, and the derived values then additively combined, to obtain the said indicator parameter. The transformation has a first region in which the derived value depends relatively weakly on the corresponding metric, and a second region, in which the derived value depends relatively strongly on the corresponding metric. A score value may be entered by a user, indicative of the user's perception of the performance of the software application, and compared with the derived indicator parameter. The calculation used to derive the indicator parameter may be varied, in dependence on the user-entered score. Diagnostic traces may be triggered in dependence on the derived indicator parameter. Values of the indicator parameter and associated trace data may be collected in a database and collated to diagnose and/or predict problems in the said computer system. | 06-28-2012 |
20120166637 | METHOD, DEVICE AND MEDIUM FOR DETERMINING OPERATIONS PERFORMED ON A PACKET - A system for tracing operations executed by a network device on a packet wherein a network device may capture a packet and determine whether the packet is a candidate for tracing; if the packet is a candidate for tracing the network device may set a trace option identifier within the packet indicating that the packet is to be tagged in association with operations performed on or in association with the packet by the network device. The network device may tag the packet with one or more tags in response to the trace option identifier, export the packet with the trace option identifier, generate a report based on the tags and send the report to a network management station. | 06-28-2012 |
20120166638 | MODULAR MONITOR SERVICE FOR SMART ITEM MONITORING - Monitor services deployable on device networks may be implemented using a modular approach, in which a core monitor service is mapped to one or more devices included in, or associated with, the device networks. Additional monitoring-related functionality may be provided to such devices using plug-ins, add-on services or service components, or other service modules, which interact with the core monitor service. The core monitor service(s) and any monitor service modules may be mapped, to specific ones of the devices, based on, for example, requirements of other services and/or relevant device metadata (e.g., capabilities) of the devices. In additional or alternative implementations, various protocols may be used to register new devices and deployed monitor service(s) with the distributed monitoring service(s) in a fast, secure, energy-efficient, and reliable manner, even as devices join or leave the device network(s). | 06-28-2012 |
20120166639 | Multipath Routing Process - Methods and apparatus that enable more than one server to host a resource using a shared IP address such that a client may generally access the resource on any of the servers using the shared IP address are disclosed. According to one aspect of the present invention, a method for providing paths that allow a client to access a resource in a TCP/IP network includes obtaining an IP address, as well as associating the IP address to first and second servers. The first and second servers support the resource at the IP address, and a first path of the plurality of paths that allow the client to access the resource is between the client and the first server and a second path of the plurality of paths that allow the client to access the resource is between the client and the second server. | 06-28-2012 |
20120166640 | Peer to Peer Monitoring Framework for Transaction Tracking - An approach is provided that transmits a load balance request from a first peer node to other peer nodes. Some of the peer nodes have assigned transaction tracking responsibilities. The transmitting is performed in response to identifying that the first peer node is performing at a non-optimal level. The first peer node receives responses from the other peer nodes. A determination is made as to whether to handover one or more of the first peer node's transaction tracking responsibilities. If a second peer node is identified to take some of the first peer node's responsibilities, then a handover message is sent from the first peer node to the second peer node that assigns at least one of the first peer node's assigned transaction responsibilities to the second peer node. | 06-28-2012 |
20120166641 | METHOD, SYSTEM AND APPARATUS FOR MANAGING COMPUTER PROCESSES - Methods, systems and apparatuses for managing computer processes in a computing environment may be described. An exemplary method may include the defining of a plurality of computer processes; the defining of a sequence that dictates the starting and stopping of the plurality of computer processes; the Defining of any process dependencies for the plurality of computer processes; the defining of a first networked environment where the plurality of computer processes run; the determining of an action to take following a system event; and the executing of the action | 06-28-2012 |
20120173699 | Controlling access to web content - A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer. | 07-05-2012 |
20120173700 | System for Organizing and Guiding a User in the Experience of Browsing Different Applications Based on Contexts - The present invention provides a system that enhances the experience of using a portable device such as mobile phones, smart phones, Personal Digital Assistants PDA etc. To improve the user experience in the use of a portable device, techniques are used for “context characterization, i.e., from a range of conditions possible to detect by the system, such as time (date/time), current location, motion, etc., as well as the historical use of the device, a certain grouping of actions and settings, called “context” are selected automatically or manually, modifying and setting from that moment the way of user interacts with the device. | 07-05-2012 |
20120173701 | MATCHING TECHNIQUES FOR CROSS-PLATFORM MONITORING AND INFORMATION - Systems and methods are disclosed for employing matching techniques for cross-platform monitoring. A content sequence is produced for determining network content accessed at certain times by a computer registered to a particular user. Another content sequence is produced for determining media exposure at certain times for a portable user device registered to the same user. The content sequences are then processed and compared in a resolution server to validate the content sequences against each other, and to populate either or both sequences with missing data. | 07-05-2012 |
20120173702 | Automatic Signature Generation For Application Recognition And User Tracking Over Heterogeneous Networks - An apparatus, method and computer program of automatic signature generation for application recognition and user tracking over a network is described. This apparatus, method and computer program receive a set of flows of Internet traffic, find motifs in the Internet traffic, rate the motifs by looking them up in the set of flows of Internet traffic using sequence alignment to generate a sequence, create clusters of motifs from the sequence and generate regular expressions (regexps) from the clusters of motifs to serve as traffic signatures. | 07-05-2012 |
20120173703 | METHOD AND APPARATUS OF ESTABLISHING CUSTOMIZED NETWORK MONITORING CRITERIA - A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example of the present invention may include a method of monitoring at least one computer device operating on a network. The method may include receiving audit information representing attributes of the computer device and storing the audit information in memory. The method may also include comparing the audit information to a predefined monitor set of objects to be monitored. The method may further include creating a new monitor set based on the comparison of the audit information and the predefined monitor set. The new monitor set is different from the predefined monitor set and is generally used to monitor objects which are included in the audited device. The method may also include monitoring the at least one computer device based on the new monitor set. | 07-05-2012 |
20120173704 | METHOD AND APPARATUS OF DISCOVERING AND MONITORING NETWORK DEVICES - A method and apparatus of monitoring computer devices operating on a network is disclosed. One example method may include discovering and monitoring a plurality of network devices operating on a network. The method may include scanning the network to discover various network devices and determining a device type of each of the network devices. The method may also include determining attributes corresponding to each of the network devices, monitoring the attributes corresponding to each of the network devices and compiling a list of attribute information based on the monitoring operation and storing the list of attribute information in a memory. The device discovery and monitoring may be performed autonomously without user intervention allowing computer devices to be discovered and monitored as they are added to the network. | 07-05-2012 |
20120173705 | SYSTEM AND METHOD FOR CONSOLIDATED MONITORING AND MANAGING OF NETWORK ENABLED DEVICES - A system and method for monitoring and managing a network of electrical devices includes a central device operatively connected to a plurality of end devices by a network, such as a ZigBee network. The central device can monitor the status of the first plurality of end devices and display the status of the end devices. The central device can also be configured to command an aspect of at least one of the first plurality of end devices. Thus, the user can remotely monitor and adjust an aspect of one or more of the end devices by the central device. All end devices connected to the network can be monitored and managed from the central device, thereby improving monitoring of the devices and providing a convenient way to adjust the devices to desired conditions. | 07-05-2012 |
20120173706 | METHOD AND APPARATUS FOR MANAGING COMMON AND APPLICATION SPECIFIC PRESENCE INFORMATION - A method and apparatus for managing common and application specific presence information, wherein the apparatus programs a computer to perform the method, which includes: receiving a publication message comprising presence information from a presentity; partitioning the presence information into common presence information and application specific presence information; storing the common presence information in a common presence information database, wherein authorization for access to the common presence information database is controlled by the presence server; and forwarding the application specific presence information to an external application, wherein the external application controls storage of the application specification presence information and authorization for access to the application specific presence information. | 07-05-2012 |
20120173707 | Leveraging Passive Networks - System and methods for leveraging passive networks are disclosed. In one embodiment, a method includes receiving, from a first data source, a first data descriptor, wherein the first data descriptor identifies an instance of contact between at least two persons. The method also includes determining a connection between the at least two persons, wherein the connection is based on an instance of contact between the at least two persons identified in the first data descriptor. The method further includes determining, with a processor, a first contact count for the connection, the first contact count based on a number of instances of contact between the at least two persons associated with the connection. The method also includes calculating, with the processor, a connection score for the connection, wherein the connection score is based at least in part on the first contact count. | 07-05-2012 |
20120173708 | IDENTIFYING OPTIMAL PLATFORMS FOR WORKLOAD PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a workload optimization approach that measures workload performance across combinations of hardware (platform, network configuration, storage configuration, etc.) and operating systems, and which provides a workload placement on the platforms where jobs perform most efficiently. This type of placement may be based on performance measurements (e.g., throughput, response, and other such service levels), but it can also be based on other factors such as power consumption or reliability. In a typical embodiment, ideal platforms are identified for handling workloads based on performance measurements and any applicable service level agreement (SLA) terms. | 07-05-2012 |
20120173709 | SEAMLESS SCALING OF ENTERPRISE APPLICATIONS - Various exemplary embodiments relate to a method of scaling resources of a computing system, the method comprising. The method may include: setting a threshold value for a metric of system performance; determining an ideal resource load for at least one resource based on the threshold value for the metric; distributing a system work load among the computing system resources; and adjusting the number of resources based on the system work load, the ideal resource load, and a current number of resources. Various exemplary embodiments also relate to a computing system for scaling cloud resources. The computing system may include: internal resources; a load balancer; a performance monitor; a communication module; a job dispatching module; and a controller. Various exemplary embodiments also relate to a method of detecting dynamic bottlenecks during resource scaling using a resource performance metric and a method of detecting scaling choke points using historical system performance metric. | 07-05-2012 |
20120173710 | SYSTEMS, APPARATUS, AND METHODS FOR NETWORK DATA ANALYSIS - Systems and methods are disclosed for analyzing network traffic data to detect anomalies in the data and determine their causes. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to generate a time series of network traffic values. The processor calculates deviation scores for time entries within the time series and detects anomalies in the time series by comparing the deviation score to a predetermined range. If the processor detects an anomaly, it may determine a list of IP addresses of computers on the network that may have caused the anomaly. | 07-05-2012 |
20120173711 | Identifying an Application Server in a Plurality of Application Servers Associated with a Shared Identifier - Methods and apparatuses, including computer program products, are described for identifying an application server in a plurality of application servers associated with a shared identifier in an Internet Protocol Multimedia Subsystem (IMS) network. The method includes receiving, from a Signaling System 7 (SS7) network, a message including a mobile device identifier associated with a mobile device connected to the IMS network and determining the identity of an application server in the plurality of application servers associated with the shared identifier. The determining step includes extracting the mobile device identifier from the message and retrieving, from a data storage module, an application server identifier associated with an application server based on the extracted mobile device identifier. The application server associated with the retrieved identifier provides service to the mobile device. The method also includes transmitting the message to the application server associated with the retrieved identifier. | 07-05-2012 |
20120173712 | METHOD AND DEVICE FOR IDENTIFYING P2P APPLICATION CONNECTIONS - The present invention relates to a method for identifying P2P application connections, which includes: searching corresponding ports of intranet IPs according to the data package received; and identifying the connection of the data package to be P2P application connection when the counter value of the said port is the preset threshold and represents the number of all simultaneous online UDP connections to the port. When the counter value of the said port is not the preset threshold, and the connection of the data package is a new UDP connection, the counter value of the said port will be added by 1; when the UDP connection of the said port is disconnected, the counter value of the port will be deducted by 1. It is a primary object of the present invention to provide a method and a device for identifying P2P application connections based on the behavioral characteristics of UDP, which have improved the accuracy of P2P application identification. | 07-05-2012 |
20120173713 | RESOURCES MONITORING AND RECOVERY - Techniques for monitoring system resources such that a resource-related problem can be identified at a point in time when it is still possible to initiate a set of recovery actions for remedying the problem without disrupting services provided by the system. Various system resources may be monitored including but not limited to system memory (e.g., RAM), one or more processors, non-volatile memory (e.g., Compact Flash usage), and the like. | 07-05-2012 |
20120173715 | APPLICATION SERVER PLATFORM FOR TELECOM-BASED APPLICATIONS USING AN ACTOR CONTAINER - In accordance with various embodiments, a set of features are described for enabling an application server platform for telecom based applications. A system for providing an application server for telecom-based applications can include a computer, including a computer readable medium and processor. The system can also include an application server, executing on the computer. The application server can include an actor container that manages and provides lifecycle and runtime properties for application classes that are executed as actors in the application server. The actor container can manages a set of event transactions, wherein all storage operations are performed as part of the event transaction that spans each event handler invocation. | 07-05-2012 |
20120173716 | INTERNET CONNECTION USER COMMUNICATIONS SYSTEM - A method for communicating in real-time to users of a provider of Internet access service, without requiring any installation or set-up by the user, that utilizes the unique identification information automatically provided by the user during communications for identifying the user to provide a fixed identifier which is then communicated to a redirecting device. Messages may then be selectively transmitted to the user. The system is normally transparent to the user, with no modification of its content along the path. Content then may be modified or replaced along the path to the user. For the purposes of establishing a reliable delivery of bulletin messages from providers to their users, the system forces the delivery of specially-composed World Wide Web browser pages to the user, although it is not limited to that type of data. These may be displayed permanently, temporarily, or in separate pop-up browser windows, according to policies set by the provider irrespective of the user's intended browsing destination. | 07-05-2012 |
20120173717 | Cloud*Innovator - Cloud*Innovator is a proprietary rules based event driven invention that is fully integrated within the SAP technology framework and is used to enable Cloud capabilities to ensure optimal performance and systems availability through continuous monitoring, metering, auto-provisioning and tuning of systems resources. This includes an intelligence engine to deliver real-time business decisions to ensure precision tuning of the system resources and parameters via advanced automation techniques. | 07-05-2012 |
20120173718 | METHOD AND NETWORK FOR MANAGING PORT RANGES - For allowing a very efficient use of available port space without requesting clients to interrupt ongoing sessions a method for operating a network, particularly an IP (Internet Protocol) network or mobile network is disclosed, wherein a network address and at least one port range associated to the network address and including ports or port numbers are assigned to a client by an address and/or port range manager. The method is characterized in that one or more port ranges will be marked by the manager with an attribute that signals to the client not to allocate any more ports or port numbers in marked port ranges. Further, a network is described, preferably for carrying out the above mentioned method. | 07-05-2012 |
20120173719 | DETERMINING AN AVERAGE EFFECTIVE DATA THROUGH-PUT AS CORRESPONDS TO A NETWORK-SERVED END USER - A network monitoring apparatus in a communications network detects TCP data flows (to at least one network-served end user) to provide corresponding detected data flows. This apparatus then measures data throughput to this (or these) end user(s) via the TCP data flows and during the TCP data flows and calculates an average effective data throughput to this end user. This calculation can be based, by one approach, upon use of time variables that represent the detected data flows (to effectively garner a beginning-to-end view of the various TCP data flows while avoiding inclusion of periods that represent no (or possibly only a little) volume in these regards as may be due to application idle time or end-user idle time while including periods that represent no (or possibly only a little) volume due to network buffering, device performance problems, and so forth). | 07-05-2012 |
20120173720 | SYSTEM AND METHOD FOR SOCIAL INFERENCE BASED ON DISTRIBUTED SOCIAL SENSOR SYSTEM - A method (and system) for data acquisition includes downloading a user's sent materials from a communication data repository, analyzing the sent materials and extracting data portions that are authored by the user, generating statistical values from the extracted data, transmitting the generated statistical values to one or multiple repositories, receiving the generated statistical values on one or multiple server machines, and aggregating statistical values of multiple users. | 07-05-2012 |
20120173721 | Organizing Individual Java Client Request Flows Into A Single Server Transaction - Multiple flows each include a common transaction-specific identifier. The transaction-specific identifier corresponds to a transaction and is generated in response to receiving a request over a computer network. In turn, data is logged pertaining to each of the detected plurality of flows in a storage area. Upon identifying a completion of the transaction, a total cost of the transaction is calculated using the logged data pertaining to each of the plurality of flows. | 07-05-2012 |
20120173722 | METHOD AND APPARATUS FOR CONTROLLING RESPONSE TO SERVICE NOTIFICATIONS IN A NETWORK ENVIRONMENT - A method of providing content notifications to devices in a wireless communication system includes obtaining notification information comprising an identifier that defines a subset of a plurality of devices on a network configured to be responsive to content notifications; generating a notification message based on the obtained notification information to cause the subset of the plurality of devices to retrieve content from a network; and broadcasting the notification message over the network to the plurality of devices. The method also includes receiving content notifications in a wireless communication system, including receiving, in a wireless network, a notification message comprising an identifier that defines a subset of a plurality of devices on a network configured to be responsive to content notifications; and retrieving content from a network in response to being one of the subset of the plurality of devices as defined by the identifier of the received notification message. | 07-05-2012 |
20120173723 | ANALYSIS OF THIRD PARTY NETWORKS - A method of analyzing customer behavior, where customers are engaged in customer-to-customer transactions in the third-party network, includes the transformation of data representing the customer-to-customer transactions from a data representation to a network representation, and then analyzing the network representation. The network representation includes a set of nodes and a set of links where each node represents a customer and each link represents a transaction between two of the customers. | 07-05-2012 |
20120173724 | Monitoring Information Assets and Information Asset Topologies - According to one embodiment of the present invention, a computer system monitors information assets providing data for constructing a logical entity. The information assets are dependent upon each other for data and form a topology. The computer system receives an event message associated with an information asset. The event message includes information relating to one or more conditions of that information asset. The computer system processes the received event message to determine the presence of a change within the associated information asset that affects the topology. The change is determined based on the information relating to the one or more conditions within the received event message. The computer system further transmits a notification of the change to one or more entities in response to determining the presence of the change. Embodiments of the present invention further include a method and computer program product for monitoring information assets. | 07-05-2012 |
20120179809 | APPLICATION MONITORING IN A STREAM DATABASE ENVIRONMENT - Methods and systems for monitoring a stream application are disclosed. The stream application is composed from a plurality of processing elements executing on one or more compute nodes. A graphical user interface display presents a user with at least a portion of an operator graph in a running stream application. The operator graph represents the plurality of processing elements, and links between processing elements, corresponding to a flow of data tuples through the stream application. A monitoring application then monitors user interactions with the presentation of the portion of the operator graph on the graphical user interface display and identifies at least a first modification to the stream application based on a processing state of the stream application and the monitored user interactions. | 07-12-2012 |
20120179810 | METHOD AND APPARATUS FOR IMPROVING MANAGEMENT OF NETWORK RESOURCES FOR DEVICES - Methods and apparatuses are provided that facilitate selecting one or more front links or backhaul links for a device for facilitating communications with one or more service providers. A small base station can include multiple front link and backhaul link options, and one or more link options can be selected for a given device based on a utility function, one or more policies, etc., according to various parameters related to the device, to the small base station, to the service provider, and/or the like. | 07-12-2012 |
20120179811 | METHODS FOR PROVIDING PERFORMANCE IMPROVEMENT RECOMMENDATIONS - In a method of providing a performance improvement recommendation for a connection between a first network node in communication with a second network node, information is transmitted from the first node to the second node to provide communication between the nodes, via a number of transmission components. An elapsed time of transmission of the information between a subset of the transmission components is measured, the aggregation of the measurements representing time elapsed for end-to-end transmission of the information that includes preparing, by the first node, the information for transmission and processing, by the second node, the information upon receipt. A determination is made that one of the measured transmission components has a performance that crosses a predetermined threshold. A recommendation is identified to improve the performance of the identified component. | 07-12-2012 |
20120179812 | SYSTEM AND METHOD FOR PHYSICALLY DETECTING, IDENTIFYING, DIAGNOSING AND GEOLOCATING ELECTRONIC DEVICES CONNECTABLE TO A NETWORK - A system and method of detecting, locating, geolocating and providing diagnostics on electronic devices includes use of emission detection apparatus, information collected over a network and template containing emission signatures. Collected unintended emissions are compared to an emission signature in the template preferably constructed from the information collected on the network. Using the known location of the electronic device, the emissions measurement device is then used to detect and identify other devices in the vicinity of the electronic device that is connected to the network. The emission detection apparatus includes a high sensitivity receiver for receiving and analyzing electronic emissions. The network collection apparatus could be any software manifestation known in the art for collecting information about a device such as a cookie or online fingerprinting or a hardware based collection mechanism. | 07-12-2012 |
20120179813 | TRAFFIC FLOW INFERENCE BASED ON LINK LOADS AND GRAVITY MEASURES - Traffic flow between each pair of nodes in a network are determined based on loads measured at each link and based on gravity measures. The gravity measures correspond to a likelihood of the node being a source or a sink of traffic and may be assigned based on characteristics associated with each node, such as the demographics of the region in which the node is located, prior sinking and sourcing statistics, and so on. The gravity measures are used to generate an objective function for solving a system of linear equations, rather than as criteria that must be satisfied in the solution. The measured link loads are allocated among the traffic flows between nodes to at least a given allocation efficiency criteria by solving a system of linear equations with an objective of minimizing a difference between the assigned gravities and the resultant gravities corresponding to the determined flows. | 07-12-2012 |
20120179814 | Determination and use of metrics in a domain name service (DNS) system - A method for determining metrics of a content delivery and global traffic management network provides service metric probes that determine the service availability and metric measurements of types of services provided by a content delivery machine. Latency probes are also provided for determining the latency of various servers within a network. The latency probe calculates, for example, the latency from its location to a client's location using the round trip time for sending a packet to the client to obtain the latency value for that client. DNS servers use the latency test results, along with traffic weightings, to determine a server to return for a given DNS name. | 07-12-2012 |
20120179815 | STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A management computer includes a memory storing toplogical information including identifiers of ports of computers, storage apparatuses, and switches. The management computer includes a processor, which is configured to: collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; evaluate that a certain access time among the plurality of access times exceeds a predetermined allowable range; search a first access path to which the certain access time corresponds; search at least one second access path starting from a first computer port on the first access path; and search performance information of certain ports which are on the at least one second access path in order to display the searched performance information. | 07-12-2012 |
20120179816 | MANAGING CAPTURED NETWORK TRAFFIC DATA - A system and method for managing captured network traffic data is provided. The invention comprises a plurality of capture agents, each being configured to capture the network traffic associated with one or more applications. Each application is associated with one or more capture agents according to an application profile that is stored and maintained in a capture server. When analysis of an application's network traffic is required, the capture server contacts the corresponding capture agents according to the application profile. The capture server then effects the identification and archiving of the network traffic that corresponds to a user-defined capture condition. A database at the capture server maintains a record that associates the corresponding network traffic with the user-defined capture condition such that the corresponding network traffic can later be retrieved and analyzed using an analysis engine. | 07-12-2012 |
20120185581 | DOMAIN BASED ISOLATION OF NETWORK PORTS - When an operating system process evaluates a rule for an operation being attempted on a logical network port, the operating system process determines whether the target logical port falls within a range of logical ports, and then determines whether the operation is associated with a permitted domain of the range of logical ports. If the operation is a bind operation, then the process attempting to bind to the target port will be allowed to bind if the target port falls within the range and the operation/process is associated with a permitted domain. Otherwise, the binding operation will not be allowed to proceed. | 07-19-2012 |
20120185582 | System and Method For Collecting and Evaluating statistics To Establish Network Connections - An apparatus and method are described for collecting and evaluating statistics for different network addresses and/or subnets when establishing network connections. For example, a method according to one embodiment comprises: receiving a set of potential network addresses for establishing a connection to a remote host; evaluating routing statistics associated with each of the potential network addresses; prioritizing the set of potential network addresses based on the evaluation; and initially attempting to connect to the remote host using the highest priority one or more network addresses. | 07-19-2012 |
20120185583 | METHODS AND APPARATUS FOR ENABLING RELAYING OF PEER DISCOVERY SIGNALS - A method of operating a first wireless device includes receiving a peer discovery signal from a second wireless device on a first resource in a set of resources associated with a particular identifier. In addition, the method includes determining whether to relay the peer discovery signal. Furthermore, the method includes sending the peer discovery signal on a second resource in the set of resources upon determining to relay the peer discovery signal. The second resource is associated with the particular identifier and is the same resource on which the peer discovery signal is sent by the second wireless device. | 07-19-2012 |
20120185584 | RECORDING APPLICATION CONSUMPTION DETAILS - A consumption data monitoring method may identify an interface provided by an operating system running on a server. A monitoring module populates an operating system database with information on the identified interface. The monitoring module populates a host database with consumption details received from a host machine, the consumption details comprising one or more interfaces of an operating system on the host machine used by a computer application program running on the host machine. The monitoring module compares the host database to the operating system database to determine if the interface provided by the operating system running on the server matches the one or more interfaces of the operating system on the host machine. | 07-19-2012 |
20120185585 | Adaptive Idle Timeout for TCP Connections in ESTAB State - In various embodiments, a method may be provided comprising: determining a number of established TCP connections to a server; comparing the number of established TCP connections to the server to a upper threshold value; and if the number of established TCP connections to the server is greater than or equal to the upper threshold value, determine an adaptive idle timeout value based on the relationship between the number of established TCP connections to a server and the upper threshold value. | 07-19-2012 |
20120185586 | SYSTEMS AND METHODS FOR GROUP BANDWIDTH MANAGEMENT IN A COMMUNICATION SYSTEMS NETWORK - An embodiment is a method of managing bandwidth, performed by a computing system. The system receives user-selected connection parameters associated with a subscriber device. The system associates a network identifier of the subscriber device with a group bandwidth policy, based on the user-selected connection parameters. The system stores, in computer-readable storage media, parameters associated with the group bandwidth policy, in association with the network identifier of the subscriber device. The system receives, at a gateway device, network communication data from the subscriber device. The system limits, at the gateway device, bandwidth available to the network communication data, based on the stored parameters associated with the group bandwidth policy. | 07-19-2012 |
20120185587 | DATA CONSISTENCY IN LONG-RUNNING PROCESSES - Long running computer implemented processes are dynamically adapted to improve data consistency. A range of process steps in a long running computer implemented process is specified. Additionally, each of the computer-implemented process partners that are associated with the execution of the long running process are identified within the range of specified process steps. Monitoring information is also collected with regard to at least one identified process partner. An automatic determination is made as to whether each monitored process partner is available before initiating execution of the specified range of process steps in an instance of the long running computer implemented process and a flow of the long running computer implemented process is transformed based at least in part upon the determination as to whether each monitored process partner is available. | 07-19-2012 |
20120185588 | Distributed Data Collection and Aggregation - A distributed, redundant, multi-homed system collects and aggregates website usage information. Two or more data collection nodes, preferably situated in diverse locations, efficiently collect and time-stamp information from users in a wide variety of geographic locations. Data collected by the individual data collection nodes is aggregated at a master processing center, sorted according to time stamps, and subjected to statistical analysis in order to generate complete and accurate reports regarding website traffic. | 07-19-2012 |
20120185589 | MEDIA LIBRARY MONITORING SYSTEM AND METHOD - Embodiments of methods and systems comprise collecting data associated with a library or library components and storing the collected data in repository. By collecting data associated with a library or library components and storing the collected data in a repository, the degradation of library components can be monitored and the reliability of library components determined, allowing unreliable components to be bypassed or replaced, enhancing the reliability of the library and preventing data loss. | 07-19-2012 |
20120185590 | Data Center Inventory Management Using Smart Racks - A user interface (UI) is accessible on a display to depict and control a plurality of smart racks in a data center is disclosed. The UI includes first, second and third graphical displays. The first graphical display depicts smart racks in the data center so as to mimic a physical arrangement of the smart racks. The second graphical display depicts a plurality of blade hosts in a smart rack in the plurality of smart racks, so as to mimic a physical arrangement of the plurality of blade hosts. The first and second graphical display may include visual indicators to depict error and warning conditions. The third graphical display depicts blade information about a blade host in the plurality of blade hosts. The blade information includes system information, a list of virtual machines hosted on the blade host, and a physical location of the blade host in the data center. | 07-19-2012 |
20120185591 | WEB SERVICE SYSTEM, SCHEDULE EXECUTION APPARATUS AND CONTROL METHOD THEREOF - A schedule execution unit accesses a storage unit for storing a call list registered in a database and determines whether or not there is a Web service call to be executed. If the presence of a Web service call to be executed is confirmed, the schedule execution unit reads out the Web service address and process details and calls the Web service. By so doing, the apparatus that provides the function and the apparatus that carries out the call can be separated, thus enabling a particular program to be executed simply and flexibly according to a schedule. | 07-19-2012 |
20120185592 | NETWORK PERFORMANCE ESTIMATING APPARATUS AND NETWORK PERFORMANCE ESTIMATING METHOD, NETWORK CONFIGURATION CHECKING METHOD, COMMUNICATION MANAGING APPARATUS, AND DATA COMMUNICATION METHOD - A network performance estimating apparatus includes a network-configuration depicting unit configured to generate, from a designed network, network configuration information indicating a connection relation of ports among communication apparatuses and store, as attribute information, apparatus identification information including input peculiar information for each communication apparatus name and apparatus type of the communication apparatuses, a communication-apparatus-attribute-information acquiring unit configured to acquire, communication performance of the communication apparatuses specified by the apparatus identification information from peculiar information in which apparatus model names and communication performance are stored in association with each other, a token-circulation-order determining unit configured to determine, from the network configuration information, token circulation order indicating order in a designed network, and a performance estimating unit configured to calculate communication performance of the designed network using the token circulation order and the communication performance of the communication apparatuses. | 07-19-2012 |
20120185593 | LICENSE REDISTRIBUTING METHOD, MODERATOR AND LICENSE CONTROLLING SYSTEM THEREOF - The present invention provides a method for redistributing the license tokens to the traffic nodes to make the license tokens can be efficiently distributed to the traffic node. The method including: collecting usage information of each of the traffic nodes; determining a set of license tokens for each of the traffic nodes; and commanding a first group of traffic node(s) to release license tokens and commanding a second group of traffic node(s) to request license tokens based on the usage information and the set of license tokens. A moderator, used in a license controlling system which can efficiently redistribute the license tokens among the traffic nodes, is provided and a controlling system which including this moderator is also provided. | 07-19-2012 |
20120185594 | CONGESTION CONTROL IN CACHING ENABLED VIDEO NETWORKS - The present invention relates to a method, related system, related congestion monitoring device and related media delivery personalization devices for controlling congestion in a media delivery network that includes a media delivery server and a plurality of client devices. The media delivery server is coupled over the media delivery network to each client device of the plurality of client devices. The media delivery server delivering media to a client device over a path between the media delivery server and the client device. The related method includes the steps of monitoring congestion in the media delivery network and subsequently adapting a level of personalization of the delivering of media to the client device based on the congestion monitored. | 07-19-2012 |
20120191841 | SYSTEMS AND METHODS FOR RATING A CONTENT BASED ON TRENDS - A system for and method of rating a content is presented. The method may include receiving first user data associated with one or more contents for a first predetermined time period and second user data associated with the one or more contents for a second predetermined time period. The method may also include determining a first average of the first user data associated with the one or more contents for the first predetermined time period and a second average of the second user data associated with the one or more contents for the second predetermined time period. The method may further include determining a variance between the first average of the first user data associated with the one or more contents for the first predetermined time period and the second average of the second user data associated with the one or more contents for the second predetermined time period. The method may additionally include determining trend value of the one or more contents based at least in part on the variance between the first average of the first user data associated with the one or more contents for the first predetermined time period and the second average of the second user data associated with the one or more contents for the second predetermined time period. | 07-26-2012 |
20120191842 | SCALABLE POLICY DEPLOYMENT ARCHITECTURE IN A COMMUNICATION NETWORK - Aspects describe using a Policy Access Gateway to facilitate scalability within a communication network and to provide a solution to deploy an enhanced policy gateway. The Policy Access Gateway can enhance standard defined Diameter Routing Agent (DRA) functions with session binding mechanisms. Further, the Policy Access Gateway is scalable and can be deployed in a very large network that supports hundreds of millions of users. Further, the Policy Access Gateway can provide additional policy information to enable policy information consolidation and caching capabilities. | 07-26-2012 |
20120191843 | SYSTEMS AND METHODS FOR APPLICATION DEPENDENCY DISCOVERY - Systems and methods for discovering a set of applications that run on a network are disclosed. In accordance with one method, aggregate traffic volumes are determined for pairs of nodes on the network over a plurality of time intervals. The method further includes building a traffic matrix denoting each of the pairs of nodes and denoting respective aggregate traffic volume histories of each of the pairs of nodes that are based on the determined traffic volumes. In addition, the traffic matrix is formulated as a combination of bases vectors that model the set of applications. The bases vectors are determined by applying a covariance matrix adaptation evolutionary strategy based on the traffic matrix. An indication of the set of applications based on the bases vectors is output. | 07-26-2012 |
20120191844 | METHODS AND SYSTEMS FOR MANAGING DEVICE SPECIFIC CONTENT - Methods and apparatus for managing content may include receiving feedback information for content associated with a device having a set of device characteristics. The methods and apparatus may further include determining a compatibility rating of the content based on the feedback information. The methods and apparatus may also include providing a message based on a portion of the compatibility rating of the content for an other device having a portion of the set of device characteristics. | 07-26-2012 |
20120191845 | Methods and Systems for Executing Applications on Personal Digital Assistant Terminals - Methods, systems, non-transitory media comprising computer-readable instructions, and logic for obtaining information related to an application may include receiving, at a terminal device, data exchange information, including data transfer speed information, that is related to a data exchange between the terminal device and a web service. The method further may include storing, at the terminal device, at least a portion of the data exchange information received at the terminal device. | 07-26-2012 |
20120191846 | MONITORING SYSTEM, MONITORING APPARATUS, MONITORING METHOD AND MONITORING PROGRAM - A monitoring system, includes a monitoring apparatus which monitors a monitored object equipment; and a managing server which manage a result of the monitoring apparatus monitoring the monitored object equipment, wherein the monitoring apparatus includes an information acquiring unit to acquire connection information, which is used for connecting with the managing server, from an information storing medium which stores the connection information, wherein in the case that the information acquiring unit acquires the connection information from the information storing medium, the monitoring apparatus connects with the managing server on the basis of the connection information to communicate with the managing server, and then sends the monitoring result to the managing server, and wherein the managing server acquires the monitoring result while the communication connection with the monitoring apparatus is maintained. | 07-26-2012 |
20120191847 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SCREENING DIAMETER MESSAGES WITHIN A DIAMETER SIGNALING ROUTER (DSR) HAVING A DISTRIBUTED MESSAGE PROCESSOR ARCHITECTURE - According to one aspect, the subject matter described herein includes a method for screening Diameter messages within a Diameter signaling router (DSR) having a distributed message processor architecture. The method includes steps occurring at a DSR comprising a plurality of Diameter message processors, each configured to perform at least one Diameter function. The steps include receiving, at an ingress Diameter message processor of the Diameter message processors, a Diameter message from a Diameter peer node. The steps also include identifying, at a Diameter application message processor of the Diameter message processors, a Diameter message screening rule associated with the received Diameter message. The steps further include performing, at the Diameter application message processor of the Diameter message processors, a screening function associated with the identified Diameter message screening rule on the received Diameter message. | 07-26-2012 |
20120191848 | METHOD AND APPARATUS FOR DISCOVERING PEOPLE, PRODUCTS, AND/OR SERVICES VIA A LOCALIZED WIRELESS NETWORK - Electronic devices may exchange messages over a localized wireless network to discover persons, products, and/or services. The exchanged messages may comprise personalize messages that enable the users of the devices to connect (e.g., via a social networking website). The messages may enable the wireless exchange of feedback and recommendations. The messages may comprise advertisements which generate pay-per-click revenues. The messages may be generated and/or transmitted in accordance with a low-power wireless protocol such as ISO 18000-7. | 07-26-2012 |
20120191849 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 07-26-2012 |
20120191850 | Networked Probe System - A networked probe system for a communications network ( | 07-26-2012 |
20120191851 | HTTP Streaming With Proved Service Quality - This invention relates to a method for streaming a media file to an end user using a hypertext transfer protocol HTTP, wherein a proxy monitors HTTP messages for detecting a streaming of the media file using HTTP. When a HTTP message is received, the proxy determines bearer parameters required for streaming the media file and determines whether a bearer meeting an appropriate service quality is necessary. If necessary, the proxy triggers a provision of the bearer meeting with said appropriate service quality. | 07-26-2012 |
20120191852 | NETWORK EVALUATION GRID TECHNIQUES - Network evaluation grid techniques are presented. Local specifications for traffic patterns are evaluated for local traffic on local grids of a grid computing environment and reported out. The local traffic reported out is then evaluated in response to global traffic pattern specifications and a global traffic policy in order to identify one or more remedial actions to take or to recommend in response to that evaluation. | 07-26-2012 |
20120198046 | MOBILE DEVICE BANDWIDTH THROTTLING - System and methods for managing communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the policies associated with telecommunications-based devices as a function of the usage of the radio communication network. The modification of the policies corresponds to monitoring of telecommunications-based device data usage and comparing the monitored data usage with data usage thresholds. The modification of the policies can also correspond to monitoring telecommunications-based device data usage and adjusting data usage quotas. The resulting modification can limit the throughput of data, prevent additional data requests, or modify different aspect of the data communications via the radio communication network. | 08-02-2012 |
20120198047 | METHOD AND SYSTEM FOR DETERMINING RESPONSE TIME OF A SERVER - A method for determining a response time of a server may include monitoring communications to and from the server to detect a client request to the server. The method may also include detecting in the monitored communications at least one trigger signal associated with the client request. The method may further include determining a response time of the server to be the time difference between a time at which said at least one trigger signal was fully received and a beginning time of transmission of a final server response from the server, disregarding transmission periods and periods during which the client request is not processed by the server. A computer readable medium and system for determining a response time of a server are also disclosed. | 08-02-2012 |
20120198048 | IDENTIFYING REMOTE MACHINE OPERATING SYSTEM - A method for discovering an operating system of a remote machine includes monitoring network communications to detect a plurality of data packets that were generated by the remote machine. The contents of each detected data packet are read so as to extract a packet signature of each detected data packet. Each packet signature is compared with at least one signature of a database of signatures in order to determine a similarity between each packet signature and the signature from the database. A confidence level for at least one candidate operating system is calculated based on the determined similarities. A candidate operating system is selected based on the confidence level for that operating system. Relating computer program product and data processing system are also disclosed. | 08-02-2012 |
20120198049 | System and Method for Stateless, Fault Tolerance and Load Balanced Data Collection Using Overlay Namespaces - Systems, methods and computer readable media that provide stateless fault tolerance and load balanced data collection using overlay namespaces are described. A cluster is used. Each node of the cluster may be a monitoring system. A data provider process may run on each node in the cluster. Each node has an overlay namespace which comprises one or more links to namespaces on other nodes, and local viewpoints of those linked namespaces. When a node detects a resource waiting to be monitored, it queries other nodes to determine whether object creation for that resource is allowed. It creates an object only if no other node is creating or has created an object for that resource. A node may stop monitoring more resources if the load on the node reaches a specified threshold. The node may also stop monitoring a resource if it determines the load level on another node is at a predefined low level compared with its own load level. | 08-02-2012 |
20120198050 | SYSTEM AND METHOD FOR DISTRIBUTED DATA COLLECTION AND HEURISTIC REFINEMENT IN A NETWORK INTERMEDIARY DEVICE - Data useful in analyzing the effectiveness of policies for handling transactions involving client communications is automatically collected at network intermediary devices and delivered to an analysis server as part of feedback communications from the network intermediary devices. The data may be collected according to data collection directives distributed to the network intermediary devices along with updates to policies for handling transactions, those updates being configured to alter actions of the network intermediary devices, for example to accommodate changes in behaviors of content servers from which the network intermediary devices obtain content in connection with the client communications. | 08-02-2012 |
20120198051 | Adaptive Service Discovery in Structured Peer-to-Peer Overlay Networks and Method - An overlay network, node and method for adaptive service discovery. The method uses an adaptive service discovery in the overlay network for finding a peer that provides a desired service; generates a tree structure for current peers that provide the desired service; assign the current peers that provide the desired service to different levels of the tree structure; estimate, when a peer intends to register for the desired service with the adaptive service discovery, a number S of actual peers that provide the desired service; and calculates, based on the estimated number of actual peers providing the desired service, an optimal starting level for the peer to register for the desired service. | 08-02-2012 |
20120198052 | Method for Retrieving the Implemented Data Model from a Device - Presented is an apparatus and methods for collecting the implemented data model and version information from an end user device. The apparatus is communicatively connected to the end user device and uses, for example, the Broadband Forum TR-069 protocol or another protocol for communications. The method interrogates the end user device to determine all parameters and their data types by traversing the end user device's data model level by level and instantiating any objects discovered that are instantiable but not yet instantiated. The method archives the data model and end user device version information for later use with like devices. | 08-02-2012 |
20120198053 | Web Based Client/Server Notification Engine - Various technologies and techniques improve the updating of client content in a client/server arrangement. A client notification engine of a user interface subscribes to receive notifications from a central server side notification engine. The client notification engine polls the server side notification engine at a specified interval. The server side notification engine receives and aggregates notifications about and/or from one or more sources and aggregates them into a collection of relevant notifications. These notifications are sent to the client where the different subscriptions originated and are then used by the user interface in the client to update part of the content being displayed as appropriate. | 08-02-2012 |
20120198054 | Method and apparatus for determining gateway and method and system for sending message - The present disclosure discloses a method for determining a multimedia message gateway, comprising: receiving a message of querying a multimedia message gateway sent by a value-added service server after the value-added service server generates a multimedia message; acquiring the service processing situation or resource occupation situation of each multimedia message gateway, determining the multimedia message gateway with the strongest service processing capacity currently according to the service processing situation, or determining the multimedia message gateway with the most residual resource according to the resource occupation situation; and using the determined multimedia message gateway as the multimedia message gateway for sending the multimedia message. The disclosure further discloses a method for sending a multimedia message, an apparatus for determining a multimedia message gateway and a system for sending a multimedia message. The disclosure can solve the problem of traffic imbalance of each multimedia message gateway caused by presetting multimedia message gateways in the prior art. | 08-02-2012 |
20120198055 | SYSTEM AND METHOD FOR USE WITH A DATA GRID CLUSTER TO SUPPORT DEATH DETECTION - A system and method is described for use with a data grid cluster to support death detection. A network ring is formed by connecting a plurality of process nodes in the data grid, wherein each node in the network ring watches another node. A death of a first process node in the network ring can be detected by a second process node, when the second process node notices that its connection to the first process node has closed. The first process node then informs other process cluster nodes in the network ring that the first node is dead. In accordance with an embodiment, machine level death detection can also be supported in the data grid cluster by using an Internet Protocol (IP) monitor. | 08-02-2012 |
20120198056 | Techniques for Analyzing Website Content - A scheme for analyzing businesses and generating business leads is disclosed. A list of company websites can be gathered from a plurality of data sources and combined to produce an aggregated list of companies. Content from the websites of the companies in the list is extracted and stored. Contact information may automatically be ascertained from the website content, if available. The stored content extracted from the websites may then be analyzed to detect the presence of particular features. The listing of companies may then be filtered to produce a subset of businesses that represent potential business leads. The business leads may be provided to a company seeking such leads, and may optionally be provided to an automated marketing system, which is configured to generate and transmit commercial advertisements to the businesses identified as leads. | 08-02-2012 |
20120198057 | METHODS AND APPARATUS FOR IDENTIFYING THE IMPACT OF CHANGES IN COMPUTER NETWORKS - The impact of device configuration changes on operational issues and policy compliance in a computer network can be discerned from a visual data presentation that jointly shows representations of changes, issues, and policy compliance in a common view for a group of network devices. Configuration information is collected from devices in the computer network and processed to determine whether a change has occurred in a configuration of any of the devices, whether any operational issues exist for each of the devices, and whether any of the devices are not in compliance with any applicable operational policies. A display device displays the visual data presentation to allow an operator to see trends and relationships between device configuration changes and operational issues and incidents of policy non-compliance. The visual data presentation can be depicted as a graphical timeline view, a network topology view, or a table view of the information. | 08-02-2012 |
20120198058 | Computer Network Service Providing System Including Self Adjusting Volume Enforcement Functionality - A Computer Network Service Providing System including Self Adjusting Volume enforcement functionality and methods for diminishing or minimizing volume leakage. | 08-02-2012 |
20120198059 | WEB PAGE PERFORMANCE SCORING - A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors. | 08-02-2012 |
20120198060 | NETWORK DELAY ESTIMATION APPARATUS AND A NETWORK DELAY ESTIMATION METHOD - A network delay estimation apparatus capable of creating a metric tree with high accuracy and in a short time. Network delay estimation apparatus ( | 08-02-2012 |
20120198061 | User Interest and Identity Control on Internet - The present invention relates to a solution for handling customer activity when connecting to a wireless communication network and in particular for statistics of customer activity using the network. This is provided in a number of aspects such as methods, node, and system for reporting user profile statistics from deep packet inspection of data packets in a packet data network ( | 08-02-2012 |
20120198062 | METHOD FOR MONITORING TRAFFIC IN A NETWORK AND A NETWORK - For providing a simple monitoring mechanism with reduced resource and performance requirements a method for monitoring traffic in a network is claimed, wherein a monitoring activity of at least two monitoring probes of the network is coordinated by a coordinating element, wherein at least two nodes of the network are able to operate as coordinating elements and wherein the responsibility for coordinating the monitoring activity of the monitoring probes is split between the nodes according to a compressed representation of flow parameter keys. Further, an according network is described, preferably for carrying out the above mentioned method. | 08-02-2012 |
20120198063 | VIRTUAL SERVER SYSTEM, AUTONOMOUS CONTROL SERVER THEREOF, AND DATA PROCESSING METHOD AND COMPUTER PROGRAM THEREOF - An autonomous control server ( | 08-02-2012 |
20120203886 | Optimized video streaming to client devices - There is provided a system and method for determining an optimal bandwidth for a communication between a networked client device and a server. There is provided a method comprising identifying the networked client device, identifying a location of the networked client device, obtaining a client device profile for the networked client device corresponding to the location, and determining the optimal bandwidth using the client device profile. In this manner, client devices may almost instantly stream the highest quality video available. | 08-09-2012 |
20120203887 | SYSTEMS AND METHODS FOR DISTRIBUTED OFFLOAD OF EXECUTION PATH MONITORING - Systems and methods provide for the processing of data including monitoring functions. A blade enclosure for processing data includes: at least one first blade server configured to only perform routine processing tasks; and at least one second blade server connected to the at least one first blade server and configured to perform monitoring functions, wherein the at least one first blade server is configured to offload received data which requires monitoring to the at least one second blade server, and wherein the routine processing tasks do not include monitoring functions. | 08-09-2012 |
20120203888 | SELECTING COMPUTING NODES IN CLOUD SERVICE USING REPLICATION TOPOLOGIES - A cloud statistics server generates statistics for a cloud service based on an identified data item and an identified operation. The cloud service may include various computing nodes and storage nodes. The cloud statistics may include expected completion times for the identified operation and the identified data item with respect to each of the computing nodes. A computing node may be selected to execute the identified operation based on the expected completion times. The generated statistics may be generated by the cloud statistics server using a network topology associated with the data item that is based on the latencies or expected transfer times between the various storage nodes and computing nodes, and a replication strategy used by the cloud service. The topology may be implemented as a directed graph with edge weights corresponding to expected transfer times between each node. | 08-09-2012 |
20120203889 | Web Analytics System and Method - A web analytics system and method is provided. Generally, the system contains a collection element collecting browser information associated with a web page, wherein the browser information is collected into a string variable. A tag creation element creates a first tag and a second tag within the web page. A naming element names a tag source of the first tag with the string variable having the browser information. A record of the web page is established at the server, wherein a script is returned as the named tag source and arrives with an identifier for a visit or a visitor of the web page. At least a portion of the browser information is flushed to the server, wherein the portion of the collected browser information is initiated based on at least one of a length of the string variable and an elapsed time between at least two mouse movements. | 08-09-2012 |
20120203890 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR MONITORING AND REPORTING PERFORMANCE OF NETWORK APPLICATIONS EXECUTING IN OPERATING-SYSTEM-LEVEL VIRTUALIZATION CONTAINERS - Provided are methods and computer program products for monitoring the performance of network applications executing within operating-system-level virtualization containers. Methods may include enumerating operating-system-level virtualization containers on a networked device; creating a named pipe accessible by at least one application running in each operating-system-level virtualization container; retrieving, via the named pipe, performance data gathered by the at least one application, including an identification of each operating-system-level virtualization container; generating metrics based on the retrieved performance data; and generating an event incorporating the metrics, including operating-system-level virtualization container identifiers. | 08-09-2012 |
20120203891 | NETFLIX IN A BOX - One embodiment of the present invention sets forth a technique for testing a client for audio/video/subtitle playback capabilities. A computing device is configured to receive a virtual machine data file that includes an operating system, a web server, a content playback application, and a test program. The virtual machine data file is executed to cause the operating system and web server to initialize. The web server detects a communications connection to the client, transmits the content playback application to the client for execution, and transmits one or more tests included in the test program to test the audio/video playback capabilities of the client. The computing device is further configured to receive, from the client via the web server, test results associated with the one or more tests, and to store the test results in a memory. | 08-09-2012 |
20120203892 | IDENTIFYING OPERATING HYBRID SOLUTIONS - A method and apparatus for identifying operating hybrid solutions is provided. An operating hybrid solution includes a combination of hardware and software components operating together for a particular purpose, such as to provide particular functionality. In various embodiments, mappings are stored to associate operating hybrid solutions with operating criteria that describe devices when the devices are operating according to the operating hybrid solutions. During operation of a device, a monitoring process uses the mappings to determine whether the device is operating as part of an operating hybrid solution. The monitoring process stores an indication of whether the device is operating as part of the operating hybrid solution, and the indication may be provided in response to a request for operating hybrid solution information associated with the device. | 08-09-2012 |
20120203893 | METHODS FOR ACHIEVING TARGET LOSS RATIO - A method of forwarding data transmissions from a first network to a third network via a second network comprises receiving packets of a first type from the first network, segmenting each packet into packets of a second type that are transmitted to the second network, and producing and transmitting at least one encoded duplicate of each of the packets of a second type to the second network to allow a packet of the first type to be recreated in the event that not all the packets of the second type are received. In the event that a sufficient number of the packets of a second type and the encoded duplicate packets are not received to recreate the packet of a first type, the method determines a loss ratio that represents the number of packets not recreated relative to the number of packets transmitted during a selected time interval. | 08-09-2012 |
20120203894 | APPARATUS AND METHOD FOR PROVIDING PROFILE OF TERMINAL IN COMMUNICATION SYSTEM - An apparatus and a method support Machine to Machine (M2M) communication in a communication system. A method for providing an M2M service includes determining at least one of identifier (ID) information of an M2M device, ID information of an M2M Service Provider (MSP), and service type information of the M2M device to provide the M2M service. The method also includes determining a profile of the M2M device using the at least one information determined. The method further includes transmitting the profile of the M2M device to an Authentication, Authorization and Accounting (AAA) server. | 08-09-2012 |
20120203895 | Trending Engine for Virtual Computing Environment - Methods, systems, devices, and computer program products are described to monitor trends in workflow in a virtual computing environment, and adapt a session according to these monitored trends. Sessions may be monitored based on a type of user involved, a type of machine or application accessed, and/or specific locations. The workflow of a user within a session may be monitored as well. Certain correlations between past and future actions are identified. Future events may be anticipated or predicted based on an association between events, types of users, types of machines and applications, and/or specific locations. Using this trending information, workflow can be anticipated and sessions can be adapted proactively. | 08-09-2012 |
20120203896 | METHOD, SYSTEM ARCHITECTURE AND COMPUTER SOFTWARE FOR COMMUNICATION BETWEEN DEVICES - A system architecture for communication between devices connected through a network including a hierarchy. Each device has at least one service for controlling and/or monitoring the device. At least one communication module enables a first device service to detect a second device, to detect a second device service, to retrieve information about functions of the second device service, arrange with the first device services and second device services into the hierarchy, wherein one of the devices is the parent of the other, generate messages with at least one device and transmit the messages to another device, wherein the information about functions and messages are received only by devices that have a same parent as one of the devices and by the parent of the devices, and to invoke a function of the second device service, wherein the devices are interchangeable at least to detect, to retrieve information and to invoke. | 08-09-2012 |
20120203897 | ENDPOINT-TO-ENDPOINT COMMUNICATIONS STATUS MONITORING - Communication ability between nodes in a cluster-based computer system is tracked to inform applications executing on the nodes of the existence and quality of the endpoint-to-endpoint communications available between the nodes. Communications between a node and other nodes are tracked, and a database records the communication ability between the node and the other nodes for each link between the nodes. The tracking and recording are repeated at the other nodes. A registration by an application executing at a particular one of the nodes to receive notifications of changes in the communication ability with another node over a particular link (or in general) will cause notification of the application when the link status changes. | 08-09-2012 |
20120203898 | DYNAMIC RATE HEARTBEATING FOR INTER-NODE STATUS UPDATING - A scheme for monitoring node operational status according to communications transmits messages periodically according to a heartbeat rate among the nodes. The messages may be gossip messages containing the status of the other nodes in the pairs, are received at the nodes and indications of the communications delays of the received messages are stored, which are used to compute statistics of the stored communications delays. Parameters of the node status monitoring, which are used for determining operational status of the nodes, are adjusted according to the statistics, which may include adjusting the heartbeat rate, the maximum wait time before a message is considered missed, and/or the maximum number of missed messages, e.g., the sequence number deviation, before the node is considered non-operational (down). | 08-09-2012 |
20120203899 | INTER-NODE COMMUNICATION SCHEME FOR NODE STATUS SHARING - A gossiping scheme for sharing node status in a cluster of nodes provides a robust mechanism for determining node status within the cluster. Nodes transmit gossip messages to each other nodes, the gossip messages listing other nodes in the cluster that are operational. When a node does not receive a gossip message from a particular node within a predetermined time period, then the node transmits messages to the other nodes indicating that the particular node is down. However, if another node has received a packet from the particular node within the predetermined time period and receives the node down message, then the other node responds with a node alive message. | 08-09-2012 |
20120203900 | Botmaster Traceback - Embodiments locate a botmaster on a network. A honeynet host is configured to join a botnet and generate a watermarked packet flow by applying a watermark to an outgoing packet flow in response to commands from the botmaster. The watermark is applied to the outgoing packet flow by: choosing distinct packets from the outgoing packet flow; forming packet pair(s) from the distinct packets, that include a reference packet and an encoding packet; and encoding bits in the watermark to the packet pair(s) by increasing the length of the encoding packet when watermark bits have a predetermined value. The cooperating node(s) are configured to: inspect passing packet flows for the watermarked packet flow and generate tracking information related to detection of the watermarked packet flow. The path determination processor is configured to analyze the tracking information to locate a path taken by the watermarked packet flow. | 08-09-2012 |
20120203901 | Page Grouping for Site Traffic Analysis Reports - Website administrators can specify page groups and/or single pages as checkpoint nodes for site analysis reporting purposes, and can configure the system of the invention to provide information as to a particular visitation path through the checkpoints. Any group of pages can be designed as a single checkpoint node for website traffic analysis and reporting purposes. Page groups can be used in place of or in addition to individual web pages in any context where site traffic analysis is being presented or performed. | 08-09-2012 |
20120203902 | PING FEATURE FOR ELECTRONIC DEVICES - A pinging electronic device, a pingable electronic device and a network for the devices are disclosed. The ping electronic devices comprising a ping function and a transmitter wherein the ping function is adapted to generate and the transmitter is adapted to transmit over an ad hoc wireless network at least one associated ping control message to at least one pingable electronic device paired to the pinging electronic device for actuation of at least one indicator element of the at least one pingable electronic device. | 08-09-2012 |
20120203903 | CONTENT DISTRIBUTION SYSTEM - A content distribution system | 08-09-2012 |
20120209982 | NETWORK DEVICE MATCHING - Various embodiments are disclosed that relate to matching network devices on a computing device. For example, one disclosed embodiment provides a method of operating a computing device. The method includes receiving a match request from a first client device, finding a second client device based on one or more constraints, if a second client device is found, sending the match request to the second client device, and if a second client device is not found based on the one or more constraints, relaxing the one or more constraints until a second client device is found and sending the match request to the second client device. | 08-16-2012 |
20120209983 | CONFIGURABLE FORENSIC INVESTIGATIVE TOOL - This disclosure provides example techniques to invoke one or more forensic tools, with a forensic investigative tool. The forensic investigative tool provides a common framework that allows investigators to invoke their own trusted forensic tools or third-party generated forensic tools. The forensic investigative tool described herein seamlessly and transparently invokes the forensic tools in accordance with an investigative profile created by the investigator. | 08-16-2012 |
20120209984 | Overlay Network - Methods, apparatus and systems, including computer program products, implementing and using techniques for providing a scalable and elastic two-level overlay computer network. A host network is provided. The host network includes a system of interconnected computers and can to support one or more transport layer protocols. A first overlay network is generated on top of the host network. The first overlay network includes one or more first-level nodal entities. At least some of the first-level nodal entities operate as factories for generating second-level nodal entities in a second overlay network. In response to receiving an instruction, one or more factories dynamically generate the second overlay network. The second overlay network includes several networked second-level nodal entities that can support data processing and data communication between the second-level nodal entities. | 08-16-2012 |
20120209985 | DETECTING NETWORK-APPLICATION SERVICE FAILURES - A computer-implemented process ( | 08-16-2012 |
20120209986 | Social Net Advocacy Process and Architecture - A method and system are disclosed for monitoring user interactions and generating proactive responses thereto within a social media environment. Social media interactions are monitored, collected, and processed to determine whether they contain content outside of a threshold. If so, they are processed to determine the content causing the content to be outside of the threshold. Once the issues have been determined, proactive actions are performed to counteract the affect of the content. | 08-16-2012 |
20120209987 | Monitoring Use Of Tracking Objects on a Network Property - A collection of tracking objects that are provided with more resources of a network property are programmatically identified. Information about individual tracking objects of the collection are analyzed. A classification attribute is determined for at least some of the individual tracking objects based at least in part on the analyzed information. The classification attribute is indicative of whether the tracking object is known or in compliance with a policy of the network site that pertains to use of tracking objects. | 08-16-2012 |
20120209988 | AUTOMATIC SERVER POSITION DETERMINATION - Systems and methods are provided for determining the location of a target computer device, such as a server in an array of interconnected servers. In one embodiment, a method comprises selecting a first server defining a first point of an axis of a reference coordinate system and selecting a second server defining a second point of the axis. A first cable is connected from the target server to the first server and a second cable is connected from the target server to the second server. The location of the target server is determined according to the length of the first cable, the length of the second cable, and the locations of the first and second servers. The axis may be designated using an axis cable, by connecting a first end of the axis cable to the first server and connecting a second end of the axis cable to the second server. | 08-16-2012 |
20120209989 | Method for Dynamic Migration of a Process or Services from One Control Plane Processor to Another - An apparatus comprising a processor configured to migrate load from a source process running on the processor to a target process running on a peer processor in a dynamic manner by monitoring an amount of resources used by the source process, wherein the load is migrated when the amount of resources utilized by the source process exceeds a threshold. Also disclosed is a network component comprising a first processor configured to select a source process to migrate a load from the first processor based on available resources on the first processor and the source process; and a second processor configured upon receiving a migration request from the first processor to one of select and start a target process to which to migrate the load based on available resources for the second processor and the target process. | 08-16-2012 |
20120209990 | METHOD AND SYSTEM FOR PROVIDING A ZERO RATING SERVICE TO AN END-USER DEVICE - Methods and systems for providing a zero rating service to an end-user device are described. In one embodiment, a method for providing a zero rating service to an end-user device involves redirecting a request that is directed to a third party URL from an end-user device to a zero rating URL and performing a URL transformation in response to the redirected request. Other embodiments are also described. | 08-16-2012 |
20120209991 | NETWORK DEVICE, INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF THE SAME, AND RECORDING MEDIUM FOR THE SAME - A network device communicating with an information processing apparatus includes a receiving unit configured to receive an activation request from the information processing apparatus, an activation unit configured to activate the network device in response to the activation request, a notification unit configured to provide notification of a first scheduled time indicating a duration time of a state in which the network device is not activated, and a responding unit configured to, in response to the activation request received after the notification unit is notified of the first scheduled time, provide notification of a second scheduled time indicating a duration time of the state in which the network device is not activated between when the first scheduled time is notified and before a time corresponding to the first scheduled time elapses, and when the activation has been completed, to notify the information processing apparatus that the activation has been completed. | 08-16-2012 |
20120209992 | SYSTEM FOR METERING IN AN ON-DEMAND UTILITY ENVIRONMENT - A method for metering on-demand service (ODS) resource consumption by a user comprising a web services interface, a processing engine, and configuration data. A data gathering agent in the ODS stores the usage data in records, combines the records into packets, and transmits the packets to the web services interface. The web services interface passes the packets onto the processing engine, which stores the records in the packet into a database. The generalized format of the record is critical because it allows the metrics to be stored in the record table with the usage data. When a record contains an instruction to close a UOW, the processing engine applies the configuration data comprising composition rules and record selection rules to the database. The record selection rules select the desired records from the database. The composition rules aggregate, normalize, and compose the selected records to produce a metric. | 08-16-2012 |
20120209993 | DRIFT VISUALIZATION - A system for drift visualization of change data of a data center is disclosed. The data center includes a plurality of configuration items. The system includes a management server in communication with the data center. The management server includes an agent configured to collect the change data from one or more of the plurality of configuration items. A change datastore in communication with the management server is provided to store the change data. A data extractor in communication with the change datastore retrieves the change data and provides a filtered subset of the change data to a display. A policy datastore enables the data extractor to filter the change data based on data center policy violations. The visualization depicts multiple dimensions of change-related data for the items in the data center in a unique and concise manner. | 08-16-2012 |
20120209994 | SYSTEM AND METHOD FOR ADAPTIVELY COLLECTING PERFORMANCE AND EVENT INFORMATION - Determination of an optimum batch size for aggregating data wherein, for a number of batch sizes, costs are estimated for sending batched information to persistent storage and for losing batched data. Then, the optimum batch size is selected from the number of different batch sizes based on sums of these costs. | 08-16-2012 |
20120209995 | SYSTEM AND METHOD TO ENHANCE USER PRESENCE MANAGEMENT TO ENABLE THE FEDERATION OF RICH MEDIA SESSIONS - A method and system is provided to enhance user presence management to enable the federation of rich media sessions. The method is implemented on a system and includes a presence manager server receiving a notification of user activity of one or more users taking place on one or more participating ecosystem sites in a participant ecosystem. The method further includes processing the user activity of the one or more users based on preferences of the one or more participating ecosystem sites established during a registration process and stored in a preference repository. The method further includes sending a notification of the user activity of the one or more users to the one or more participating ecosystem sites in the participant ecosystem to enable the participating ecosystem sites to at least one of communicate the user activity of the one or more users to one or more users and maintain a session of the one or more users. | 08-16-2012 |
20120209996 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION CONTROL METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM - Provided is a communication system that includes first and second communication devices operating in conformance with IPv | 08-16-2012 |
20120209997 | Providing Page Navigation in Multirole-Enabled Network Application - The present invention discloses an apparatus, method and computer program for providing page navigation in a multirole-enabled network application. The apparatus comprises: a virtual role creator adapted to create a virtual role for each user in the multirole-enabled network application based upon an atomic role set configured for the user; an access pattern generator adapted to generate a virtual-role-based access pattern by recording page access requests of the user and by performing pattern mining for the recorded page access requests according to the virtual role of the user; and a page navigation provider adapted to provide page navigation by utilizing the access pattern corresponding to the virtual role of the user when the user accesses the multirole-enabled network application. With the technical solution of the invention, pattern mining can be performed for access data of one or more users according to virtual role, so the user can be provided with optimized personalized page navigation. | 08-16-2012 |
20120215903 | Generating Audience Response Metrics and Ratings From Social Interest In Time-Based Media - Social media content items are mapped to relevant time-based media events. These mappings are used as the basis for calculating metrics based upon the mappings, and ratings of the time-based media there from. Audience response metrics (ARMs) are calculated from the mappings, which provide an indication of audience engagement or response. In addition, ARMs provide information about the virality, depth, and breadth of the response by the viewing audience. The calculated metrics are stored and are used to generate ratings for the time-based media. The ratings may be published in whole or in part, e.g., as part of a ratings system. | 08-23-2012 |
20120215904 | Backup System Monitor - A system and method of monitoring and displaying a status of a backup at one or more locations is presented. The system and method may include identifying a status of a backup at a first location, identifying a status of a backup at a second location and displaying the statuses at a backup system monitor. In some examples, the statuses may be displayed simultaneously. In still other examples, the received status of a backup system may be flagged if it is within a predetermined threshold. The received statuses may be displayed graphically in order to aid in identifying issues and prioritizing allocation of resources. | 08-23-2012 |
20120215905 | METHOD AND APPARATUS OF ESTABLISHING COMPUTER NETWORK MONITORING CRITERIA - A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of automatically configuring a set of monitoring requirements may include creating initial monitor counter values at a computing device and monitoring at least one computer based on the initial monitor counter values. Additional operations may include calculating override monitor counter values based on the monitoring of the at least one computer, and monitoring the at least one computer based on the override monitor counter values. The override values may be better suited for the device(s) being monitored and may replace the previously used monitoring settings. | 08-23-2012 |
20120215906 | METHOD AND APPARATUS OF MATCHING MONITORING SETS TO NETWORK DEVICES - A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of assigning a sample set to a network device operating on a network may include identifying the at least one network device, and identifying at least one object identifier associated with the at least one identified network device. The method may also include transmitting the at least one object identified to a memory location, and comparing the at least one object identifier to a plurality of sample sets and assigning relevancy scores to the plurality of sample sets based on the comparison. The method may also include assigning at least one sample set having a greater relevancy score than the other sample sets to the at least one network device. The sample sets may be SNMP sample sets. | 08-23-2012 |
20120215907 | SYSTEMS AND METHODS FOR SELF-ADJUSTING LOGGING OF LOG MESSAGES - Systems, methods and articles of manufacture for logging computer generated log messages utilizing a computerized feedback signal. A logging server logs computer generated log messages from a log source at a logging server at a first detail level. The detail level of logging is the amount of information or data logged for a given activity. A log analyzer analyzes the log messages being logged by the logging server at a first detail level. Then, in response to a computerized feedback signal based upon the analysis of the log messages by the log analyzer, the detail level of logging at the logging server is automatically modified to a second detail level which is different than the first detail level. | 08-23-2012 |
20120215908 | METHOD AND SYSTEM FOR DETECTING IMPROPER OPERATION AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM - An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation. | 08-23-2012 |
20120215909 | SYSTEM AND METHOD FOR EFFICIENT CLASSIFICATION AND PROCESSING OF NETWORK TRAFFIC - Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass. | 08-23-2012 |
20120215910 | WEB SERVICE SYSTEM, SERVER MANAGEMENT APPARATUS, AND WEB SERVICE PROVIDING METHOD - A virtual device management server manages location information and resource information about a virtual device server as server information. The virtual device management server receives a processing request and printer location information from a printer. Then, the virtual device management server selects a virtual device server for providing a Web service corresponding to the processing request on the basis of server information, the processing request, and location information about the printer to thereby assign the selected virtual device server to the printer. | 08-23-2012 |
20120215911 | Flow tagging for service policy implementation - A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications. | 08-23-2012 |
20120215912 | METHOD AND APPARATUS FOR EVENT CORRELATION RELATED TO SERVICE IMPACT ANALYSIS IN A VIRTUALIZED ENVIRONMENT - A computer processor device provides a dependency tree representing (i) relationships among all the infrastructure elements in a computer system that are related to delivery of a service by a computer system, and (ii) how the infrastructure elements interact with each other in a delivery of said service, wherein a state of an infrastructure element is impacted only by states among its immediately dependent infrastructure elements of the dependency tree. The computer processor device determines the state of the service by checking current states of infrastructure elements in the dependency tree that immediately depend from the service. | 08-23-2012 |
20120215913 | INFORMATION MANAGEMENT APPARATUS AND INFORMATION MANAGEMENT SYSTEM - An information management apparatus may include a first collection unit that collects a measurement value measured by a measurement device connected to the information management apparatus via a network, a second collection unit that collects status information indicating statuses of the measurement device and the network, and a correction unit that correcting quality information indicating validity of the measurement value, which has been collected by the first collection unit, by using the status information that has been collected by the second collection unit. | 08-23-2012 |
20120215914 | REQUEST ROUTING BASED ON CLASS - A system and method for management and processing of resource requests is provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a requested resource from the client computing device. The content delivery network service provider associates the client computing device with a cluster of other client computing devices. Based on routing information for the cluster, the content delivery network service provider routes the DNS query. The process can further include monitoring performance data associated with the delivery of the requested resource and updating the routing information for the cluster based on the performance data for use in processing subsequent requests from client computing devices in the cluster. | 08-23-2012 |
20120215915 | Global Load Balancing on a Content Delivery Network - The invention relates to systems and methods of global load balancing in a content delivery network having a plurality of edge servers which may be distributed across multiple geographic locations. According to one aspect of the invention, a global load balancing system includes a first load balancing server for receiving a packet requesting content to be delivered to a client, selecting one of the plurality of edge servers to deliver the requested content to the client, and forwarding the packet across a network connection to a second load balancing server, which forwards the packet to the selected edge server. The selected edge server, in response to receiving the packet, sends across a network connection the requested content with an address for direct delivery to the client, thereby allowing the requested content to be delivered to the client while bypassing a return path through the first load balancing server. | 08-23-2012 |
20120215916 | Server Access Processing System - A method, programmed medium and system are provided for preventing the denial of file system access to a plurality of clients accessing a NFS server. In one example, an NFS server is configured to listen on a server port. The server runs a separate daemon which “watches” client requests as they are received at the NFS server. The server processing system tracks the number of times a client sends consecutive TCP zero-window packets in response to a data packet from the server. If the number of zero-window packets crosses a user-defined threshold, then a routine is called to stop responding to that client using a backoff algorithm. When the server reaches a point where the number of available threads or any other relevant resource dips below a user-defined threshold, the server process starts terminating connections to the clients starting from the ones with the oldest entry in the table. | 08-23-2012 |
20120215917 | Detecting the Health of an Operating System in Virtualized and Non-Virtualized Environments - A remote management controller is provided for use in conjunction with a managed host computer. The remote management controller exposes a virtual network interface controller, such as a driverless virtual USB network interface controller, to the managed host computer. Through the in-band connection provided by the virtual network interface controller, the remote management controller can send a command to the host operating system or one or more guest operating systems executing in a virtualized environment. If no reply is received to the command, the remote management controller takes corrective action to restore the operation of the host operating system or the non-responsive guest operating systems. | 08-23-2012 |
20120221708 | Distributed content popularity tracking for use in memory eviction - In one embodiment, a method includes storing at a node in a distributed network of nodes, an object associated with an object descriptor comprising popularity information for the object, each of the nodes storing a plurality of the objects and object descriptors, the node in communication with a server storing objects that are less popular than the objects stored at the nodes, and transmitting from the node to the server, one of the objects identified as less popular than one of the objects stored at the server. One of the nodes receives and stores the object from the server. An apparatus is also disclosed. | 08-30-2012 |
20120221709 | MECHANISM TO ALLOW HOSTED AND ON-SITE IMPLEMENTATIONS TO MANAGE PRODUCT ASSETS AS SPECIFIED BY A THIRD PARTY - A first server computing system receives a request from a second server computing system over a first network. The request is for product asset management data relating to an owner of product assets. The product asset management data comprises product business model data of a third party. The first computing system collects the product asset management data relating to the owner and sends the product asset management data to the second server computing system to allow the second server computing system to manage the product assets of the owner as specified by the third party via a second network. | 08-30-2012 |
20120221710 | Mechanism for Virtual Machine Resource Reduction for Live Migration Optimization - A mechanism for virtual machine resource reduction for live migration optimization is disclosed. A method of the invention includes monitoring a rate of state change of a virtual machine (VM) undergoing a live migration, determining that the rate of state change of the VM exceeds a rate of state transfer of the VM during the live migration process, and adjusting one or more resources of the VM to decrease the rate of state change of the VM to be less than the rate of state transfer of the VM. | 08-30-2012 |
20120221711 | REGULAR EXPRESSION SEARCHES UTILIZING GENERAL PURPOSE PROCESSORS ON A NETWORK INTERCONNECT - A first hardware node in a network interconnect receives a data packet from a network. The first hardware node examines the data packet for a regular expression. In response to the first hardware node failing to identify the regular expression in the data packet, the data packet is forwarded to a second hardware node in the network interconnect for further examination of the data packet in order to search for the regular expression in the data packet. | 08-30-2012 |
20120221712 | User Activity Monitoring - Embodiments of the present invention include systems and methods for monitoring user activity. In embodiments, a front-end component collections data that may be useful to an administrator or others in determining or inferring what a user was doing or trying to do when interacting with an application, and the front-end component communicates at least some of this data to a back-end component. In embodiments, the communication of data related to the user activity is piggy-backed with typical transmissions, such as requests and responses, to reduce the overhead of the user activity monitoring. | 08-30-2012 |
20120221713 | MULTIFUNCTIONAL HOME NETWORK SYSTEM USING UBIQUITOUS COMPUTING - The invention is related to a multifunctional home network system using ubiquitous computing. The system includes a home network equipment that communicate to a home gateway with wire/wireless inside a room, and can provide various services including security, home automation, multimedia, and medical service and transmit these information to a user located outside. | 08-30-2012 |
20120221714 | Communication Device, Communication Method, and Computer Readable Recording Medium - A communication device includes a controller configured to control the communication device to determine whether to permit measurement of a transmission channel bandwidth which is a usable bandwidth in a transmission channel to and from another communication device via a network, based on whether the other communication device satisfies a specified condition, in response to receiving an establishment request that requests establishment of a session from the other communication device, measure the transmission channel bandwidth to and from the other communication device, in response to determining that the measurement of the transmission channel bandwidth is permitted, and communicate with the other communication device using the measured transmission channel bandwidth, in response to measuring the transmission channel bandwidth and receiving a permit command that is a command to permit the establishment of the session with the other communication device. | 08-30-2012 |
20120221715 | APPARATUS, SYSTEM, AND METHOD OF PROCESSING LOG DATA, AND RECORDING MEDIUM STORING LOG DATA PROCESSING PROGRAM - An management system stores information including communication state data indicating a communication state of a terminal as raw log data, and applies format processing to the raw log data to generate formatted log data before a request for obtaining communications log information of the terminal is received. When the request is received, the management system searches the formatted log data to obtain formatted log data that matches the request. | 08-30-2012 |
20120221716 | Tracking Internet Usage In A Household - Tracking Internet usage in a home network including multiple household computing devices connectible using a consumer premises router. An agent is installable in the consumer premises router. A monitor server operatively connects to the consumer premises router. The agent is operable to: capture a request originating from at least one of the household devices and to extract data from the request. The data may include an identifier of the household device initiating the request. | 08-30-2012 |
20120221717 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR AUTOMATED REMOTE DATA COLLECTION - Methods, apparatuses, computer program products and other means are provided for systems that are configured to use remote connections to, for example, provide proactive support monitoring by running scripts (such as, e.g., diagnostic tests) and/or collecting data (such as diagnostic test result data) from one or more customer machines. The collected data can be received at a centralized location. The collected data can be analyzed by one or more other machines, used by a support team, sold to clients, and/or used in any other manner. For example, technical problems discovered from diagnostic test results data may be fixed by a support team before the symptoms of the problems are experienced by at least some of the customer's machines. Some embodiments may also be configured to perform fact based decision making. | 08-30-2012 |
20120221718 | ENERGY MANAGEMENT METHOD - An energy management system includes a controller disposed at a site. The controller is in communication with a gateway with the gateway being capable of establishing a broadband connection with a first communication network. The gateway is configured to communicate with at least one remote server for receiving energy management information located at the at least one remote server. The controller is configured to initiate communication with the at least one remote server at a first periodic interval to request receipt of the energy management information over the first communication network. | 08-30-2012 |
20120221719 | METHOD FOR SETTING DATA TRANSMISSION PARAMETERS AND COMMUNICATION DEVICE - A method for setting data transmission parameters of a communication connection comprising exchanging interface management capabilities between a plurality of communication devices; selecting from the plurality of communication devices, an active interference manager and at least one passive interference manager; collecting information about communication connections to the active interference manager, including information messaged from the at least one passive interference manager; and setting the plurality of data transmission parameters of the communication connections based on the collected information, wherein the collected information includes database information generated through simulations or measurements and stored on the plurality of communication devices. | 08-30-2012 |
20120221720 | MONITORING DEVICE MESH NETWORK SYSTEMS AND METHODS - Methods, systems, devices, and software are described for data transmission to and from a monitored device via a mesh network. Monitoring devices report usage, status, location, and other pertinent data via a mesh network, and perhaps other networks as well. Novel data collection, transmission, and aggregation techniques are described. Data transfer may be bi-directional in order to manage and update device status and operation. The monitored device location may be tracked with the reported information. | 08-30-2012 |
20120221721 | Detecting Fraudulent Activity - Described are computer-based methods and apparatuses, including computer program products, for detecting fraudulent activity. A computing device in a second network receives a plurality of interactions between data centers in a first network and one or more devices, remote from the data centers, of a user, the interactions forming an aggregate user session representing the user's activity over a period of time with the data centers via the devices. The computing device monitors data transaction requests of the interactions and is configured to respond to each request with a response that appears as if the request was executed. If the interactions are harmful, the computing device interdicts the interactions from execution by the data centers and allows the devices to submit additional interactions. If unable to determine whether the subsequent interactions are harmful, the computing device transmits the interactions to the data centers for execution and marks the interactions. | 08-30-2012 |
20120221722 | Method and Arrangement for Handling Notifications in a Communication Network - A method can be executed at a notifier of a communication system for the purpose of handling notifications, at least partly according to a notification scheme. The basis of the method is to provisioning for a differentiated distribution rate to be applied together with the notification scheme when distributing notifications which have been received from a notification source function and which are associated with the subscriber. The provisioning is based on user traffic statistics on traffic involving a registered subscriber, and which has been generated in the communication network, and where the statistics has been acquired from a statistics server and accumulated by the notifier. | 08-30-2012 |
20120226796 | SYSTEMS AND METHODS FOR GENERATING OPTIMIZED RESOURCE CONSUMPTION PERIODS FOR MULTIPLE USERS ON COMBINED BASIS - Embodiments relate to systems and methods for generating optimized resource consumption periods for multiple users on a combined basis. A set of aggregate usage history data can record consumption of processor, software, or other resources subscribed to by a set of users, in one cloud or across multiple clouds. An entitlement engine can analyze the usage history data to identify a subscription margin for the subscribed resources, reflecting collective under/over-consumption of cloud resources by the users against subscription limits. The entitlement engine can track the short-term subscription margin for one or multiple resources over hours of a day, or over other intervals. The entitlement engine can thereby generate a set of variable or dynamic consumption periods over which to track the resource consumption, based on trends or conditions demonstrated in that consumption pattern by the set of users on a combined basis. Combined consumption can be metered on smaller, larger, and/or more rapidly changing intervals when the collective consumption rate is rapidly changing. | 09-06-2012 |
20120226797 | Active Load Distribution for Control Plane Traffic Using a Messaging and Presence Protocol - Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server devices that are configured to manage traffic for messaging and presence clients communicating via a messaging and presence protocol. The control plane traffic is associated with the messaging and presence protocol. A determination is made as to when the control plane traffic load level has become unbalanced among the two or more server devices and in response to determining that the control plane traffic load level has become unbalanced, sending a transfer message to one or more clients comprising information configured to initiate migration of one or more clients from a server device that is relatively overloaded to a server device that is relatively underloaded in order to balance the control plane traffic load level among the two or more server devices. | 09-06-2012 |
20120226798 | FAST NETWORK DISCOVERY USING SNMP MULTI-CAST - A network management device sends an SNMP multi-cast GET on a network to discover all the network devices on the network or subnet. The network management device builds a Management Information Base (MIB) based on the responses received from the SNMP multi-cast GET. The MIB information is then sent to a Network Management System (NMS). | 09-06-2012 |
20120226799 | Capabilities Based Routing of Virtual Data Center Service Request - Systems and methods are provided for receiving at a provider edge routing device capabilities data representative of capabilities of computing devices disposed in a data center, the capabilities data having been published by an associated local data center edge device, and advertising, by the provider edge routing device, the capabilities data to other provider edge routing devices in communication with one another in a network of provider edge routing devices. The provider edge routing device also receives respective capabilities data from each of the other provider edge routing devices, wherein each of the other provider edge routing devices is associated with a respective local data center via a corresponding data center edge device, and stores all the capabilities data in a directory of capabilities. Thereafter, a request for computing services is received at the provider edge network and the methodology provides for selecting, based on the directory of capabilities, one of the data centers to fulfill the request for computing services to obtain a selected data center, and for routing the request for computing services to the selected data center. | 09-06-2012 |
20120226800 | REGULATING NETWORK BANDWIDTH IN A VIRTUALIZED ENVIRONMENT - In a method for regulating network bandwidth in a virtualized computer environment, a computer having a hypervisor program receives a request from a first virtual client to transmit data. In response, the computer transfers the data from a memory of the first virtual client to a memory of a virtual server. The computer receives an error notification from a shared virtual network adapter of the virtual server, indicative of insufficient network bandwidth available to transmit the data. In response, the computer notifies the first virtual client that insufficient network bandwidth is available to transmit the data. | 09-06-2012 |
20120226801 | Network Appliance with Integrated Local Area Network and Storage Area Network Extension Services - Techniques and a network appliance apparatus are provided herein to extend local area networks (LANs) and storage area networks (SANs) beyond a data center while converging the associated local area network and storage area network host layers. A service flow is received at a device in a network. It is determined if the service flow is associated with storage area network or with local area network traffic. In response to determining that the service flow is storage area network traffic, storage area network extension services are performed with respect to the service flow in order to extend the storage area network on behalf of a remote location. In response to determining that the service flow is local area network traffic, local area network extension services are performed with respect to the service flow in order to extend the local area network on behalf of the remote location. | 09-06-2012 |
20120226802 | Controlling Network Device Behavior - A sender device is able to send packets over a network destined to a receiver device, and the sender device receives response information that is responsive to the packets. A behavior of the sender device with respect to data transmission on plural subflows of a connection is controlled based on the response information. | 09-06-2012 |
20120226803 | METHOD AND SYSTEM FOR PROVIDING STATUS OF A MACHINE - A method for providing machine status information via an enterprise social network is disclosed. The method embodiment includes receiving by a server a status update message from a machine where the status update message includes an identifier of the machine and an indication of a status update of the machine. The server is configured to determine information identifying a first user from a database system, where the first user follows a status of the machine, and to post a notification message in a feed on a web page associated with the first user. In an embodiment, the notification message identifies the machine and includes the status update of the machine. By posting the status update on the first user's web page, the first user is notified of the status of the machine. | 09-06-2012 |
20120226804 | SYSTEMS AND METHODS FOR SCALABLE N-CORE STATS AGGREGATION - The present invention is directed towards systems and methods for aggregating and providing statistics from cores of a multi-core system intermediary between one or more clients and servers. The system may maintain in shared memory a global device number for each core of the multi-core system. The system may provide a thread for each core of the multi-core system to gather data from the corresponding core. A first thread may generate aggregated statistics from a corresponding core by parsing the gathered data from the corresponding core. The first thread may transfer the generated statistics to a statistics log according to a schedule. The system may adaptively reschedule the transfer by monitoring the operation of each computing thread. Responsive to a request from a client, an agent of the client may obtain statistics from the statistics log. | 09-06-2012 |
20120226805 | DYNAMIC BANDWIDTH MANAGER - A dynamic bandwidth manager for determining the bandwidth available to an IP connected client device, the IP connected client device requesting access to multimedia resources from a service provider, the dynamic bandwidth manager comprising: a receiving component for receiving an IP address of an IP connected client requesting access to a resource; a requesting component for locating a nearest managed device to the IP connected client and requesting a current network management data set pertaining to the IP connected client from the located managed device; a calculation component for retrieving a previously stored set of network management data pertaining to the IP connected client and for analysing the network management data sets, in dependence on the current network management data set and the previously stored network management data sets, to calculate the available bandwidth capacity of the IP connected client. | 09-06-2012 |
20120226806 | DYNAMICALLY ENABLING FEATURES OF AN APPLICATION BASED ON USER STATUS - In one embodiment, a first application detects a user's activity. Based on the user's activity detected by the first application, a type of user status is determined from among a plurality of different types of possible user status. One or more features are determined of a feature set of a second application that correspond to the type of user status detected by the first application. The corresponding one or more features of the feature set of the second application are limited to prevent the one or more features from interrupting the user's activity. One or more other features of the feature set of the second application that do not correspond to the type of user status detected by the first application are permitted. | 09-06-2012 |
20120226807 | SYSTEM FOR AND METHOD OF NETWORK ASSET IDENTIFICATION - A method of identifying a new end-user device connected within a network includes monitoring a plurality of remote outlets and detecting a new end-user device upon connection thereof to the network at a first of the remote outlets and determining information about the new end-user device by electronically communicating with some but not all of the remote outlets. A system for performing such a method with a network having a plurality of end-user devices connected thereto is also disclosed. | 09-06-2012 |
20120233307 | Status conflict resolution in integrated communication systems and methods thereof - The present application relates to unified communications, and more specifically, to resolving status conflicts within unified communications to provide integrated services. According to one illustrative embodiment, a set of status triggers are managed through a unified communication server. The triggers can be received from client devices such as global positioning systems, computers, presence detectors, calendar applications, etc. When received, the unified communication server can associate each of the triggers with a priority along with a duration. The unified communication server can set a status for the user according to the duration of the trigger event having the highest priority or until another trigger event having a higher priority is received. Based on the status of the user, communication services can be updated or kept. | 09-13-2012 |
20120233308 | Determining Network Node Performance Data Based on Location and Proximity of Nodes - In an embodiment, a method comprises receiving a request to obtain network performance data for a plurality of target nodes; determining geo-locations of the plurality of target nodes; based on the geo-locations, determining a set of the plurality of target nodes that are within a specified proximity radius; selecting one particular target node in the set; sending a probe packet, requesting network performance data, to the one particular target node in the set and not to all other target nodes in the set; applying, to all the target nodes in the set, network performance data that is received in response to the probe packet; wherein the method is performed by one or more processors. | 09-13-2012 |
20120233309 | METHODS OF MANAGING LOADS ON A PLURALITY OF SECONDARY DATA SERVERS WHOSE WORKFLOWS ARE CONTROLLED BY A PRIMARY CONTROL SERVER - A method is provided of managing workflow loads on a plurality of secondary data servers whose workflows are controlled by a primary control server. The method comprises initially directing workflow to only an active first data server of the plurality of secondary data servers, monitoring at least one server capacity factor associated with the active first data server, after a first predetermined minimum load level of work to the active first data server has been reached, continue directing work to only the active first data server until a first predetermined maximum load level of work to the active first data server is reached, determining if a minimum load level of work can be maintained on an idle second data server of the plurality of secondary data servers based upon the monitored capacity factor associated with the active first data server, and directing workflow to the idle second data server when a determination is made that the minimum load level of work can be maintained on the idle second data server. | 09-13-2012 |
20120233310 | COMPREHENSIVE BOTTLENECK DETECTION IN A MULTI-TIER ENTERPRISE STORAGE SYSTEM - Embodiments of the present invention provide approaches (e.g., online methods) to analyze end-to-end performance issues in a multi-tier enterprise storage system (ESS), such as a storage cloud, where data may be distributed across multiple storage components. Specifically, performance and configuration data from different storage components (e.g., nodes) is collected and analyzed to identify nodes that are becoming (or may become) performance bottlenecks. In a typical embodiment, a set of components distributed among a set of tiers of an ESS is identified. For each component, a total capacity and a current load are determined. Based on these values, a utilization of each component is determined. Comparison of the utilization with a predetermined threshold and/or analysis of historical data allows one or more components causing a bottleneck to be identified. | 09-13-2012 |
20120233311 | ANOMALY DETECTION AND IDENTIFICATION USING TRAFFIC STEERING AND REAL-TIME ANALYTICS - A system, associated with a service provider network, is configured to monitor traffic, that is traveling to or from the service provider network, to obtain traffic metrics that correspond to a collection of network layers, where the network layers; process the traffic metrics with respect to each of the network layers to identify an anomaly, associated with the traffic, that corresponds to at least one of the network layers; send a request for packets associated with the traffic based on the identification of the anomaly; receive copies of the packets associated with the traffic; analyze the copies of the packets to obtain information associated with the anomaly; and send a notification that indicates that the anomaly has been identified, where the notification includes the traffic metrics associated with the traffic or the information associated with the anomaly. | 09-13-2012 |
20120233312 | MANAGING DELIVERY OF APPLICATION SERVER CONTENT - A method of managing delivery of content to end users of an application executing on an application server is disclosed. A definition of a first variant of a web page is received, the definition of the first variant specifying that an instance of a first widget is to be included in the first variant at a first region conforming to a page layout of the web page. A definition of a second variant of the web page is received, the definition of the second variant specifying that an instance of a second widget is to be included in the second variant at a second region conforming to the page layout of the web page. A comparison of the first variant and the second variant is presented with respect to a performance metric, the performance metric pertaining to an effectiveness of the web page at bringing in revenues to a network-based publication system. | 09-13-2012 |
20120233313 | SHARED SCALING SERVER SYSTEM - The shared scaling server system of the present invention comprises a plurality of client terminals for transmitting a request, an application load balancer for distributing the request transmitted by the plurality of client terminals, a plurality of application servers for processing the request distributed by the application load balancer, a main server connected to the application load balancer and the plurality of application servers and having a monitor and a controller. The monitor monitors load status of the plurality of application servers, the monitor detects a site, in which access to a resource of at least one application server is increased when the monitor judges that load status of the at least one application server exceeds a threshold, the monitor checks availability of a resource of the plurality of application servers, the monitor transmits information about the availability of the resource of the plurality of application servers to the controller. The controller, depending on the information, processes traffic of the site, in which access is increased, in an available resource of the plurality of application servers and the controller, depending on the information, activates a new application server when there is no available resource in the plurality of application servers, allocates a firm comprising the site, in which access is increased, to an available resource of the new application server and processes traffic of the site, in which access is increased, in an available resource of the new application server. | 09-13-2012 |
20120233314 | Visualization of Access Information - The present disclosure involves a method. The method involves: receiving a request to access a resource; retrieving contextual information from the request; and dynamically associating an object with the retrieved contextual information, the object having at least one of: an audio component and a visual component that represent the contextual information in an auditory manner and a visual manner, respectively. The present disclosure also involves a system. The system involves: means for receiving a request to access a resource; means for retrieving contextual information from the request; means for associating an object with the retrieved contextual information, the object having at least one of: an audio component and a visual component that convey the contextual information in an auditory manner and a visual manner, respectively; and means for communicating the object to an entity, wherein the entity is selected from the group consisting of: a machine that is making the request, a user whose account is to be accessed by the request, and a representative of the user. | 09-13-2012 |
20120233315 | SYSTEMS AND METHODS FOR SIZING RESOURCES IN A CLOUD-BASED ENVIRONMENT - Systems and methods for sizing resources in a cloud-based environment are provided. In an exemplary embodiment, a method includes receiving quality of service requirements and a functional description of a cloud architecture associated with the application, including application resources and relations between the application resources, performing latency analysis of data packets in a compute layer of the cloud architecture, with the latency analysis including comparing size per time metrics of the data packets, determining minimal resources to guarantee the quality of service requirements based on the latency analysis and the quality of service requirements, and providing to the data center the minimal resources. | 09-13-2012 |
20120233316 | MANAGEMENT COMPUTER, STORAGE SYSTEM MANAGEMENT METHOD, AND STORAGE SYSTEM - It is provided a management computer coupled to a plurality of storage apparatuses and a plurality of physical computers, which comprises a memory, a processor and a network interface. The management computer collects performance information on each of at least one resource included in a path based on monitoring priority assigned to the each of the at least one resource; identifies a first path including a first resource based on configuration information in a case where a first event has occurred on the first resource; identifies a second resource included in the first path; determines whether a third resource for which the monitoring priority needs to be changed is included in the second resource based on the first event and the monitoring priority information; and changes the monitoring priority of the third resource in a case where the third resource is determined to be included in the second resource. | 09-13-2012 |
20120233317 | COMPUTER SYSTEM MANAGEMENT METHOD AND MANAGEMENT APPARATUS - The present invention makes it possible to analyze a problem spanning multiple domains. A management apparatus stores an analysis rule. The analysis rule defines a relationship between a causal event, which constitutes a cause of a problem, and multiple relevant events, which denote problems created by the causal event. A first management apparatus acquires a relevant event related to a prescribed node apparatus, which is not under management of the first management apparatus, from a second management apparatus, which manages the prescribed node apparatus. The first management apparatus analyzes a problem by applying the relevant event acquired from the second management apparatus and another relevant event related to a node apparatus under the management of the first management apparatus to the analysis rule. | 09-13-2012 |
20120233318 | In-Line Network Device For Storing Application-Layer Data, Processing Instructions, And/Or Rule Sets - A network device located in the data path between a user computer and a server stores application data, processing instructions, and/or rule sets. By storing user computer-specific application data, processing instructions, and/or rule sets in the data path between the user computer and the server, the invention reduces the complexity of the web server, improves the handling of server failure, and increases the overall scalability and performance of the system. | 09-13-2012 |
20120233319 | Method of Diagnostics and Monitoring Management and Related Communication Device - A method of diagnostics and monitoring management for a DM (device management) client in a wireless communication system is disclosed. The method comprises having at least one event set in a Trap management object (MO) tree; and performing measurements and providing measurement results to the server when the at least one event is triggered. | 09-13-2012 |
20120233320 | REPORT PRODUCTION APPARATUS, REPORT PRODUCTION SYSTEM, AND REPORT PRODUCTION METHOD - A report production apparatus includes a first collection unit configured to make requests depending on multiple types of device management systems respectively to collect pieces of device management information and convert the collected pieces into a common format, each piece of device management information being about usage of devices disposed at a base of the device management system; a second collection unit configured to make a request to collect contract information about quality assurance for the devices from a contract system; a third collection unit configure to make requests depending on multiple types of service desk systems respectively to collect pieces of service information and convert the collected pieces into another common format, each piece of service information being about device abnormality of the devices disposed at the base of the service desk system; and a production unit configured to produce a report using the above information. | 09-13-2012 |
20120233321 | NETWORK STRUCTURE AND METHOD OF ITS USE FOR TENANT SPECIFIC MEASUREMENT OF RESOURCE UTILIZATION IN A MULTI-TENANT SYSTEM FOR THE PURPOSES OF REPORTING, RATING AND ACCESS CONTROL - A system and method for metering the use of network-accessible computer resources by multiple users, each user being associated with two or more tenant client computing device connected to a multi-tenant system via a network. The multi-tenant system includes a load balancer and access control device, a server computing device, and a consolidated user store. Requests to use resources of the multi-tenant system are generated by one of the tenant client computing devices and are received by the load balancer and access control device. In response to such requests, the system executes usage measurement initiation instructions, processes usage measurement computation instructions and records usage measurement data, periodically detects recordation of the usage measurement data in said local memory cache, and aggregates said usage measurement data in said consolidated user store. | 09-13-2012 |
20120233322 | MANAGING RESOURCE CONSOLIDATION CONFIGURATIONS - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance information to determine a consolidation configuration to be associated with a subsequent request for the content associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance information collected and associated with subsequent requests corresponding to the content associated with the two or more embedded resources and using each of a variety of alternative consolidation configurations. Aspects of systems and methods for generating recommendations to use a particular consolidation configuration to process a subsequent request corresponding to the content associated with the two or more embedded resources are also provided. | 09-13-2012 |
20120233323 | METHOD AND APPARATUS FOR USE IN A COMMUNICATIONS NETWORK - According to a first aspect of the present invention there is provided a method of operating a Charging Trigger Function to collect session and/or event related information from an IP Multimedia Subsystem. The method comprises configuring the Charging Trigger Function with one or more string filters for identifying matching strings, determining if messages passing through the Charging Trigger Function include one or more matching strings, and, if a message does include one or more matching strings, sending a reporting message to a charging control entity, the reporting message comprising data associated with each matching string. | 09-13-2012 |
20120233324 | Method and system for implementing usage monitoring control - The present disclosure provides a method for implementing usage monitoring control, comprising: a PCRF makes a usage monitoring policy for each IP-CAN session or service data flow that shares a total allowanced usage according to the obtained total allowanced usage shared by multiple users, and the PCRF sends the usage monitoring policy to a PCEF ( | 09-13-2012 |
20120233325 | Method and system for implementing usage monitoring control - The present disclosure discloses a method for implementing usage monitoring control, a total allowanced usage is prestored in a Subscription Profile Repository (SPR), the SPR sets an allowanced usage threshold according to a request from a Policy and Charging Rules Function (PCRF) and distributes the set allowanced usage threshold to the PCRF; the PCRF makes a usage monitoring policy according to the obtained allowanced usage threshold; after receiving a usage report of the PCRF, the SPR deducts a consumed usage from the total allowanced usage shared by multiple users. The present disclosure also provides a system for implementing usage monitoring control. Through the solution of the present disclosure, when multiple users share a total allowanced usage, PCRF simultaneously monitors the usage on the multiple users according to the total allowanced usage, thereby avoiding conflicts in policy and charging controls. | 09-13-2012 |
20120239796 | ZONE-BASED NETWORK TRAFFIC ANALYSIS - Network discovery is performed to detect routers and to collect discovery data from them. The discovery data is analyzed to identify zones, i.e., autonomous routing domains and subdomain areas. Network traffic is monitored at border router ports to obtain zone traffic data. The zone traffic data is analyzed to evaluate per-zone or inter-zone traffic parameters. | 09-20-2012 |
20120239797 | RECONCILING NETWORK MANAGEMENT DATA - Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold. | 09-20-2012 |
20120239798 | Monitoring the Distribution of Software - A computer implemented method to monitor the distribution of software to computers on a network is provided. The network has a data source, for example a systems management tool, which stores data relating to downloads of software. It is desirable for the purpose of operating the network economically to monitor the distribution of software to users. The systems management tool is accessed to determine the number of the computers on the network which have received a particular item of software. That number is compared with a threshold number which is small compared to the number of computers on the network. If the number is less than the threshold that is taken as an indication that the particular item of software has been distributed to the computers by a download as a result of one or more individual requests by users of the computers. Monitoring such indications can be used to estimate the cost of dealing with individual requests and that provides information for assisting a decision to provide a portal for making software available to users. Such an indication may be used to automatically make the software available on a portal to be downloaded by other users, if such a portal is provided. | 09-20-2012 |
20120239799 | NETWORK SYSTEM MANAGEMENT - Systems, methods, and machine-readable and executable instructions are provided for network system management. Network system management can include receiving a network system size and a number of system parameters. Network system management can also include receiving a desired monitoring performance and a desired monitoring quality. Furthermore, network system management can include generating a monitoring system topology for a monitoring and analysis system based on the network system size, the number of system parameters, the desired monitoring performance, and the desired monitoring quality. | 09-20-2012 |
20120239800 | Device Identification using Device Functions - Device identification techniques using identifiable device functions are described. In one or more implementations, data is obtained that describes functions of a device that are identifiable for use in conjunction with a computing device and a device identifier (ID) is computed for the peripheral device based on the identifiable device functions. | 09-20-2012 |
20120239801 | CONTENT DELIVERY VALIDATION SERVICE - Techniques for content delivery validation services are provided. A Request for content is validated for a specific level of service that is to be provided over a network when making the request for the content and when delivering the content to satisfy the request over the network. A network transaction is tagged representing the request and the delivery of the content. Resources that comport with the specific level of service are designated to handle the network transaction and the transaction is injected into the network. Usage of the resources is monitored as the network transaction is processed. | 09-20-2012 |
20120239802 | TRANSACTION PROCESSING SYSTEM AND OPERATION OF THE TRANSACTION PROCESS SYSTEM - A transaction processing system includes an application server having a transaction processing unit, a process monitoring unit, a database server having a database, and a database management unit. The transaction processing unit sends a transaction identifier for identifying the transaction to the database management unit, requests a session process, and outputs the transaction identifier to the process monitoring unit. The process monitoring unit receives the transaction identifier, receives a session identifier for identifying the session process returned by the database management unit, and sends an instruction to terminate the session process to the database management unit after a certain period of time, and the database management unit creates the session identifier, correlates the session identifier with the transaction identifier which are stored, starts the session process, returns the correlated session identifier to the process monitoring unit when receiving the transaction identifier, and terminates the session process when receiving the instruction. | 09-20-2012 |
20120239803 | MONITORING APPARATUS, MONITORING SYSTEM, AND INFORMATION SETTING METHOD - A monitoring apparatus includes a storage and a processor. The storage stores collecting apparatus information for identifying one of a plurality of collecting apparatuses collecting status information of a network. The processor acquires status information of the network from a network apparatus connected to the network. The processor acquires, from a database, collecting apparatus information for identifying each of the plurality of collecting apparatuses. The processor acquires, based on the acquired collecting apparatus information, load information indicating a load on each of the plurality of collecting apparatuses. The processor selects, based on the acquired load information, one collecting apparatus among the plurality of collecting apparatuses, to which the monitoring apparatus transmits the acquired status information. The processor stores collecting apparatus information for identifying the selected collecting apparatus in the storage. The processor notifies the selected collecting apparatus of monitoring apparatus information for identifying the monitoring apparatus. | 09-20-2012 |
20120239804 | METHOD, DEVICE AND SYSTEM FOR BACKUP - A method, a device, and a system for backup are disclosed. The method includes: receiving a backup packet; analyzing the backup packet to obtain a serial number of an active data packet, where the serial number is carried in the backup packet; calculating a sum of the serial number of the active data packet and a specific increment value to obtain a serial number of a standby data packet; and backing up the serial number of the standby data packet. Therefore, after the service is switched over from the active device to the standby device, the active device still regards the data packet sent by the former standby device as a new data packet and receives the data packet, which prevents service interruption caused by the switchover and improves continuity of service processing in the process of two-node cluster hot backup. | 09-20-2012 |
20120239805 | System and Method to Determine Network Usage - A method includes determining a first upload usage value and a first download usage value for a user account for a time interval from cell counter data retrieved from a first network device. The method includes determining a second download usage value for the user account for the time interval based on session information from a second network device. The method includes adding an upload usage value based on the first upload usage value and the second upload usage value to a cumulative upload usage value for the user account and adding a download usage value based on the first download usage value and the second download usage value to a cumulative download usage value for the user account. The method also includes sending the cumulative upload usage value and the cumulative download usage value to a billing system. | 09-20-2012 |
20120239806 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD - An information processing apparatus coupled to a plurality of terminal devices through a communication channel, the information processing apparatus includes a communication unit configured to communicate with the plurality of terminal devices, an apparatus information obtaining unit configured to obtain apparatus information indicating a state of the information processing apparatus, and an information transmission controller which includes an information storage unit configured to store the apparatus information received from the apparatus information obtaining unit. | 09-20-2012 |
20120239807 | SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - An exemplary embodiment of the present invention provides a site controller for use in a communication system. The site controller can be configured to receive original data messages and repeated data messages, identify remote devices in associated with sensor data signals of received data messages and repeated data messages, and provide information related to the sensor data signals to a wide area network for access by a first host computer. | 09-20-2012 |
20120239808 | SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - An exemplary embodiment of the present invention provides a site controller for use in a communication system. The site controller can be configured to receive original data messages and repeated data messages, identify remote devices in associated with sensor data signals of received data messages and repeated data messages, and provide information related to the sensor data signals to a wide area network for access by a first host computer. | 09-20-2012 |
20120239809 | METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Example methods and apparatus to determine impressions using distributed demographic information are disclosed. A disclosed example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged. | 09-20-2012 |
20120246291 | Filtering and Promoting Application Store Applications - Techniques for filtering and promoting application store applications are described that can be employed to provide filtered application information and/or application promotions to client devices. The filtering and promoting can be based at least in part upon system information that describes configurations and capabilities of the client devices. In one or more embodiments, various system information for a client device is detected. The detected system information for the client device is used to filter application data in an application catalog. Page information to be provided to the client device for interaction with the application catalog is then ascertained using the filtered application data. The page information is sufficient to enable the client device to render targeted application store pages having filtered application information and/or promotions that are selected based on the detected system information. | 09-27-2012 |
20120246292 | Verifying Availability and Reachability Through a Network Device - In an embodiment, in response to receiving from a client computer a client request to connect to a server: processing the client request in a network protection device including applying one or more translations and one or more security checks, generating a server acknowledgment to the client computer as if the server acknowledged receiving the client request from the client computer, processing the server acknowledgement in the network protection device including applying one or more translations and one or more security checks and sending the server acknowledgment to the client computer; in response to receiving a client acknowledgment of receiving the server acknowledgment, determining that a first path between the client computer and the network protection device is operational; generating a server request to the server; processing the server request in the network protection device, determining that a second path between the network protection device and the server is operational. | 09-27-2012 |
20120246293 | FAST DEVICE CLASSIFICATION - In a system in which one or more client devices | 09-27-2012 |
20120246294 | SYSTEM AND METHOD OF SELECTING DEVICES TO COMMUNICATE WITH A NODE IN A COMMUNICATION NETWORK - The disclosure recites a system and method for selecting a client device for a server device managing communications for a wireless network. The method comprises: identifying a set of wireless devices that are communicating in the network; and identifying a set of client of devices in the set of wireless devices to communicate with the network through the server device by evaluating network communication characteristics of members in the set. | 09-27-2012 |
20120246295 | Real Time Distribution of Layered Communication Using Publish-Subscribe Data-Centric Middleware - Methods and apparatus, including computer program products, implementing and using techniques for organizing a communication session between two or more media aware network entities in a computer network. A computer network includes several media aware network entities (MANEs). The MANEs include data writers and data readers. A model for communication between the MANEs is provided. The communication model includes: subsets of planes associated with a session between two or more MANEs in a domain, each plane representing a collection of MANEs partaking on a subset of topics within the domain; a complementary subset of planes common to all participating MANEs of a domain, an aggregation of domains and topics, and methods for addressing namespaces within the topics. Data streams are exchanged in a session between two MANEs in the computer network according to the communication model. Techniques for distributing a data stream in a computer network are also described. | 09-27-2012 |
20120246296 | METHOD AND A SYSTEM FOR ANALYSING TRAFFIC ON A WEBSITE INCLUDING MULTIPLE VISITS BY THE VISITORS - A method and a system for analysing traffic on a website are disclosed, the website being arranged on a server. The method comprises the steps of allowing a visitor to perform multiple visits on the website, and monitoring navigations and/or actions performed by the visitor during each visit while accumulating value points in accordance with content viewed by the visitor and actions performed by the visitor, and in accordance with predefined value point settings associated with content of the website, thereby obtaining a value point score for each visit. An origin of the first visit, leading the visitor to the website, is registered and categorised according to type of origin in accordance with two or more predefined categories of origin. An accumulated value point score for the visitor is obtained by adding the obtained value point scores of the first visit and each of the subsequent visit(s). Thereby the website owner obtains information regarding total value generated by the visitor during all visits and regarding what initially lead the visitor to the website. This allows the website owner to evaluate marketing campaigns and to focus and/or improve marketing efforts. | 09-27-2012 |
20120246297 | AGENT BASED MONITORING FOR SAAS IT SERVICE MANAGEMENT - An apparatus for agent based monitoring software-as-a-service information technology service management. Proxy clients are installed on network equipment devices belonging to a customer. Each proxy client includes discovery module(s) to discover network equipment devices on at least one private network of the customer, a discovery reporting module to transmit information identifying the devices discovered by the discovery modules to a server using web services, and monitoring module that monitors network equipment device(s) according to monitoring definition(s) configured by the customer to collect information of those network equipment devices, receives monitored information from monitoring agents installed on different network equipment devices, and transmits the information collected and the received monitored information to the server using web services. Each of the monitoring definitions identifies which of the network equipment devices to monitor and defines parameter(s) of the monitoring. | 09-27-2012 |
20120246298 | MULTIPLE PHASE DISTRIBUTED REDUCTION - A method and system for metric information processing is disclosed in one embodiment. Metric information is gathered with a plurality of points of presence (POPs) geographically distributed across the Internet. The metric information is processed in a hub-and-spoke fashion with a metric reduction occurring in the POPs and another metric reduction in a kernel application server according to predetermined schemes. The two-stage metric reduction generates a result set including a data structure. The result set can be processed according to a query to generate a report. The data structure and reports have metric information that is recent and updated regularly without use of a database. | 09-27-2012 |
20120246299 | ANALYTICS PERFORMANCE ENHANCEMENTS - A method and apparatus for processing metric information is disclosed in one embodiment. Metric information is gathered from a number of end users. At least some of the reference types are converted to value types and stored in non-mechanical memory. The value types are manipulated to summarize the metric information. The value types are processed using the stack instead of the heap. | 09-27-2012 |
20120246300 | ANALYZING APPARATUS, METHOD, SYSTEM, AND RECORDING MEDIUM OF PROGRAM - An analyzing apparatus including includes a memory and a processor that executes a procedure, the procedure including controlling the memory to store logs of communication between a first apparatus and a second apparatus, and logs of communication between the second apparatus and a third apparatus, and extracting logs indicating a pair of a first request and a first response corresponding to the first request, communicated between the second apparatus and the third apparatus within a time range from transmission of a second request, transmitted from the first apparatus to the second apparatus, to transmission of a second response corresponding to the second request, transmitted from the second apparatus to the first apparatus, from among the logs stored in the memory. | 09-27-2012 |
20120246301 | APPARATUS AND METHOD FOR MANAGING PEER-TO-PEER CONNECTIONS BETWEEN DIFFERENT SERVICE PROVIDERS - In one embodiment of the invention, service providers generate bloom filters with the user ID codes of registered users and exchange the bloom filters with one another. In response to a request to locate a first user, a first service provider will query its own registration database to determine if the first user is registered with the first service provider. If the first user is not registered with the first service provider, then the first service provider will query its bloom filters to identify other service providers with which the first user may be registered. A positive response from a bloom filter indicates that the first user may or may not be registered with the service provider associated with that bloom filter, and a negative response indicates with certainty that the first user is not registered with the service provider associated with that bloom filter. | 09-27-2012 |
20120246302 | SYSTEM AND METHODOLOGY FOR CREATING AND USING CONTEXTUAL USER PROFILES - A computing device receives an indication of an action performed on a resource by a user of a user device. The computing device stores context data corresponding to the action and analyzes the indication of the action with respect to the context data, to determine a user affinity value for a criteria associated with the resource. The computing device stores the user affinity value for the criteria in a contextual user profile associated with the user. | 09-27-2012 |
20120246303 | LOG COLLECTION, STRUCTURING AND PROCESSING - Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing engines (e.g., “log managers”) using any appropriate rule base to identify “events” (i.e., log messages of somewhat heightened importance), and one or more “event managers” may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms. | 09-27-2012 |
20120246304 | SERVER MANAGEMENT APPARATUS AND METHOD, AND SERVER MANAGEMENT PROGRAM - A server management apparatus that performs processing of collecting statuses of devices arranged in a target server system on the basis of a request received from an upper-level apparatus and transmits a result of the processing to the upper-level apparatus as a reply to the request, the server management apparatus includes a communication controller configured to perform a communication with the upper-level apparatus, and a processor configured, in a case where when the communication controller receives the request from the upper-level apparatus, a processing content of the request is the same as a processing content of a previously received request and a reply to the processing based on the previously received request has not been transmitted to the upper-level apparatus, to avoid starting the processing corresponding to the subsequently received request and continue the processing based on the previously received request. | 09-27-2012 |
20120246305 | SYSTEM AND METHOD FOR MANAGEMENT OF COTS DEVICES IN MANAGED NETWORKS BASED ON DEVICE AUTO-DETECTION - A system and method for managing COTS devices based on device auto-detection and identification is provided. A network device on a managed network is identified, wherein the network device is identified as a one of a list of one or more network device types supported by the managed network and included in one or more configuration files, and wherein the one or more configuration files further include a list of one or more respective SNMP variables to be monitored for each of the network device types. The respective listing of SNMP variables to be monitored and/or configured is extracted from the one or more configuration files for the identified network device type. A request is then generated to monitor and/or configure the extracted SNMP variables to be monitored for the network device. | 09-27-2012 |
20120246306 | Unified Web Hosting and Content Distribution System and Method for Assuring Predetermined Performance Levels - A service model, integrated system, and method for enabling a service provider to deliver an integrated web hosting and content distribution service offering, which affords assured operational performance service levels, regardless of whether the customer's web site is served by the service provider's hosting center, the service provider's content distribution network (CDN), by a third party web host, or by a third party CDN. A monitoring system of the primary service provider receives detailed capacity and health statistics from any CDN under the operational control of the primary service provider, receives aggregate capacity and health statistics from other CDNs not under the operational control of the primary service provider. A redirection system then decides to which web host, content distribution network, or combination thereof, user requests for content are directed in order that operational performance service levels are maintained. | 09-27-2012 |
20120246307 | ANALYSIS OF ACTIVITY OF DEVICES IN A NETWORK THAT EMPLOY TRANSLATED NETWORK ADDRESSES - The embodiments provide for analyzing activity of devices in a network. Activity from a device may result from multiple devices translated to a common address, such as a public internet protocol (IP) address. In some embodiments, the activity from a network or device is analyzed to identify if multiple devices communicate via translated addresses from the common address. The devices may be identified based on various criteria, such as a unique identifier, protocol header information, or a media access control (or “MAC”) address. Other criteria may also be employed. Each device that is mapped to common address is then remapped so that each device has its own address. The activity data is then modified so that each device is correlated with its unique address. Alternatively, a new activity data file may be generated so that the activity of each device is indicated. | 09-27-2012 |
20120246308 | Interdomain Network Aware Peer-to-Peer Protocol - A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client. | 09-27-2012 |
20120246309 | DISTRIBUTED STORAGE AND AGGREGATION OF MULTIMEDIA INFORMATION VIA A BROADBAND ACCESS GATEWAY - A system and method for the aggregation of multimedia information storage via a broadband access gateway is disclosed. Information about storage resources accessible to a broadband access gateway may be collected and used in selecting storage capacity used for storing multimedia information such as, for example, streaming video, broadcast video, digitized video, digitized audio, text, and digitized images. The gateway may manage storage and retrieval of the multimedia information based upon user defined criteria and characteristics of the available storage resources. Multimedia information may be parsed for storage across multiple storage resources, and the location and nature of the storage resources used for storage of multimedia information items may be unknown to the user. Storage services accessible via a broadband connection may also be used as storage resources. | 09-27-2012 |
20120246310 | Active Waterfall Charts - A processor-implemented method includes providing an analytic dashboard with a graphical user interface (GUI) that outputs aggregated results streaming in real-time of a load test performed on a target website. The load test consists of a plurality of virtual users simulated by one or more load servers that execute a test composition on one or more webpages of the website. A waterfall chart is produced on the analytic dashboard that includes a plurality of timeline bars. Each of the timeline bars represents an aggregated result for a resource of the one or more webpages across all of the virtual users. The timeline bars change in real-time as the load test progresses. | 09-27-2012 |
20120246311 | SESSION MANAGEMENT SYSTEM, SESSION MANAGEMENT DEVICE, SESSION MANAGEMENT METHOD AND SESSION MANAGEMENT PROGRAM - A session management system including a client environment providing server, a plurality of terminals, and a session management server, wherein the session management server includes a session monitoring unit which monitors use end time of the client environment, a client environment management unit which makes a log-out request for the execution of log-out processing of a predetermined client environment to the client environment providing server, and a state of use checking unit which checks a state of use of each the client environment, wherein the session monitoring unit notifying a request for stopping use of the client environment to the state of use checking unit when the use end time of the client environment coincides with current time, and the client environment management unit, when the client environment is in use, transmitting to the client environment providing server a log-out request of the client environment. | 09-27-2012 |
20120254395 | REDUCING IMPACT OF RESOURCE DOWNTIME - Systems and methods of reducing impact of resource downtime. In an example, a method includes monitoring user access to the resource. The method also includes identifying baseline patterns in the monitored user access to the resource. The method also includes defining downtime for the resource based on the baseline patterns and expected time for taking the resource down. | 10-04-2012 |
20120254396 | PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource. | 10-04-2012 |
20120254397 | Method and System for Frame Discard on Switchover of Traffic Manager Resources - In accordance with some embodiments of the present disclosure, a method may include receiving a plurality of frames in a flow from a plurality of traffic managers, determining whether a traffic manager from which a frame in the flow was sent is a primary traffic manager for the flow or a secondary traffic manager for the flow based on a class marker for the frame, switching the frame if the frame is from the primary traffic manager for the flow, and discarding the frame if the frame is from the secondary traffic manager for the flow. | 10-04-2012 |
20120254398 | Traffic Like NXDomains - Methods and systems for analyzing network traffic related to domain names, including Non-Existent Domain names, comprise: storing network traffic data associated with DNS requests for NXDs; receiving an analysis request associated with a domain name; creating, based on the stored network traffic data, an NXD list comprising NXDs that received at least one DNS request during a specified time period; computing, based on the stored network traffic data, a similarity metric for each NXD listed in the NXD list; and providing an analysis report identifying potentially valuable NXDs based on the computed similarity metrics. | 10-04-2012 |
20120254399 | COMPUTING-DEVICE MANAGEMENT DEVICE, COMPUTING-DEVICE MANAGEMENT METHOD, AND COMPUTING-DEVICE MANAGEMENT PROGRAM - A computing-device management device capable of easily carrying out load distribution is provided. The computing-device management device has: a future load prediction unit that calculates a load prediction value, which is a value of a future load in each of computing devices, on the basis of load information of the computing device informed by the computing device and that determines whether the load prediction value exceeds a predetermined threshold value or not; a software allocation unit that detects, as a target computing device to be in an overloaded state in future, the computing device determined by the future load prediction unit to have the load prediction value exceeding the predetermined threshold value and that determines which computing device is to be an allocation destination of at least one software component operating in the target computing device on the basis of a CPU load, a memory used volume, and a data communication volume of the computing device; and an informing unit that informs the target computing device and the allocation-destination computing device of information of the allocated software component. | 10-04-2012 |
20120254400 | SYSTEM TO IMPROVE OPERATION OF A DATA CENTER WITH HETEROGENEOUS COMPUTING CLOUDS - A system to improve operation of a data center with heterogeneous computing clouds may include monitoring components to track data center climate controls and individual heterogeneous computing clouds' operating parameters within the data center. The system may also include a controller that regulates the individual heterogeneous computing clouds and data center climate controls based upon data generated by the monitoring components to improve the operating performance of the individual heterogeneous computing clouds as well as the operating performance of the data center. The system may further include spilling computing clouds to receive excess workload of an individual heterogeneous computing cloud without violating individual heterogeneous computing clouds contracts. | 10-04-2012 |
20120254401 | Method And Apparatus For Home Network Access By A Trusted Monitoring Agent - A manner of extending a home network to a remote TMA service. A TMA in the TMA service acquires and stores a UID (unique identifier) and a MS-UID (monitoring service UID), than registers with an SG (signaling gateway) and is then redirected to an MA-SG (monitoring application SG). The MA-SG may be dedicated to the TMA service or may host communications for more than one service. When an HA that subscribes to the monitoring service registers, it is also redirected to the MA-SG, and a secure tunnel is established between the TMA and the HA and maintained by heartbeat messages. The secure tunnel may be redirected to an MA-PS (monitoring application proxy server) depending on the bandwidth consumed in the monitoring process and traffic conditions. | 10-04-2012 |
20120254402 | SYSTEMS, APPARATUS, AND METHODS FOR MOBILE DEVICE DETECTION - Systems and methods are disclosed for detecting mobile devices. In one implementation, a system includes a web server. The web server receives mobile device detection strings from a DNS server in response to a DNS request and stores the mobile device detection strings on the server. The web server uses the mobile device detection strings to determine if a client device making a request to the web server is a mobile device. The web server may determine if the client device is a mobile device by comparing a user agent string in the request to the mobile device detection strings. The web server may determine whether the client device is a mobile device before sending the client device's request to any server-side scripts stored at the web server. | 10-04-2012 |
20120254403 | LAWFUL INTERCEPTION IN AN IP MULTIMEDIA SUBSYSTEM NETWORK - A method and apparatus for providing lawful interception in an IMS network. A first node in an IMS network receives a message from a Lawful Intercept mediation system node instructing the first node to perform lawful interception on a target. The first node sends a subscribe request message towards a second node located in an IMS core network. The subscribe request message includes at least an identity of a service type to be monitored. The first node subsequently receives a notify message from the second node, the notify message including session information from which intercept related information can be derived. The first node then sends intercept related information towards the Lawful Intercept mediation system node. | 10-04-2012 |
20120254404 | MULTI-TIERED AUTOMATIC CONTENT RECOGNITION AND PROCESSING - A multi-tiered approach to identifying digital content and acting upon the identification includes transmitting data from a device on which the content is stored or played to a first tier entity where the content and the device are identified. The first tier entity may use any one of many techniques for identifying the data and device. Once the identification data is determined, the information is transmitted to any one of multiple second tier entities that work in cooperation with the first tier entity. The second tier entities may then perform any desired functions based on the identification, such as providing offers, content, products and/or services to the device, or to other devices associated with the device or the device user. Other tiers may be employed for carrying out particular functions or activities, such as under the direction of the second tier entities. | 10-04-2012 |
20120254405 | SYSTEM AND METHOD FOR BENCHMARKING WEB ACCESSIBILITY FEATURES IN WEBSITES - The disclosed embodiment relates to a system and method for rating the accessibility of websites to disabled users. The method comprises receiving, with a computing device, ratings information from at least one user, the ratings information including ratings values of at least one website based on at least one web accessibility parameter, determining, with a computing device, a web accessibility score for at least one of the websites, wherein the web accessibility score is based on the ratings information received from the at least one user, and creating, with a computing device, a web accessibility index including the web accessibility score of at least one of the websites based on the determined web accessibility score. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods. | 10-04-2012 |
20120254406 | COMPUTER SYSTEM MANAGEMENT METHOD AND MANAGEMENT APPARATUS - An object of the present invention is to create information for use in problem analysis only for a required event in a case where an event denoting a change in the configuration of a computer system has been detected. A management apparatus detects a configuration change of the computer system as an event and records this event in an event management table T | 10-04-2012 |
20120254407 | SYSTEM AND METHOD TO MONITOR AND TRANSFER HYPERLINK PRESENCE - Method to monitor and transfer hyperlink presence information, including: transmitting a hyperlink presence monitor request to a web server; receiving an hyperlink presence information; and rendering a hyperlink based upon the hyperlink presence information. Optionally, the hyperlink presence information is represented as one of: attributes of a hyperlink element; HTML5 microdata; RDFa data; and XHTML message data. Optionally, the hyperlink presence information includes: a last-update information to indicate when the hyperlink presence was last updated; a last-status information to indicate a latest hyperlink presence status; a monitor information to indicate a URI that points to a resource to monitor for hyperlink presence; a status-list information to indicate a list of hyperlink presence status values; and a target information to indicate the hyperlink to be monitored. | 10-04-2012 |
20120254408 | NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM, INFORMATION COMMUNICATION DEVICE AND LINK METHOD - A quick connection unit | 10-04-2012 |
20120254409 | Network System and Communication Log Analyzer - This invention provides an apparatus that associates a location where a terminal uses communication or travel route in use of the communication, with a connection destination of the terminal. The apparatus includes a communication log analyzer that aggregates communication logs collected by network apparatuses that constitute the mobile network and analyzes it. The communication log analyzer estimates travel route of the terminal connected the network using: log information generated by a base station to be connected to the terminal at the time of starting the connection, log information generated by a base station to be connected to the terminal at the time of a handover of the connection, and log information generated by a base station connected to the terminal at the time of detaching the connection. | 10-04-2012 |
20120254410 | COMPUTER SERVER CAPABLE OF SUPPORTING CPU VIRTUALIZATION - A computer server includes a CPU (Central Processing Unit) pool including a plurality of CPUs, at least two partitions being exclusively offered the plurality of the CPUs and independently performing an operation system and a resource managing and monitoring unit managing a CPU allocation and retrieval of the at least two partitions based on a number of currently available CPU and a number of currently used CPU. The resource managing and monitoring unit monitors partition status information (the partition status information including the number of currently used CPU, a number of guaranteed CPU, a CAP status and a number of maximum available CPU) for measuring a ratio of CPU usage about each of the at least two partitions. | 10-04-2012 |
20120254411 | APPLICATION PROVIDING SYSTEM, APPLICATION PROVIDING METHOD, AND INFORMATION PROCESSING APPARATUS - An application providing system has a communication terminal, a Web server that manages resources of Web applications, and a push server that manages storage location addresses of resources. The push server has an address managing unit that manages a terminal ID, a storage location address, and providing timing in a manner associated with one another. The push server further has a timing monitoring unit that monitors the providing timing. The push server further has a push transmitting unit that transmits a storage location address of a resource of a Web application associated with providing timing to a communication terminal associated with the providing timing upon detection of the providing timing to cache the resource of the Web application corresponding to the providing timing in the communication terminal. | 10-04-2012 |
20120254412 | REPLICATED STATE MACHINE UTILIZING VIEW CHANGE PROTOCOL RESILIENT TO PERFORMANCE ATTACKS - A network of replicated servers providing a service includes a plurality of server replicas. A leader is elected from among the plurality of server replicas for coordinating ordering of operations among the plurality of server replicas. A view change protocol is executed by the plurality of server replicas after the election of the leader. Each iteration of the view change protocol corresponds to a unique view number. The server replicas are directed by the view change protocol to cooperate to order operations by exchange of information associated with particular view numbers. The information is prioritized in accordance with the view numbers. The non-leaders monitor the response time of the leader and elect a new leader when it is determined that the monitored length of time is greater than a threshold value that is dependent upon current network conditions. | 10-04-2012 |
20120254413 | PROXY SERVER, HIERARCHICAL NETWORK SYSTEM, AND DISTRIBUTED WORKLOAD MANAGEMENT METHOD - A proxy server and a hierarchical network system and a distributed workload management method. According to one embodiment of this disclosure, the proxy server includes: a rate controller configured to, based on measured request-related information and service quality parameters relative to service levels of requests, periodically determine a dispatch rate for requests of each service level, wherein the sum of the dispatch rate for respective service levels is less than or equal to a predetermined rate; and a request dispatcher configured to dispatch the requests of the corresponding service level in accordance with the dispatch rate determined by the rate controller. One aspect of the disclosure realizes a low overhead, highly scalable, simple and efficient workload management system to achieve QoS assurance and overload protection. | 10-04-2012 |
20120254414 | USE OF METRICS SELECTED BASED ON LAG CORRELATION TO PROVIDE LEADING INDICATORS OF SERVICE PERFORMANCE DEGRADATION - The present description refers to a computer implemented method, computer program product, and computer system for identifying a service metric associated with a service, identifying one or more abnormalities of one or more infrastructure metrics that occur within a time window around an abnormality of the service metric, determining a set of candidate infrastructure metrics for the service metric based on how many times an abnormality of an infrastructure metric occurred within a time window around an abnormality of the service metric, determining a degree of lag correlation for each candidate infrastructure metric with respect to the service metric, selecting one or more candidate infrastructure metrics having a degree of lag correlation that exceeds a threshold to be a leading indicator infrastructure metric for the service metric, and providing a performance degradation warning for the service when an abnormality of one of the leading indicator infrastructure metrics is detected. | 10-04-2012 |
20120254415 | COMMUNICATION SYSTEM USING SERVER AGENTS ACCORDING TO SIMPLE NETWORK MANAGEMENT PROTOCOL - A plurality of communication devices communicates with each other via a network in accordance with a simple network management protocol (SNMP). The communication devices include agents with specific identifications. At least one communication device includes a proxy manager. The agent updates its status log at each status transition. The proxy manager periodically monitors communication devices, irrespective of their conditions as to whether or not communication devices are each under maintenance, independently of trap messages notifying events that occur on the network. The proxy manager collects statuses of agents included in communication devices so as to store them in connection with agents. Thus, it is possible to periodically monitor agents under maintenance without conducting a status monitoring operation. | 10-04-2012 |
20120254416 | Mainframe Event Correlation - Methods, systems, and devices are described for managing mainframe events based on identified correlation among related events. In the methods, systems, and devices of the present disclosure, a set of events including at least one mainframe event is stored at a data store associated with a mainframe event server module. The set of events is analyzed to identify a correlation among a subset of the stored events according to at least one predefined correlation criterion. A new event is generated based on the identified correlation among the subset of the stored events, and the new event is transmitted to at least one destination Security Information and Event Management (SIEM) application. | 10-04-2012 |
20120254417 | SELECTIVE DATA COMPRESSION BY A DISTRIBUTED TRAFFIC MANAGEMENT SYSTEM TO REDUCE MOBILE DATA TRAFFIC AND SIGNALING TRAFFIC - Selective data compression by a distributed traffic management system to reduce mobile and/or signaling traffic are disclosed. In one embodiment, the method can include, for example: compressing an uncompressed data chunk in a data stream to be transmitted over the wireless network to generate a compressed data chunk, comparing sizes of the uncompressed data chunk with the compressed data chunk, transmitting an optimized data stream comprising of the uncompressed data chunk or the compressed data chunk over the wireless network, depending on which is smaller in size. In one embedment, a header can be included in the optimized data stream to indicate which of uncompressed data chunk and the compressed data chunk is transmitted. | 10-04-2012 |
20120254418 | RELATIVE TIMESTAMP WHEN REAL TIME CLOCK IS UNAVAILABLE - An operating system or other software resident on an electronic processing device employs aggregated timestamps. In this way timestamps can be generated and compared to one another without the need for a real-time clock with a power backup. Aggregated time includes the last known time that the device synchronized its clock with a reference time available over a network. Aggregated time also includes a relative time value which in part accumulates using a session clock whenever the device is powered-up. When network time becomes available the operating system or other software will use this information to fix up the already generated aggregated timestamps. A comparison of timestamps will most of the time be resolved for stamps generated on the same device and will generally be resolved by comparing time frames when the timestamps being compared are generated by different devices. | 10-04-2012 |
20120254419 | NOTIFICATION TO USERS OF EVENTS - A method and system for notifying users of events. User activity of a user is monitored, based on user notification information in a storage location. The user notification information pertains to a scheduled event. In response to a detection, from the monitoring, of a change in the user activity, it is ascertained that the change necessitates notifying the user of the scheduled event due to the change impacting whether the user can participate in the scheduled event. Then the user is notified of the scheduled event. The user notification information in the storage location is modified, based on the detected change in the user activity, in response to receipt of an instruction from the user to change the user notification information in the storage location. | 10-04-2012 |
20120254420 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 10-04-2012 |
20120254421 | CONTENT DELIVERY NETWORK - A content delivery system for providing content from a content delivery network to end users may include a plurality of delivery servers that host one or more content items and an inventory server having an inventory of content. The inventory of content can indicate which of the delivery servers host the content items. The inventory server may receive a request for a content item from an end user system and may access the inventory of content to determine one or more delivery servers that host the content item. In response to this determination, the inventory server may redirect the request for the content item to a selected one of the delivery servers. The selected delivery server can then serve the content item to the end user system. | 10-04-2012 |
20120254422 | Apparatus, Methods, and Computer Program Products for Monitoring Network Activity for Child Related Risks - Embodiments of the present invention provide apparatus, method and/or computer program products for monitoring internet activity. In some method embodiments, a network is searched to detect network data indicative of actual and/or potential contact with a child. A report is generated that identifies a source of detected data and the report is sent to a responsible party. | 10-04-2012 |
20120254423 | Monitoring Sensors For Systems Management - Methods, apparatuses, and computer program products are provided for monitoring sensors for systems management. Embodiments include establishing, by a server, an entity identification for a component of the server; establishing, by the server, for a plurality of sensors a single virtual sensor number; establishing, by the server, for each sensor having the single virtual sensor number a unique instance identification representing the sensor; receiving, from a system management node, by the server, a request for a sensor reading, the request including the entity identification, the single virtual sensor number, and the unique instance identification; based on the entity identification, the single virtual sensor number, and the unique instance identification, retrieving, by the server, a sensor reading; and transmitting to the system management node, by the server, the sensor reading. | 10-04-2012 |
20120254424 | GLOBAL CONDUCT SCORE AND ATTRIBUTE DATA UTILIZATION PERTAINING TO COMMERCIAL TRANSACTIONS AND PAGE VIEWS - In one embodiment, a system and method is illustrated as including generating a model using at least one of a global conduct score and attribute data. A range of numeric values may be retrieved, based upon which, a better term is granted in a transaction than would otherwise be granted in the transaction. A comparison may be made between the model and the range of numeric values. Further, a better term may be granted in the transaction where the model falls within the range of numeric values. The global conduct score is computed using an approach including at least one of a feed score approach, and a composite score approach. The attribute data includes page view data, click through data, account usage data, and good purchased data. The model includes a global conduct score model, a weighting model, an AI based model, and an associated network based model. | 10-04-2012 |
20120254425 | ONLINE RESOURCE SERVER FOR ALLOWING DEVICE CONTROL AND ACCESS TO DIGITAL CONTENT THROUGH PLUGGABLE USER INTERFACES - An online resource server for allowing device control and access to digital content through pluggable user interfaces (PUI). Features of various embodiments of the system can also include: a system of access rights for resources; user types and their meaning; determination of mandatory and optional properties of resources; an algorithm for ranking of resources based on weights given in a resource query; registration of a PUI upon upload resulting in a unique resource name (URI); user interface socket descriptions for device classes, and extensibility of the socket descriptions through naming conventions; a universal Control Hub as a Service; an ability to allow content owners to protect their intellectual property by keeping the (protected) media over HDMI separated from the control network; an ability to track usage data and dynamically adjust the PUI without the need for user intervention; and enhanced technical support, including remote diagnostics of the consumer electronics equipment. | 10-04-2012 |
20120254426 | CONTROL DEVICE AND CONTROL METHOD FOR REDUCED POWER CONSUMPTION IN NETWORK DEVICE - This invention provides a data transfer control device for carrying out data transfer using a plurality of transfer resources. The data transfer control device comprises a transfer resource management portion that set the plurality of transfer resources to either one of a transfer-enabled state whereby data transfer is enabled and a plurality of standby states on the basis of a load on the data transfer control device and that manages the plurality of transfer resources so as to assume the set operating status; and a load distribution portion that distributes the data to transfer resources that have been set to the transfer-enabled state. The plurality of standby states are states which data transfer is disabled and which mutually differ at a minimum in terms of at least one of power consumption level and transition time to the transfer-enabled state. | 10-04-2012 |
20120259968 | CONTINUOUS AVAILABILITY BETWEEN SITES AT UNLIMITED DISTANCES - A continuous availability system including a controller module executing on a computer processor, the system is configured to receive a unit of work and to select a primary site from a plurality of sites to process the unit of work. Once a site is selected the system is further configured to select one of one or more processing systems from the primary site to process the unit of work. The system is additionally configured to replicate the unit of work to at least one other site once the unit of work is completed at the primary site. The system is configured to operate even when the primary site is separated from each of the plurality of sites by a distance greater than a metropolitan area network and the operations occur within a customer acceptability window. | 10-11-2012 |
20120259969 | CACHED DATA DETECTION - A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response. | 10-11-2012 |
20120259970 | POLICY AS A NETWORK SERVICE IN A MOBILE CORE NETWORK - Aspects describe using a network element to facilitate scalability within a communication network and to provide policy as a network service in a mobile core network. The network element can be scalable and can be a primary policy access gateway for a first geographic region and can be a secondary policy access gateway for at least a second geographic region. The first geographic region and the second geographic region can have portions that overlap. Further, the network element can hide topology of the home network from roaming partners. | 10-11-2012 |
20120259971 | REAL TIME RELIABILITY CHECK FOR NETWORK LINKS - Embodiments of the invention provide a method and corresponding computing device for testing network adapters. The computing device receives a network address for the network. The computing device identifies a device based on the network address, the device having a network adapter. Then the computing device identifies additional devices along a route to the device, each of the additional devices having a respective network adapter. The computing device sends one or more requests to each the network adapters. The computing device determines an indication of reliability of each of the network adapters based on handling of the requests by the network adapter. A network adapter may also maintain logic to test itself in another embodiment. | 10-11-2012 |
20120259972 | EXCLUSIVE IP ZONE SUPPORT SYSTEMS AND METHOD - Network resource monitoring systems and methods are presented. In one embodiment, a network resource monitoring method comprises: gathering network resource pre-monitoring information, including information indicating whether a network resource is associated with a zone, and if associated with a zone also gathering information indicating zone type; performing a network resource monitoring process on the network resource based on results of the gathered network resource pre-monitoring information; including performing a network resource monitoring process when the network resource is in a local zone that does not otherwise make available or share information with a global zone; and analyzing the results of the network resource monitoring process. In one embodiment, if the network resource is included in an exclusive IP zone. In one exemplary implementation, the network resource monitoring process comprises: ascertaining if a monitoring type trigger condition exists; performing a corresponding type of monitoring if the monitoring type trigger condition exists. | 10-11-2012 |
20120259973 | SYSTEMS AND METHODS FOR MANAGING COMPUTING SYSTEMS UTILIZING AUGMENTED REALITY - Systems and methods for managing computing systems are provided. One system includes a capture device for capturing environmental inputs, memory storing code comprising a management module, and a processor. The processor, when executing the code comprising the management module, is configured to perform the method below. One method includes capturing an environmental input, identifying a target device in the captured environmental input, and comparing the target device in the captured environmental input to a model of the target device. The method further includes recognizing, in real-time, a status condition of the target device based on the comparison and providing a user with troubleshooting data if the status condition is an error condition. Also provided are physical computer storage mediums including a computer program product for performing the above method. | 10-11-2012 |
20120259974 | SYSTEM AND METHOD FOR DYNAMIC MODIFICATION OF WEB PAGE CONTENT TO ENSURE CONSISTENT RESPONSE TIME - Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client. | 10-11-2012 |
20120259975 | AUTOMATIC PROVISIONING OF NEW USERS OF INTEREST FOR CAPTURE ON A COMMUNICATION NETWORK - A system, method, and apparatus for collecting data streams, such as data packets, on a network, such as the Internet, are disclosed. A metadata portion of at least one of the data streams is analyzed on the network and evaluated using a metadata processing engine to identify a relationship between at least two of the plurality of data streams, e.g., a relationship between multiple users of a network, regardless of whether the users are currently of interest or if they are not of interest. An interface manager can receive an information of a new user of interest, evaluate the new user of interest for redundancy against existing known users of interest of the NMS; then communicate the information of the new user of interest to at least one access device to collect data streams associated with the new user of interest. | 10-11-2012 |
20120259976 | SYSTEM AND METHOD FOR MANAGING THE PERFORMANCE OF AN ENTERPRISE APPLICATION - The present disclosure relates to a framework to improve the predictability of performance problems in an enterprise application. In one embodiment, the present disclosure produces accurate predictive analysis by taking into consideration all the factors including workload, historical performance, environments, configurations, and data volumes etc. which are significant for determining the future performance characteristics of the system. In addition, the present disclosure calculates the actual impact of the determined performance characteristics on the business. | 10-11-2012 |
20120259977 | DYNAMIC RESOURCE ALLOCATION - A computer-implemented method includes detecting an actual workload representative of a pattern of access of a plurality of items of content; comparing the actual workload against a prescriptive workload to determine an occurrence of a substantial deviation from the prescriptive workload; and upon determining the occurrence of the substantial deviation, revising the prescriptive workload based at least in part on the actual workload. The plurality of items is stored on resources of a storage environment according to one of a plurality of resource allocation arrangements. The prescriptive workload including a plurality of categories, each category being associated with a respective one of the plurality of resource allocation arrangements. | 10-11-2012 |
20120259978 | NETWORK PERFORMANCE MONITOR - Disclosed in this specification is a method for monitoring a network, such as the central monitoring station of a medical facility. Performance data from each of the network components of interest is monitored for compliance with certain component-specific criteria. Responses are generated if the performance data satisfies, or fails to satisfy, such criteria. | 10-11-2012 |
20120259979 | REMOTELY MANAGED DEVICE - A remote management server creates a data set-up instruction telegram to be sent to a remotely managed device. A control program extracts the data set-up instruction from the telegram, and outputs same to a communication control bundle. The communication control bundle outputs the data set-up instruction to a basic data management bundle. The basic data management bundle, based on the data set-up instruction, fetches the data to be set in the remotely managed device, and determines whether this data is basic data or extended data. If the data is basic data, the basic data management bundle executes this data set-up process. If the data is extended data, an extended data management bundle executes the data set-up process. | 10-11-2012 |
20120259980 | Performance Monitoring of a Computer Resource - A method, computer program product, and system for performance monitoring of a computer resource utilized by a user community. The computer resource is monitored, and sets of performance metrics characterizing a state of the computer resource are collected and analyzed to detect performance incidents. External information such as contextual information and user annotations are also collected and analyzed. If a performance incident is detected, its set of performance metrics and associated external information are used to search a data repository of past performance incidents for related incidents, in order to identify critical performance incidents, determine recommended solutions for the performance incidents, and determine performance forecasts for the computer resource. | 10-11-2012 |
20120265870 | DATA TAPS ON A SERVER-MANAGED DATA INTEGRATION PROCESS - Analyzing data in one or more data flows of an integration package. The integration package includes one or more executable integration processes including one or more data flows that when executed on a server cause data to be integrated from a source system to a destination system according to transformations defined in the integration package. A method includes receiving a data package including a contained unit of one or more data flows. The method further includes defining a tap at a point in one of the data flows. The method further includes executing the data flow. The method further includes collecting data at the tap point flowing through the tap point as a result of executing the data flow. The method further includes storing data collected at the tap point in a specified storage location. | 10-18-2012 |
20120265871 | MULTICAST, CLIENT/SERVICE-ATTRIBUTE RESOLUTION - Proximity-based communications is established between client and service applications mediated by bus daemons. Client applications consume services and service applications provide services. A unique discovery protocol provides a name service in the bus daemon structure to assist the bus daemons in discovering the service applications available at other bus daemons. Bus daemons periodically announce their existence and provide the address and port over which they may be contacted. They also provide attribute information consisting of a description, such as an instance attribute and a well-known name attribute, of the service applications available at the bus daemon. The name service in the bus daemon structure may also respond to queries as to the availability of requested service applications. When client applications require access to a service application, they query their associated bus daemon that, in turn, queries its name service. | 10-18-2012 |
20120265872 | Systems and Methods of Automatically Remediating Fault Conditions - Example embodiments of the systems and methods of automatically remediating fault conditions disclosed herein retrieve information from the hardware, apply algorithms around that reading, and identify solutions that can correct the condition automatically. These systems and methods reduce the need for human intervention and provide a self-correcting procedure to the hardware itself. | 10-18-2012 |
20120265873 | Adaptation of Content Transmission in Mobile Networks - The present invention provides a method for adapting a transmission mode of a content provided on a server to a client. The server instructs the client to automatically change from a poll mechanism to a push mechanism or vice versa depending on a parameter related to content transmission. The parameter monitored by the server can be the content publication rate, negative polling attempts by the client, or the current network load. | 10-18-2012 |
20120265874 | METHOD AND APPARATUS FOR SHARING AND MANAGING RESOURCE AVAILABILITY - An example approach is provided for sharing and managing resource availability information. One or more resource availability information is received. Further, one or more requests to access the one or more resource availability messages are received from at least one consuming device. Access to the one or more resource availability messages is reserved based, at least in part, on the one or more requests. | 10-18-2012 |
20120265875 | NETWORK ELEMENT CONNECTION MANAGEMENT WITHIN A NETWORK MANAGEMENT SYSTEM - Preferred embodiments of the invention provide systems and methods to receive a logical command, the logical command being associated with a target identifier of a network element, determine connection parameters of the network element based on the target identifier, define a work flow based on the logical command, the work flow including a connection manager work unit, and execute the connection manager work unit to retrieve a connection from a connection pool based on the connection parameters. | 10-18-2012 |
20120265876 | SYSTEMS AND METHODS FOR MANAGING COMPUTING SYSTEMS UTILIZING AUGMENTED REALITY - Systems and methods for managing computing systems are provided. One system includes a capture device for capturing environmental inputs, memory storing code comprising a management module, and a processor. The processor, when executing the code comprising the management module, is configured to perform the method below. One method includes capturing an environmental input, identifying a target device in the captured environmental input, and comparing the target device in the captured environmental input to a model of the target device. The method further includes recognizing, in real-time, a status condition of the target device based on the comparison and providing a user with troubleshooting data if the status condition is an error condition. Also provided are physical computer storage mediums including a computer program product for performing the above method. | 10-18-2012 |
20120265877 | CONGESTION MANAGEMENT AND LATENCY PREDICTION IN CSMA MEDIA - A facility for congestion management and latency prediction is described. In various embodiments, the facility sums a series of fractional transmission delays wherein each fractional transmission delay is measured as a probability of a failed transmission attempt multiplied by the cost of the failed transmission attempt, and provides the sum. | 10-18-2012 |
20120265878 | NETWORK MANAGEMENT SYSTEM ACCELERATED EVENT DESKTOP CLIENT - A method, a system, and a computer program product associated with a network management system are disclosed. The method includes storing event data associated with a system event in a network as an event item at a database. The method also includes processing the event item at a control system of a collection server when a fast track flag is identified in the stored event item of the database. Processing the event item by the control system includes generating processing data to send a first notification associated with the event item to a first client. The first notification includes an identifier enabling the first client to obtain the stored event data from the database. Processing the event item by the control system also includes purging the processing data from the control system after sending the first notification. | 10-18-2012 |
20120271935 | COORDINATING DATA CENTER COMPUTE AND THERMAL LOAD BASED ON ENVIRONMENTAL DATA FORECASTS - The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time. | 10-25-2012 |
20120271936 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 10-25-2012 |
20120271937 | AUTOMATED TOPOLOGY CHANGE DETECTION AND POLICY BASED PROVISIONING AND REMEDIATION IN INFORMATION TECHNOLOGY SYSTEMS - Aspects of the present disclosure involve systems, methods, computer program products, and the like, that provide automated topology change detection and policy based provisioning and remediation in information technology systems, among other functions and advantages. | 10-25-2012 |
20120271938 | Socket Application Program Interface (API) Extension - Embodiments contemplate one or more socket application program interface (API) extensions that may provide one or more Internet Protocol Address lists. Embodiments may include determining a state (or status) of one or more available Internet Protocol (IP) addresses. Further, embodiments may include communicating the state (or status) of the available Internet addresses to a Multi Connection Transport Protocol. | 10-25-2012 |
20120271939 | SCALABLE ARCHITECTURE - Exemplary embodiments may employ techniques for dynamically dispatching requests to resources operating in a distributed computing environment, such as a computing cloud, according to one or more policies. Embodiments may further dynamically adjust resources in the computing environment using predictive models that use current loads as an input. Embodiments may still further maintain a state for a processing environment independent of the type or configuration of a device used to access the environment on behalf of a user. | 10-25-2012 |
20120271940 | METHOD AND SYSTEM FOR PROBABILISTIC PROCESSING OF DATA - A method for probabilistic processing of data, wherein the data is provided in form of a data set S composed of multidimensional n-tuples of the form (x | 10-25-2012 |
20120271941 | METHOD AND SYSTEM FOR EFFICIENT AND EXHAUSTIVE URL CATEGORIZATION - The present method and system relate to categorizing URLs (Uniform Resource Locators) of web pages accessed by multiple users over an IP (Internet Protocol) based data network. The method and system collect real time data from IP data traffic occurring on the IP based data network, and extract parameters from the collected real time data, the parameters including an URL of a web page. The URL is processed by a rule based categorization engine, to associate a matching category to the URL of the web page. When no matching category is inferred, the URL is transferred to a semantic based categorization engine. A matching category is associated to the transferred URL by the semantic based categorization engine, based on a semantic analysis of the textual content extracted from the web page associated to the URL. | 10-25-2012 |
20120271942 | Managing Recordings of Communications Sessions - A device for recording the content of live communications sessions allocates each session with a unique identifier which is also communicated to a server, exchange, switch or endpoint having control of that session. A log of events occurring in the session is updated with the unique identifier of the recorded content, and following the session, the log of events is communicated to the recording device, indexed under the unique identifier, and stored with the recorded content of the session itself. | 10-25-2012 |
20120271943 | METHOD, APPARATUS, AND SYSTEM FOR SCHEDULING DISTRIBUTED BUFFER RESOURCES - A method for scheduling distributed buffer resources is provided, where in the distributed buffer system, each buffer node is distributed on a virtual circle that is based on a consistent hashing algorithm, and the method includes: monitoring a load value of each buffer node in the distributed buffer system; judging whether a load exception exists in the current distributed buffer system according to the load value; and if the load exception exists in the current distributed buffer system, adjusting a layout of the buffer nodes in the distributed buffer system. | 10-25-2012 |
20120271944 | DISTRIBUTED COMPUTING BASED ON MULTIPLE NODES WITH DETERMINED CAPACITY SELECTIVELY JOINING RESOURCE GROUPS HAVING RESOURCE REQUIREMENTS - A network provides distributed computing services based on participation in respective resource groups by computing nodes, each resource group including a corresponding resource requirement for any computing node that joins the corresponding resource group for execution of the corresponding distributed computing service. Each computing node, in response to determining its corresponding available node capacity, is configured for selectively creating and joining at least one new resource group for execution of a corresponding distributed computing service having a corresponding resource requirement, and/or selectively joining at least one of the available resource groups, based on the corresponding available node capacity satisfying the corresponding resource requirement. Each computing node also is configured for selectively leaving any one of the joined resource groups based on determined conditions. Hence, each computing node may choose to participate in as many resource groups as needed for respective computing services, based on the corresponding available node capacity. | 10-25-2012 |
20120278471 | Devices and Methods for Two Step Searches for Servers by a Communication Device - Disclosed are a communication device and a method of a communication device that includes processing by the controller a first scan for shared drives and folders on a wide local area network in accordance with a CIFS Protocol and then processing a second scan for shared drives and folders of a local wide area network in accordance with an Address Resolution Protocol. An Address Resolution Protocol (ARP) is a computer network host's link layer or hardware address when only it's Internet Layer (IP) or Network Layer address is known. An ARP port scan is a low level request and answer protocol that uses a simple message format that contains one address resolution request or response. IP addresses are the result of an ARP port scan. In this way, user can be provided with the opportunity to connect to all available local servers. | 11-01-2012 |
20120278472 | USAGE MONITORING AFTER ROLLOVER - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining a session to roll over; determining whether usage monitoring at a usage monitoring node is currently disabled for the session; and if usage monitoring at the usage monitoring node is currently disabled for the session, sending a message from the session management node to the usage monitoring node, wherein the message includes an instruction to enable usage monitoring for the session. Various alternative embodiments additionally include one or more of the following: waiting for a length of time to receive a usage report at the session management node from the usage monitoring node; wherein the step of sending a message from the session management node to the usage monitoring node is only performed when a usage report is not received during the length of time. | 11-01-2012 |
20120278473 | Event Queuing and Distribution System - A REST-based event distribution system is described, with particular applicability to the distribution of distributed filesystem notifications over a high-latency best-effort network such as the Internet. In one embodiment, event channels are mapped to URL spaces and created and distributed through the use of HTTP POST and GET requests. The system is optimized for short polling by clients; an event history is maintained to buffer messages and maintain the idempotence of requests. In another embodiment, the events are registered as a SIP event pack allowing for the distribution of filesystem events. | 11-01-2012 |
20120278474 | SYSTEMS AND METHODS FOR MAINTAINING A MEASURE OF SESSION TIME ON A NETWORKED DEVICE - Systems and methods for maintaining a measure of session time of a networked device. A session between the networked device and a first network is monitored to determine a first session time. The first session time is indicative of a first time increment the networked device is continuously connected to the first network. A next session between the networked device and a second network is monitored to determine a second session time. The second session time is indicative of a second time increment the networked device is continuously connected to the second network. A time interval between termination of the session and commencement of the next session is determined. A rule is applied to determine whether the time interval is less than or equal to a pre-determined value. A session time equal to the sum of the first session time and the second session time is displayed when the time interval is less than or equal to the pre-determined value. A session time equal to the second session time is displayed when the time interval is greater than the pre-determined value. | 11-01-2012 |
20120278475 | Managing Notifications Pushed to User Devices - In one embodiment, a first computing device determines whether one or more conditions are satisfied for not pushing communications to a second computing device associated with a user; and if the one or more conditions are satisfied, then refrains from pushing any communication to the second computing device. | 11-01-2012 |
20120278476 | PREDICTIVE PLACEMENT OF CONTENT THROUGH NETWORK ANALYSIS - Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed. | 11-01-2012 |
20120278477 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR NETWORK SERVER PERFORMANCE ANOMALY DETECTION - Methods, systems, and computer readable media for network server performance anomaly detection are disclosed. According to one aspect of the subject matter disclosed, a method is disclosed for real-time computation of an endpoint performance measure based on transport and network layer header information. The method includes passively collecting transport and network layer header information from packet traffic in a network. Connections in the network are modeled using an abstract syntax for characterizing a sequence of application-level bidirectional interactions between endpoints of each connection and delays between the interactions. Application-level characteristics of the packet traffic are determined based on the modeled connections. A performance measure of at least one endpoint is computed based on the application-level characteristics and the modeled connections. | 11-01-2012 |
20120278478 | METHOD AND SYSTEM FOR MONITORING A MONITORING-TARGET PROCESS - A method and system for monitoring a monitoring-target process. A monitored server computer starts a monitoring-target process. After starting the monitoring-target process, the computer ascertains a current operating state of the monitoring-target process which includes utilizing a monitoring condition record included in a monitoring-condition registry. The monitoring-condition registry is a file or database stored in a data storage device in the computer. The monitoring condition record includes monitoring conditions controlling implementation of the monitoring-target process. The monitoring condition record includes a process label that uniquely identifies the monitoring-target process. After ascertaining the current operating state, the computer stops the monitoring-target process. | 11-01-2012 |
20120278479 | Asset Management Via Virtual Tunnels - An asset management system is presented. The management system includes monitoring devices able to provide asset data across firewalls without requiring reconfiguration of the firewalls. The asset data pass through a forwarding service that instantiates a virtual tunnel comprising a communication channel between the monitoring devices and remote asset management engines. The asset management engines can also be located behind firewalls. As the management engines aggregate asset data, the engines can present one or more alerts via a management interface. | 11-01-2012 |
20120278480 | SYSTEM AND METHOD FOR IDENTIFYING SESSION IDENTIFICATION INFORMATION - A computer-implemented process, computer program product, and apparatus for identifying session identification information. A recording is initiated and an operation sequence of interest is performed while recording and the recording ceases. Responsive to a determination that the operation sequence of interest was successful, information from the operation sequence of interest is saved as recorded information and responsive to a determination that a same operation sequence of interest was recorded, the recorded information from each operation sequence of interest is compared. Differences in the recorded information are identified to form identified differences and a session identifier is constructed using the identified differences. | 11-01-2012 |
20120278481 | Representing Aggregated Rich Presence Information - Techniques for relaying presence information of an entity to a user are provided. The techniques include obtaining a portion of the presence information of the entity from servers associated with the communications networks, and assembling an image in accordance with the at least one portion of the presence information of the entity, wherein at least a portion of the image represents a highest ranked communication option of a plurality of communication options for contacting the entity based on a rule set that evaluates the presence information of the entity, in its entirety, in accordance with at least one item of communication-related information, the image conveying presence information of the entity for at least the highest ranked communication option, and in accordance with communication parameters associated with the entity and the user, communication preferences of at least one of the entity and the user, and communication capabilities of the user. | 11-01-2012 |
20120278482 | SYSTEM AND METHOD FOR PERFORMANCE MANAGEMENT IN A MULTI-TIER COMPUTING ENVIRONMENT - The invention relates to monitoring a selected tier in a multi-tier computing environment with an apparatus that includes a context agent and a dynamic tier extension. The context agent is associated with the selected tier and is coupled with other context agents, each of which is associated with a respective tier. The dynamic tier extension is coupled with the context agent and with specific predetermined points of the selected tier. The dynamic tier extension monitors request traffic passing through the selected tier. | 11-01-2012 |
20120278483 | AUTOMATIC SERVER POSITION DETERMINATION - A method is provided for determining the location of a target computer device, such as a server in an array of interconnected servers. In one embodiment, the method comprises selecting a first server defining a first point of an axis of a reference coordinate system and selecting a second server defining a second point of the axis. A first cable is connected from the target server to the first server and a second cable is connected from the target server to the second server. The location of the target server is determined according to the length of the first cable, the length of the second cable, and the locations of the first and second servers. The axis may be designated using an axis cable, by connecting a first end of the axis cable to the first server and connecting a second end of the axis cable to the second server. | 11-01-2012 |
20120278484 | SYSTEM AND METHOD FOR DIRECTING ATTENTION TO WEB SITE FUNCTIONALITY - A system determines if functionality offered via a Web site is being underutilizing by a user, e.g., not being using at all or not being using with some desired degree of regularity. When it is determined that the functionality offered via the Web site is being underutilized by the user, the system provides to content of the Web site a cue, e.g., audio and/or visual, for directing the attention of the user to the functionality offered via the Web site. | 11-01-2012 |
20120278485 | MONITORING NETWORK PERFORMANCE TO IDENTIFY SOURCES OF NETWORK PERFORMANCE DEGRADATION - A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation. | 11-01-2012 |
20120278486 | SYSTEM AND METHOD FOR MANAGING REGISTRATION OF SERVICES FOR AN ELECTRONIC DEVICE - The present disclosure described herein relates to a wireless electronic device and method for managing access to a server. The method comprises: identifying a first capability of the wireless electronic device; analyzing the first capability with operating parameters of a plurality of servers in the network to identify a first server that is compatible with the first capability; analyzing operating parameters of a plurality of services available in the network to identify a service of the plurality of services that the wireless electronic device cannot access in view of a second capability not currently provided by the wireless electronic device; identifying a second server in the plurality of servers that provides the second capability; and generating and sending an access request to the second server for the wireless electronic device. | 11-01-2012 |
20120284390 | GUARANTEED RESPONSE PATTERN - Methods, systems and computer readable medium are presented for providing a response to a request. A request (e.g., a java request) is received by a computer-based system for providing a response to a request. The availability of the backend system (e.g., java dispatching system) request is analyzed in response to receiving the request. In response to a determination that the backend system is unavailable to process the request, an unavailable response is transmitted. In response to a determination that the backend system is available to process the request, the request is transmitted to a backend system to process the request. | 11-08-2012 |
20120284391 | SYSTEM AND METHOD FOR MONITORING UNKNOWN RESOURCES - The present invention provides a method and system for inferential monitoring of a resource. The method according to one embodiment of the invention comprises selecting a given resource, the selected given resource including one or more monitorable parts and at least one unmonitorable part, and performing one or more tests on the one or more monitorable part to determine a status of the one or more monitorable parts. Results from the one or more tests of the one or more monitorable parts is correlated with the at least one unmonitorable part to determine a status of the unmonitorable part on the basis of the correlation. | 11-08-2012 |
20120284392 | MESH DATA NETWORK DATA MANAGEMENT SYSTEM, NODE, AND COMPUTER PROGRAM PRODUCT - A mesh data network data management system where each of a plurality of nodes collects data when a respective triggering event occurs, puts the collected data in a reporting data packet, and sends the reporting data packet to an upstream node in the mesh data network. If a reporting node is in communication with a downstream node, it may also place received downstream data in the reporting data packet so that all data from a branch of the mesh data network in which the reporting node operates may be included in the reporting data packet. | 11-08-2012 |
20120284393 | Data Transmission Between Devices Based on Bandwidth Availability - In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time. | 11-08-2012 |
20120284394 | CAPABILITY NEGOTIATION AND CONTROL - It is provided an apparatus, comprising enforcement means having an own capability to enforce a policy for a service, and/or to detect a traffic, and/or to detect the service in a communication system; determining means configured to determine, based on the own capability and a control information on a capability to be controlled for enforcing the policy and/or for detecting the traffic and/or for detecting the service, whether the own capability is to be activated, wherein the control information is received from a steering apparatus; and activating means configured to activate the own capability for the service depending on the determination by the determining means. | 11-08-2012 |
20120284395 | DEVICE CONTROL APPARATUS AND METHOD FOR MONITORING DEVICE, CLIENT APPARATUS, AND DEVICE CONTROL SYSTEM - A device control apparatus which monitors a state change of a device independently without communication with a client apparatus. A device server as the device control apparatus monitors the state of a device locally connected thereto, using a definition file and a trigger detection algorithm for monitoring the state of the device, and detects a state change of the device. When a state change of the device is detected, the device server transmits a trigger notification indicative of the detection of the state change to the client apparatus. The device server starts a session with the client apparatus having received the trigger notification and relay data communication with the device, of which the state change has been detected. When the session with the client apparatus is disconnected, the device server restarts monitoring of the state of the device. | 11-08-2012 |
20120284396 | DIAGNOSTIC TOOL FOR BROADBAND NETWORKS - A local pre-transfer agent, that can be run on a local computer including RAM, one central processing unit, and one interface communicating with a data exchange network connected to the RAM by a communication bus. The agent includes a first function establishing a first predictive value of the data transmission or reception bandwidth limit from configuration data on the memory, a second function establishing a second predictive value of bandwidth limit from configuration data of the processing unit, a third function establishing a third predictive value of bandwidth limit from bus configuration data, a fourth function establishing a fourth predictive value of bandwidth limit from configuration data of the communication interface, and a hardware diagnostic function invoking each one these functions and establishing, from the resulting predictive values, a bandwidth reference value in accordance with predefined comparison rules for said predictive values. | 11-08-2012 |
20120284397 | Method and device for pushing data - The disclosure provides a method and device for pushing data and relates to the Internet. The method includes acquiring data which meet a predetermined condition, acquiring attributes of reading-performed-users that have browsed the data, and determining a common attribute of the reading-performed-users; selecting reading-not-performed-users that have the common attribute and have not browsed the data; and pushing the data to the reading-not-performed-users. The device includes a common attribute acquisition module, a reading-not-performed-user selection module and a pushing module. According to the method and device for pushing data provided by the embodiments of the disclosure, the reading-not-performed-users that have the common attribute and have not browsed the data may be determined based on the data that meet a predetermined condition and a common attribute of the reading-performed-users, and the data are pushed to the reading-not-performed-users. Thus, the reading-not-performed-users may acquire their interesting data accurately. | 11-08-2012 |
20120284398 | INTER-VIRTUAL MACHINE COMMUNICATION - A computer implemented method is provided, including monitoring network traffic among virtual machines allocated to a plurality of compute nodes on a network, and identifying first and second virtual machines having inter-virtual machine communication over the network in an amount that is greater than a threshold amount of the network traffic. The method further comprises migrating at least one of the first and second virtual machines so that the first and second virtual machines are allocated to the same compute node and the inter-virtual machine communication between the first and second virtual machines is no longer directed over the network. In one embodiment, each compute node is coupled to an Ethernet link of a network switch, and data is obtained from a management information database of the network switch to determine the amount of network bandwidth that is being utilized for communication between the first and second virtual machines. | 11-08-2012 |
20120284399 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - Data collection agent associated with a mobile device movable within a mobile communications environment that includes at least one available network connectable to the mobile device. The data collection agent includes an acquisition device to acquire data related to at least one of: service coverage for the at least one available network; service quality for the at least one available network; usage for the at least one available network; and system data from the mobile device, and a transmitter to send the acquired data to a web server. | 11-08-2012 |
20120284400 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR MANAGING COMMUNICATIONS AMONG SERVICE MODULES - A communication method between service modules in a system in which service modules operating on a plurality of information processing apparatuses connected with a network operate in collaboration with each other, the system includes a monitoring apparatus that is provided with a monitor module monitoring a connection between service modules in the system and that has connection management information including identifier information for uniquely identifying an information processing apparatus in which a service module is operating in the system, and connection information including external connection information for the service module to perform communication using an external network between the information processing apparatuses and internal connection information for the service module to perform communication using an internal network of the information processing apparatus. | 11-08-2012 |
20120284401 | System for an Open Architecture Deployment Platform with Centralized Synchronization - One aspect of the preferred embodiment relates to an application framework for managing mobile clients and application programs. By utilizing the preferred embodiment, a system administrator may be provided the capability to manage and control multiple devices, directly and indirectly, using push (server-initiated) and/or pull (client-initiated) techniques from a single location. Additionally, the preferred embodiment may be utilized to back up and securely store information on the mobile clients, identify device usage and to deliver files and databases to the mobile clients. | 11-08-2012 |
20120284402 | System and Method for Sharing Web Perfomance Data - A monitoring system is provided that allows owners of monitoring accounts to share web monitoring data collected under the direction of the monitoring account. Account owners are able to interact with the monitoring system to identify recipient accounts for shared web monitoring data and apply permissions at a granular level so that portions of monitored data can be shared with varying permission levels. Grouping can also be employed by an account owner to facilitate efficient sharing of monitoring data to many recipient accounts. The monitoring system also provides analysis utilities that can be used by a recipient account to aggregate shared with owned data and generate related reports as desired. | 11-08-2012 |
20120284403 | Selectively Disabling Reliability Mechanisms on a Network Connection - Computerized methods, systems, and computer-storage media for establishing and managing a transmission control protocol (TCP)-based tunnel (“tunnel”) are provided. The tunnel spans between a data center and a private enterprise network and connects endpoints, of a service application, that reside in each location. During communication, the endpoints transmit data packets over one or more channels (e.g., higher-level channel and lower-level channel) that comprise the tunnel. Each of the channels supports reliability mechanisms (e.g., congestion-control mechanism and loss-recovery mechanism) integrally running thereon, for ensuring complete data-packet delivery. To prevent unwarranted performance degradation caused by duplicative efforts of reliability mechanisms, a fabric controller is employed to selectively disable one or more of the reliability mechanisms individually. The selective disablement of the reliability mechanisms is invoked by predefined criteria, such as instructions from a service model or detected identity of a source/destination endpoint, and is invoked on a per network connection basis. | 11-08-2012 |
20120284404 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - Network auditing system and method for monitoring or auditing at least one communications network. The network auditing system includes an acquisition device to acquire, for locations throughout the at least one communications network, data related to at least one of: service coverage for the at least one communications network; service quality for the at least one communications network; and service usage for the at least one communications network, and a plotter to identify on an audit map the data acquired for the locations. | 11-08-2012 |
20120284405 | SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUAL APPLIANCES IN CLOUD-BASED NETWORK - Embodiments relate to systems and methods for instantiating and operating a virtual appliance monitor in a network cloud environment. A method includes receiving, by a virtual appliance monitor, appliance state information representing an execution state of a virtual appliance of a set of virtual appliances instantiated in the network cloud, wherein the virtual appliance monitor is instantiated separately from the set of virtual appliances and configured to monitor the set of virtual appliances. The method further includes performing a control action to alter the execution state of the virtual appliance in response to conditions detected in the appliance state information. | 11-08-2012 |
20120290705 | Component Independent Process Integration Message Monitoring - The present disclosure involves systems, software, and computer implemented methods for centralized monitoring of business processes. One process includes identifying a process integration (PI) domain, where the PI domain includes at least one PI component, accessing at least one PI component included in the identified PI domain. retrieving a set of local monitoring information from the accessed at least one PI component, persisting the retrieved set of local monitoring information in a centralized repository, and presenting at least a portion of the persisted set of local monitoring information to a client in response to a request from the client. | 11-15-2012 |
20120290706 | STATE CONTROL OF REMOTE HOSTS FOR MANAGEMENT OF DISTRIBUTED APPLICATIONS - Configuring a node. A method includes determining a current state of a target node. The current state of the target node refers to objects currently deployed or running in the remote target node. It includes at least one of an operating system, one or more applications, or configuration setting at the target node. The method further includes determining a desired state for the target node to change the current state. The method further includes accessing a dependency graph based on the version of an agent running on the target node. The dependency graph is supplied to a state machine. The state machine is particular to the target node. The state machine using the current state of the target node, the desired state and the dependency graph, performs operations to drive the target node toward its goal. | 11-15-2012 |
20120290707 | SYSTEM AND METHOD FOR UNIFIED POLLING OF NETWORKED DEVICES AND SERVICES - The present invention provides methods, systems and computer readable media for unified polling of networked devices and services. A system for unified polling of networked devices and services according to one embodiment comprises one or more pollers in communication with one or more devices, the one or more pollers operative to request and perform one or more polling tasks of the one or more devices. The system further comprises a unified poller in communication with the plurality of pollers, the unified poller operative to receive requests for one or more polling tasks; determine priorities of the one or more polling tasks; and assign one or more threads to control the one or more pollers on the basis of the priorities of the one or more polling tasks. | 11-15-2012 |
20120290708 | Personally Identifiable Information Independent Utilization Of Analytics Data - An analytics system receives segment definitions, each associated with an account identifier. The account identifier identifies an analytics tracking account for a publisher. Each segment definition defines a segment of visitors to a network property and, for each visitor in the first segment, includes a visitor identifier identifying a device used by a visitor to visit the network property and which is issued by the analytics system. The publisher selects the visitor identifiers based on customer identifiers that are issued by the publisher, and neither the customer identifiers, nor any personally identifiable information, is provided to the analytics system. The analytics system determines whether the segment definitions present a personal information exposure risk for one or more of the visitors, and processes the segment definitions only in response to determining that the segment definitions do not present a personal information exposure risk for one or more of the visitors. | 11-15-2012 |
20120290709 | METHOD AND APPARATUS TO DETERMINE THE AMOUNT OF DELAY IN THE TRANSFER OF DATA ASSOCIATED WITH A TCP ZERO WINDOW EVENT OR SET OF TCP ZERO WINDOW EVENTS - Network monitoring method and apparatus determines the zero window event data transfer delay, reporting the amount of data transfer delay caused thereby. Non-data-transfer-delaying zero window events can be separated from those causing actual delay, allowing reporting of actual delay events separate from non-delay causing events. | 11-15-2012 |
20120290710 | METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING DATA STORAGE RATES IN AN APM SYSTEM - Data storage rates are dynamically adjusted in an APM system, by monitoring data storage elements and modulating the data storage when a determination is made that the storage buffer utilization is too high. | 11-15-2012 |
20120290711 | METHOD AND APPARATUS TO ESTIMATE APPLICATION AND NETWORK PERFORMANCE METRICS AND DISTRIBUTE THOSE METRICS ACROSS THE APPROPRIATE APPLICATIONS, SITES, SERVERS, ETC - A method and apparatus to estimate application and network performance metrics and distribute those metrics across the appropriate applications, sites, servers, and the like, performs shallow analysis on a majority of traffic and deep analysis on a sampled set of the traffic, and estimates network and application performance metrics for the non-deep analysis data, providing an overall estimate of metrics without requiring deep analysis of all traffic. | 11-15-2012 |
20120290712 | Account Compromise Detection - Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection. | 11-15-2012 |
20120290713 | MID-SESSION CHANGE SUPPORT IN USAGE MONITORING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at a session management node, a usage monitoring report from a usage monitoring node, the usage monitoring report including a reported usage amount for a first monitoring key; updating a current usage amount based upon the reported usage amount; identifying a current monitoring key; and requesting additional monitoring from the usage monitoring node for the current monitoring key. Various exemplary embodiments additionally relate to a method and related network node including one or more of the following: taking a policy action based on the current usage amount; determining a next threshold based on the current usage amount; determining a second usage amount associated with a second monitoring key; and adding the current usage amount to at least the second usage amount to determine a total usage amount. | 11-15-2012 |
20120290714 | METHOD AND APPARATUS FOR PROVIDING HEURISTIC-BASED CLUSTER MANAGEMENT - An approach is provided for heuristic-based cluster management. A cluster management framework receives a request for specifying at least one management process on at least one cluster of one or more servers. The cluster management framework determines one or more heuristics associated with the at least one management process, the at least one cluster, the one or more servers, or a combination thereof. The cluster management framework then processes and/or facilitates a processing of the one or more heuristics to cause, at least in part, a generation of a plan for implementing the at least one management process. | 11-15-2012 |
20120290715 | NETWORK RESOURCE CONFIGURATIONS - Temporally classifying and visually representing network and IT infrastructure with planned or occurred configuration activities and/or policy compliance or non-compliance of network and IT resources, including a method, apparatus and computer program for gathering and classifying observable configuration aspects of resources and relationships in a network of resources, wherein the method comprises: analyzing the network of resources to collect planned configuration times and actual resource status; monitoring actual resource status to make determinations if planned configurations are executed; and updating a network configuration status with the determinations. Planned and actual configurations are collected and monitored over a defined time range extending before and/or after a time zero. Each planned or actual configuration is categorized with respect to one or more time windows in the defined time range. | 11-15-2012 |
20120290716 | METHODS AND SYSTEMS FOR MONITORING NETWORK ROUTING - The disclosed methods and systems include collecting routing data from a plurality of network routers, and correlating the routing data across routers and across time to obtain network data. The network data can be streamed to a user in real-time and the user can interactively query the data. In one embodiment, interactive routing analyses, drill-down, and forensics can be performed using a repository of Border Gateway Protocol (BGP) update traffic. Alarms can be set to detect selected routing problems. In setting the alarms, the message data for each router can be processed in timestamp order. Current message data from each router can be compared with previous message data to determine a condition status. An alarm can be provided when the condition status meets a temporal correlation criterion and/or a spatial correlation criterion. Based on the computed instability metrics for individual network prefixes and on a common property of those prefixes, a group instability metric for a group of network prefixes can be computed. | 11-15-2012 |
20120290717 | DETECTING AND PRESERVING STATE FOR SATISFYING APPLICATION REQUESTS IN A DISTRIBUTED PROXY AND CACHE SYSTEM - Systems and methods for cache state management to preserve user experience with a mobile application on a mobile device while conserving resources in a wireless network are disclosed. In one embodiment, the method can include, for example, storing content from a content server as cached elements in a local cache on the mobile device and in response to receiving polling requests to contact the content server, retrieving the cached elements from the local cache to respond to the polling requests made at the mobile device, and/or using state information associated with the cached elements to provide the cached elements as responses to the polling requests such that user experience is preserved | 11-15-2012 |
20120290718 | Methods and Computer Program Products for Collecting Storage Resource Performance Data Using File System Hooks - Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a location for a function dispatch table, and modifying the function dispatch table to redirect a request for an operation. In response to a received request for the operation, an intent to perform the operation is recorded to estimate an operational queue length, and data associated with the operation is recorded in a hash table. In response to recording data associated with the operation, a function corresponding to the operation to perform the operation is invoked. Elapsed time and storage size is recorded. | 11-15-2012 |
20120290719 | METHOD FOR SEARCHING IP ADDRESS OF ROUTING NODE IN VIRTUAL PRIVATE NETWORK ENVIRONMENT - The present invention relates to a method for obtaining an IP address of a routing node nearest to a client computer in a virtual private network environment by modulating a routing table of the client computer. According to the present invention, a method for extracting IP address information of a routing node of an internal path of a virtual private network by an agent installed in a client computer comprises the steps of: the first step of, the agent, confirming whether the client computer is in a virtual private network environment by analyzing the routing table of the client computer; the second step of, the agent, obtaining a public IP of an information collection web server; the third step of, the agent, searching a path between a VPN server and the client computer passing through a physical gateway among paths of the routing table, generating an information collection path that has changed the destination of the searched path into the public IP of the information collection web server, and adding the generated path to the routing table; and the fourth step of, the agent, executing the information collection path, and obtaining a public IP address of the routing node from the executed result. | 11-15-2012 |
20120290720 | SYSTEM AND METHOD FOR NETWORK MANAGEMENT - Various systems and methods for network management are disclosed. In one embodiment, a network management system comprises a receiver for receiving data from a plurality of entities, including base stations and/or subscriber handsets, a processor for generating a network map or a recommendation based on the received data, a display device for displaying the network map or recommendation, and a transmitter for transmitting instructions based on the recommendation. | 11-15-2012 |
20120290721 | SYSTEMS AND METHODS FOR IP SESSION KEEPALIVE USING BFD PROTOCOLS - A network device may include logic to establish an IP session, establish a BFD session within the established IP session, transmit BFD packets within the established BFD session, and determine that the established IP session is active based upon reception of the BFD packets. In another embodiment, the logic may also determine that an IP session is active using an inactivity timer that may also trigger transmission of BFD packets. | 11-15-2012 |
20120290722 | COMMUNICATION SYSTEM AND METHOD FOR DISCOVERING END-POINTS THAT UTILIZE A LINK LAYER CONNECTION IN A WIRED/WIRELESS LOCAL AREA NETWORK - Aspects of the invention provide a communication system and method in a hybrid wired/wireless local area network. At least one discovery message may be broadcasted to at least one of a plurality of access points. A response may be received from one or more of the access points. The response may report a presence of at least one access device located within a coverage area of one or more of the access points. A status of at least one access device located within a coverage area of one or more of the access points may be requested from the access points. | 11-15-2012 |
20120290723 | SERVICE MANAGER FOR ADAPTIVE LOAD SHEDDING - A service manager that facilitates managing requests that are obtained at a middleware tier of a communications network includes a monitor component that evaluates data associated with effectuating a request that is received at a middleware tier. The monitor component identifies resources associated with effectuating the request. Additionally, the service manager includes a request component that accepts and/or rejects the request based at least in part upon the identified resources. | 11-15-2012 |
20120297050 | Collecting Information Regarding Electronic Aging of Products - Monitoring aging information for multiple devices. Aging information of the devices may be received. Statistics regarding the multiple devices may be determined based on the aging information. For at least some of the devices, update information may be determined based on the respective aging information. The update information may include modifications to operating parameters of the devices. For example, the devices may operate according to initial parameters that are above sustainable parameters and the update information may lower the operating parameters based on the aging information. | 11-22-2012 |
20120297051 | P2P ACTIVITY DETECTION AND MANAGEMENT - A network device may receive a peer-to-peer (P2P) activity record corresponding to a P2P data flow of P2P activity in a network. The P2P data flow may include content information communicated from a first user equipment device (UE) to a second UE via the network, and the P2P activity record may include information identifying the P2P data flow. The network device may insert the information identifying the P2P data flow into a P2P activity map and compare the P2P activity map to a P2P pattern of interest. The network device may also determine a P2P activity of interest probability based on the comparison of the P2P activity map to the P2P pattern of interest, which may describe the likelihood that P2P activity of interest is occurring in the network. The network device may also generate a system response based on the P2P activity of interest probability. | 11-22-2012 |
20120297052 | DETERMINING MISCONNECTION OF AN ELECTRONIC DEVICE TO A NETWORK DEVICE USING ZONE INFORMATION - Connection of an electronic device to a particular port of the network device is detected. It is determined based on zone information whether a misconnection has occurred. The zone information defines plural zones. | 11-22-2012 |
20120297053 | UTILIZING SIGNATURES TO DISCOVER AND MANAGE DERELICT ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets. | 11-22-2012 |
20120297054 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 11-22-2012 |
20120297055 | System and method for wireless network offloading - Wireless offloading provides tools to a service provider to encourage or direct a subscriber to offload from a first network, e.g., a cellular network, to a second network, e.g., a Wi-Fi network. The cellular service provider can use network data to determine wireless offloading priorities for cellular subscribers on an individual or group basis. The cellular service provider may use wireless network data it has and/or wireless network data it learns about networks from the wireless devices (which may obtain Wi-Fi network data from beacon frames of Wi-Fi networks or active scanning and which may report to the cellular service provider). Each wireless device can be given scanning assignments to ensure that the reporting task is shared among subscribers or adjusted to fill in gaps in data. With the network data, the cellular service provider is capable of generating useful prioritized network lists for wireless devices, either individually or as a group. Preferences can be encouraged in the form of incentive offers to subscribers to, e.g., offload from the cellular network to a Wi-Fi network. Incentive offers can include offers to lower service costs or provide additional or improved services. | 11-22-2012 |
20120297056 | EXTENSIBLE CENTRALIZED DYNAMIC RESOURCE DISTRIBUTION IN A CLUSTERED DATA GRID - A centralized resource distribution is described where the decision portion of partitioning data among cluster nodes is made centralized while the actual mechanics to implement the partitioning remain a distributed algorithm. A central distribution coordinator is used to create an extensible central strategy that controls how the data will be partitioned across the cluster. The work to implement this strategy is performed by all of the members individually and asynchronously, in accordance with a distributed algorithm. The central strategy can be communicated to all cluster members and each member can perform the partitioning as it relates to itself. For example, in accordance with the distributed algorithm, one node may decide that it needs to obtain a particular partition in light of the central strategy and carry out the necessary steps to obtain that data, while other nodes may be asynchronously performing other individual partition transfers relevant to those particular nodes. | 11-22-2012 |
20120297057 | Hardware-Assisted Integrity Monitor - A hardware-assisted integrity monitor may include one or more target machines and/or monitor machines. A target machine may include one or more processors, which may include one or more system management modes (SMM). A SMM may include one or more register checking modules, which may be configured to determine one or more current CPU register states. A SMM may include one or more acquiring modules, which may be configured to determine one or more current memory states. A SMM may include one or more network modules, which may be configured to direct one or more communications, for example of one or more current CPU register states and/or current memory states, to a monitor machine. A monitor machine may include one or more network modules and/or analysis modules. An analysis module may be configured to determine memory state differences and/or determine CPU register states differences. | 11-22-2012 |
20120297058 | MATCHING ENGINE FOR COMPARING DATA FEEDS WITH USER PROFILE CRITERIA - An event notification matching system, including an event matching table forming a plurality of nodes. Each node is assigned a subscriber request value and contains identifiers for one or more subscribers to be notified at the occurrence of an event relating to the subscriber request value. The event notification matching system may also include a table index. The table index receives input values from an event processing module and selects one or more of the nodes that have subscriber request values corresponding to the received input values. The event processor receives event data from a predetermined source, and formats the input values to simplify the operations performed by the event matching table. The event notification matching system is configured such that the event data need not be compared to non-matching nodes in the event matching table. | 11-22-2012 |
20120297059 | AUTOMATED CREATION OF MONITORING CONFIGURATION TEMPLATES FOR CLOUD SERVER IMAGES - Monitoring configurations for monitoring systems are automatically created for cloud server instances by polling the cloud controller to detect creation of each new instance, obtaining the image ID for the new instance from the cloud controller, and using a monitoring configuration template associated with the image ID to create the monitoring configuration. If a monitoring configuration template is not available for the image ID, a new template is created, either manually and/or automatically, and added to the template database. Automated template creation can include polling and analyzing instance ports and/or detecting and interrogating embedded monitoring agents such as WMI or SNMP. Monitor packs including detection criteria and interrogation checks can be used to detect monitoring agents and construct appropriate templates. Embodiments further monitor the cloud controller to detect termination of instances, and remove corresponding monitoring configurations from the monitoring to avoid generating false alerts. | 11-22-2012 |
20120297060 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - There is provided an information processing device including a device information acquisition unit configured to acquire information on other devices connected via a network, and a setting file creation unit configured to, on the basis of the information on the other devices acquired by the device information acquisition unit, create a setting file by causing the information processing device to describe in the setting file information on content that is managed by the information processing device, the setting file being adapted to be forwarded to the other devices. The setting file creation unit describes in the setting file an order in which the setting file is to be forwarded. | 11-22-2012 |
20120297061 | METHOD AND SYSTEM FOR COLLECTING AND MANAGING NETWORK DATA - Some embodiments include a method and/or a system for collecting and managing network data. Other embodiments of related methods and systems are disclosed. | 11-22-2012 |
20120297062 | SYSTEM AND METHOD FOR GENERATING AND REPORTING COOKIE VALUES AT A CLIENT NODE - A method and apparatus for tracking and reporting traffic activity on a web site whereby cookie data is compiled at the visitor computer using cookie processing script embedded within the web page downloaded over the Internet and operable on the visitor computer. Data mining code within the downloaded web page is operable on the visitor computer to obtain web browsing data. The cookie processing script operates in consideration of this web browsing data and an old cookie previously stored on the visitor computer and associated with the visited web page to obtain new cookie values. These new cookie values are then stored on the visitor computer and also attached to an image request sent to a data collection server where they are processed and posted for viewing by the web page owner. As cookie processing and writing occurs completely within the visitor computer, cookie-blocking technologies are circumvented. | 11-22-2012 |
20120297063 | METHOD AND APPARATUS FOR POPULATING A SOFTWARE CATALOGUE WITH SOFTWARE KNOWLEDGE GATHERING - A method and a corresponding apparatus for inventoring software products on a plurality of computer are proposed. The inventoring system aims at populating a software catalogue without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process which gathers information from a potentially very large collection of computers. Any occurrence of a group of identical files across multiple computers is considered a reliable indicator that they belong to the installation footprint of a product. | 11-22-2012 |
20120297064 | METHOD AND APPARATUS FOR AN MTC USER EQUIPMENT TO DETECT AND REPORT A PREDETERMINED EVENT TO AN MTC SERVER - The invention proposes a detecting and reporting method and apparatus in a user equipment of a machine type communication based communication system. The MTC user equipment firstly detects whether a predetermined event occurs; and the MTC user equipment transmits a first report message to one or more servers if the predetermined event occurs. With the technical solution of the invention, the MTC user equipment can detect the occurrence of the predetermined event, for example, the MTC user equipment being stolen, the MTC user equipment being in illegal movement, the MTC user equipment being damaged, the MTC user equipment being powered off or a predetermined data value measured by the MTC user equipment being above or below a predetermined threshold, and notify an MTS server. The MTC server can take the further action upon acquisition of the relevant condition, for example, recover the MTC user equipment, bill the user of the MTC user equipment, charge the user of the MTC user equipment, etc. | 11-22-2012 |
20120303790 | Host Visibility as a Network Service - At a data switching device in a data center, it is detected whether a host has connected to a cloud computing network of which the data switching device and the data center are components. The detection is performed without directly communicating with the host. The data switching device determines properties of the host and generates a message comprising data representative of the properties of the host. The message is sent from the data switching device to a node in the cloud computing network that is configured to manage components of the cloud computing network associated with the host. | 11-29-2012 |
20120303791 | LOAD BALANCING WHEN REPLICATING ACCOUNT DATA - Embodiments of the present invention relate to invoking and managing load-balancing operation(s) applied to partitions within a distributed computing environment, where each partition represents a key range of data for a storage account. The partitions affected by the load-balancing operation(s) are source partitions hosted on a primary storage stamp and/or destination partitions hosted on a secondary storage stamp, where the primary and secondary storage stamps are located in geographically distinct areas and are equipped to replicate the storage account's data therebetween. The load-balancing operation(s) include splitting partitions into child partitions upon detecting an increased workload as a result of active replication, merging partitions to form parent partitions upon detecting a reduction in workload as a result of decreased processing-related resource consumption, or offloading partitions based on resource consumption. A service within a partition layer of the storage stamps is responsible for determining when to invoke these load-balancing operation(s). | 11-29-2012 |
20120303792 | METHOD AND APPARATUS FOR PROVIDING RECOMMENDATIONS WITHIN CONTEXT-BASED BOUNDARIES - An approach is provided for providing recommendations within context-based boundaries. A recommendation platform receives an input, from a device, for selecting at least one content recommendation channel, wherein the at least one content recommendation channel includes, at least in part, one or more context-based boundaries for selecting one or more content items. Next, the recommendation platform determines context information associated with the device, a user of the device, or a combination thereof. Then, the recommendation platform processes and/or facilitates a processing of the context information based, at least in part, on the at least one content recommendation channel to cause, at least in part, a selection of the one or more content items. | 11-29-2012 |
20120303793 | FEEDBACK-BASED SYMPTOM AND CONDITION CORRELATION - Feedback data can be received from client agents running on client computer systems. The feedback data can include data on the symptoms and conditions for rules that relate computer system symptoms to computer system conditions. The feedback data can be analyzed to produce correlation information that quantifies a degree of correlation between the symptom(s) and condition(s) related by the rule(s). It may be determined whether analysis of the feedback data warrants including one of the rules in correlation mappings to be applied to monitored computer systems. If so, then that rule can be included in the mappings. Information representing the correlation mappings may be transmitted to the monitored computer system(s). Additionally, information representing the correlation mappings may be transmitted to the monitored computer system(s), and types of feedback data collected from the client agents can be altered on the basis of the correlation information. | 11-29-2012 |
20120303794 | METHOD AND APPARATUS OF PERFORMING REMOTE MANAGEMENT OF A MANAGED MACHINE - Disclosed are an apparatus and method of remotely communicating with a managed machine. One example method of operation may include selecting the managed machine operating in a communication network, transmitting a connection request message to the managed machine and establishing a secure connection between the managed machine and an administrator machine. The example method may also include responsive to connecting with the managed machine, executing a host service on the managed machine, and connecting to the host service over the communication network via an application client operating on the administrator machine. | 11-29-2012 |
20120303795 | QOS CONTROL IN WIRELINE SUBSCRIBER MANAGEMENT - Various exemplary embodiments relate to a session management node. A session management node may include: a receiver configured to receive an accounting message; a session information storage that includes a record of accumulated network usage of the subscriber; a session manager configured to determine a Quality of Service (QoS) for the subscriber based upon the subscriber's accumulated network usage and an update time; and a transmitter configured to send an authorization message to the NAS. A session management node may also include: a configurable NAS profile; a usage reporter; a policy engine; and a reauthorization scheduler. Various exemplary embodiments may relate to a method of authorizing QoS based on subscriber usage and current time period. The method may include: receiving an accounting message; monitoring the usage of the subscriber; authorizing a QoS; and transmitting an authorization message. Subscriber network usage may be associated with a monitoring key and/or rating factor. | 11-29-2012 |
20120303796 | MAPPING ACCOUNTING AVPS TO MONITORING KEYS FOR WIRELINE SUBSCRIBER MANAGEMENT - Various exemplary embodiments relate to a session management node. A session management node may include: a receiver that receives an accounting message indicating network usage of a subscriber, the message including at least one field; a NAS profile that maps the accounting message to a type of usage based on the field; a session information storage that includes a record of accumulated network usage for the type of usage; and a usage reporter that updates the subscriber's accumulated network usage. Various exemplary embodiments relate to a method of measuring network usage of a subscriber. The method may include: receiving an accounting message; determining a type of usage; and monitoring the subscriber's usage according to the type of usage. In various exemplary embodiments, various messages including vendor specific fields may be mapped to the same type of usage. A rating factor for monitoring may be assigned to a type of usage. | 11-29-2012 |
20120303797 | SCALABLE AUDIOVISUAL STREAMING METHOD AND APPARATUS - A real-time audiovisual streaming system transmits audiovisual content over an internetwork from an audiovisual stream source to a plurality of invited viewers. The system includes an application monitor coupled to an internetwork to monitor performance of each of a plurality of streaming servers coupled to the internetwork. The application monitor selects at least one streaming server to receive and broadcast an audiovisual stream over the internetwork, based on its monitoring of the streaming servers. The application monitor also monitors performance of each of a plurality of control servers and selects at least one control server based thereon to establish control with the audiovisual stream source to enable transmission of the audiovisual stream from the audiovisual stream source to the at least one selected streaming server and to establish control with at least one of the plurality of invited viewers to enable the broadcast of the audiovisual stream from the at least one selected streaming server to the at least one invited viewer. | 11-29-2012 |
20120303798 | System and Method for Monitoring Handheld Devices in a User Testing Mode - A system and method are presented for monitoring handheld devices in a testing environment. At least one handheld device is provided, typically several, that is capable of performing a first plurality of functions in a non-test mode, and a more limited number of functions in a test mode. In a test environment the handheld device should be set to perform in the test mode. In the event of the handheld device mode being changed from the test mode to non-test mode, the handheld device generates a non-test mode signal. A monitoring software application records the non-test mode signal. In one aspect, the monitoring application is embedded in a remote proctor device. The remote proctor device monitoring application may send a mode interrogation message to the handheld device, and the handheld device generates the non-test mode signal in response to the mode interrogation message. | 11-29-2012 |
20120303799 | Migration of virtual resources over remotely connected networks - Systems and methods for migrating a virtual resource from a source host in a source network to a destination host in a destination network are provided. In one embodiment, the method comprises establishing a secure communication connection between a source proxy in the source network and a destination proxy in the destination network; and monitoring migration traffic directed from the source host to the source proxy and forwarding said traffic to the destination proxy which in turn forwards the traffic to the destination host over the secure communication connection between the source proxy and the destination proxy, such that the communication addresses of the source host and the destination host remain guarded from direct access by an entity outside of the source network or the destination network. | 11-29-2012 |
20120303800 | Autonomous Computer Session Capacity Estimation - Systems and methods are disclosed for estimating and updating the capacity associated with resources in a virtualized computing environment. A capacity estimation value may be stored in computer memory. The capacity estimation value may estimate how many concurrent sessions a resource in the virtualized computing environment has workload capacity to desirably handle. The system may monitor one or more resource consumption metrics of the resource on an ongoing basis. The capacity estimation value may be updated based on, inter alia, the monitoring. The capacity estimation value may be used when a request is received to create a new session in the resource. | 11-29-2012 |
20120303801 | MANAGING A DOMAIN - A system for managing a domain in a premises is described. The system includes: an action identifier coupled with a server, the action identifier identifies an action to be mapped to a device of the at least one device, wherein the device comprises a communication port that supports a first protocol; a device driver determiner coupled with the server, the device driver determiner determines a device driver that supports a second protocol, wherein the second protocol supports the action; a comparer coupled with the server, the comparer compares the second protocol with a domain configuration store comprising device configuration information for the at least one device; and a device driver implementer coupled with the server, the device driver implementer implements, based on the comparing, the device driver when the first protocol corresponds to the second protocol such that the action is enabled for performance. | 11-29-2012 |
20120303802 | COMPUTER NETWORK SOFTWARE AND HARDWARE ASSET CONFIGURATION AND DISCOVERY SYSTEM AND METHOD - A method, system, and network for interfacing the work-flow monitoring and reporting of a host computer, a local network of information technology devices, a community of network users, and a global information technology community. This includes the processes and system features for initiating an inventory of a plurality of information technology devices associated with the local network of information technology devices. The present disclosure further includes determining needs of the local network of information technology and associating the needs to similar needs of the community of network users, and solution product and services of the global information technology community. The system directs the host computer to research and purchase resources similar in temperament of the needs of the local network of the information technology devices, and drive the global information technology community advertisements of the needs of the local network to the user of the host computer. | 11-29-2012 |
20120303803 | CONT Internet Use Monitoring System - A system for monitoring Internet use of a selected computer user includes a remote server and a computer having a monitoring program voluntarily installed thereon by the user communicatively connected to the remote server. The monitoring program is configured to monitor various Internet access activity of the computer user and record the Internet access activity on the remote server. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats, and electronic mail activity. A method of using a monitoring system includes the steps of a computer user voluntarily installing a monitoring program on a selected computer, recording the Internet access activity, and providing the recorded information to a third party recipient. A report may be provided that includes a variety of information and may include a plurality of portions. | 11-29-2012 |
20120303804 | Method and system for providing on-demand content delivery for an origin server - An infrastructure “insurance” mechanism enables a Web site to fail over to a content delivery network (CDN) upon a given occurrence at the site. Upon such occurrence, at least some portion of the site's content is served preferentially from the CDN so that end users that desire the content can still get it, even if the content is not then available from the origin site. In operation, content requests are serviced from the site in the usual manner, e.g., by resolving DNS queries to the site's IP address, until detection of the given occurrence. Thereafter, DNS queries are managed by a CDN dynamic DNS-based request routing mechanism so that such queries are resolved to optimal CDN edge servers. After the event that caused the occurrence has passed, control of the site's DNS may be returned from the CDN back to the origin server's DNS mechanism. | 11-29-2012 |
20120303805 | SYSTEM AND METHOD FOR PERFORMANCE DATA COLLECTION IN A VIRTUAL ENVIRONMENT - A system and method can manage software services in virtualized and non-virtualized environments. A plurality of data collection components in a computing environment can include a plurality of virtual machines running on the one or more microprocessors, wherein the plurality of virtual machines are adapted to be deployed with services and applications. Each data collection component operates to use one or more data structures to communicate with a data consumer, wherein each data structure describes metrics to be collected by said data collection component and is capable of containing collected metric values. | 11-29-2012 |
20120303806 | DISCOVERING PHYSICAL SERVER LOCATION BY CORRELATING EXTERNAL AND INTERNAL SERVER INFORMATION - The present invention includes a computing system for discovering a physical location of a physical server device in a datacenter. The computing system obtains at least one physical property of the physical server device pertaining to the physical location of the physical server device. The computing system acquires at least one logical property of the physical server device pertaining to a logical server name of the physical server device. The computing system correlates the at least one physical property and the at least one logical property. Thereby, the computing system matches the logical server name to the physical location. | 11-29-2012 |
20120303807 | OPERATING CLOUD COMPUTING SERVICES AND CLOUD COMPUTING INFORMATION SYSTEM - A cloud computing information system includes a first collection unit that collects node status information from a cloud computing node, a second collection unit that collects cloud service status information indicative of an attribute of a cloud computing service being executed in the cloud computing node, a third collection unit that collects environmental data sets from a plurality of computing systems where each data set corresponds to attribute values of one of the computing systems, a group building unit that builds a group of computing systems, where the group includes computing systems of the plurality of computing systems with an identical attribute value, a storage unit that stores the node and cloud service status information, environmental data sets, and the identical attribute value, and a selection unit that selects characteristic data from the node and cloud service status information and environmental data sets and sends it to a computing system. | 11-29-2012 |
20120311126 | SYSTEMS AND METHODS FOR MEASURING QUALITY OF EXPERIENCE FOR MEDIA STREAMING - A method for measuring quality of experience for media streaming in a network is provided, the method includes: identifying a media stream; detecting an event related to the media stream indicative of a quality of experience (QoE) as perceived by a subscriber; measuring a metric relating to the detected event; and determining a quality of experience measurement based on the metric. A system for measuring quality of experience for media streaming as perceived by subscribers in a network is provided, the system having: a media flow recognition module configured to identify a media stream; a QoE event handler operatively connected to the media flow recognition module and configured to detect an event related to the media stream indicative of a quality of experience as perceived by a subscriber; a metric measurement module operatively connected to the QoE event handler and configured to measure a metric relating to the detected event; and a quality of experience calculation module operatively connected to the metric measurement module and configured to determine a quality of experience measurement based on the metric. | 12-06-2012 |
20120311127 | Flyway Generation in Data Centers - The subject disclosure is directed towards configuring and controlling wireless flyways (e.g., communication links between server racks provisioned on demand in a data center) to operate efficiently and without interfering with one another. Control and flyway selection may be based upon steered antenna directionality, channel, location in the data center, transmit power, and measured and/or predicted (estimated) network traffic. Flyways also may be used to route indirect traffic to reduce traffic on a bottleneck (e.g., wired) link. A payload may be sent over a over a wireless flyway with acknowledgment via a wired backchannel so that wireless communication is in one direction. The lack of interference and communication in one direction facilitates flyway operation without a backoff function and/or without clear channel assessment. | 12-06-2012 |
20120311128 | PERFORMANCE TESTING IN A CLOUD ENVIRONMENT - A test controller provisions a load generation unit and instructs the load generation unit to generate a load and apply the load to a first application server instance in a cloud computing environment. The test controller measures a performance level of the first application server instance to determine if the first application server instance reaches a saturation point. If the first application server instance reaches the saturation point, the test controller records a performance statistic of the first application server instance. | 12-06-2012 |
20120311129 | IDENTIFYING A DIFFERENCE IN APPLICATIOIN PERFORMANCE - A method for identifying a difference in application performance includes identifying first recorded statistics pertaining to traffic of an application sniffed during a first period prior to an application change. Subsequent to the application change, causing a collection, at the node, of the application's traffic during a second period and recording second statistics pertaining to that traffic. An evaluation is generated from a comparison of the first statistics with the second statistics. The evaluation indicates a difference in application performance following the change. | 12-06-2012 |
20120311130 | CONTEXT-BASED COMPUTING FRAMEWORK - A context-based computing framework is disclosed. An example method for context-based computing disclosed herein comprises receiving context information provisioned for a current location from a context service in response to a query, and configuring interaction with a resource associated with the current location based on the context information received from the context service. Another example method for context-based computing disclosed herein comprises determining a location associated with a query requesting context information, obtaining the context information from a context profile associated with the location, and sending the context information in response to the query, the context information to facilitate interaction with a resource associated with the location. | 12-06-2012 |
20120311131 | Method and Apparatus for Monitoring and Controlling Data Sharing - An approach is provided for managing data sharing at user device. A data sharing module determines one or more requests for a transmission or a reception of one or more data items at a device. Next, the data sharing module causes, at least in part, a time delay in the transmission or the reception of the one or more data items. Further, the data sharing module determines to monitor during the time delay for one or more inputs specifying at least one operation with respect to the transmission or the reception of the one or more data items. | 12-06-2012 |
20120311132 | AUTONOMOUS PERFORMANCE PROBING - A method, device, and computer-readable medium are disclosed for automatically activating a probe configured to generate test network traffic in response to evaluating a policy that accounts for aggregated information that describes traffic that was processed by a network device. The method includes storing a policy, and evaluating the policy based at least in part on an item of received aggregated information that describes a set of packets that were processed by the network device and sent or received on a network. The probe is activated at least partially in response to evaluating the policy. The probe generates test packets to emulate one or more applications, services, or devices communicating on the network. | 12-06-2012 |
20120311133 | FACILITATING PROCESSING IN A COMMUNICATIONS ENVIRONMENT USING STOP SIGNALING - Processing, such as debug and/or recovery processing, within a communications environment is facilitated. Responsive to detecting an event, a stop signal is propagated through a communications network of the communications environment, and each network element that receives the stop signal, transmits the signal to its neighbors (if any), and then performs an action depending on its specific programming. The action can be to take no action, perform a debugging action or perform a recovery action. The elements that receive the signal and perform the same action as other elements form a coordinated network providing a coordinated result. | 12-06-2012 |
20120311134 | Estimating Bandwidth Based on Server IP Address - Some embodiments provide a method for estimating bandwidth for receiving data at a device during a communication session from a set of servers based on identities of the servers. During the session, the method receives a first set of data packets reflecting a first server identity. The method detects a change of server identity during the session based on a second set of received data packets that reflect a second server identity that is different from the first server identity. The method uses the second server identity to calculate a bandwidth estimate that accounts for the change based on a history of interactions during the session with the second server. | 12-06-2012 |
20120311135 | AUTOMATED RECOMMENDATIONS FOR CLOUD-COMPUTING OPTIONS - Systems, computer storage devices, and methods receive a request from a first user. The first user has at least one instance running within a cloud-computing environment. The systems, computer storage devices, and methods automatically analyze the first user instance to produce first user instance characteristics, and automatically analyze characteristics of other user instances running within the cloud-computing environment. Other users, who are different from the first user, operate the other user instances. The systems, computer storage devices, and methods automatically match the first user instance to instances of the other user instances by determining which of the other user instances have the same characteristics as the first user instance characteristics. The systems, computer storage devices, and methods automatically identify cloud-computing options selected by such other users that operate the matching instances that are related to the request. The systems, computer storage devices, and methods then automatically make recommendations to the first user using the computing devices. | 12-06-2012 |
20120311136 | TIME SYNCHRONIZATION ACROSS COMPUTERS IN A DISTRIBUTED SYSTEM - Normalizing time across machines in a distributed system. A method includes obtaining one or more points defining differences in time between machines in the distributed system. Using the points, a determination of one or more time measurement drifts between machines is made. The one or more time measurement drifts indicate changing differences in time over time. One or more traces are collected. Each trace includes one or more events. Each event is correlated to a time stamp from one of the machines in the distributed system. Using the one or more determined time measurement drifts, the time stamps are normalized. | 12-06-2012 |
20120311137 | SYSTEMS AND METHODS FOR IDENTIFYING FOUNDATION FIELDBUS LINKING DEVICES - Systems and methods for identifying Foundation Fieldbus linking devices are described. A Foundation Fieldbus linking device may be identified by a gateway device that includes one or more computers. An operational status for the identified linking device may be determined by the gateway device. A virtual address representative of the identified linking device may be determined by the gateway device. A message associated with operation of the identified linking device may be provided by the gateway device to an external system, and the virtual address may be utilized to represent the linking device. | 12-06-2012 |
20120311138 | SYSTEM AND METHOD FOR USING QUALITY OF SERVICE WITH WORKLOAD MANAGEMENT IN AN APPLICATION SERVER ENVIRONMENT - Described herein are systems and methods for collecting and surfacing metrics with respect to their classification; and the use of the metrics by a workload manager and other application monitoring tools to provide quality-of-service and workload management. Each request is classified, either by the application server or another process. A request classification identifier (RCID) is associated with each request, and thereafter flows with that request as it is being processed. The RCID value is used by data collectors at various points in the system to aggregate the metrics, and a workload manager collects the metrics. The collected metrics are then processed by a rules engine at the workload manager, which analyzes the metrics and generates adjustment recommendations to provide quality-of-service and workload management. | 12-06-2012 |
20120311139 | Method and Apparatus for Context-Based Content Recommendation - Starting with the people in and around enterprises, the expertise and work patterns stored in people's brains as exhibited in their daily behavior is detected and captured. A behavioral based knowledge index is thus created that is used to produce expert-guided, personalized information. | 12-06-2012 |
20120311140 | METHOD OF PROCESSING WEB ACCESS INFORMATION AND SERVER IMPLEMENTING SAME - A server includes an operation number counting part configured to count the number of operations on a link on a Web page; an operation ratio predicted value calculating part configured to calculate the predicted value of the ratio of the operations of the link based on the Web page; and a link prominence determining part configured to determine the prominence of the link based on the number of the operations and the predicted value of the ratio of the operations. | 12-06-2012 |
20120311141 | Dynamic Power Usage Management Based on Historical Traffic Pattern Data for Network Devices - Particular embodiments provide power usage management for network devices according to historical traffic pattern data. Network traffic statistics for traffic flowing through a network device may be determined. Traffic pattern for a time period based on the traffic flowing through the network device is then determined. The network device may then manage power based on the pattern. For example, when a pattern indicates that traffic flowing through the network device is light during a time period, then the network device may operate in a lower power mode, such as a standby mode and when it indicates that there is higher usage, the network device may operate in a normal power mode. A power usage policy may be determined based on the historical traffic patterns and is automatically enforced by the network device. The power usage policy also may be dynamically adjusted over time based on network traffic statistics. | 12-06-2012 |
20120311142 | Wireless SNMP Agent Gateway - A system for managing communications between a group of remote machine-to-machine devices and a management platform is described where the remote devices may have disparate communication protocols. An agent gateway sits in the communication path between the remote devices and the management platform and communicates wireless with the remote devices using the native communication protocols of each device. The agent gateway includes a translator function connected to a management information base, wherein the management information base contains information relating to each machine-to-machine device and its native protocol. The agent gateway translates the messages into a standard protocol, such as SNMP, used by the network management platform allowing the network management platform to monitor and manage the remote devices using the standard network protocol. | 12-06-2012 |
20120311143 | SYSTEM AND METHOD FOR SUPPORTING AUTOMATIC DISABLING OF DEGRADED LINKS IN AN INFINIBAND (IB) NETWORK - A system and method can support automatic disabling of degraded links in an InfiniBand (IB) network. At least one node in a fabric can monitor one or more local ports of the at least one node for one or more error states associated with a link at the at least one node, wherein the link is connected to a local port of the at least one node. The at least one node further allows a subnet manager to observe the one or more error states associated with the link at the at least one node, and allows the subnet manager to set the link in a basic state if the observed error states exceed a threshold. In this basic state, the link allows only SMP traffic and prevents data traffic and non-SMP based management traffic. | 12-06-2012 |
20120311144 | METHOD FOR OPERATING CLOUD COMPUTING SERVICES AND CLOUD COMPUTING INFORMATION SYSTEM - A method for cloud computing comprising collecting cloud computing node status information from a cloud computing node connected to the cloud computing network; collecting cloud computing service status information indicative of an attribute of a cloud computing service executed in the node; collecting environmental data sets from computing systems connected to a network connected to the cloud, each environmental data set corresponding to attribute values of the computing systems; building a group of computing systems; storing the node and cloud service status information, the environmental data sets, and the identical attribute value of each computing system in a database; and responsive to a request for characteristic data from one of the computing systems, selecting the respective characteristic data out of the status information and the environmental data sets in the database and sending the characteristic data over the cloud computing network and the network to the requesting computing system. | 12-06-2012 |
20120311145 | METHOD AND SYSTEM TO MONITOR EQUIPMENT OF AN IT INFRASTRUCTURE - The present system relates to a method for rating an application by a user. The application is downloaded by the user from an application store server to his/her electronic device and is executable on the electronic device. The method includes, for the electronic device, the acts of monitoring application usage data for the application after a first execution of the application by the user, when the application usage data matches a predefined usage data criterion, sending a request to the user for evaluation of the application, and upon entry of an evaluation by the user, forwarding the entry to the application store server. | 12-06-2012 |
20120311146 | SERVICE-CENTRIC COMMUNICATION NETWORK MONITORING - Service-centric communication network monitoring apparatus and methods are provided. Service traffic, associated with a third-party service provided by an external service provider that is controlled independently of a communication network, is identified in communication traffic that is being transferred through that communication network. The identified service traffic is monitored, for example, to compile service usage statistics, to police usage of the service, to generate billing records for usage of the service, and/or to mirror the identified service traffic. A registry in which the service is registered may interact with a monitoring system of the communication network so as to establish monitoring for the service traffic. | 12-06-2012 |
20120311147 | Method and Apparatus for Reporting of Measurement Data - An apparatus, method and computer program product are provided to collect measurement data that may be useful for coverage optimization without having to rely as extensively upon drive tests. In this regard, an apparatus, method and computer program product may be provided for collecting and reporting upon measurement data. Additionally, an apparatus, method and computer program product may be provided for directing the collection of the measurement data and for then receiving a report of the measurement data. A corresponding system for collecting measurement data may also be provided. | 12-06-2012 |
20120311148 | DELIVERY PERFORMANCE ANALYSIS FOR INTERNET SERVICES - One preferred embodiment of the present invention provides systems and methods for analyzing the delivery performance of newsgroup services. Briefly described, in architecture, one embodiment, among others, includes a newsgroup evaluation system configured to determine a delivery rate for a newsgroup server. In other embodiments, methods and systems are provided for analyzing completion and retention for newsgroup services. | 12-06-2012 |
20120311149 | Remotely Monitoring Field Assets - Disclosed methods, systems, and apparatuses remotely monitor a plurality of field assets. Device discovery is conducted to find a communication path through a master controller to an operations center. A plurality of states are monitored for individual field assets of the plurality of field assets. In response to trigger events, monitored states are selectively included in data sets that may be parsed, compressed, encrypted, and forwarded through a mesh network to an operations center. | 12-06-2012 |
20120317265 | Automatically Detecting and Locating Equipment Within an Equipment Rack - A mechanism is provided for automatically detecting and locating equipment within an intelligent equipment rack. The intelligent equipment rack comprises a rack controller that determines whether a signal has been received indicating that a rack space in a plurality of rack spaces in the intelligent equipment rack has been occupied by a piece of electronic equipment. Responsive to receiving the signal indicating that the rack space has been occupied by the piece of electronic equipment, the rack controller updates a rack information table in the memory with occupation information related to the rack space occupied by the piece of electronic equipment. | 12-13-2012 |
20120317266 | Application Ratings Based On Performance Metrics - Application portals enable a unified interface to be provided for users to select application for download and purchase to their devices. User rankings and reviews are common place but do not provide insight on the performance of an application on a particular device type. To improve the application experience additional metrics associated with the performance of an application can be provided to the user prior to download to provide real performance metrics received from individual devices that have already executed the application on a similar device type. The performance metrics can be presented to a user or developer and in a more informative ranking for an application, one based on performance rather than popularity. | 12-13-2012 |
20120317267 | PRESENCE-BASED SITE ASSIGNMENT OF A DEVICE - A system and method for presence-based site assignment of a device includes a step of detecting a presence of the device by a network-managed device having a known logical location, wherein the logical location of the device is not known. A next step includes reporting the presence of the detected device to a network manager by the network-managed device. A next step includes assigning the detected device to the same logical location as the first network-managed device by the network manager. Subsequently, a next step includes a second network-managed device detecting the presence of the device and then associating to the logical location of the device. As a result the logical location of devices is inferred by the co-presence of other device having a known logical location. | 12-13-2012 |
20120317268 | SYSTEM, APPARATUS AND METHOD FOR ADDRESS MANAGEMENT IN A DISTRIBUTED MOBILE CORE NETWORK - Embodiments of the present invention provide a system, apparatus and method for address management in a distributed mobile core network. The apparatus includes a user equipment for managing multiple addresses for connecting at least one application client of the user equipment to a respective application server via at least one network. The user equipment includes a mobile address unit configured to manage a principal address, a local macro network (LMN) address, and a local area network (LAN) address. The principal address is used for data transmissions of a first type, the LMN address is used for data transmissions of a second type, and the LAN address is used for data transmission of a third type. | 12-13-2012 |
20120317269 | INTELLIGENT NETWORK MANAGEMENT OF NETWORK-RELATED EVENTS - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the network node, an indication of an event from a network monitor, the event associated with a network element; identifying an applicable rule of a plurality of rules based on the event, the applicable rule specifying at least one action; initiating performance of the at least one action with respect to at least one session associated with the network element. Various embodiments additionally include one or more of the following: identifying a group of sessions associated with the network element; and wherein the steps of identifying an applicable rule and initiating performance of the at least one action are performed for each session of the group of sessions. | 12-13-2012 |
20120317270 | INTELLIGENT PRESENCE COST MANAGEMENT BASED UPON CONGESTION STATUS AND SUBSCRIBER PROFILE - Various exemplary embodiments relate to a method performed by a network platform, the method comprising: receiving a subscriber ID and associated base station ID and application IDs from a user equipment; receiving network congestion information from a network monitor; identifying an application affected by the network congestion; calculating a cost to the identified application due to the network congestion; and notifying the identified application of the calculated cost. | 12-13-2012 |
20120317271 | Video and Site Analytics - Analytics describing video data published to one or more destination sites are calculated. Metrics describing performance of the video data, such as performance in different geographical areas, in different demographics and in different devices are calculated. An interface simplifies calculation of the video metrics to simplify analysis by allowing a user to identify different videos or sets of videos for analysis. Additionally, interaction with one or more web pages including the video data is also captured and combined with video data performance metrics. Integrating web page interaction data and video performance metrics provide a user with a more accurate description of how visitors interact with content presented using the one or more web pages. | 12-13-2012 |
20120317272 | Video Aware Paths - Analytics describing video data published to one or more destination sites are calculated. Metrics describing performance of the video data, such as performance in different geographical areas, in different demographics and in different devices are calculated. An interface simplifies calculation of the video metrics to simplify analysis by allowing a user to identify different videos or sets of videos for analysis. Additionally, interaction with one or more web pages including the video data is also captured and combined with video data performance metrics. For example, the effect of video data on navigation between web pages within a website is described by one or more navigation paths accounting for interaction with video data. | 12-13-2012 |
20120317273 | PRIORITIZING LAWFUL INTERCEPT SESSIONS - A method may include receiving a request for a lawful intercept (LI) session, where the LI session is associated with a particular priority of a set of priority levels, and determining whether a maximum quantity of LI sessions has been initiated by a network device. The method may further include initiating a new LI session based on the request, when the maximum quantity of LI sessions has not been initiated; determining whether at least one LI session exists that is associated with a lower priority than the particular priority, when the maximum quantity of LI sessions has been initiated; and terminating a particular LI session associated with a lowest priority and initiating a new LI session based on the received request, when the at least one LI session associated with the lower priority exists. | 12-13-2012 |
20120317274 | DISTRIBUTED METERING AND MONITORING SYSTEM - The distributed metering and monitoring service (DMMS) system provides a way to gather and maintain metrics data which remains distributed, until requested. The DMMS system uses messaging queues to scale the number of servers that may be monitored and metered to a hyperscale of greater than 10,000 servers. The DMMS system determines how many servers (nodes) to assign to a cluster, and uses a metric aggregator to collect and store metrics data for the nodes. The DMMS system creates message queues for the instances, injects instance identifiers into the cluster state data and metrics data, listens for request messages for metering information for instances, retrieves the metrics data for users identified by the instance identifiers stored locally at the nodes, and calculates the metering information for the instance. | 12-13-2012 |
20120317275 | METHODS AND DEVICES FOR NODE DISTRIBUTION - Methods for node distribution in a P2P network system and include the steps of: mapping nodes to a numerical space respectively, wherein each node has a neighborhood table recorded a certain number of nodes and the certain number of nodes are close to the node along one of two sides in increasing and decreasing direction; performing a search process to find a plurality of reference nodes, wherein any two consecutive reference nodes are a first reference node and a second reference node, and the second reference node is the node in the neighborhood table of the first reference node and a distance between the second and the first reference node conforms to a predetermined condition; finding two positioning reference nodes; mapping a target node to a target value, and locating the target node in a position corresponding to the target value and informing the reference nodes of the position. | 12-13-2012 |
20120317276 | SYSTEMS AND METHODS FOR ANALYZING NETWORK METRICS - The present solution is directed to systems and methods for providing, by a device intermediary to a plurality of clients and one or more servers, analytics on a stream of network packets traversing the device. The systems and methods include the device identifying, while the device manages network traffic between the plurality of clients and the one or more servers, a stream of network packets, from a plurality of streams of network packets of the network traffic traversing the device, corresponding to a flow identifier, e.g., a selected one of an internet protocol address, a uniform resource locator or an application identifier. The systems and methods may include a collector of the analytics engine collecting, while the device manages network traffic, metrics on the identified stream of network packets and generating one or more stream objects that comprise the collected metrics. | 12-13-2012 |
20120317277 | MONITORING APPARATUS, MONITORING METHOD, AND COMPUTER-READABLE MEDIUM - A monitoring apparatus which monitors a plurality of image forming apparatuses and transmits monitoring information, collected by monitoring, to a central management apparatus, comprises: collection unit configured to collect the monitoring information from the plurality of image forming apparatuses; storing unit configured to store the monitoring information collected; transmission unit configured to transmit the monitoring information stored by the storing unit to the central management apparatus; selection unit configured to accept selection of a data type, of the collected monitoring information, which is stored in a storage device within a local network; and output configured to output, as output data, data acquired from the monitoring information transmitted by the transmission unit in accordance with the data type selected for storing the output data in the storage device within the local network. | 12-13-2012 |
20120317278 | COMMUNICATION APPARATUS, COMMUNICATION METHOD AND REMOTE MONITORING SYSTEM - In a remote monitoring system including a monitoring center, a sensing information collecting station, and one or more sensing terminals, the sensing information collecting station collects measurement results measured by the sensing terminals, classifies the collected measurement results into priority information and general information, and transmits priority information and general information to the monitoring center. The monitoring center transmits response information to received priority information to the sensing information collecting station. The sensing information collecting station estimates network condition from a delay time based on the response information and decreases the transmission rate of general information when the estimated network condition is more congested. Thereby, even if the network condition fluctuates, desired information such as statistical information on measurement results and measurement results meeting a predetermined condition is communicated stably at low delay. | 12-13-2012 |
20120317279 | SYSTEM FOR SCALING A SYSTEM OF RELATED WINDOWS-BASED SERVERS OF ALL TYPES OPERATING IN A CLOUD SYSTEM, INCLUDING FILE MANAGEMENT AND PRESENTATION, IN A COMPLETELY SECURED AND ENCRYPTED SYSTEM - The described embodiment of the system includes business methods and software and hardware that acquires up to multi-gigabyte digital video files from digital cameras and other storage media, encodes the video files into formats in general use for playback on the Internet, acquires and manages all types of non-video files and delivers digital video and non-video files to remote storage for display using encryption algorithms and file compression algorithms. The system consists of digital cameras, personal computers, software and remote servers. The video-file-management software manages the process of acquiring video files from removable storage and all types of files from personal computers, manages the process of encoding movie files, annotating and editing movie files, annotating non-movie files, and compressing, encrypting and uploading such files to remote storage. The video-file-management software divides long movie files into two-minute segments to make editing, recombining and uploading simpler and more reliable. | 12-13-2012 |
20120317280 | SYSTEM FOR SCALING A SYSTEM OF RELATED WINDOWS-BASED SERVERS OF ALL TYPES OPERATING IN A CLOUD SYSTEM, INCLUDING FILE MANAGEMENT AND PRESENTATION, IN A COMPLETELY SECURED AND ENCRYPTED SYSTEM - The described embodiment of the system includes business methods and software and hardware that creates a cloud based Windows operating system server system that provides education and collaboration tools and system s to general education providers, business entities, and medical professionals and patients, and provides a system of real time delivery of services and information to users. The system uses SSL, AES, RC6, SHA, and UDP VPN over SSL, along with HMAC style logins to provide end-to-end security from within and external to the cloud. It provides online collaboration including live video streaming, email, SMS and live chat. It provides file handling for the conversion of paper medical records into electronic versions. | 12-13-2012 |
20120317281 | System and Method for Creating and Tracking Website Visitor Event Sequences - A method of analyzing user behavior on a website based on the real-time detection of event chains, where each event is a basic action such as a mouseclick, filling in a web form, and so on. The events are linked together into event chains by logical operators. | 12-13-2012 |
20120317282 | SYSTEM AND METHOD FOR COMMUNICATIONS IN A VEHICLE CONSIST - A method for communications in a vehicle consist (e.g., for managing a high-availability network for a locomotive consist) includes monitoring an operational status of a plurality of network channels across a plurality of vehicles in the consist, and routing messages through one or more of the network channels in dependence upon the monitored operational status of the network channels. | 12-13-2012 |
20120317283 | PROXY SERVER, HIERARCHICAL NETWORK SYSTEM, AND DISTRIBUTED WORKLOAD MANAGEMENT METHOD - A proxy server and a hierarchical network system and a distributed workload management method. According to one embodiment of this disclosure, the proxy server includes: a rate controller configured to, based on measured request-related information and service quality parameters relative to service levels of requests, periodically determine a dispatch rate for requests of each service level, wherein the sum of the dispatch rate for respective service levels is less than or equal to a predetermined rate; and a request dispatcher configured to dispatch the requests of the corresponding service level in accordance with the dispatch rate determined by the rate controller. One aspect of the disclosure realizes a low overhead, highly scalable, simple and efficient workload management system to achieve QoS assurance and overload protection. | 12-13-2012 |
20120317284 | Adaptive Ambient Services - Adaptive ambient services are provided. In some embodiments, an adaptive ambient service includes providing an ambient service profile. In some embodiments, an ambient service includes implementing an ambient service profile for assisting control of the communications device use of an ambient service on a wireless network, in which the ambient service profile includes a plurality of service policy settings, and in which the ambient service profile is associated with an ambient service plan that provides for initial access to the ambient service with limited service capabilities prior to activation of a new service plan; monitoring use of the ambient service based on the ambient service profile; and adapting the ambient service profile based on the monitored use of the ambient service. | 12-13-2012 |
20120324091 | Device-assisted services for protecting network capacity - Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity. | 12-20-2012 |
20120324092 | FORECASTING CAPACITY AVAILABLE FOR PROCESSING WORKLOADS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for forecasting a capacity available for processing a workload in a networked computing environment (e.g., a cloud computing environment). Specifically, aspects of the present invention provide service availability for cloud subscribers by forecasting the capacity available for running or scheduled applications in a networked computing environment. In one embodiment, capacity data may be collected and analyzed in real-time from a set of cloud service providers and/or peer cloud-based systems. In order to further increase forecast accuracy, historical data and forecast output may be post-processed. Data may be post-processed in a substantially continuous manner so as to assess the accuracy of previous forecasts. By factoring in actual capacity data collected after a forecast, and taking into account applications requirements as well as other factors, substantially continuous calibration of the algorithm can occur so as to improve the accuracy of future forecasts and enable functioning in a self-learning (e.g., heuristic) mode. | 12-20-2012 |
20120324093 | REAL-TIME DATA MONITORING BASED ON DATA PUSH - Data monitoring including: establishing a real-time connection between at least two processing entities; defining transfer preferences for data and metrics to be sent for monitoring; and sending the data and metrics from at least one sending entity to a collecting entity of the at least two processing entities using a data push process, wherein the data push process is based on the transfer preferences defined in advance for the data and metrics. | 12-20-2012 |
20120324094 | MOBILE DEVICE DNS OPTIMIZATION - When a mobile device interacts with a network service, synchronous DNS resolution can significantly impact user experience due to lossy or moderate-high latency conditions. Network services that rely on low-TTL DNS records for failover require a client to frequently resolve the service's host name. It is undesirable to block on these frequent resolutions. In an implementation, user activity on a mobile device is monitored to determine whether the user is engaged in an activity that would contact a server. If such an activity is in progress, then DNS requests to resolve the server's host name are periodically generated to make sure the server's IP address is cached. In an implementation, if a request to communicate with a server fails, the DNS cache expires the entry for that server so that a new DNS request can resolve the server's IP address in case the server's IP address has changed. | 12-20-2012 |
20120324095 | IMAGE PROCESSING IN A COMPUTER NETWORK - A method of allocating computing tasks in a computer network when servers receive processing tasks that are unequally distributed among the server computers. A task-available message is sent over the computer network from a server having a heavy task load to the other server computers. The task-available message is processed by at least one of the other server computer by requesting a task. | 12-20-2012 |
20120324096 | IMAGE PROCESSING IN A COMPUTER NETWORK - A plurality of server computers connected to computer network processes tasks that are unequally distributed among the server computers. A server sends a task-available message over the computer network to the remaining server computers to request assistance. The received task-available message is processed by some of the servers while others of the servers do not process the message because they are too busy. The servers that process the message respond by requesting a task from the message sending server. | 12-20-2012 |
20120324097 | PERFORMANCE ANALYZER FOR SELF-TUNING SYSTEM CONTROLLER - A performance analyzer for a self-tuning system controller, and a method for performance analysis. A range of values for a control parameter of a system controller for a system is split into a plurality of sub-ranges, need is determined to obtain a data point for a sub-range of the plurality of sub-ranges based on a criteria, wherein said sub-range is adjacent to a sub-range having a best performance value that identifies a best performance for the system, the control parameter is set to a value to generate the data point for the adjacent sub-range; and the control parameter set to a value for system performance, based on a search range determined from a window of data points that includes the generated data point. | 12-20-2012 |
20120324098 | ADVERTISEMENTS IN VIEW - A technique is provided to determine whether a region within a web page is viewable to a user through a browser window. Often, browsers will only show part of a web page at given time, creating a difficulty in establishing whether a region of the web page, which may be an advertisement for example, is in view. This is addressed by providing one or more test features within the region, rendering the web page, monitoring a behavioural characteristic of the test features and determining whether the region is in view based on the monitored behavioural characteristic, wherein the behavioural characteristic varies according to whether the test feature is currently being displayed. One example of a behavioural characteristic is a frame progression rate. Browsers will typically redraw elements of a web page at a higher rate if they are currently in view through the browser window, and this characteristic can therefore be used to determine whether the test feature, and thus the region, is in view. The present invention finds particular utility where the region contains an advertisement, as it allows an advertiser to discover whether the advertisement has been seen by users. | 12-20-2012 |
20120324099 | Content delivery control methods, apparatuses and computer programs - In a policy and charging control method, a network node including a policy and charging enforcement function (PCEF) establishes a user plane session with a user and obtains a profile of the user. Upon receiving a packet, the PCEF determines, through a deep inspection of the packet, whether the packet indicates that content of a particular type, referred to as original content, is to be received by the user. If it is determined that the packet indicates that the original content of the particular type is to be received by the user, the PCEF obtains, based on the user profile and the particular type of the original content, information regarding operations to be performed in relation to the original content. The PCEF then performs the operations in relation to the original content. The invention further relates to network nodes implementing a PCEF and to computer programs. | 12-20-2012 |
20120324100 | METHODS, SYSTEMS AND APPARATUS FOR MANAGING AND/OR ENFORCING POLICIES FOR MANAGING INTERNET PROTOCOL ("IP") TRAFFIC AMONG MULTIPLE ACCESSES OF A NETWORK - Methods, systems and apparatus for managing and/or enforcing one or more policies for managing internet protocol (“IP”) traffic among multiple accesses of a network in accordance with a policy for managing bandwidth among the multiple accesses are disclosed. Among the methods, systems and apparatus is a method that may include obtaining performance metrics associated with the multiple accesses. The method may also include adapting one or more rules of one or more the policies for managing IP traffic among the plurality of accesses based, at least in part, on the performance metrics and the policy for managing bandwidth among the plurality of accesses. The method may further include managing IP traffic associated with at least one wireless transmit and/or receive unit (“WTRU”) among the plurality of accesses responsive to the adapted rules. | 12-20-2012 |
20120324101 | COMBINING MEASUREMENTS BASED ON BEACON DATA - Usage data representing the access of a set of resources on a network is accessed. The usage data is based at least in part on information received from client systems sent as a result of beacon instructions included with the set of resources. First and second sets of usage data representing access by client systems classified as a first type and a second type, respectively, are determined based on the accessed usage data. Counts of unique visitors accessing the network resources from each of the first and second types of client systems, based on the first and sets of usage data, respectively, are each determined. A total count of unique visitors accessing the network resources from the first and second types of client systems is determined based on data representing the usage overlap of devices of the first type with devices of the second type. | 12-20-2012 |
20120324102 | QUALITY OF SERVICE AWARE RATE THROTTLING OF DELAY TOLERANT TRAFFIC FOR ENERGY EFFICIENT ROUTING - The invention is directed to energy-efficient network processing of delay tolerant data packet traffic. Embodiments of the invention determine if an aggregate of time critical traffic flow rates and minimum rates for meeting QoS requirements of delay tolerant traffic flows exceeds a combined optimal rate of packet processing engines of a network processor. In the affirmative case, embodiments set the processing rate of individual packet processing engines to a minimum rate, such that the cumulative rate of the packet processing engines meets the aggregate rate, and schedule the delay tolerant flows to meet their respective minimum rates. Advantageously, by throttling the processing rate of only delay tolerant traffic, energy consumption of network processors can be reduced while at the same time QoS requirements of the delay tolerant traffic and time critical traffic can be met. | 12-20-2012 |
20120324103 | INTELLIGENT MANAGEMENT OF APPLICATION CONNECTIVITY - Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications activity including a request to access the network. An application associated with the communications activity is be identified. A communications configuration associated with the application is accessed, the communications configuration indicating how the application is configured to access the network. Network connectivity is selectively established based on the communications configuration, and the application may be enabled to access the network to support the communications activity. | 12-20-2012 |
20120324104 | MONITORING AN INFORMATION TECHNOLOGY SYSTEM - The present invention relates to the technical field of performance management for IT systems. More particularly, the present invention relates to a technology of performing monitoring on demand for a complex IT system. According to one aspect of the present invention, there is provided a method of system monitoring that includes: monitoring a performance parameter of a client of the system, determining, based on the performance parameter of the client, whether to monitor a service endpoint directly called by the client, locating the service endpoint to be monitored in response to a determination to monitor the service endpoint directly called by the client, and monitoring a performance parameter of the service endpoint. | 12-20-2012 |
20120324105 | SERVICE MANAGEMENT SYSTEM FOR A TELECOMMUNICATIONS NETWORK - A communication line is installed in a network by automating a design phase and a configuration phase for the service and by automating failure recovery in either of the phases. In the design phase, an optimal route for the communication line is found, and the network components are provisioned and assigned. If the assigned network components are not available or can not be validated, the components causing the failure are marked, and the design phase is retried without the marked components. After the design phase, the configuration phase begins. The circuit design is tested against actual network components. If the test is passed, the actual network is configured according to the circuit design and the circuit is activated. If there is a network component failure during the configuration phase, the good route elements in the design are released while the failed network components are marked. The design phase is retried. | 12-20-2012 |
20120324106 | ADAPTIVE CROSS-NETWORK MESSAGE BANDWIDTH ALLOCATION BY MESSAGE SERVERS - The network device is described that comprises an allocator to adaptively allocate respective event message rate limits to client network devices that is in communication with an event-based system logging server to send event messages to the logging server for processing. The adaptively allocated event message rate limits are communicated to the client network devices so that limiting of a global rate of event messages received by the logging server comprises limiting the respective rates at which the client network devices can transmit event messages to the logging server. Measurement of respective event message rates comprises a count of event messages actually received by the logging server from the corresponding client device within a defined time window. | 12-20-2012 |
20120331124 | CONSTRAINT DEFINITION FOR CAPACITY MANGEMENT - Methods, systems, and computer-readable media with executable instructions stored thereon for constraint definition for capacity management. Constraint definition for capacity management can include discovering a topology of a set of resources. A number of policy rules for the set of resources can be defined. A Dependency-Group (D-G) tree can be constructed according to the number of policy rules. Information obtained from the D-G tree can be converted into a set of resource placement constraint definitions understandable by a consolidation engine. | 12-27-2012 |
20120331125 | Resource Use Management System - A method and apparatus for managing resources is provided. Responsive to a request for a set of resources by a user, a token is added to a response to the request generated by a server application. The requests are monitored from the user. The token identifies the user. A pattern of use by the user is identified. A determination is made as to whether overuse of the set of resources has occurred based on the pattern of use and a policy. | 12-27-2012 |
20120331126 | DISTRIBUTED COLLECTION AND INTELLIGENT MANAGEMENT OF COMMUNICATION AND TRANSACTION DATA FOR ANALYSIS AND VISUALIZATION - Systems and methods of collecting, storing and transmitting a set of communication and transaction data across a distributed system spanning multiple networks are disclosed. In one embodiment, the method may include distributing a set of collection servers throughout a distributed network to collect a set of communication and transaction data. The method may also include processing the set of communication and transaction data to extract metadata and a content. The method may include storing the content in the collection server. The method may also include automatically transmitting the metadata to a service platform to be used by an analyst at a workstation. The method may also include transmitting the content to the service platform to be used by the analyst, for analysis and reconstruction purposes when specifically requested by the analyst. | 12-27-2012 |
20120331127 | Methods and Apparatus to Monitor Server Loads - Methods and apparatus to monitor server loads are disclosed. An example load monitor includes a first virtual machine to replicate a first server; a router interface to cause a router to redirect a portion of requests destined for the first server to the first virtual machine, the first virtual machine to serve the redirected requests; a collector to collect first metric data from the first virtual machine related to processing of the redirected requests; and an overload indicator to indicate an overload condition at the first server based on the first metric data collected from the first virtual machine. | 12-27-2012 |
20120331128 | METHOD AND A SYSTEM FOR ANALYSING IMPACT OF CHANGES TO CONTENT OF A WEBSITE - A method and a system for managing a website are disclosed, the website being arranged on a server. According to the method, a website administrator initially performs changes to content of the website. Then the traffic to the website is analysed, including obtaining information regarding value generated for the website owner by the traffic, and the impact on the value generated for the website owner by the traffic, due to the performed changes, is evaluated. In the case that the evaluating step reveals that the performed changes decrease the value generated for the website owner by the traffic, a warning is generated for the website administrator. Thereby the website administrator is alerted if the changed content causes the value generated for the website owner by the visitors visiting the website to decrease, thereby allowing the website administrator to reverse the changes and/or perform further changes to the content in order to once again increase the generated value. | 12-27-2012 |
20120331129 | METHOD AND A SYSTEM FOR ANALYSING TRAFFIC ON A WEBSITE INCLUDING REDIRECTION OF TRAFFIC - A method and a system for analysing traffic on a website are disclosed. The website is arranged on a server and comprises at least two webpages. A plurality of visitors is allowed to visit the website. For each visit navigations and/or actions performed by the visitor during the visit are monitored, while accumulating value points in accordance with content viewed by the visitor and actions performed by the visitor, and in accordance with predefined value point settings associated with content of the website, thereby obtaining an accumulated value point score for the visit. Furthermore, an origin of the visit, leading the visitor to the website, and a landing webpage being the first webpage of the website which the visitor visits when arriving from the origin of the visit, said landing webpage being designated by the origin, are registered. | 12-27-2012 |
20120331130 | Selecting A Network Connection For Data Communications With A Networked Device - Selecting a network connection for data communications with a networked device, including: identifying a plurality of networks available for data communications with the networked device, each network having network connection attributes; and selecting one of the plurality of networks in dependence upon the network connection attributes and the direction of data transfer. | 12-27-2012 |
20120331131 | SYSTEM FOR MANAGING AND TRACKING AN INVENTORY OF ELEMENTS - Embodiments of the invention relate to systems, methods, and computer program products for managing and tracking an inventory of controlled elements, wherein a database comprising a plurality of elements is maintained, an owner is assigned to each element, the relationships between elements are identified and related elements are linked. The elements are then monitored to identify changes to the elements. Any identified change is confirmed, and if material, the owners of related elements are notified of the changes the need to be made to the related elements and the plurality of elements are monitored to determine when all required changes have been made. Once all the required changes are a made, the owners of the identified elements are required to provide final confirmation that no further changes are needed. | 12-27-2012 |
20120331132 | NETWORK MONITORING SYSTEMS FOR MEDICAL DEVICES - A ventilator monitoring system is described for monitoring a plurality of ventilators. In one embodiment, a server including a dedicated ventilator application program for each type of ventilator, monitors a plurality of heterogeneous ventilators over a wireless network. | 12-27-2012 |
20120331133 | REMOTE MONITORING SYSTEM - A method for monitoring and reporting information regarding status of a power supply/management device operated by a user comprises detecting the status of the device using a monitoring device having an application interface configured to communicate over a communication network, generating a status update indication using a self-describing computer language and sending the status update indication over the communication network to a remote computer, and associating the user with the status update information for the remote device using the remote computer. | 12-27-2012 |
20120331134 | INFORMATION CATALOGING - An information cataloging system disclosed herein provides a system and method for inferring relationships between various elements, such as e-mail address, phone number, etc., of various observations, such as business cards, observations obtained from the Internet, etc. The method comprises representing various elements, such as name, e-mail address, etc., using nodes, representing the relations between the various elements using edges connecting these nodes, computing a distance between two disparate nodes, wherein each of the two disparate nodes represent an element related to the entity. An implementation of the information cataloging system disclosed herein also provides a method of calculating noise and signal to noise ratio attached to various nodes and using such noise information in calculating confidence level of relationships between various elements. | 12-27-2012 |
20120331135 | SYSTEM AND METHOD FOR PERFORMANCE MANAGEMENT IN A MULTI-TIER COMPUTING ENVIRONMENT - A method of profiling code executed within a monitored tier of a multi-tier computing system includes the steps of periodically sampling the code executed by processing enclaves of the monitored tier, determining in real-time the periodical sampling overhead, dynamically adjusting the periodical sampling rate, identifying the business context of each code sample, and merging request traffic data and profiling data for presenting to an operator of the multi-tier system. | 12-27-2012 |
20120331136 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, SETTING METHOD, SETTING PROGRAM, AND SETTING CIRCUIT - In order to automatically set information of a maintenance entity group end point device into a communication device only by using periodically transmitted and received supervision frames without the need for a specifically defined frame, a maintenance entity group end point device is equipped with: a receiving unit for receiving supervision frames; a management table for managing identification information of the maintenance entity group end point devices that are transmission sources of the supervision frames; and a registering unit for, in a case that identification information of a maintenance entity group end point device that is a transmission source of a supervision frame received by the receiving unit is not registered in the management table, registering the identification information of the maintenance entity group end point device into the management table. | 12-27-2012 |
20120331137 | METHOD AND APPARATUS FOR ESTIMATING USER CHARACTERISTICS BASED ON USER INTERACTION DATA - An approach is provided for estimating user characteristics based on user interaction data. A characteristics determination logic retrieves an interaction data from a device associated with a use. Next, the characteristics determination logic determines a usage vector from the interaction data. Then, the characteristics determination logic correlates the determined usage vector with one or more predefined characteristics. Then, the characteristics determination logic computes a user characteristics profile based, at least in part, on the one or more correlated characteristics. | 12-27-2012 |
20120331138 | MEDICAL MONITORING METHOD AND DEVICE INTEGRATING CENTRAL MONITORING FUNCTION - A method for realizing a central monitoring server by using an individual patient monitor device is provided, and the patient monitor device ( | 12-27-2012 |
20120331139 | GATEWAY APPARATUS, COMMUNICATION APPARATUS, APPARATUS CO-OPERATION NETWORK SYSTEM, AND APPARATUS CO-OPERATION METHOD - A gateway apparatus for allowing a plurality of apparatuses on a first network to co-operate with each other includes: a message monitoring unit which monitors messages communicated on the first network, and detects an apparatus discovery message for discovering an apparatus that satisfies an arbitrary requirement; an activation state managing unit which checks whether at least one target apparatus among the apparatuses that satisfies the requirement indicated by the apparatus discovery message is in an activated state for communication on the first network; a predicted activation time determining unit which determines a predicted activation time predicted as required to activate the at least one target apparatus; and a proxy response unit which transmits, in proxy of the at least one target apparatus, a response message including information indicating the predicted activation time when the at least one target apparatus is not in an activated state. | 12-27-2012 |
20120331140 | DATA COLLECTION DEVICE HAVING DYNAMIC ACCESS TO MULTIPLE WIRELESS NETWORKS - There is described a data collection device that can incorporate an encoded information reading unit than can operate within a system including an access point that is wireline connected to a server. The encoded information reading unit can include at least one of a bar code reading unit, an RFID tag reading unit and a credit/debit card reading unit. Further incorporated in the data collection device can be dynamic access module. The dynamic access communication module enables the data collection device to participate in a self organized network that supports multi-hop data packet transmissions between data collection devices and which further enables the device to transmit data received from a peer device to the system access point. | 12-27-2012 |
20120331141 | AUTOMATED DIGITAL MEDIA CONTENT FILTRATION BASED ON RELATIONSHIP MONITORING - Automated digital media content filtration is performed by establishing automatically, according to a tolerance parameter, a plurality of user relationships, each user relationship based on monitoring an online association between a user and a content producer. Filtration is also performed by monitoring determined user relationships, interacting with a plurality of independent servers to identify digital media content published by content producers having a user relationship with the user and determining a relevancy weight for each published digital media content item, the relevancy based on a strength factor. Filtration is still further performed by presenting the digital media content published by one or more of the content producers to the user such that digital media content having a greater relevancy weight receives a higher priority than other digital media content available to the user from the plurality of content producers. | 12-27-2012 |
20130007254 | CONTROLLING NETWORK UTILIZATION - Network utilization of an arbitrary application is controlled by tracking network usage statistics of virtual machines (VMs), including at least VMs hosting parts of the application. For network utilization control, VMs serve as network proxies for elements of the application. A specification for a network requirement of the application is evaluated against the network usage statistics. When a network capacity requirement to/from/through an element of the application is not satisfied, one or more VMs are adapted to satisfy the requirement. For example, a VM may be migrated from a host or network location that has excess network bandwidth. Or, for example, network bandwidth availability for an under-requirement VM may be increased and bandwidth availability for a VM at an appropriate host or network location may be decreased. Thus, application-level communication path requirements may be satisfied using VM adaptations. | 01-03-2013 |
20130007255 | Methods, Devices, and Computer Program Products for Providing a Computing Application Rating - A rating is provided for a computing application. Traffic data, power data, and/or network signaling load data is collected for a computing application and compared with other similar data. A rating for the computing application is provided based on the comparison. | 01-03-2013 |
20130007256 | SYSTEM AND METHOD FOR PREDICTING THE GEOGRAPHIC LOCATION OF AN INTERNET PROTOCOL ADDRESS - A system and method for predicting the geographic location of an Internet Protocol (IP) address are disclosed. A particular embodiment of the system and method includes receiving a model to predict a geographic coordinates position of a network device given traceroute information corresponding to an Internet Protocol (IP) address of the network device; receiving traceroute information corresponding to an Internet Protocol (IP) address of one or more beacons without requiring the geographic location of the one or more beacons associated with the traceroute information; generating, by use of a processor, an output model representing one or more predicted geographic coordinates corresponding to the network device based on the model and the traceroute information; and returning a result including the predicted geographic coordinates of the network device. | 01-03-2013 |
20130007257 | FILTER SELECTION AND RESUSE - In general, techniques are described for selectively applying and reusing filters stored in a router. In one example, a method includes receiving a network access request from a first user. The method also includes selecting a candidate rule group associated with the packet flow, wherein the candidate rule group comprises one or more currently deployed rules of an existing rule group on the computing device that are currently installed within a forwarding plane and are being applied by the forwarding plane to network traffic associated with a second user. The method also includes installing a new rule group comprising the one or more currently deployed rules of the existing rule group and one or more new rules associated with the first user and not currently installed within a forwarding plane. The method also includes applying each rule of the new rule group to network traffic associated with the first user. | 01-03-2013 |
20130007258 | Resource configuration change management - Prior to a first configuration change of a first resource, such as a network resource of a network, a processor determines a first performance metric of a second resource, such as a second network resource of the network. The first configuration change does not result in complete failure or fault of the second resource. Subsequent to the first configuration change of the first resource, the processor determines a second performance metric of the second resource and compares the second performance metric to at least one of the first performance metric and a service objective to yield comparison results. Based on the comparison results, the processor can cause a second configuration change of the first resource. The second configuration change of the first resource can revert a configuration of the first resource to its state prior to the first configuration change. | 01-03-2013 |
20130007259 | Characterizing Web Workloads For Quality of Service Prediction - Implementations of the present disclosure provide systems and methods directed to receiving, at a computing device, trace data provided in a trace log file corresponding to a server, parameterizing, using the computing device, a first Markovian Arrival Process (MAP) model based on the trace data, parameterizing, using the computing device, a second MAP model based on the trace data, defining a queuing model that models a performance of the server and that includes the first MAP model and the second MAP model, and storing the queuing model in computer-readable memory. | 01-03-2013 |
20130007260 | ACCESS TO NETWORK CONTENT - A method and system for improving access to network content are described. Aspects of the disclosure minimize the delay between a navigation event and a network response by prerendering the next navigation event. For example, the method and system may predict a likely next uniform resource locator during web browsing to preemptively request content from the network before the user selects the corresponding link on a web page. The methods and systems describe a variety of manners for prerendering content and managing and configuring prerendering operations. | 01-03-2013 |
20130007261 | VIRTUAL DATA CENTER MONITORING - Techniques are provided for monitoring the state or status of virtual data centers. In one embodiment, a method includes receiving state information representing the state of hardware devices supporting instantiations of virtual data centers operating within a physical data center. The state information is mapped to hardware devices supporting a selected instantiation of a virtual data center to identify state information for the selected instantiation of a virtual data center. An assessment is then made, based on the state information for the selected instantiation of a virtual data center, regarding a degree to which the selected instantiation of a virtual data center is operating in accordance with predetermined policy. A user is then notified of the assessment via, e.g., a color-coded dashboard representation of the selected instantiation of a virtual data center or a color-coded aspect of the selected instantiation of a virtual data center. | 01-03-2013 |
20130007262 | MONITORING SYSTEM AND MONITORING METHOD - A monitoring system quantifies either a configuration change or a status change of a monitoring target, and displays a change value thereof. Furthermore, the monitoring target refers to either a monitoring-target apparatus or a component of a monitoring-target apparatus. Moreover, in a case where multiple monitoring information acquisition intervals are used a change value may be computed and displayed for each of multiple monitoring targets. There may also be a case in which a time axis of a chronological graph of monitoring numeric values and a time axis of a chronological graph of change values are displayed collectively. | 01-03-2013 |
20130007263 | Systems and Methods for Estimating Available Bandwidth and Performing Initial Stream Selection When Streaming Content - Systems and methods for determining available bandwidth and performing initial stream selection when commencing adaptive bitrate streaming using Hypertext Transfer Protocol (HTTP) in accordance with embodiments of the invention are disclosed. One embodiment of the invention includes measuring network bandwidth using a playback device, determining an initial network bandwidth estimate using the network bandwidth measurements, selecting an initial stream from said plurality of streams of encoded media that are encoded at different maximum bitrates rates using the playback device based upon the maximum bitrates of the plurality of streams and the initial bandwidth estimate; and commencing streaming of encoded media by requesting portions of the encoded media from the initial streams using the playback device. | 01-03-2013 |
20130007264 | Systems and Methods of Network Analysis and Characterization - Systems and methods for characterizing networks are disclosed. In several embodiments, a network analyzer applies a network analysis to a network that replaces components of the network in a model of the network with equivalent or bounding models. The network analyzer can then characterize the simplified model of the network and an assessment can be made concerning the accuracy of the characterization of the network. | 01-03-2013 |
20130007265 | MONITORING RESOURCES IN A CLOUD-COMPUTING ENVIRONMENT - Provided are a computer program product, system, and method for monitoring resources in a cloud computing environment. A set of cloud resources is provisioned to a user of the cloud-computing environment. A set of private resources is provided for the user, each private resource being provisioned within the set of cloud resources of the user. Monitoring templates are exposed, each one for a corresponding type of a private resource to the user. A user subscription is received to at least one of the monitoring templates, wherein each of the subscribed monitoring templates is for one of the user private resources. A private monitoring agent is provided within the cloud resources of the user housing the private resource of the user to monitor the private resource according to the corresponding selected monitoring template. | 01-03-2013 |
20130007266 | Providing Feedback to Path Computation Element - A Path Computation Client ( | 01-03-2013 |
20130007267 | Proactive Performance Management for Multi-User Enterprise Software Systems - The invention provides, in some aspects, systems for proactive management of development and performance of a software application based on monitoring it (and/or one or more of its components) during the course of development or execution. Those systems signal alerts upon determining that actual or expected usage of the application (or its components) by users of like classes (or roles) is anticipated to, or does, exceed quotas, when the application is placed in production mode. | 01-03-2013 |
20130007268 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 01-03-2013 |
20130007269 | LOAD BALANCING FOR NETWORK SERVER - Embodiments of the invention address deficiencies of the art in respect to load balancing for servers having multiple blades and provide a novel and non-obvious method, system and computer program product for load balancing at the blade level for servers having multiple blades. In one embodiment of the present invention, a blade server for performing load balancing may comprise a plurality of blades, each blade coupled with a plurality of outgoing ports. The blade server may further include a blade management module configured for monitoring throughput performance of the server and the plurality of blades, wherein each blade is coupled with a plurality of outgoing ports, instructing a blade to switch from a first outgoing port to a second outgoing port when throughput performance decreases and instructing the blade to switch from the second outgoing port back to the first outgoing port when throughput performance increases. | 01-03-2013 |
20130007270 | System and Method of Associating Events with Requests - A management system can associate the behavior of backend and application systems with a web site visitor's browsing behavior and activity at a web site. In one embodiment, the management system can time order requests and events from server computers communicatively connected to the management system. Each of these requests and events may contain a time stamp and a user identification. Each event for a user identified by the user identification is associated with a request from that user that is the closest in time to the event according to the time ordering. This can allow more relevant personalized content be sent to the user based on the user's most recent views and/or activity on the web site. | 01-03-2013 |
20130007271 | SYSTEM AND METHOD FOR COMBATING CYBERSQUATTING - A computer-implemented method for combating cybersquatting is provided. The method may comprise receiving a trademark to be monitored for potential typosquatting and generating a list of one or more typo domains for the trademark. The method then collects data associated with the one or more typo domains and prepares a document that includes a subset of the domains with their associated collected data for submission to an administrative agency handling domain disputes. | 01-03-2013 |
20130007272 | CAPACITY OVER-COMMIT MANAGEMENT IN RESOURCE PROVISIONING ENVIRONMENTS - Systems and methods for managing capacity over-commitment in a resource provisioning environment. The method comprising collecting historical data about capacity usage in a resource provisioning environment and failure statistics from an operational database, in addition to prior service commitments due to previously contracted service level agreements (SLAs) stored in a SLA repository; calculating equivalent capacity for the resource provisioning environment based on a defined residual benefit goal, and other business goals instrumented by way of a policy engine; and determining whether placing requested virtual resources on one or more hosts is feasible taking into account anti-collocation constraints that prohibit placement of two or more virtual resources on same host. | 01-03-2013 |
20130007273 | OPTIMIZING RESOURCE CONFIGURATIONS - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to a set of resources. The processing device uses the processed performance metric information to determine a resource configuration to be associated with the set of resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent requests corresponding to the content associated with the set of resources and using each of a variety of alternative resource configurations. The processing device may also consider a number of factors. Aspects of systems and methods for generating recommendations to use a particular resource configuration to process a subsequent request corresponding to the content associated with the set of resources are also provided. | 01-03-2013 |
20130007274 | Method for Analyzing Browsing and Device for Implementing the Method - For analyzing browsing taking place within the framework of a communication session carried by at least one communication interface, said communication session comprising at least one transfer protocol transaction involving a resource locator: a trace is captured on said communication interface; at least one transaction is identified from the trace and each identified transaction is memorized with associated information; each identified transaction is associated with the session it belongs to; for each session, constructing a graph, each node of the graph representing a resource locator and each link of the graph, connecting two nodes, representing a relationship between said two nodes, said relationship relating to a transaction associated with said session and involving the resource locator represented by at least one of said two nodes; and browsing information is derived from at least one of the constructed graphs. | 01-03-2013 |
20130007275 | Managed Unit Device, Self-Optimization Method and System - A managed unit executes a self-optimization according to a self-optimization trigger rule. The self-optimization trigger rule relates to a self-optimization capability supported by the managed unit. The self-optimization capability supported by the managed unit includes any one of or any combination of a self-optimization type, a self-optimization trigger condition, a self-optimization objective, and a self-optimization monitoring cycle. | 01-03-2013 |
20130007276 | METHOD AND APPARATUS FOR IMPROVING SIP PARSE PERFORMANCE - A method and an apparatus are disclosed for improving SIP parse performance. The method comprises the steps of: receiving a text-based SIP message to be sent to a SIP server; according to a SIP message filter table, determining whether the text-based SIP message needs to be transformed to a token-based message; and in the case that the text-based SIP message needs to be transformed to a token-based message, performing the transformation and sending the transformed token-based message to said SIP server, otherwise directly sending the text-based SIP message to said SIP server. According to the present principles, larger SIP message throughput in a SIP server and better utilization of resources of a front end device can be achieved. | 01-03-2013 |
20130007277 | Searching Virtual Resources - A mechanism is provided for searching a virtual resource in a large scale computing system environment. The virtual resource is deployed on at least one server. Each server is coupled to a sensor and communicates with the sensor. The sensors communicate with each other and consist of a communication network. Each sensor stores an identifier of a virtual resource deployed in a server connected with the sensor and the location information of the sensor itself. The mechanism receives a searching request for a virtual resource by the at least one sensor, the searching request containing an identifier of the virtual resource being searched; forwards the searching request in the communication network of the sensors; and returns a location information of a senor storing the identifier of the virtual resource by the sensor itself. | 01-03-2013 |
20130013764 | CONTENT DELIVERY NETWORK AGGREGATION - A content delivery network (CDN) aggregation system is disclosed. A user requesting content from a content provider has his or her DNS request forwarded to a CDN selector. The CDN selector intelligently selects an optimal CDN from amongst a number of partner CDNs to provide the requested content. | 01-10-2013 |
20130013765 | INFORMATION PROCESSING APPARATUS, IMAGE FORMING APPARATUS, INFORMATION PROCESSING METHOD, IMAGE FORMING METHOD, AND COMPUTER READABLE MEDIUM - An information processing apparatus includes an acquiring unit that acquires an information item regarding an operating condition of an image forming apparatus, a first storage controller that stores the information item in a memory, an extracting unit that extracts samples from among the information items stored in the memory in accordance with a predetermined algorithm if an amount of space remaining in the memory is smaller than a predetermined threshold value, where the samples represent results of detection of the operating condition of the image forming apparatus, a statistical unit that computes a statistical value using the samples, a second storage controller that deletes the samples from the memory and stores the statistical value in the memory, and a transmitting unit that transmits the information items to a server via a communication line. | 01-10-2013 |
20130013766 | COMPUTER CLUSTER AND METHOD FOR PROVIDING A DISASTER RECOVERY FUNCTIONALITY FOR A COMPUTER CLUSTER - A computer cluster includes: a first compartment, further including a plurality of first physical nodes configured to provide first resources for guest virtual instances, each of the plurality of first physical nodes further including a mass storage device, the mass storage device further including: a first partition provided for booting the first physical node; and a second partition as part of the first resources; and a second compartment, further including a plurality of second physical nodes configured to provide second resources for guest virtual instances, each of the plurality of second physical nodes further including a mass storage device, the mass storage device including: a third partition provided for booting the second physical node; and a fourth partition as part of the second resources. The first and the second physical nodes are further configured to provide third resources for a plurality of storage management processes. | 01-10-2013 |
20130013767 | SYSTEM AND METHOD FOR MANAGING SOFTWARE PROVIDED AS CLOUD SERVICE - Provided is a system and method for managing software provided as a cloud service. At least one service provider cloud provides an operating environment for one or more software instances; The software instances are in communication with to a management agent module at the at least one service provider cloud. A software instance of the one or more software instances provides a cloud service to a processing device constructed and arranged as a service consumer device. A software management module manages the software instance. The management agent module sends status information of the software instance to the software management module via a network. The software management module sends control information to the management agent module, which processes the control data, permitting the software management module to control the software instance. | 01-10-2013 |
20130013768 | CUSTODIAN MANAGEMENT SYSTEM - Embodiments of the invention relate to systems, methods, and computer program products for the management of custodians within an electronic discovery system. Embodiments of the invention herein disclosed provide for methods of creating, maintaining, and utilizing a unified custodian directory for the purposes of carrying out electronic discovery within an enterprise environment. By employing a unified custodian directory to manage custodians apart from the electronic discovery cases to which they relate, the custodian management system of the present invention promotes efficiencies in the field of electronic discovery. | 01-10-2013 |
20130013769 | DETERMINING HEAVY DISTINCT HITTERS IN A DATA STREAM - A data traffic monitor for determining a heavy distinct hitter (HDH) in a data stream, the data stream comprising a plurality of element-value (e,v) pairs, includes a HDH module, the HDH module configured to receive the plurality of (e,v) pairs from the data stream; and a counter block in communication with the HDH module, the counter block comprising a plurality of hash functions, and further comprising a respective pair of distinct counting primitives associated with each hash function of the plurality of hash functions, wherein each of the plurality of (e,v) pairs is added to one of the distinct counting primitives of the respective pair of distinct counting primitives for each of the plurality of hash functions in each of the plurality of counter blocks. | 01-10-2013 |
20130013770 | METHODS AND APPARATUS TO COLLECT BROADBAND MARKET DATA - Example methods and apparatus to collect broadband market data are disclosed. A disclosed example method includes selecting a panelist household, the panelist household subscribing to at least one broadband service delivered via a modem, and identifying an Internet protocol (IP) address assigned to the modem by an Internet service provider (ISP). The example method also includes retrieving a range of IP addresses associated with the ISP, selecting a random subset of IP addresses from the range of IP addresses, and testing each of the IP addresses from the random subset to determine an activity status of each IP address. | 01-10-2013 |
20130013771 | SESSION INITIATION PROTOCOL (SIP) OVERLOAD PROTECTION - A device receives a Session Initiation Protocol (SIP) response that includes a load header associated with a downstream Session Initiation Protocol (SIP) device. The device also determines an amount of traffic to send to the downstream Session Initiation Protocol (SIP) device based on the load header. The device further sends the determined amount of traffic to the downstream Session Initiation Protocol (SIP) device. | 01-10-2013 |
20130013772 | PROVIDING CUSTOMIZED INFORMATION TO A USER BASED ON IDENTIFYING A TREND - To provide customized information to the user, a wireless communications network node receives a stream of data associated with a user. A first trend associated with at least a first attribute in the stream of data is identified, and based on the identified first trend, customized information is sent for presentation to the user at a mobile station. | 01-10-2013 |
20130013773 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MANAGING A MULTI-TENANT DATABASE SYSTEM - More efficient querying of a multi-tenant database using dynamic tuning of database indices. A layer of meta-data associates data items with tenants, e.g., via tags, and the meta-data is used to optimize searches by channeling processing resources during a query to only those pieces of data bearing the relevant tenant's unique tag. | 01-10-2013 |
20130013774 | Identification of Critical Web Services and their Dynamic Optimal Relocation - A web service executing on a web server is monitored by detecting metadata generated for various performance characteristics of the web service. A relocation policy is consulted in response to detecting the performance characteristics exceeding a first predetermined threshold. The relocation policy specifies a target web server as a new location for the web, and instructions for relocating the web service to the target web server if the performance characteristics exceeding a second predetermined threshold. The web service is relocated to the target web server based on the relocation policy and without human intervention. | 01-10-2013 |
20130013775 | OPTIMIZING CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a CDN service provider for alternatively hosting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative CDN service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of CDN service providers with respect to specific resource requests are also provided. | 01-10-2013 |
20130013776 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION STORAGE MEDIUM - Disclosed is an information processing device which detects a difference in environment so as to make a change to an information collection function, thereby performing information collection with excellent universal applicability. The information processing device includes a receiver unit which receives collected information collected by a terminal for information collection from the terminal for information collection, and a terminal administration unit which generates or selects executable software to be executed by the terminal for information collection at the time of information collection after the collection on the basis of the collected information received by the receiver unit, and provides the executable software to the terminal for information collection. | 01-10-2013 |
20130019004 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DERIVING USER AVAILABILITY FROM USER CONTEXT AND USER RESPONSES TO COMMUNICATIONS REQUESTSAANM Sylvain; DanyAACI QuebecAACO CAAAGP Sylvain; Dany Quebec CA - Disclosed herein are methods, systems, and computer readable media for deriving user availability from user context and user responses to communications requests. According to an aspect, a method includes monitoring communications requests. Each of the communications requests may include a request for conducting a communication session between a requesting user and a requested user. The method may also include monitoring user responses to the communications requests. Further, the method may include determining user contexts for the requested user corresponding to each of the communications requests communicated to the requested user. The method may include determining an indication of user availability for the requested user based on the user responses and the corresponding user contexts. The method may also include providing the indication of user availability to one or more authorized users. | 01-17-2013 |
20130019005 | EFFICIENT ADMISSION CONTROL FOR LOW POWER AND LOSSY NETWORKSAANM Hui; Jonathan W.AACI Foster CityAAST CAAACO USAAGP Hui; Jonathan W. Foster City CA USAANM Vasseur; Jean-PhilippeAACI Saint Martin DuriageAACO FRAAGP Vasseur; Jean-Philippe Saint Martin Duriage FRAANM Ganesan; KarthikeyanAACI CampbellAAST CAAACO USAAGP Ganesan; Karthikeyan Campbell CA USAANM Jayaraman; VikramAACI CampbellAAST CAAACO USAAGP Jayaraman; Vikram Campbell CA US - In one embodiment, a centralized network management server (NMS) determines a network state of a low power and lossy network (LLN) based on resource utilization due to traffic in the LLN. The NMS also determines an admission state based on the network state, and admission control (network-wide and/or localized control) based on the admission state. As such, the centralized NMS can then administer the admission control for all nodes in the LLN, where network-wide control comprises a single control command to all nodes in the LLN, and the nodes direct admission based on the control command, and where localized control comprises a request-response exchange between the nodes and the centralized NMS, and the NMS directs admission on a per-request basis. | 01-17-2013 |
20130019006 | MANAGING PROCESS LOGSAANM Drittler; BernhardAACI WalldorfAACO DEAAGP Drittler; Bernhard Walldorf DEAANM Nolte; Jens-ChristophAACI SandhausenAACO DEAAGP Nolte; Jens-Christoph Sandhausen DEAANM Schmitt; BerndAACI WaldbronnAACO DEAAGP Schmitt; Bernd Waldbronn DE - Systems, methods and techniques relating to managing process logs are described. A described technique includes identifying an end-to-end business process from a first system; identifying a plurality of systems that execute at least a portion of the end-to-end business process based on a definition of the end-to-end business process within the process registry; identifying a plurality of local process logs associated with the end-to-end business process for the a plurality of systems as defined by the process registry; and generating a federated process log based on at least a portion of each of the a plurality of local process logs. | 01-17-2013 |
20130019007 | FUNNEL ANALYSIS OF THE ADOPTION OF AN APPLICATIONAANM MUKUNTHU; DEEPAKAACI HyderabadAACO INAAGP MUKUNTHU; DEEPAK Hyderabad IN - A funnel approach is used to analyze the behavior of users in adopting a software application offered through an electronic store. The electronic store may include an electronic store client module that provides a virtual electronic store front to users interested in licensing software applications offered by the electronic store. The electronic store may utilize a server that stores the applications store as well as collect instrumentation data representing user's actions in progressing through the various stages of adoption. | 01-17-2013 |
20130019008 | METHOD AND SYSTEM FOR MONITORING PERFORMANCE OF AN APPLICATION SYSTEMAANM Jorgenson; LokiAACI VancouverAACO CAAAGP Jorgenson; Loki Vancouver CAAANM Pang; Alfred Yu-HanAACI VancouverAACO CAAAGP Pang; Alfred Yu-Han Vancouver CA - A method for monitoring performance of an application system which is distributed across a plurality of network connected nodes, comprising: generating a hierarchical model for the application system, the hierarchical model having a plurality of levels, each level including components of a span specific to that level; mapping the application system onto the hierarchical model according to a network topology of the application system; monitoring network traffic between the plurality of network connected nodes of the application system to gather network traffic data; assembling the network traffic data into application messages; correlating the application messages into sets of one or more application messages that are causally associated in accordance with the hierarchical model, wherein the sets of causally associated application messages constitute transactions corresponding to a lowest level of the hierarchical model; and, generating records of individual transactions occurring within the application system for at least the transactions corresponding to the lowest level of the hierarchical model. | 01-17-2013 |
20130019009 | METHOD AND SYSTEM FOR SUBSCRIBER JOURNEY ANALYTICS - The present method and system relate to analyzing journeys of at least one subscriber consuming a plurality of Internet services, using at least one device over multiple access technologies. The method and system store in a database, for each subscriber, a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The method and system collect, by means of multiple monitoring probes, real time data from IP traffic; and extract information from the collected real time data, the information comprising one of the unique identifiers. The information is transmitted to an analytic system, where it is aggregated per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. For each subscriber, a journey is generated, by processing the aggregated information with the analytic system. | 01-17-2013 |
20130019010 | Web-beacon plug-Ins and their certification - Tools and techniques are provided to allow partners of analytics providers and others who use web-beacons to submit web-beacon plug-ins for scrutiny, and for the plug-in to either be refused or else to be certified for use in a core JavaScript file or similar component. Analytics providers and others may also write web-beacon plug-ins. Certified plug-ins are executed in response to page loads, visitor clicks, and other visitor and programmatic actions at a website that has been tagged by the analytics provider's web-beacon, without requiring re-tagging of the website with a separate web-beacon for the partner. This allows the partner to obtain analytics data by piggybacking on the analytics provider, without re-tagging, and without compromising the availability and accuracy of the analytics data already being gathered. To be certified, web-beacon plug-ins must satisfy specific criteria as to their size, behavior, namespace, and the like. | 01-17-2013 |
20130019011 | POLICY-DRIVEN CAPACITY MANAGEMENT IN RESOURCE PROVISIONING ENVIRONMENTS - Systems and methods for policy-driven capacity management in a resource provisioning environment, the method comprising storing, in an operational database one or more virtual resource sets (VRSs) and elasticity ranges for components to be deployed in a resource provisioning environment, and probabilistic guarantees on the elasticity ranges defined in a service manifest provided by a service subscriber; collecting historical data about capacity usage in the resource provisioning environment and failure statistics from the operational database, in addition to prior service commitments due to previously contracted service level agreements (SLAs) stored in a SLA repository; calculating equivalent capacity for the resource provisioning environment based on a defined residual benefit goal, and other business goals instrumented by way of a policy engine; and placing requested virtual resources on physical resources, in response to determining that sufficient physical capacity is available to host the calculated equivalent capacity. | 01-17-2013 |
20130024559 | Automatic Zone-Based Management of a Data Center - Automatic zone-based management of a data center. Nodes are assigned to a first zone. One of the nodes is selected as zone leader. A load ratio of the zone leader is monitored, nodes are identified for shedding if the load ratio exceeds a predetermined maximum, and the identified nodes are assigned to a new zone. One of the nodes in the new zone is selected as zone leader. The load ratio of each zone leader is monitored, nodes are identified for shedding if the load ratio exceeds a predetermined maximum, and the identified nodes are assigned to an additional new zone, the zone leaders negotiate for reassignment of loads. | 01-24-2013 |
20130024560 | CENTRALLY DRIVEN PERFORMANCE ANALYSIS OF LOW POWER AND LOSSY NETWORKS - In one embodiment, a centralized device for a computer network divides the computer network into one or more regions for which performance is to be measured, and selects one or more nodes within each respective region of the one or more regions. The centralized device may then send a performance measurement request (PMR) to the selected node(s) for each region, and receives measured performance reports from the selected node(s) for each region in response to the PMR. Accordingly, based on the measured performance reports, the centralized device may then adjust at least one of either the divided regions or the selected node(s) for one or more of the one or more regions, e.g., for future PMRs. | 01-24-2013 |
20130024561 | APPARATUS AND METHOD FOR DETERMINING ROUTE, COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN MANAGEMENT PROGRAM, AND MANAGEMENT DEVICE - An apparatus for determining a route including: a collector that collects a current amount of link traffic and current link power consumption of each link; a virtual link setter that sets virtual links for each link; a link cost calculator that calculates a link cost of each virtual link based on the estimated increase in the link power consumption; a constraint condition setter that creates a constraint condition satisfying a requirement of end-to-end quality of a request flow based on change in quality of each virtual link and satisfying a requirement of end-to-end quality of an existing flow based on the change in quality of the existing flow on the virtual link; a route determinator that determines a route having a smallest sum of the link costs including a plurality of the virtual links satisfying the created constraint condition. | 01-24-2013 |
20130024562 | NETWORK ANALYSIS - A method of analyzing a network is disclosed that may include a plurality of interconnected network components, and a network model with component configuration data for each of the network components and component interconnection data for each connection between network components. The method may also comprise selectively altering component configuration data for a first network component, or selectively altering component interconnection data for a first connection, thereby selectively altering a modeled state of the first network component or the first component connection within the network model, propagating the effect of such altering of a modeled state throughout the network model in dependence upon configuration data and interconnection data relating to the first network component and in dependence upon such data relating to other connected network components, monitoring the effect of said propagation on other network components within the network model. Also disclosed is a system for analyzing a network. | 01-24-2013 |
20130024563 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, SERVER EQUIPMENT, AND COMMUNICATION EQUIPMENT - A communication equipment notifies a server equipment of a communication port to which a communication cable is connected. If another communication port as a connection partner of the notified communication port is not yet connected to the communication cable, the server equipment transmits a first notification instruction to another communication equipment having the said another communication port. The said another communication equipment indicates, in a viewable manner, a communication port corresponding to the first notification instruction as a communication port to which the communication cable is required to be connected. | 01-24-2013 |
20130024564 | MONITORING AGENT PROGRAMS IN A DISTRIBUTED COMPUTING PLATFORM - Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed computing platform and for indexing and analyzing the information within a data store are provided. Monitoring involves a monitoring agent that is integrated within an operating system of computing devices that make up the distributed computing platform. In operation, the monitoring agent retrieves information from the role instances and converts the information into parameters that are assembled to documents. Generally, the parameters are assembled to a uniform-structured format in accordance with a schema imposed by the distributed computing platform. Accordingly, each of the documents across the platform have a common format that promotes processing and analysis without a need for reconfiguration. Accordingly, the health of the service application, although dispersed throughout the distributed computing environment, may be observed and evaluated in a consistent manner. | 01-24-2013 |
20130024565 | System and Method to Publish Information from Servers to Remote Monitor Devices - To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page. | 01-24-2013 |
20130024566 | DETECTION OF LINK CONNECTIVITY IN COMMUNICATION SYSTEMS - A method of commencement of operation of a communication system such as an Ethernet OAM system comprises enabling an endpoint (A) to transmit and receive repetitive connectivity check messages on a link between the endpoint and a remote endpoint (B); determining a loss of connectivity with the remote endpoint by the absence of received connectivity check messages within a monitoring interval; and delaying the commencement of said monitoring interval until a predetermined number of valid connectivity check messages has been received. The invention may be implemented by means of a counter ( | 01-24-2013 |
20130024567 | NETWORK MONITOR - A computer network monitoring controller for monitoring the performance of a plurality of virtual machines in a cloud computing environment, each virtual machine being a set of resources hosted on a hardware platform and arranged to appear as a real hardware to a client, the virtual machines being allocated and generated by a management system, the monitoring controller comprising: a plurality of interfaces, each one connected to a monitoring system having links to at least one of the virtual machines, and each monitoring system being arranged to capturing event messages relating to the status of the virtual machine and outputting these event messages in a monitoring system specific format; an data store for storing event messages received from each of the monitoring systems via the interfaces; a receiver for receiving monitoring requests from said management system, each request specifying monitoring requirements relating to at least one of the virtual machines; a converter for converting the messages from the monitoring systems into a common format for storage in the event log; a processor for processing the received requests and matching the requirements to event messages received from the plurality of virtual machines; and a sender for sending matched event messages to the management system in the common format. | 01-24-2013 |
20130024568 | MANAGEMENT COMMUNICATION - The present invention relates to methods and apparatus for improving management communication. One or more performance parameter measurements may be received by a throughput optimisation system wherein the one or more performance parameters relate to one or more communication links between one or more management applications and one or more managed entities, and the one or more performance parameters provide an indication of a performance of the one or more communication links. The throughput optimisation system may adapt one or more system parameters for the one or more management applications which are performing one or more active management tasks based on the received one or more performance parameters relating to the one or more communication links. | 01-24-2013 |
20130031237 | NETWORK COMPONENT MANAGEMENT - A network component management system includes a first network element and a second network element. The second network element is at a customer location and is configured to communicate with the first network element over a communication network. A computing device is configured to communicate with the first and second network elements over the communication network and includes a visibility tool configured to actively monitor the second network element and present a status of the second network element. The status of the second network element indicates whether the second network element is provisioned and able to communicate over the communication network. A method includes querying the network element, determining the status of the network element, presenting the status, and initiating a troubleshooting procedure if the network element is not provisioned or is unable to communicate over the communication network. | 01-31-2013 |
20130031238 | HEALTH AND WELFARE MONITORING OF NETWORK SERVER OPERATIONS - Methods, systems and computer program products for monitoring and analysis of network servers and web analytics programs are disclosed. A monitoring program, for example, is configured to monitor the status of web analytics program(s) associated with one or more network servers. The monitoring program may monitor server-specific metrics such as server free disk space, server available memory, server on-line/off-line status, report processing time, difference between system time and log file time, table size details, etc. The program may be configured to present status indicators to the user that are indicative of the health of the web analytics program and/or server. A user may receive an alert generated by the monitoring program regarding a change in web analytics program status. Additionally, the monitoring program may be configured to automatically take corrective action to remedy or prevent a critical event that may cause loss of data or delay web analytics reporting. | 01-31-2013 |
20130031239 | DATA COMMUNICATION METHOD AND APPARATUS - There is provided a method of scheduling requests from a plurality of services to at least one data storage resource. The method comprises receiving, on a computer system, service requests from said plurality of services. The service requests comprise metadata specifying a service ID and a data size of payload data associated with said service request, and at least some of said service IDs have service throughput metadata specifying a required service throughput associated therewith. The method further includes arranging, in a computer system, said requests into FIFO throttled queues based on said service ID and then setting a deadline for processing of a request in a throttled queue. The deadline is selected in dependence upon the size of the request and the required service throughput associated therewith. Then, the deadline of each throttled queue is monitored and, if a request in a throttled queue has reached or exceeded the deadline the request is processed in a data storage resource. | 01-31-2013 |
20130031240 | Capacity Evaluation of Computer Network Capabilities - A method and apparatus are provided for evaluating the capacity of a capability enabled by network devices in a computer network. The method includes identifying a network capability enabled by one or more network devices, monitoring a plurality of hardware resources of the one or more network devices during implementation of one or more instances of the identified network capability and capturing respective device-specific metrics representative of a utilization level of each of the plurality of hardware resources during implementation of the one or more instances. The method also includes identifying which one of the plurality of hardware resources is most limiting for a remaining capacity of the identified network capability, calculating, based on the hardware resource that is most limiting for the remaining capacity of the identified network capability, a maximum remaining capacity for additional instances of the identified network capability, and providing an indication of the maximum remaining capacity of the identified network capability. | 01-31-2013 |
20130031241 | DISTRIBUTED SERVICE INSTANTIATION FOR INFORMATION-CENTRIC NETWORKS - An exemplary communication device includes a node having a processor configured to instantiate a service at the node responsive to the processor determining that the node is a superior instantiation candidate relative to a next upstream node on a downstream path of the service. An exemplary method of communicating includes instantiating a service at a node responsive to the node determining that the node is a superior instantiation candidate relative to a next upstream node on a downstream path of the service. | 01-31-2013 |
20130031242 | QUANTITATIVE MANAGEMENT ASSESSMENTS OF DATA COMMUNICATION NETWORKS WITH CONVERGED ARCHITECTURES - Techniques for quantitative converged network assessment are described. Performance information, associated with network infrastructure elements and application or service elements of a computer network, is received. One or more key performance indicators of a reference network architecture are compared with at least a portion of the performance information. A plurality of first scores is determined based on the comparison of the one or more key performance indicators and at least a portion of the performance information. Based on the plurality of first scores, a single second score is determined that indicates a converged state of the computer network with respect to the reference network architecture. | 01-31-2013 |
20130031243 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR SELF-LEARNING INTERACTIVE COMMUNICATIONS PRIVILEGES FOR GOVERNING INTERACTIVE COMMUNICATIONS WITH ENTITIES OUTSIDE A DOMAIN - Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside and outside a domain. The requested interactive communications are allowed if the interactive communications privileges configured for the entity outside the domain allow for the requested interactive communications. The interactive communications privileges are determined in an automated, self-learning manner in response to monitoring communication interactions between the entities inside and outside the domain. In this manner, the interactive communications privileges are not required to be provisioned and maintained by an administrator. The interactive communications privileges can be determined by gathering insight about the entities outside the domain. Insight about an entity outside the domain is information that is useful in determining which interactive communications privileges to configure for an entity outside the domain. | 01-31-2013 |
20130031244 | Greening the Network with the Power Consumption Statuses of Network Components - In an embodiment, the disclosure includes an apparatus comprising a data store which comprises cost data associated with use of a path in a communications network. The data store also comprises power consumption data associated with the use of the path. The apparatus further comprises at least one processor configured to determine a score for the path based on the cost data and the power consumption data. The disclosure also includes an apparatus comprising a path computation element (PCE) configured to receive data from a plurality of network elements (NEs). The data comprises cost and power consumption data for establishing a path between a plurality of the NEs. The PCE is configured to determine a score for the path based on the cost and power consumption data. | 01-31-2013 |
20130031245 | GENERATING A CONFIGURATION FILE BASED UPON AN APPLICATION REGISTRY - A system and method are provided for generating a configuration file based upon an application registry. The method, for example, includes, but is not limited to, determining, by a processor, which users are logged into the server that are associated with a predetermined group, determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running, and generating, by the processor, the configuration file based upon which applications each user is running and storing the registry file in a memory. | 01-31-2013 |
20130031246 | NETWORK MONITORING CONTROL APPARATUS AND MANAGEMENT INFORMATION ACQUISITION METHOD - A network monitoring control apparatus includes: a traffic information acquisition unit to acquire traffic information of a network component included in a network; a decision information switching unit to set decision information for the network component based on a comparison result between the traffic information and one of a congestion decision threshold and a congestion recovery decision threshold of the network component; and a management information acquisition unit to acquire management information of the network component based on the decision information. | 01-31-2013 |
20130031247 | GENERATING DISPERSED STORAGE NETWORK EVENT RECORDS - A method begins by a dispersed storage (DS) processing module collecting an event record, a record regarding processing of an event request, and a plurality of records regarding processing of a plurality of sub-event requests to produce a collection of records. The event record includes information regarding an event, wherein the event is a user access operation or a system administrative operation initiated by a device affiliated with the DSN. The record regarding processing of the event request includes information regarding a dispersed storage (DS) processing module of the DSN processing the event request to produce the plurality of sub-event requests. The plurality of records regarding processing of the plurality of sub-event requests includes information regarding a plurality of DS units of the DSN processing the plurality of sub-event requests. The method continues with the DS processing module evaluating the collection of records to produce performance information regarding the DSN. | 01-31-2013 |
20130031248 | NODE DETECTION APPARATUS, NODE DETECTION METHOD AND COMPUTER READABLE MEDIUM - There is provided a node detection apparatus including: an acquisition section that acquires address information of communication equipment managed by a DNS server; an operation confirmation section that confirms operations of the communication equipment based on the address information acquired by the acquisition section; and a node registration section that registers the communication equipment having the address information acquired by the acquisition section as an operating node, based on a result of the operation confirmation by the operation confirmation section. | 01-31-2013 |
20130031249 | SYSTEM AND METHOD FOR SERVICING FIELD DEVICES IN AN AUTOMATION PLANT - A system for servicing field devices in an automation plant, comprising: a computing unit, which accesses the field devices via a communications network; a communications hardware; a server; an interpreter for electronic device descriptions; and a software component. The server, the interpreter for the electronic device descriptions and the software component are associated with the communications hardware. The software component, upon the occurrence of an event, identifies, by means of scanning, or polling, the field devices arranged in the communications network and utilizes the identification of the field devices, in order to activate corresponding electronic device descriptions in the interpreter and to provide correspondingly prepared information via the server to the computing unit for the purpose of servicing the field devices. | 01-31-2013 |
20130031250 | APPARATUS, METHOD AND SYSTEM FOR IMPROVING APPLICATION PERFORMANCE ACROSS A COMMUNICATIONS NETWORK - An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources. | 01-31-2013 |
20130031251 | COMPLEX EVENT PROCESSING SYSTEM AND METHOD - A complex event processing system comprises a complex event processing engine ( | 01-31-2013 |
20130036216 | SYSTEM AND METHOD FOR OPTIMIZED EVENT MONITORING IN A MANAGEMENT ENVIRONMENT - In accordance with the present disclosure, a system and method for optimizing event monitoring in a management environment is disclosed. The system may include a management system, an agent system, an intermediate management module and an event generation engine. The intermediate management module may create a device object in the management system corresponding to the agent system. The event generation engine may convert a transmission from the agent system into a pre-determined event structure and inject the event structure into the device object. The intermediate management module may then generate an alert in response to the injection of the event structure. | 02-07-2013 |
20130036217 | NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center. | 02-07-2013 |
20130036218 | Monitoring Tool Deployment Module and Method of Operation - A monitoring tool deployment module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring deployment requests, each monitoring deployment request identifying one or more monitoring tools to be deployed for one or more monitoring targets. The memory is coupled to the interface and stores the plurality of monitoring deployment requests in a queue based at least in part upon the order that the monitoring deployment requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring deployment requests stored in memory, and determines a monitoring tool to be used based at least in part upon the particular monitoring deployment request. The processor further determines a monitoring target based at least in part upon the received monitoring deployment request, and executes commands to initiate the deployment of the determined monitoring tool for the determined monitoring target. | 02-07-2013 |
20130036219 | Monitoring Tool Auditing Module and Method of Operation - A monitoring tool auditing module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring audit requests, each monitoring audit request identifying one or more monitoring targets to be audited. The memory is coupled to the interface and stores the plurality of monitoring audit requests in a queue based at least in part upon the order that the monitoring audit requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring audit requests stored in memory and determines a monitoring target to be audited based at least in part upon the particular monitoring audit request. The processor determines a plurality of monitoring tools that are deployed at the determined monitoring target, and determines status information for each determined monitoring tool deployed at the determined monitoring target. The processor further determines configuration information for each determined monitoring tool deployed at the determined monitoring target. | 02-07-2013 |
20130036220 | Apparatus and Method for Implementing Point to Point Protocol Data Service Link-Disconnect - An apparatus and method for implementing Point to Point Protocol (PPP) data service link disconnection are disclosed in the present invention. The apparatus is set in a terminal and comprises: a detection module, a processing module and a link disconnection module, wherein, the detection module is used for detecting the state of a Personal Computer (PC) connected with the terminal when the terminal performs the PPP data service in a dormant state, and notifying the processing module when determining that the PC is currently in an unavailable state; the processing module is used for sending a link disconnection request to the network side when knowing that the PC in the unavailable state, and triggering the link disconnection module when receiving a link disconnection request acknowledgement from the network side; the link disconnection module is used for disconnecting the PPP link carrying the PPP data service. | 02-07-2013 |
20130036221 | APPARATUS, METHOD AND SYSTEM FOR IMPROVING APPLICATION PERFORMANCE ACROSS A COMMUNICATIONS NETWORK - An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources. | 02-07-2013 |
20130036222 | INHERITABLE DIMENSIONS IN A SERVICE MODEL - A performance management tool is provided that monitors performance in a computing infrastructure in a computing environment. The performance management tool includes a service model that represents the computing infrastructure. The service model is a hierarchical tree structure comprised of a plurality of linked nodes, where each node in the tree structure represents a component of the computing infrastructure and has one or more properties of the component assigned thereto. Each node further includes an inheritance rule which defines how properties assigned to other nodes are inherited by the component. A dimension indexer module is configured to receive a request for properties associated with a particular node and operates to retrieve properties for the particular node from the tree structure, including at least one property not assigned to the particular node but inherited from another node in the tree structure in accordance with the inheritance rule assigned the particular node. | 02-07-2013 |
20130041998 | DELIVERY QUALITY OF EXPERIENCE (QoE) IN A COMPUTER NETWORK - An apparatus generally having an interface and a circuit is disclosed. The interface may be connectable to a network to monitor a media program streaming across the network to a media client. The circuit may be configured to (i) generate first information by modeling a buffer of the media client, the first information being representative of a plurality of events related to the buffer during a playback of the media program and (ii) generate a signal representative of a quality of experience of the media program in response to the first information. | 02-14-2013 |
20130041999 | DETERMINING INFORMATION ABOUT A COMPUTING SYSTEM - In a method for determining information about a computing system, a designated process in the computing system is monitored. A determination whether a selected event has occurred in the designated process is made. State information and configuration information regarding the computing device is collected in response to a determination that the selected event has occurred. Meta information associated with the designated process is determined in response to a determination that the selected event has occurred. The state information, the configuration information and the meta information is recorded in an accessible file. | 02-14-2013 |
20130042000 | CONFIGURATION INFORMATION MANAGEMENT SERVER, CONFIGURATION INFORMATION MANAGEMENT METHOD AND CONFIGURATION MANAGEMENT PROGRAM - A configuration information management server that can correlate information collected from a virtual server to information collected from a physical server is provided. More specifically, when test load corresponding to a characteristic load pattern is generated in a server whose dependency relationship is to be analyzed, the configuration information management server refers to load information collected from all servers of a system, identifies a server in which the characteristic load pattern is measured, and thereby identifies a physical server and a virtual server having a dependency relationship, obtains correspondence of the physical server information and the virtual server information, and stores it in a configuration information management database. | 02-14-2013 |
20130042001 | EVENT QUEUES - Described are techniques for communicating between one or more producers and one or more consumers. A first consumer of an event queue registers for notification regarding occurrences of one or more events. A producer of the event queue posts one or more notifications to one or more consumers of the event queue regarding one or more occurrences of one or more events. Each of the consumers receive notification regarding occurrences of events for which said each consumer is registered. The first consumer retrieves posted event notifications regarding events for which said first consumer is registered. If the first consumer is executing in user space and an event notification list to which said event notifications for said first consumer are posted is located in shared memory, said first consumer retrieves said posted event notifications without proxying into kernel space. | 02-14-2013 |
20130046878 | ASYNCHRONOUS REQUEST INTERCEPTION FOR TESTING A REQUEST LIFE-CYCLE - Methods and systems for asynchronous request interception for testing a request life-cycle are described. In one embodiment, a proxy object intercepts an asynchronous request directed to an original object used to implement a network communication interface for an application, having a client-side application and a server-side application. The proxy object is configured to allow a test entity to verify the application during a request life-cycle of the asynchronous request. The proxy object gives control to the test entity and receives permission back to further process the asynchronous request. The proxy object sends the asynchronous request to the original object when the permission is received. | 02-21-2013 |
20130046879 | Server-Initiated Bandwidth Conservation Policies - In one embodiment, a social networking system maintains a moving average of the number of connection problems, including socket timeouts and failed uploads, per client in a geographic area to determine whether the wireless data network serving the geographic area is overloaded. In response to detecting a network overload, the social networking system may transmit an instruction to the clients in the particular geographic area to enter one of a plurality of traffic throttling modes. In particular embodiments, the social networking system maintains a historical log of network overload conditions, and uses the historical log to generate an estimate of the wireless network capacity serving a geographic area. Thus, the social networking system may preemptively transmit instructions to clients to enter a bandwidth-conservation mode when the estimated traffic demand exceeds the estimated capacity for a particular geographic region. | 02-21-2013 |
20130046880 | SYSTEM AND METHOD FOR PROVIDING REDIRECTIONS - A redirection of a URL page request may be performed by monitoring an upstream path from a subscriber to the internet through an ISP. When a URL page request is detected from a subscriber for whom a redirection is required, a redirection device generates a single TCP packet response that mimics a response from the intended destination server. The single TCP packet includes a set FIN bit that closes any active session with the destination server to prevent the subscriber from accepting packets from the destination server. | 02-21-2013 |
20130046881 | Method and Apparatus For Network Device Detection - A method and apparatus for detecting remote network devices. In one embodiment, the method comprises detecting an event and a) transmitting a message requesting a response from one or more remote network devices, the message comprising a first network identification code, and b) determining whether a response to the message has been received, the response transmitted by a remote network device after receiving the message and determining that the first network identification code matches a second network identification code stored within the remote network device, the response comprising identification information of the remote network device. If c) a response has not been received, terminating the method for detecting remote network devices if a pre-determined time period has elapsed since transmitting the message. If d) a response has been received, storing identification information associated with the responding remote network device and repeating steps a-d until no further responses are received. | 02-21-2013 |
20130046882 | COMMUNICATION CONTROL SYSTEM AND COMMUNICATION CONTROL METHOD - In the case of a system where a communication device is remote-controlled from a control server, depending on timing when an entry is written into a forwarding table of the communication device from the control server, there is a possibility that a loop and discard of the traffic occur. Therefore, for registration, rewriting and deletion of the entry of the forwarding table which are performed on the communication device | 02-21-2013 |
20130046883 | End-to-End Content Delivery Network Incorporating Independently Operated Transparent Caches and Proxy Caches - Some embodiments provide an end-to-end federated CDN solution that assimilates a transparent caching server that is operated by a transparent caching server operator into a CDN that independently operates CDN caching servers. Specifically, the logs from the transparent caching server are assimilated into the CDN by aggregating the logs from the transparent caching server and processing the transparent caching server logs to identify network usage for content of a CDN content provider customer that is delivered by the transparent caching server. The network usage is then combined with the network usage that tracked by the CDN caching servers in order to provide comprehensive report metrics for the content provider customer and to bill the content provider customer for all network usage related to delivering the content provider customer's content irrespective of whether the content was delivered by a transparent caching server or a CDN caching server. | 02-21-2013 |
20130046884 | INTEGRATED ASSET TRACKING, TASK MANAGER, AND VIRTUAL CONTAINER FOR DATA CENTER MANAGEMENT - The present invention provides for the integration of a an infrastructure management software (IMS) asset tracking system, an IMS task manager (ITM) and an IMS virtual container or virtual container feature to alleviate issues such as personnel scheduling issues, lost asset issues and service outages within a data center. | 02-21-2013 |
20130046885 | System and Method for Performing Capacity Planning for Enterprise Applications - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data. | 02-21-2013 |
20130046886 | Controlling a Network Connection Status Indicator - This disclosure describes techniques for restricting activity of a status indicator if a received data unit is determined to be a protocol control unit that is selected for filtering. In one embodiment, a method is described that comprises receiving a data unit from a network, determining whether the received data unit is a protocol control unit, and restricting activity of a status indicator if the received data unit is determined to be the protocol control unit, or allowing activity of the status indicator if the received data unit is determined to be data other than the protocol control unit. | 02-21-2013 |
20130046887 | NETWORK CAPACITY PLANNING FOR MULTIPLE INSTANCES OF AN APPLICATION - Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations are used or until a substantially steady state of network performance is achieved. | 02-21-2013 |
20130046888 | METHOD AND DEVICE FOR MANAGING DEVICES IN DEVICE MANAGEMENT SYSTEM - A method for managing devices in a device management system includes: sending, by a server, target device condition information to a gateway; and sending, by the server, management information for a target device to the gateway, and triggering the gateway to determine the target device according to the target device condition information and send the management information to the target device. According to a trigger of the server and the target device condition information sent by the server, the gateway searches for the target device; and according to a trigger of the server, the gateway sends the management information sent by the server to the target device. Embodiments of the present disclosure also provide a server and a gateway in a device management system. Thereby, a type of target devices can be managed in batches. | 02-21-2013 |
20130054775 | NETWORK DEVICE AND MOBILE DEVICE WITH STATE CAPTURE SERVICES - A method and system for identifying a trigger event for capturing state information of a user device; capturing the state information upon an identified occurrence of the trigger event; storing the state information in another device; obtaining the state information by another user device; and configuring the other user device based on the state information. | 02-28-2013 |
20130054776 | AUTOMATED SCALING OF AN APPLICATION AND ITS SUPPORT COMPONENTS - An execution environment provides a plurality of components that support execution of an application, wherein the plurality of components and the application are hosted by a plurality of nodes arranged in one or more clusters. The execution environment monitors runtime behavior of the application and the plurality of components, and generates a scaling event based on a comparison of the runtime behavior to one or more scaling policies. The execution environment automatically scales at least one of the application or a component of the plurality of components if the scaling event does not violate a constraint, wherein the scaling comprises adding a new node to at least one cluster of the one or more clusters or removing a node from at least one cluster of the one or more clusters based on the scaling event. | 02-28-2013 |
20130054777 | AUTOMATED AVAILABILITY DATA COLLECTION AND REPORTING FOR SYSTEM MANAGEMENT ENVIRONMENTS - A system and associated method for automatically monitoring and reporting availability data of at least one system management (SM) environment. A SM environment subject to monitoring is coupled to a SM portal server. The SM portal server has components of a central repository storing monitoring data, a user interface interacting with a user of the SM portal server, and a data collection module remotely controlling operations of availability module running in a monitoring server of the SM environment. The availability module gathers status of terminal systems of the SM environment by use of various SM tools and subsequently reports to the data collection module, which stores gathered data in the central repository and communicates to the user for availability analysis purposes. | 02-28-2013 |
20130054778 | SIGNALING PLANE DELAY KPI MONITORING IN LIVE NETWORK - Embodiments of the invention are directed to providing a method for measuring signaling plane delay in a communication network using a probe session indicator to trigger logging of timestamps at network elements for centralized analysis at a network monitor system. | 02-28-2013 |
20130054779 | STREAM APPLICATION PERFORMANCE MONITORING METRICS - Techniques are disclosed for calculating performance metrics associated with a data stream. A processing element configured to process data tuples flowing through a stream-based computing system receives data tuples via the data stream. Each of the one or more tuples is processed at the processing element, and each of the one or more tuples are associated with metadata that includes information related to the processing of the tuple by the processing element. Performance metrics are then calculated for the data stream based on the metadata associated with the one or more tuples. | 02-28-2013 |
20130054780 | Monitoring Geographic Location Changes of Assets in a Cloud - Despite the best intentions of a cloud service provider, digital assets of may be moved to a geographic location that deviates from a geographic preference, policy, or setting of the owner of the digital assets. A monitoring tool can monitor network location of a digital asset hosted by a cloud service provider. Movement of the digital asset from a first network location to a second network location is detected. In response to detecting that the digital asset moves, a geographic location that corresponds to the second network location is determined. It is then determined that the geographic location deviates from a geographic setting configured for the digital asset. A notification that the digital asset has been moved to the geographic location that deviates from the geographic setting is generated. | 02-28-2013 |
20130054781 | SYSTEM AND METHOD FOR ENHANCING EFFICIENCY AND/OR EFFICACY OF SWITCHOVER AND/OR FAILOVER IN PROVIDING NETWORK BASED SERVICES WITH HIGH AVAILABILITY - A system is configured to provide a suite of network-based services to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index functions, search functions, help search functions, document-management functions, and/or other functions. The suite of network-based services may correspond to services provided by a server application such as Microsoft® SharePoint™ being executed on one or more processors of one or more servers. As used herein, the term “high availability” may refer a system design protocol that ensures a certain degree of operational continuity during a given measurement period. | 02-28-2013 |
20130054782 | DETERMINATION OF UNAUTHORIZED CONTENT SOURCES - A plurality of network addresses from a distributed client is obtained, at least a first portion of the obtained network addresses including resolved network address responses to distributed client requests for resolved network addresses corresponding to one or more network location indicators associated with a first web service. Test content is obtained, based on one or more of the network addresses included in the first portion. It is determined whether the obtained test content includes unauthorized content. | 02-28-2013 |
20130054783 | PASSIVE AND COMPREHENSIVE HIERARCHICAL ANOMALY DETECTION SYSTEM AND METHOD - A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. | 02-28-2013 |
20130054784 | Session Layer for Monitoring Utility Application Traffic - Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information. | 02-28-2013 |
20130054785 | COMMUNICATIONS PATH DISCOVERY - In one implementation, a plurality of candidate output addresses are identified for an intermediate entity and a data packet is provided to a candidate output address from the plurality of candidate output addresses. The candidate output address is defined as the output address of the intermediate entity if a response to the data packet was provided from the input address of the intermediate entity. | 02-28-2013 |
20130054786 | Using eBook Reading Data To Generate Time-Based Information - Reading data from an eBook is used to generate time-based information. Timing reports are received from a plurality of clients. The timing reports describe reading time intervals for reading portions of an eBook on the clients. Timing reports from different clients describe reading time intervals for different overlapping portions of the eBook. The overlapping portions are analyzed to generate timing information. The timing information describes reading speeds for granular portions of the book that are smaller than the portions described in the reading time intervals. The timing information is stored. Timing information is provided to a client enabling the client to provide advanced features. The features include estimating a user's current reading position and providing an estimate of the time required by the user to finished reading a portion of the eBook. | 02-28-2013 |
20130054787 | System and Method for Latency Monitoring - A method for monitoring remote access connection latency between a client device and a server device comprises using a virtual channel between the client device and the server device to determine a value for the latency in a network connection therebetween. | 02-28-2013 |
20130054788 | MANAGING HOST COMPUTING DEVICES - Systems and methods are disclosed which facilitate the management of host computing devices through the utilization of a host computing device control component. The host computing device control component includes a state monitoring component that monitors operating states of the control component. Based on monitoring the operating of the control component, the state monitoring component causes the generation of one or more visual indicator indicative of the operating state of the control component. | 02-28-2013 |
20130054789 | NOTIFYING NETWORK OPERATOR WHEN VIRTUAL ADDRESSES DO NOT MATCH ON NETWORK ELEMENTS CONFIGURED FOR INTERCHASSIS REDUNDANCY - A method, in a first network element, of notifying a network operator when mismatching sets of virtual addresses are configured on first and second network elements, prior to making one of the sets of virtual addresses available for network traffic reception. The first network element is coupled with a second network element by a synchronization channel. The network elements are configured to exchange synchronization data over the synchronization channel. A second set of virtual addresses, which are configured on the second network element, are received from the second network element. It is determined that the second set of virtual addresses and a first set of virtual addresses, which are configured on the first network element, do not match. A network operator is notified responsive to determining that first and second sets of virtual addresses do not match. The method may prevent problems that occur when the virtual addresses don't match. | 02-28-2013 |
20130054790 | SERVER-TEST INTEGRATED APPARATUS FOR ONLINE GAME - Provided is a server-test integrated apparatus for online game, which performs a load test with an online game server. The server-test integrated apparatus includes a server module, a server load tester, a packet designer tool, and a metafile processor. The server module provides online service to a client over a network. The packet designer tool defines a packet protocol, and generates a header file for exchanging data between the server module and client, and at least one packet definition file for exchanging data between the server module and server load tester. The metafile processor stores the packet definition file generated by the packet designer tool. The server load tester writes a scenario with the packet definition file to test a load of the server module. | 02-28-2013 |
20130054791 | METHOD OF OUTPUTTING ESTIMATED QOES ON A TERMINAL ON AN APPLICATION BASIS - Implementations and techniques for outputting information about estimated QoEs on a terminal on which plural applications can be executed are generally disclosed. The estimated QoEs may be obtained by performing QoE estimation on an application basis. | 02-28-2013 |
20130054792 | CLOUD-BASED PERFORMANCE TESTING OF FUNCTIONALITY OF AN APPLICATION PRIOR TO COMPLETION OF DEVELOPMENT - Provided here is a computer-implemented method of performance testing functionality of a cloud-based application during development of the cloud-based application. The method obtains a defined use case from a plurality of use cases to be supported by the cloud-based application, and executed an automated performance test on the defined use case prior to completion of development of the cloud-based application. The method continues by generating an output that summarizes the performance test results. The steps of obtaining, executing, and generating can be repeated for a plurality of additional defined use cases as needed. | 02-28-2013 |
20130054793 | VIRTUAL DATACENTER PRIVATE SUBLETS FOR QUARANTINED ACCESS TO DATA - Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications, however, may be controlled by a supervisor that analyses an output and enforces limitations on content and/or volume based on a level of purchased access. | 02-28-2013 |
20130054794 | SYSTEM AND METHOD FOR RECORDING AND MONITORING USER INTERACTIONS WITH A SERVER - A system includes multiple KVM switches, multiple user consoles and a recording system connected via a network. Each KVM switch facilitates interactions between user consoles and selected servers connected its server ports. The KVM switch transmits keyboard, mouse and video data exchanged between user consoles and servers, and administrative data, to the recording system. The recording system records the keyboard, mouse, video and administrative data, and detects trigger events based on such data. Trigger events include predefined keywords, mouse operations, video images, user IDs and server IDs, or combinations thereof. When a trigger event is detected, the recording system automatically transmits monitoring information to an administrative console via the network. The monitoring information may include combined video data containing information about keyboard and mouse actions superimposed on desktop images. The administrative console may also request specific recorded data for review. The recording system may employ a master-slave configuration. | 02-28-2013 |
20130054795 | METHOD AND APPARATUS FOR SHARING CONTENT IN HOME NETWORK ENVIRONMENT - A method and an apparatus for sharing content in a home network environment are provided. The method for sharing the content in the home network environment includes detecting a connection to a network; searching for at least one device connected to the network; and when the at least one is connected to the network, checking a type of the at least one device connected to the network, and determining whether to operate as a content providing server according to the type of the at least one device. | 02-28-2013 |
20130054796 | SERVICE PROVIDER OPTIMIZATION OF CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of service providers with respect to specific resource requests are also provided. | 02-28-2013 |
20130054797 | METHOD AND SYSTEM FOR HIERARCHICAL TRACKING OF CONTENT AND CACHE FOR NETWORKING AND DISTRIBUTION TO WIRED AND MOBILE DEVICES - Embodiments of the present invention are directed to a system and apparatus for tracking media content (storage) and its cache (that is synched with the original content) in a large-scale wide-area distributed network. The system includes at least one mini tracker which is configured to keep information on the location of the content and to distribute this information to micro trackers in a first jurisdiction. The system also includes at least one zone tracker which is configured to keep information on the location of the content in a region and to distribute this information to mini trackers in a second jurisdiction. The system further includes a master tracker which is configured to keep information on the location of the content in all regions in a third jurisdiction to distribute this information to zone trackers in the third jurisdiction. The micro tracker (in wired or mobile end device/point) is configured to obtain location information from at least one of the mini tracker or zone tracker if a primary source malfunctions. | 02-28-2013 |
20130054798 | METHOD AND APPARATUS FOR MONITORING FUNCTIONS OF DISTRIBUTED DATA - A method and system of monitoring computer network activity including determining a first phase frequency estimate, associated with a first frequency vector, determined in response to receiving first bits from a first plurality of remote computer network devices. The first bits received from the first plurality of remote devices in response to satisfying a first activity threshold. Also, determining a second phase frequency estimate associated with a second frequency vector and determined in response to receiving second bits from a second plurality of remote devices. The second bits received from the second plurality of remote devices in response to a second activity threshold being satisfied. The second phase frequency estimate determined in response to the first phase frequency estimate exceeding a global threshold. Further, providing a frequency moment F | 02-28-2013 |
20130054799 | Minimising Network Resource Overhead - A mechanism is provided for minimising network resource overhead consumption by reports from one or more agents distributed in an electronic data network of nodes having a hierarchical reporting structure. Reports are received from other nodes in an electronic network of nodes or one or more agents further from a network root node in the electronic network of nodes. The reports are submitted to another node closer to the network root node in response to another node existing between the node and the network root node. The reports are submitted to the network root node in response to no other node existing between the node and the network root node. The node is adapted to only report variations in the expected report flow associated with the received reports. | 02-28-2013 |
20130054800 | EFFICIENT DATA DELIVERY METHOD AND APPARATUS - A method of delivering data to user terminals connected to an Internet Protocol Connectivity Access Network, IP-CAN, wherein the IP-CAN implements a Policy and Charging Control, PCC, architecture. The method comprises caching data within an IP-CAN cache server upon a decision made by a Policy and Charging Rules Function, PCRF, of the PCC architecture. The cached data is then identified to a Policy and Charging Enforcement Function, PCEF, of the PCC architecture. At the PCEF, data requests made by user terminals are monitored and a determination made as to whether or not a request relates to cached data. If a request does relate to cached data, then that cached data is delivered from the IP-CAN cache server to the requesting user terminal. | 02-28-2013 |
20130060929 | DISTRIBUTED CONTROL PLATFORM FOR LARGE-SCALE PRODUCTION NETWORKS - Some embodiments provide a program that monitors several network controllers in a network. Each network controller manages a logical data path set that is implemented across several managed switching elements. The program detects that a first network controller in the several network controllers has failed. The program selects a second network controller in the several network controllers to manage the logical data path set managed by the first network controller. | 03-07-2013 |
20130060930 | SYSTEMS, METHODS, AND INTERFACES FOR ANALYZING WEBPAGE PORTIONS - A method includes aggregating a set of analyzed webpage portions from at least two unaffiliated websites. The method also includes transmitting an aggregated result, the aggregated result associated with an aggregated set of analyzed webpage portions. Another embodiment includes the set of analyzed webpage portions being associated with a topic. Yet another embodiment includes receiving an indication of an occurrence of a browser event and analyzing, in response to receiving the indication, a webpage portion then storing an analyzed webpage portion and the browser event in a database. Yet another embodiment includes analyzing the webpage portion by downloading a webpage portion from at least one website, extracting a text portion from the webpage portion and associating, in response to extracting the text portion, at least one topic from the text portion. | 03-07-2013 |
20130060931 | CONTENT DELIVERY SESSION ACCOUNTING FOR ACCESS/NETWORK SERVICE PROVIDER - An edge node of an Access/Network Service Provider (ANP) network tracks the delivery into the ANP network of content from Contzzent Providers (CP), and generates accounting sessions with an accounting server. The edge node is provisioned with the IP addresses of known CP servers. A content delivery session, characterized by a CP IP address and a content identifier, such as a Differentiated Service Code Point (DSCP) value, is started upon the source IP address of a packet matching a known CP, and a packet count is incremented for each subsequent packet from the CP with the same content identifier. An accounting session is initiated with an accounting server when the content delivery session is started, and the accounting session is terminated, with the packet count for the session, upon a time-out since the last packet received. Multiple content delivery sessions may be ongoing simultaneously. | 03-07-2013 |
20130060932 | DISCOVERING TIERS WITHIN AN APPLICATION - A method for discovering tiers within an application includes monitoring network traffic. A periodic report may be assembled based on the network traffic. Tiers may be discovered using the periodic report. | 03-07-2013 |
20130060933 | CLOUD SERVICE MONITORING SYSTEM - A cloud services monitoring system (CSMS) helps a consumer of cloud computing resources determine the state of the cloud computing resources available to the consumer. The CSMS is particularly effective for cloud models where the consumer of the cloud computing resources is not the same as the provider of the cloud resource. The CSMS | 03-07-2013 |
20130060934 | SECURE ELECTRONIC ELEMENT NETWORK - A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element. | 03-07-2013 |
20130060935 | SYSTEM AND METHOD FOR CREATING A DATA DISPLAY TO MONITOR STATUS OF A RELATIONSHIP BETWEEN TWO INDIVIDUALS - Embodiments of the invention include a system and method for monitoring status of a relationship between two individuals. Using a computer network or mobile network, the two individuals in the relationship create profiles, each profile including a sub-profile of input variables. These customizable input variables correspond to behavior conducive to the relationship. The first individual enters data by tallying observed behaviors of the second individual corresponding to each particular input variable, and the second individual enters data by tallying observed behaviors of the first individual corresponding to each particular input variable. A visual representation is displayed based upon the entered data and the sub-profile. The system is presented on a mobile device of each individual connected to a network, so that each individual can easily enter data, view the display, and monitor status of the relationship. Status, reminder, tips, rewards, comments, and notifications are additional parts of the invention. | 03-07-2013 |
20130060936 | Backup Coverage in a Wireless Network - Concepts and technologies are disclosed herein for identifying backup coverage in wireless networks. An active network resource to be analyzed is identified, and a at least one potential backup network resource is identified. The at least one potential backup network resource is evaluated to determine if the at least one potential backup network resource is available to function as the backup coverage for the active network resource. If the at least one potential backup resource is available to funtion as the backup coverage for the active network resource, a power management parameter associated with the wireless networking environment can be updated. | 03-07-2013 |
20130060937 | SYSTEM AND METHOD FOR FAST FILE TRACKING AND CHANGE MONITORING - Embodiments are directed towards a dynamic change evaluation mechanism, whereby items having a detected possible change are scheduled for re-evaluation for possible changes at a higher frequency than items detected to not have previously changed, while those items detected as not to have changed are dynamically scheduled for re-evaluation based on an evaluation backlog that may be in turn based, in part, on a time from when an item is assigned an expiration time to when the item is evaluated. In one embodiment, a possibly changed item may be assigned a new expiration time independent of the evaluation backlog. In another embodiment, if no change is detected, then the item may be assigned a new expiration time as a function of a previous expiration time and on the evaluation backlog. | 03-07-2013 |
20130060938 | METHOD AND SYSTEM FOR MONITORING OF ASPECTS FOR USE BY A TRIGGER - A method and apparatus within a computing execution environment for establishing monitoring of an instance of a context for an observer, including receiving, from a PAL client, a message at the PAL server, the message; requesting establishment of a presence context; resolving an aspect based on the message to establish the presence context, the presence context providing a simplified or abstracted view of presence information on behalf of the PAL client; and placing the presence context into at least one of a monitoring state and a monitoring-capable state if a trigger is associated with the aspect. | 03-07-2013 |
20130060939 | METHOD FOR CHECKING WHETHER PROGRAM INSTRUCTIONS HAVE BEEN EXECUTED BY A PORTABLE END DEVICE - A method and a system for checking whether program instructions have been executed by an end device, wherein, the end device calls for program instructions and the program instructions are stored in executable form in a trustworthy entity, in particular a chip card. Subsequently, the program instructions are variably modified in the trustworthy entity such that the modified program instructions vary upon each execution of the method. Through execution of the instructions in the end device there is obtained a check value which is in turn transferred to the trustworthy entity and verified in the trustworthy entity. | 03-07-2013 |
20130067058 | PROVIDING EXTERNAL ACCESS TO SERVICE VERSIONS VIA A BUNDLE FRAMEWORK - A bundle entering a set of starting and active bundles within a bundle framework is detected by a controller bundle executed by a processor. It is determined whether a manifest of the bundle includes an extension header that identifies an application and an aliased additional version of the application. It is determined whether an active application proxy object that represents the application as an active service registered from a previously-started bundle already exists within a service registry. An inactive application proxy object that represents a defined entry point class of the application and an additional active application proxy object that represents a defined entry point class of the aliased additional version of the application are created. The created additional active application proxy object is registered as an additional service within the service registry of the bundle framework. | 03-14-2013 |
20130067059 | Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network. | 03-14-2013 |
20130067060 | Wake Pattern Management - Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken. | 03-14-2013 |
20130067061 | Network Communication and Cost Awareness - Network communication and cost awareness techniques are described. In one or more implementations, functionality is exposed through one or more application programming interfaces (APIs) that is accessible to a plurality of applications of the computing device to perform network communication. Data is returned to one or more of the plurality of applications regarding a cost network used to perform the network communication. | 03-14-2013 |
20130067062 | Correlation of Users to IP Address Lease Events - Techniques for correlation of users to IP address lease events are described herein. In one or more embodiments, an audit system is provided to collect IP address lease events from a DHCP server and authentication data from one or more sources of authentication data. The audit system may store the collected data in a common data store. The common data store may be searched to correlate the IP address lease events with authentication data. In this manner, a comprehensive record of the computers or devices used by a user within a given time period can be established through correlation of the historical IP address lease information from the DHCP server with the user login information from an authentication source. This may occur by matching events using timestamps of the events and the IP address and/or other common elements between two event sources. | 03-14-2013 |
20130067063 | DYNAMIC KEEPALIVE PARAMETERS FOR REVERSE PATH VALIDATION IN COMPUTER NETWORKS - In one embodiment, a network device determines a path from itself to a source device in a computer network, where the source device utilizes the path in reverse to reach the network device. Based on determining a reliability of the path in reverse, the network device may dynamically adjust one or more keepalive parameters for keepalive messages sent on the path. Accordingly, the network device may then send keepalive messages on the path based on the dynamically adjusted keepalive parameters. | 03-14-2013 |
20130067064 | NETWORK ADAPTIVE CONTENT DOWNLOAD - Techniques for managing content downloads to a computing device. The techniques include an agent on the computing device determining for each network of a plurality of networks available to the computing device, costs of downloading content and an exemption list. The exemption list includes content downloads that are exempted from costs charged by a particular network. The agent determines possible content downloads for the computing device. The agent also assesses potential costs associated with the possible content downloads based upon the costs and exemption lists determined for the plurality of networks. Based upon the assessment, the agent selects one of the networks for downloading at least part of the possible content downloads. | 03-14-2013 |
20130067065 | DETECTING DEVICE PRESENCE FOR A LAYER 3 CONNECTION USING LAYER 2 DISCOVERY INFORMATION - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 03-14-2013 |
20130067066 | BEST PRACTICES ANALYSIS OF ZONES AND COMPONENTS IN A NETWORK - Provided are a computer program product, system, and method for best practices analysis of zones and components in a network. A database has information on components in the network and configuration settings for the components. Best practices rules indicate best practices configuration settings for components in the network. The database and the accessed best practices rules are processed to determine whether the configuration settings for the components in the network satisfy the best practices configuration settings for the components indicated in the best practices rules. A report is generated indicating whether the configuration settings of the components in the network satisfy the best practices configuration settings for the components indicated in the best practices rules. | 03-14-2013 |
20130067067 | Cross-Machine Event Log Correlation - In computing environments having multiple computers, where such computers may comprise virtual machines, events are logged in association with corresponding activity identifiers. When a data packet associated with an activity is transferred to a destination machine, the activity identifier corresponding to the activity is transferred along with the data packet and used by the destination machine when logging its events. This allows events from the two machines to be correlated according to the activities to which they pertain. | 03-14-2013 |
20130067068 | EVENT-DRIVEN DETECTION OF DEVICE PRESENCE FOR LAYER 3 SERVICES USING LAYER 2 DISCOVERY INFORMATION - Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection. | 03-14-2013 |
20130067069 | FLOW TOPOLOGY OF COMPUTER TRANSACTIONS - A visualization of a topology of a flow of multiple transactions is generated. A first computer system receives a current transaction initiation request from a precursory transaction. The current transaction initiation request is for an initiation of a current transaction in the first computer system, and the precursory transaction is part of a flow of other transactions that are upstream from the current transaction. The current transaction initiation request contains parameter information that holds a hop count, which identifies how many computer systems have received other transaction initiation requests in the flow of other transactions, and a transaction initiation count, which identifies how many transaction initiation requests have been transmitted in the flow of other transactions. A processor generates a visualization of a topology map of the current transaction and the other transactions based on information in the parameter information from the current transaction initiation request. | 03-14-2013 |
20130067070 | System and Method for Indirectly Classifying a Computer Based on Usage - A server computer receives web request events corresponding to web requests issued by users. Each web request event includes: a cookie that identifies the user computer that originated the corresponding web request; an IP address corresponding to the user computer; and a date/time stamp indicating when the corresponding web request was received at a web server. The server stores the web request events. The server selects a subset of the web request events, all of which are associated with the same cookie. Then the server computes a geographical location corresponding to the user computer, where the computation uses the IP address associated with the web request event. The server determines the local time and day of week corresponding to the web request. The server then classifies the user computer based, at least in part, on a usage pattern corresponding to the web request events in the subset. | 03-14-2013 |
20130067071 | METHOD AND POWER-SAVING CONTROL DEVICE FOR CONTROLLING OPERATIONS OF COMPUTING UNITS - A method and a power-saving control device for controlling operations of a plurality of computing units are provided. The method includes pre-estimating network service demands for the computing units within a next period. The method further includes: before the next period, calculating a first number and a second number of the computing units which are expected to be respectively in a busy state and a standby state within the next period according to the pre-estimated network service demands. The method further includes controlling the computing units such that the numbers of the computing units which are in the busy state and the standby state within the next period are respectively equal to the first number and the second number. | 03-14-2013 |
20130067072 | MONITORING REMOTE ACCESS TO AN ENTERPRISE NETWORK - Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an enterprise network. The representation indicates resources accessed by a remote computer or by a user of that computer and provides associated information useful for managing remote network access. To create the representation, multiple security associations formed between a remote client computer and resources on the enterprise network are associated with entity sessions, based on identical session identifiers generated for each security association within an entity session. The entity sessions may be aggregated into a to DirectAccess “connection” between the remote client computer and the enterprise network, based on an identity of the remote client computer. Resources accessed over the connection may be identified using a session identifier of each entity session so that security associations in that entity session may be matched with the resources. | 03-14-2013 |
20130067073 | NETWORK DELAY ANALYSIS INCLUDING PARALLEL DELAY EFFECTS - The embodiments facilitate the analysis of application delays, including delays that occur on multiple paths. A trace file of an application's network events is processed to categorize the causes of delays incurred in the propagation and processing of these events. The system identifies the amount of delay that can be eliminated by eliminating each of the components of delay individually, as well as the amount of delay that can be eliminated by eliminating combinations of the delay components. A user interface displays the amount of reduction that can be achieved by eliminating various delays alone or in combination. The interface also allows the user to view the individual delay components contained in combinations of delay components. In this manner, the user is provided a view of each of the delay components that would need to be addressed, either individually or in combination, to improve the overall application delay. | 03-14-2013 |
20130067074 | FLOW TOPOLOGY OF COMPUTER TRANSACTIONS - A visualization of a topology of a flow of multiple transactions is generated. A first computer system receives a current transaction initiation request from a precursory transaction. The current transaction initiation request is for an initiation of a current transaction in the first computer system, and the precursory transaction is part of a flow of other transactions that are upstream from the current transaction. The current transaction initiation request contains parameter information that holds a hop count, which identifies how many computer systems have received other transaction initiation requests in the flow of other transactions, and a transaction initiation count, which identifies how many transaction initiation requests have been transmitted in the flow of other transactions. A processor generates a visualization of a topology map of the current transaction and the other transactions based on information in the parameter information from the current transaction initiation request. | 03-14-2013 |
20130067075 | SYSTEM AND METHOD FOR EVALUATING COVERAGE OF SERVICES BY COMPONENTS OF AN IT INFRASTRUCTURE - Embodiments of the invention provide a system and method of evaluating compliance by components of an IT computer infrastructure with a policy by comparing a recipient component of a service that is identified by a component providing such service, to an identity of a component providing such service that is identified by a component receiving of such service. | 03-14-2013 |
20130067076 | INCREMENTALLY IMPROVED AUTO-DISCOVERY OF NETWORK DEVICES - The embodiments improve the results of an auto-detection of network devices responsive to the causes of detection failures in preceding runs of the auto-detection process. The network may comprise various devices that are believed to be in the network. If a device that is believed to be in the network, but is undiscovered, the embodiments identify the device and information regarding the cause or causes of non-discovery. In response, the discovery parameters are modified, based on the causes associated with the undiscovered devices. The extent to which the discovery parameters are modified is based various criteria, such as the characterization of the network, or upon the detection of changes to the network. | 03-14-2013 |
20130067077 | PROMOTION OF PERFORMANCE PARAMETERS IN DISTRIBUTED DATA PROCESSING ENVIRONMENT - A method of performance monitoring in a data processing environment is provided. The data processing environment includes multiple systems, each of which has resources. Each resource relates to a resource type, wherein at least one performance parameter is defined for each resource type. The method includes determining a value of the at least one performance parameter for at least one resource, aggregating performance parameter values and related resources of a resource type, creating for at least a part of the resources a next predefined aggregation level which includes all resources relating to the resource type and associating all performance parameter values to this aggregation level, and repeating the creating for at least a part of the resources a next predefined aggregation level until a predefined target aggregation level of the data processing environment has been reached. | 03-14-2013 |
20130067078 | SYSTEM AND METHOD FOR PROVIDING A SCRIPT-BASED COLLECTION FOR DEVICES IN A NETWORK ENVIRONMENT - A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination. | 03-14-2013 |
20130073713 | Resource Selection Advisor Mechanism - A method, an apparatus and an article of manufacture for generating resource selection information. The method includes monitoring at least one resource and at least one resource change performed by at least one user, analyzing a user request, wherein the user request comprises resource parameter information, searching for at least one similar resource request based on the user request and on monitored information and generating an output based on analysis of the user request, wherein the output comprises at least one candidate resource set and a corresponding rationale for selection of the at least one candidate resource set based on historical data. | 03-21-2013 |
20130073714 | System and Method for Data Set Synchronization and Replication - According to one embodiment of the present disclosure, a method for synchronizing data sets includes receiving a request to synchronize a first data set associated with a first server and a second data set associated with a second server. The method also includes determining, with reference to one or more replication constraints, whether to begin synchronization. The method further includes applying one or more resource control actions in response to determining to begin synchronization. | 03-21-2013 |
20130073715 | METHODS AND APPARATUS FOR REMEDIATING POLICY TEST FAILURES, INCLUDING CORRELATING CHANGES TO REMEDIATION PROCESSES - Disclosed herein are methods, systems, and articles associated with correlating detected changes within a computer network with remediation processes performed in response to policy test failures. In embodiments, on determination that a failure of a policy test has occurred within a computer network having a number of nodes, a remediation process may be executed to remediate the failure. Change at a node may be detected. Further, the detected change may be correlated with the execution of the remediation process, and the correlation may be identified. | 03-21-2013 |
20130073716 | DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center. | 03-21-2013 |
20130073717 | OPTIMIZING CLUSTERED NETWORK ATTACHED STORAGE (NAS) USAGE - A system and associated method for optimizing usage of a clustered-network attached storage (NAS). An administration module of the clustered NAS calculates a number of nodes in the clustered NAS necessary to service a required amount of load for a specific number of client systems, and a number of addresses associated with the nodes through which the client systems accesses the clustered NAS. The load is evenly shared by all client systems and uniformly serviced by the nodes of the clustered NAS. When a node fails, the rest of operating nodes in the clustered NAS take over addresses associated with the failed node and evenly share additional load associated with an address taken from the failed node to provide seamless services for the production by the client systems. | 03-21-2013 |
20130073718 | TEST ANALYSIS SYSTEM OF NETWORK AND ANALYSIS METHOD THEREOF - The test analysis system of a network according to an exemplary embodiment of the present invention includes: a server group having at least one server performing at least any one of generation of real-time information and storage of a server local log according to test scenarios; a client group having at least one client. communicating with the server group and performing at least any one of the generation of the real-time information and the storage of the local log according to the test scenarios; and a monitoring system storing the real-time information as a system log while monitoring the real-time information received from the server group and the client group during the execution of the test scenarios and informing a test manager of the monitored real-time information. | 03-21-2013 |
20130073719 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A disclosed information processing system includes a first apparatus including a storage unit storing types of events which occur in the first apparatus so as to be reported to an information processing apparatus via a network, and a sending unit sending, when one of the events stored in the storage unit occurs, event information of the event to the information processing apparatus; and the information processing apparatus including a delivery destination storage unit storing identification information of a second apparatus existing at a delivery destination of the event in the first apparatus, and a delivery unit sending the event information of the event to the second apparatus of which identification information is stored in the delivery destination storage unit when the event information is received by the information processing apparatus. | 03-21-2013 |
20130073720 | METHOD AND APPARATUS FOR PROVIDING INFORMATION REGARDING A DEVICE - A method and apparatus of providing information regarding at least one device is provided. The method includes receiving location information and service information from an external device; and transmitting information regarding at least one device capable of providing a service based on according to the service information in a predetermined region based on the location information to the external device. | 03-21-2013 |
20130073721 | Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future. | 03-21-2013 |
20130073722 | Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future. | 03-21-2013 |
20130073723 | MATCHING ENGINE FOR COMPARING DATA FEEDS WITH USER PROFILE CRITERIA - An event notification matching system, including an event matching table forming a plurality of nodes. Each node is assigned a subscriber request value and contains identifiers for one or more subscribers to be notified at the occurrence of an event relating to the subscriber request value. The event notification matching system may also include a table index. The table index receives input values from an event processing module and selects one or more of the nodes that have subscriber request values corresponding to the received input values. The event processor receives event data from a predetermined source, and formats the input values to simplify the operations performed by the event matching table. The event notification matching system is configured such that the event data need not be compared to non-matching nodes in the event matching table. | 03-21-2013 |
20130073724 | Autonomic Workflow Management in Dynamically Federated, Hybrid Cloud Infrastructures - An autonomic workflow framework may include a federated cloud that includes a plurality of clouds, where each cloud in the federated cloud includes one or more nodes. An autonomic workflow framework may include a workflow manager configured to receive a workflow. The workflow may include a plurality of stages, and the workflow may be associated with a user objective. An autonomic workflow framework may include an autonomic scheduler in communication with the workflow manager. The autonomic scheduler may be configured to provision one or more of the one or more nodes to process the stages to achieve the user objective. | 03-21-2013 |
20130073725 | SYSTEM AND METHOD FOR AUTOMATED CONTENT DISTRIBUTION - A system and method for automated content distribution is disclosed. A content distribution system includes a detector module for intercepting a network communication and verifying whether content is available for a client, and a notification module coupled to the detector module for notifying the client that the content is available. A method for content distribution includes intercepting a network communication, analyzing the network communication for determining whether content is available for a client, and notifying the client that the content is available. | 03-21-2013 |
20130073726 | RESTARTING EVENT AND ALERT ANALYSIS AFTER A SHUTDOWN IN A DISTRIBUTED PROCESSING SYSTEM - Restarting event and alert analysis after a shutdown in a distributed processing system includes identifying a shutdown condition of the distributed processing system; determining whether the shutdown was a planned shutdown or an unplanned shutdown; if the shutdown was planned, storing an identification of the last event in an event log that was injected in an event queue at the time of the planned shutdown and restarting event and alert analysis using the next event identified in the event log; and if the shutdown was unplanned, for each event analyzer, identifying the last event included in the last event pool that the event analyzer closed; and restarting event and alert analysis at the event analyzer using the next event received by the event analyzer after the identified last event. | 03-21-2013 |
20130073727 | SYSTEM AND METHOD FOR MANAGING DATA DELIVERY IN A PEER-TO-PEER NETWORK - A system and method for managing content data transfers in a peer-to-peer communications network is described. The system includes a hierarchical arrangement of tracker modules, each tracker module being responsible for managing a tracker domain of network elements. Each tracker module has stored therein a content table including a record of content data available to the network elements within its respective tracker domain. Each tracker module responsible for a tracker domain containing end user peers is configured so that, if a content data request is received from a requesting peer in its respective tracker domain and the requested content is held by other peers in that tracker domain, a list of peers having the content data stored thereon is sent to the requesting peer. If the requested content is not held by enough other peers in that tracker domain, the content data request is transferred to the next tracker module up in the hierarchy. | 03-21-2013 |
20130080617 | DYNAMIC NETWORK LOAD FORECASTING - The present disclosure involves computer-implemented methods, software, and systems for optimizing the utilization of network infrastructure resources through predictive analysis. A computer-implemented method includes calculating, using at least one hardware processor, at least one user network load profile for each user profile of a set of user profiles, calculating a predicted dynamic network load using the at least one user network load profile for each user profile of the set of user profiles, transferring the predicted dynamic network load to an at least one network infrastructure resource, and adjusting the capacity of the at least one available network infrastructure resource. | 03-28-2013 |
20130080618 | METHODS AND SYSTEMS FOR FACILITATING NETWORK CONNECTIVITY - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers. | 03-28-2013 |
20130080619 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR OPTIMIZING VIRTUAL MACHINE PLACEMENT AND CONFIGURATION - A shared resource system, method of optimizing resource allocation in real time and computer program products therefor. At least one client device includes an optimization agent monitoring resource usage and selectively suggesting changes to resource configuration for the client device. A management system, e.g., in a cloud environment selectively makes resource capacity available to client devices and adjusts resource capacity available to client devices in response to the optimization agent. Client devices and provider computers connect over a network. The client devices and provider computer pass messages to each other over the network. | 03-28-2013 |
20130080620 | RESOURCE MEASUREMENT AND MANAGEMENT - Aspects of the disclosure relate to measuring and managing data traffic in one or more networks. In some embodiments, a monitor may measure the traffic at one or more locations within the network(s) or devices associated therewith to determine whether the traffic exceeds a threshold. When the traffic exceeds the threshold, one or more actions may be taken, such as issuing or transmitting a command or directive. The command or directive may advise a device or an application to throttle or reduce an input or stimulus responsible for generating the traffic. In some embodiments, a throttling may be effectuated to reduce the data traffic. | 03-28-2013 |
20130080621 | HYBRID STORAGE DEVICES - Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method and system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 03-28-2013 |
20130080622 | NETWORK STATUS INDICATION SYSTEM AND MOUSE WITH NETWORK STATUS INDICATION FUNCTION - A network status indication system includes a network controller, a first personal system (PS)/2 interface, and a mouse. The first PS/2 interface includes first and second idle pins. The mouse includes a second PS/2 interface, and first and second indicators. When the network controller determines that the first PS/2 interface is connected to the network, the network controller controls the first indicator to emit light. When the network controller determines that the first PS/2 interface is transmitting or receiving data with the network, the network controller controls the second indicator to flicker. | 03-28-2013 |
20130080623 | DYNAMIC ROUTE REQUESTS FOR MULTIPLE CLOUDS - Aspects of the present invention include a method of dynamically routing requests within multiple cloud computing networks. The method includes receiving a request for an application from a user device, forwarding the request to an edge server within a content delivery network (CDN), and analyzing the request to gather metrics about responsiveness provided by the multiple cloud computing networks running the application. The method further includes analyzing historical data for the multiple cloud computing networks regarding performance of the application, based on the performance metrics and the historical data, determining an optimal cloud computing network within the multiple cloud computing networks to route the request, routing the request to the optimal cloud computing network, and returning the response from the optimal cloud computing network to the user device. | 03-28-2013 |
20130080624 | MANAGEMENT COMPUTER AND METHOD FOR ROOT CAUSE ANALYSIS - In analyzing an elaborate computer system which requires large-scale or numerous event propagation models, a law-of-causality matrix gains size, so that significant amount of storage resources has been used in a management computer. To solve such a problem, the management computer to manage the computer system stores topologies, event propagation models, and causality information including one or more causal relations in the storage resources, determines, when the management computer analyzes or detects an event, whether a causal relation has already been created for the event to be analyzed, and creates the causal relation based on a topology and event propagation models, if not yet. | 03-28-2013 |
20130080625 | MONITORING APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A monitoring apparatus include a memory which stores a program for executing procedures and a processor coupled to the memory and executes the procedures based on the program, wherein the procedures includes detecting a destination of access from a server apparatus to a storage apparatus on the basis of a result of analysis of a packet transmitted and received between the storage apparatus and the server apparatus, the storage apparatus including a plurality of storage areas, the server apparatus executing a plurality of virtual servers, part of the plurality of storage areas being allocated to each of the plurality of virtual servers as an accessible storage area, and determining that abnormal access is performed from the server apparatus to the storage apparatus when the storage areas of the detected destination are beyond a certain criterion in the plurality of storage areas. | 03-28-2013 |
20130080626 | EDGE-BASED RESOURCE SPIN-UP FOR CLOUD COMPUTING - Aspects of the present invention include distributing new resources closer to end-users which are making increased demands by spinning-up additional virtualized instances (as part of a cloud provisioning) within servers that are physically near to the network equipment (i.e., web servers, switches, routers, load balancers) that are receiving the requests. | 03-28-2013 |
20130080627 | SYSTEM AND METHOD FOR SURGE PROTECTION AND RATE ACCELERATION IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof. In accordance with an embodiment the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. A traffic monitor, at the traffic director, monitors traffic, including the number of connections, between the traffic director instances and one or more of the resource servers within the origin servers. The traffic director can set a traffic rate which controls the traffic, including the number of connections, to provide surge protection, or rate acceleration/deceleration. | 03-28-2013 |
20130080628 | SYSTEM AND METHOD FOR DYNAMIC DISCOVERY OF ORIGIN SERVERS IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof, wherein the traffic director is provided as a software-based load balancer that can be used to deliver a fast, reliable, scalable, and secure platform for load-balancing Internet and other traffic to back-end origin servers, such as web servers, application servers, or other resource servers. In accordance with an embodiment, the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. A health check subsystem periodically checks the health of its configured resource servers, and also attempts to detect changes in the one or more pools, by sending requests to any new server instances configured as origin servers within the pool, receiving appropriate responses, and updating the configuration accordingly. | 03-28-2013 |
20130080629 | METHOD AND APPARATUS FOR DETECTING DEVICES ON A LOCAL AREA NETWORK - A method, apparatus, and system for discovering devices on a local area network. The method comprises sending a DNS request from a host networking element, receiving the DNS request at one or more devices, and responding to the host networking element with one or more DNS responses. The DNS request comprises one or more particular domain names. The one or more DNS responses comprise local network address information for the one or more VoIP devices. The apparatus comprises means for filtering a set of network traffic for a DNS request, means for responding to a DNS request with a local network address, and means for forwarding the DNS request to another device. The system comprises a computer for generating a DNS request for a particular domain, and one or more VoIP devices for receiving the DNS request and sending a DNS response to the computer with a local network address for the VoIP device. | 03-28-2013 |
20130080630 | FLEXIBLE EVENT DATA CONTENT MANAGEMENT FOR RELEVANT EVENT AND ALERT ANALYSIS WITHIN A DISTRIBUTED PROCESSING SYSTEM - Flexible event data content management for relevant event and alert analysis within a distributed processing system includes receiving, by an interface connector, a raw event from a component of the distributed processing system; analyzing custom data within the raw event to determine a location to store the custom data, the custom data in a first data format; storing extended data within the raw event in a common event data format, the extended data indicating the location of the custom data; receiving, by an event analyzer, the event; and determining whether there are custom customer rules that need the custom data; and if there are such custom customer rules, retrieving the custom data based on the extended data from the event; and applying the custom customer rules to the extended data; if there are no such custom customer rules, applying the base rules to a base portion of the event. | 03-28-2013 |
20130080631 | Method for Adaptively Building a Baseline Behavior Model - A method for generating an auto-adaptive baseline model for profiling individual and collective behavior of a plurality of network users. The method comprises the steps of creating a model, defining a plurality of members and a plurality of collective variables, each member corresponding to a user, and including a plurality of individual variables, defining conditions for each collective variable and individual variable, upon detecting an activity by a user, updating corresponding individual variables and collective variables, and comparing updated individual variables and collective variables against corresponding conditions. If a condition is met, an alert event is issued to notify designated personnel; otherwise, returning to the step of upon detecting activity. Finally, upon receiving an alert event, the designated personnel decides whether to manually redefine the conditions or to ignore the alert event. If the alert event is ignored, said conditions are automatically redefined in accordance with system defined mechanisms. | 03-28-2013 |
20130080632 | CRISSCROSS CANCELLATION PROTOCOL - Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A. Node A would like to know whether or not message X reflects Node B's state after receiving message 3. If Node B received message 3 prior to sending message X, then proper state may be maintained between the nodes. But if messages 3 and X crisscrossed, or if message 3 was never properly received by Node B, then the state between the nodes may be corrupt. Technologies, systems, and methods are provided to avoid such corruption. | 03-28-2013 |
20130080633 | APPARATUS AND METHOD FOR MONITORING OF CONNECTIVITY SERVICES - An apparatus ( | 03-28-2013 |
20130080634 | End User Performance Monitoring For Mobile Applications - A system for obtaining end-user performance data associated with a target application executing on a mobile device comprises a management system server computer configured to comprise a virtual execution environment. A mobile device is configured to support operation of a target application executing thereon via the virtual execution environment. The server computer is configured to perform at least one automated operation of the target application by emulating user actions within the virtual execution environment. One or more images are captured of a target application graphical user interface responsive to the emulated user actions from within the virtual execution environment. The images are analyzed to determine performance data of the target application, and the performance data are stored in a memory store. | 03-28-2013 |
20130086247 | WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser. | 04-04-2013 |
20130086248 | Managing Stability Of A Link Coupling An Adapter Of A Computing System To A Port Of A Networking Device For In-Band Data Communications - Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications, the adapter and the network device coupled for out-of-band data communications to a management module, where link stability is managed by: monitoring link health including retrieving adapter link statistics from the adapter and networking device link statistics from the networking device; determining, in dependence upon the adapter and networking device link statistics, whether the link health meets predefined health acceptability criteria; and if the link health does not meet predefined health acceptability criteria, instructing the adapter to execute one or more predefined corrective actions. | 04-04-2013 |
20130086249 | SERVICE NETWORK DISCOVERY - An automated service discovery and monitoring utility employs automatically generated policies (rules) for monitoring network health of a service based on network discovery using flow data derived from transmissions sent over segments between computing components defining the service. An interactive discovery application employs flow data based on transmissions associated with a service. Analysis of the flow data identifies associated components from inspection of the transmissions. Iterative component selection allows network traversal of components based on flow data of the segments used for providing the service. The interactive service discovery therefore identifies associated components (servers) and segments based on flow data, rather than topology, rendering the flow data to allow a user to make an informed selection of segments and components for inclusion in a service, and generates a set of policies (rules) based on the discovered service dependencies for monitoring various metrics for the components providing the monitored service. | 04-04-2013 |
20130086250 | METHOD AND APPARATUS FOR ROUND TRIP DELAY KPI MONITORING IN LIVE NETWORK USING USER PLANE PROBE SESSION - A method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session is disclosed for measuring round trip delays in a manner that allows latency to be apportioned to network elements. The method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session includes transmitting a loopback packet containing a probe session indicator and capturing timestamps of arrival and departure times at each network element traversed by the loopback packet, and then transmitting the timestamps to a Network Management System. | 04-04-2013 |
20130086251 | METHODS AND APPARATUS FOR CLIENT-SIDE CONTEXT MANAGERS - Methods and apparatus for client-side context managers are disclosed. An example context manager implemented on a client machine includes a file system watcher to monitor a location of a file system implemented on the client machine for creation of a new item, wherein a virtual application implemented on a server is provided access to the file system; and a connection establisher to establish a connection between the context manager and the virtual application in response to the creation of the new item in the location of the file system by the virtual application. | 04-04-2013 |
20130086252 | FLEXIBLE RULE BASED USAGE METERING POLICIES - Various exemplary embodiments relate to a method of managing usage of a service. The method may include: defining a plurality of metering policies associated with the service; assigning an applicability condition to each of the plurality of metering policies; assigning a quota to each of the plurality of metering policies; selecting an applicable first metering policy for a subscriber session based on the applicability condition; measuring usage of the service according to the first metering policy; comparing the usage against the quota of the first metering policy; and selecting an applicable second metering policy for the subscriber session based on the applicability condition assigned to the second metering policy if the usage exceeds the quota of the first metering policy. Various exemplary embodiments relate to a network node for managing subscriber usage. The network node may include: a metering policy storage; a limit selector; an interface; and a processor. | 04-04-2013 |
20130086253 | HIERARCHICAL METERING POLICY ATTRIBUTES - Various exemplary embodiments relate to a method performed by a policy and charging rules node for managing usage of a subscriber. The method may include: defining a primary metering policy having a first applicability condition and a first quota; defining a secondary metering policy having attributes including a second applicability condition and at least one inherited attribute that references an attribute of the primary metering policy; determining that the second metering policy is applicable when the first applicability condition and the second applicability condition are true; selecting the secondary metering policy as an active metering policy; and managing subscriber usage according to the attributes of the secondary metering policy. In various alternative embodiments, the step of managing subscriber usage includes: measuring subscriber usage according to a rating factor of the secondary metering policy; and charging the measured subscriber usage to both the primary metering policy and the secondary metering policy. | 04-04-2013 |
20130086254 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 04-04-2013 |
20130086255 | WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser. | 04-04-2013 |
20130086256 | Forming Configuration Information about Components of Systems which Include Components for which Acquisition of Configuration Information is Restricted - [Problem to be Solved] | 04-04-2013 |
20130086257 | METHOD AND APPARATUS FOR FINDING WEB HITS FOR PATENTS - Various embodiments of the present disclosure include methods and apparatus for finding web hits for a patent of interest. In an example method embodiment, data identifying a patent of interest is received, and at least one forward or reverse citation of the patent of interest is identified. An inventor or an owner of the at least one forward or reverse citation is identified, and a website associated with the identified inventor or owner is monitored. A watch notice is generated in response to a detection of the addition of new material to the monitored website. | 04-04-2013 |
20130086258 | MONITORING AND LIMITING REQUESTS TO ACCESS SYSTEM RESOURCES - Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing operations being performed by the system. The invention is directed to preventing the number of calls made by a merchant's applications through an application programming interface (API) for access to the lower priority services of a merchant service provider from having a negative impact on the ability of the service provider to perform the processing necessary to support higher priority services. The invention provides a user interface that may be used by a merchant or the service provider to configure the operation of a “throttle” that is designed to generate an alert when the number of calls by a merchant application for access to a specific service provider function or application exceeds a value or limit, where exceeding the value or limit may indicate a malfunction of the merchant's application or an attack by a malicious agent. | 04-04-2013 |
20130086259 | METHOD FOR ACQUIRING AN IP ADDRESS AND NETWORK ACCESS DEVICE - Embodiments of the present invention relate to a method for acquiring an IP address and a network access device. The method includes: after receiving a first IP address acquiring message from a first network, assigning a first IP address to the first network by using a process and associating an identifier of the first network with a first session, so that the network access device is capable of mapping the first IP address to a first private network IP address and sending the same to the first network, thereby avoiding the problem of complex implementation in the prior art resulted from a process where a gateway configured for a family network or an enterprise network needs to initiate an IPoE dial-up process. In this way, the gateway configured for the family network or the enterprise network is simplified, operation and maintenance costs are reduced, and flat networks are further implemented. | 04-04-2013 |
20130086260 | Automatic Generation of User Account Policies Based on Configuration Management Database Information - Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template. | 04-04-2013 |
20130086261 | Detecting Behavioral Patterns and Anomalies Using Activity Profiles - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile. | 04-04-2013 |
20130086262 | System and Method of Emulating a Network Controller within an Information Handling System - A system and method of emulating a network controller within an information handling system is disclosed. In one form, an information handling system can include a host chipset operably coupled to a network interface controller of a first main circuit board, and a management controller operably coupled to the host chipset. The information handling system can also include an emulated network interface controller operable to be activated by the management controller. The information handling system can further include a communication bus coupled to the host chipset and the management controller. In one form, the communication bus is operable to activate a communication link between the host chipset and the emulated network interface controller. | 04-04-2013 |
20130086263 | Systems and Method to Discover Clients Associated with Local Domain Name Server Using Sampling - A system includes an analyzer module, a content request data collection module, and a domain name server. The content request data collection module is configured to receive a content request sent to a tracking address, collect content request information about the content request, and provide the content request information to the analyzer module. The domain name server is configured to receive an address request from a local domain name server for a cache server address, provide a tracking address to the local domain name server, collect address request information about the address request, and provide the address request information to the analyzer module. The analyzer module is configured to receive the address request information and the content request information, and determine properties of clients served by the local domain name server based on the address request information and the content request information. | 04-04-2013 |
20130091266 | System for organizing and fast searching of massive amounts of data - A system to collect and analyze performance metric data recorded in time-series measurements, converted into unicode, and arranged into a special data structure. The performance metric data is collected by one or more probes running on machines about which data is being collected. The performance metric data is also organized into a special data structure. The data structure at the server where analysis is done has a directory for every day of performance metric data collected with a subdirectory for every resource type. Each subdirectory contain text files of performance metric data values measured for attributes in a group of attributes to which said text file is dedicated. Each attribute has its own section and the performance metric data values are recorded in time series as unicode hex numbers as a comma delimited list. Analysis of the performance metric data is done using regular expressions. | 04-11-2013 |
20130091267 | Smart Gateway - A smart gateway is disclosed for use in a local network for detecting a network configuration, for detecting devices connected to the network, and for providing configurable signal conditioning to correct problems in the network. The smart gateway includes an analysis circuit for testing the electrical properties of different network branches, and includes configurable signal conditioning circuitry for optimizing the performance of the network. | 04-11-2013 |
20130091268 | CLASSIFICATION OF WEB CLIENT NETWORK BANDWIDTH BY A WEB SERVER - This invention provides apparatuses, methods, and systems for classification of a web client's network bandwidth by a web server in real time over the Internet. The web server, based upon the round trip time (RTT) taken to establish the TCP connection with the web client, classifies the network bandwidth. The RTT for establishment of the TCP connection using a 3-way handshake is stored on the web server on most modern Operating Systems and can be fetched on demand by the web server for a given connection. A web application on the web server could then use this bandwidth classification to serve varied content to the web client, such as a light or heavy web page depending on the level of the bandwidth. | 04-11-2013 |
20130091269 | Distributed IPv6 Neighbor Discovery for Large Datacenter Switching Systems - A distributed neighbor discovery module is disclosed where all neighbor discovery operations and functionalities may be distributed to a switch device processor. Each neighbor discovery process on a switch device may run as an individual neighbor discovery router node. There may be no coordination between neighbor discovery processes occurring on different switch devices. All other traffic, including both IPv6 control traffic and data traffic destined to the router may be processed by the central controller processor. | 04-11-2013 |
20130091270 | PAGE LAYOUT IN A FLOW VISUALIZATION - Systems and methods for generating a flow visualization of network traffic. A scoring function is used to prioritize which traffic paths are displayed in the visualization. | 04-11-2013 |
20130091271 | CONNECTION METHOD - A failure of communication between a first device and a second device is managed. A failure of communication between the first device and the second device is detected at a third device intermediate. The first data is transmitted from the third device to the first device. The first data indicates that the second device is unusable by the first device. | 04-11-2013 |
20130091272 | Network Connection Status Detection System and Method Thereof - A network connection status detection system and method thereof. The system comprises a network address translation (NAT) router, a server end and at least one network electronic device. The NAT router is a bridge for communicating an intranet with an extranet. The server end is disposed at the extranet and connected to the NAT router through a network. The network electronic device is disposed at the intranet and connected to the NAT router. When a channel is established between the network electronic device and the NAT router by executing a connection configuration so that the network electronic device connects to the server end, the network electronic device sends a connection detection signal to the server end. If the server end receives the connection detection signal and returns a confirmation signal, an indicator of the network electronic device will remind a user in a predetermined way. | 04-11-2013 |
20130091273 | Cooperative Proxy Auto-Discovery and Connection Interception Through Network Address Translation - Proxy devices associate their direct connection with a client/server connection passing through one or more NAT devices. First proxy device receives a network connection request from a client. First proxy device stores connection information in association with a connection identifier. Connection information may reflect the usage of NAT devices between the two proxy devices. First proxy device sends a connection response including the connection identifier to the client. Second proxy device sends a direct connection request to first proxy device to establish a direct connection. Direct connection request includes the connection identifier, which is used by first proxy device to associate the direct connection with stored connection information. First proxy device may use the connection information to direct network traffic received via this direct connection to the correct destination and to divert network traffic from the server to the client through the direct connection and first and second proxy devices. | 04-11-2013 |
20130091274 | Process for Monitoring, Analyzing, and Alerting an Adult of a Ward's Activity on a Personal Electronic Device (PED) - A process comprising monitoring certain defined activities of a first party and alerting a second party of these activities; said monitoring performed by providing a web service for the second party; scanning a first user's electronic accounts; detecting defined activities; and sending at least one of a text and email notification to the second party if any dangerous messages are detected. | 04-11-2013 |
20130091275 | VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining. | 04-11-2013 |
20130091276 | METHOD AND DEVICE FOR MONITORING SERVICE USAGE AMOUNT - A method and a device for monitoring a service usage amount includes: determining, according to one of quintuple information, protocol information, and URL information in received service request information, whether the service request information is the same as specified service stream information in one or multiple session level service monitoring tasks, where the session level service monitoring task includes a session level service monitoring class identity, a monitoring task identity, and the specified service stream information; the monitoring class identity indicates that the monitoring task is used to monitor a usage amount of a specified service stream in a session; when determining yes, accumulating a usage amount of the service request information in the one or multiple session level service monitoring tasks; and reporting the monitoring task identity and an accumulated usage amount of the service request information in the session level service monitoring task to a PCRF. | 04-11-2013 |
20130091277 | SOLICITING FIRST PARTY IN COMMUNICATION SESSION TO MAINTAIN CALL WHEN DEGRADATION OF CONNECTION TO SECOND PARTY IS ANTICIPATED - A system and method are provided for monitoring the quality of a communication session with a first electronic device. Should the communication session degrade, rather than dropping the communication session the user of a second electronic device communicating with the first electronic device is prompted to wait while an attempt is made to improve the quality of the communication session. Similarly if the user of the first electronic device moves out of a coverage area, rather than dropping the communication session the user of the second electronic device communicating with the first electronic device is prompted to wait until a new communication session can be established. | 04-11-2013 |
20130091278 | HIERARCHICAL CLOSED-LOOP CONTROL OF POLICY, GOAL, AND RESOURCE ALLOCATION IN BANDWIDTH MANAGEMENT - A Unified Bandwidth Manager that functions as a multi-service bandwidth manager to interface with and hierarchically manage a plurality of service-specific bandwidth reservation and session management systems is described. The Unified Bandwidth Manager includes at least a hierarchical control structure, and an interface for providing observed information relevant to policy, goal, and resource usage to the hierarchical control structure. The hierarchical control structure is provided with a plurality of feedback inputs that are responsive to associated ongoing observation information from each of an associated observation reporting element. The hierarchical control structure uses the plurality of feedback inputs, together with policy information or goal information, to produce at least one element of outgoing control information. | 04-11-2013 |
20130097302 | AUDIO VISUAL PLAYER APPARATUS AND SYSTEM AND METHOD OF CONTENT DISTRIBUTION USING THE SAME - A system is presented providing content to a plurality of handheld devices (including musical selections). The devices can access a server over the Internet via a Wi-Fi or other similar wireless interconnection and can download songs requested by a user from the server or from other users using, e.g., a P2P protocol. All downloads may be governed by applicable DRM rules. Content and playlists may also be pushed by a server from other sources and means including, e.g., podcasting, based on predetermined rules, favorite preferences of users, and other criteria. | 04-18-2013 |
20130097303 | METHOD AND APPARATUS FOR PROVIDING IDENTIFICATION BASED ON A MULTIMEDIA SIGNATURE - An approach is provided for providing identification based on a multimedia signature. An indication platform processes and/or facilitates a processing of one or more device events to determine one or more participants, one or more participant devices, or a combination thereof. The indication platform further causes, at least in part, an association of one or more multimedia signatures with the one or more device events, the one or more participants, the one or more participant devices, or a combination thereof. The indication platform also determines to identify the one or more device events, the one or more participants, the one or more participant devices, or a combination thereof based, at least in part, on the association. | 04-18-2013 |
20130097304 | PROVIDING DYNAMIC RELIABILITY AND SECURITY IN COMMUNICATIONS ENVIRONMENTS - A dynamic reliability and security capability is provided. The dynamic reliability and security capability may be configured to support use of a dynamic reliability profile (DRP) that specifies the reliability parameters of a customer both as function of time and as a function of the requirements of the application or service of the customer. The reliability parameters may specify reliability requirements and/or goals of the customer, thereby providing a time varying requirements/goals profile. The dynamic reliability and security capability may be configured to dynamically configure the cloud resources to provide the required reliability as specified by the DRP. The RSG capability may be configured to subsequently monitor and meter the behavior to assure that the specified reliability is in fact being delivered, which may include use of self-healing capabilities to provide service assurance. | 04-18-2013 |
20130097305 | Bearer Management And Metrics Gateway - In accordance with the exemplary embodiments of the invention there is at least a method, apparatus to perform operations including collecting metrics from one or more network devices of the wireless communication network, and using the collected metrics to enable one of establishment and modification of a Bearer in the wireless communication network to provision a service in accordance with specified characteristics. | 04-18-2013 |
20130097306 | SYSTEM AND METHOD FOR MONITORING, MANAGING AND CONTROLLING A PLURALITY OF DEVICES USING CLOUD RESOURCES - A system is provided for providing monitoring, control, and/or management network infrastructure that comprises a controller that is configured to interface with an external cloud based computing environment, and to link to the cloud to obtain configuration information for (i) connecting to one or more devices, and (ii) to interoperate with the cloud for monitoring, controlling, or managing the one or more devices. The system interoperates with the cloud to: (i) offload data manipulation and management to the cloud; (ii) provide remote access to or control of the main controller component; and/or (iii) utilize the cloud as an automated service for access to remote storage and processing in association to enhance the operation of a plurality of devices at the location. A related method and related computer programming are also disclosed. | 04-18-2013 |
20130097307 | Session template packages for automated load testing - A computer-implemented method includes scanning a clip of messages that includes message requests and message responses arranged in a sequence. The scanning is performed based on one or more search parameters and produces a list of one or more name/value pairs. The clip is utilized to perform a load test on a target website. Each name/value pair has a corresponding value. For each name/value pair in the list a message request in the clip is identified where the corresponding value is first used. Then, looking backwards in the sequence from the message request where the corresponding value is first used, prior message responses are located where the corresponding value is found. An extraction point is specified in the clip for the corresponding value as a latest message response in the sequence where the corresponding value was returned from the target website. The corresponding value is then stored as a property. | 04-18-2013 |
20130097308 | COLLECTING ASYMMETRIC DATA AND PROXY DATA ON A COMMUNICATION NETWORK - A system, method, and apparatus for collecting data streams, such as data packets, on a network, such as the Internet, are disclosed. A metadata portion of at least one of the data streams is analyzed on the network and evaluated using a metadata processing engine to identify a relationship between at least two of the plurality of data streams, e.g., a relationship between multiple users of interest, a new user of interest, etc. Evaluation of the metadata and the relationships can be performed algorithmically, as predetermined by an analyst or as provided as preset options by the network monitoring system (NMS). An interface manager can receive the new user of interest, evaluate the new user of interest for redundancy against existing users of interest of the NMS; then communicate the new user of interest to at least one access device to collect data streams associated with the new user of interest. | 04-18-2013 |
20130097309 | METHOD AND APPARATUS FOR CARRIER CONTROLLED DYNAMIC RATE ADAPTATION AND CLIENT PLAYOUT RATE REDUCTION - A method and system is provided for controlling bandwidth rate limiting and client rendering rate limiting in a video delivery network. The method provides network service providers with a means for overriding video delivery data rates selected through dynamic client bitrate adaptation, as well as video data rendering rates of the clients, to limit the impact of network congestion. A system is also specified for implementing a client and a proxy computer in accordance with the method. The system works transparently with standard HTTP-based video delivery systems and includes an HTTP proxy cache infrastructure to support bandwidth rate limiting and client rending rate limiting. The system further provides for administrative overrides of client bitrate selection and client bandwidth usage. | 04-18-2013 |
20130097310 | CONFIGURABLE ALERT DELIVERY IN A DISTRIBUTED PROCESSING SYSTEM - Configurable alert delivery in a distributed processing system include for each alert generated by an incident analyzer, applying active alert filters to the alert; wherein applying the active alert filters to the alert includes: creating a list of all active alert filters and a set of all active listeners; and for each active alert filter, running the active alert filter; if the active alert filter indicates that the alert should not go to one or more of the active listeners, removing the one or more active listeners from the set of all active listeners; if the active listeners set is empty, stopping processing of the alert; and if the active listeners set is not empty, selecting, by the incident analyzer, the next active alert filter from the active alert filter list. | 04-18-2013 |
20130097311 | METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Example methods and apparatus to determine impressions using distributed demographic information are disclosed. A disclosed example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged. | 04-18-2013 |
20130097312 | METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Example methods and apparatus to determine impressions using distributed demographic information are disclosed. A disclosed example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged. | 04-18-2013 |
20130097313 | WEB PAGE LOAD TIME PREDICTION AND SIMULATION - Embodiments of automated cloud service performance prediction are disclosed. The automated cloud service performance prediction includes extracting one or more dependency relationships for each web object in the webpage. The prediction further includes determining an original performance metric value and original timing information associated with a page loading of a webpage. The prediction also includes simulating a page loading of the webpage based on the adjusted timing information and the dependency relationships to estimate a new performance metric value associated with the simulated page loading of the webpage. The prediction additionally includes comparing the original performance metric value to the new performance metric value to determine whether the adjusted timing information increased or decreased the new performance metric value relative to the original performance metric value. | 04-18-2013 |
20130097314 | MANAGING INVENTORY DATA FOR COMPONENTS OF A SERVER SYSTEM - Techniques are disclosed for managing inventory data for components of a server system. In one embodiment, a global management controller is provided, that is operatively connected to a plurality of local management controllers. Each local management controller is configured to manage a subset of the components of the server system. Each local management controller is also configured to generate, for each component, a checksum based on vital product data (VPD) of the component. Each local management controller is also configured to compute a composite checksum based on the checksums generated for the components in the subset. The global management controller is configured to maintain a global view of the VPD in the computer system, based on the checksums and/or composite checksums. | 04-18-2013 |
20130103821 | WIRELESS NETWORK PERFORMANCE MONITORING - A system and method include determining an amount of network traffic to add to traffic in the network to emulate a desired condition, beginning a test of the network such that network nodes generate test traffic in accordance with the determined amount of network traffic to emulate the desired condition, receiving the test traffic, and calculating network performance measures as a function of the received test traffic. | 04-25-2013 |
20130103822 | SYSTEM AND METHOD FOR NETWORK MANAGEMENT - System and methods for inferring network topology are described, including a method comprising determining a normalized transmit power of a first device, identifying a second device based upon a parameter of the second device and the normalized transmit power of the first device, and generating a topology including the first device and the second device based upon at least one of the normalized transmit power of the first device and the parameter of the second device. | 04-25-2013 |
20130103823 | EVENT PREDICTION AND PREEMPTIVE ACTION IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold). | 04-25-2013 |
20130103824 | Portable terminal receiving remote support, remote support method, program, operator system, operator server, and operator terminal for remote support - When not the target device accessed by an operator terminal but other devices communicatably connected therewith have problems, the setting operation and the status viewing of the device with a problem are enabled through the target device accessed by an operator terminal. The portable terminal detects the electric appliance connected with a local area network connected with the portable terminal, in response to an instruction from the operator terminal. The portable terminal enables the setting operation and the status viewing of the electric appliance from the operator terminal based on the determined model related information, so that the problem of the electric appliance can be solved. | 04-25-2013 |
20130103825 | AUTOMATIC RESOURCE MEASURING SYSTEM - The invention discloses an automatic resource measuring system, in other words an ARM system, to measure resources of a workflow or to form a workflow model for resource management in a distributed system. The ARM system is arranged to measure the distributed system to be examined and comprises radio transmitters which are station transmitters and task transmitters. Furthermore the ARM system comprises data collectors with a radio receiver for receiving the signals from the station transmitters and the task transmitters at the area of the station and a data server for receiving and processing the data collected by data collectors. The ARM system applies an interrupt signal to selectively mute task transmitters for a random time to avoid collision problems. The data collector transmits its arrival and exit data and task arrival data. This data is associated with a moment of time at the latest when said data arrives at the data server. | 04-25-2013 |
20130103826 | AUTOMATED SERVICE TIME ESTIMATION METHOD FOR IT SYSTEM RESOURCES - Embodiments provide a method for upgrading resources in a system including normalizing a collected dataset, scattering data from the normalized dataset, obtaining a plurality of clusters based on the scattered data, discarding one or more clusters from the plurality of clusters with less than a percentage of a total number of observations, in each cluster, performing clusterwise regression and obtaining linear sub-clusters in a defined number, reducing one or more sub-clusters including applying a refinement procedure, removing one or more sub-clusters that fit to outliers and merging pairs of clusters that fit an equivalent model, updating one or more clusters with the reduced sub-clusters, removing one or more globular clusters, reducing a number of clusters with the refinement procedure, and de-normalizing one or more results. | 04-25-2013 |
20130103827 | CLOUD COMPUTING ENHANCED GATEWAY FOR COMMUNICATION NETWORKS - A network traffic managing node of a local area network, such as a router or gateway, can monitor network traffic of the local area network. A network event associated with the local area network is detected using the network traffic managing node. The network event is reported from the network traffic managing node to one or more servers of a cloud-based computing network. A network policy update for the network traffic managing node is received from the cloud-based computing network. The network policy update is based, at least in part, on a type of network event reported to the cloud-based computing network. The network policy update is implemented at the network traffic managing node to process and/or resolve the network event. | 04-25-2013 |
20130103828 | THIRD PARTY VERIFICATION USING OVERRIDE IP ADDRESSES - Techniques for third party verification using override IP addresses is described, including detecting a request header from an endpoint, the request header being associated with a request for a media file, initiating a download of the media file to the endpoint, evaluating the request header to identify an address associated with the endpoint, generating a notification comprising the address, the notification being configured to indicate the address overrides a source address identified by a field in a packet associated with the request header, and sending the notification to report data associated with the media file, wherein the address overrides the source address to identify a source of the request. | 04-25-2013 |
20130103829 | COMPUTER SYSTEM, METHOD, AND PROGRAM - Traffic data while the system is in operation is collected for a certain time as a preprocess. Typical patterns are extracted from the collected traffic data. Next, stream programs are created for the individual typical patterns and stored for the future reference. Next, the IDs of alternative tasks for transition among different stream programs are stored. In actual system operation, the system measures traffic data regularly or at any time, compares the resultant patterns with the typical patterns, and selects a stream program corresponding to the closest typical pattern as the next phase. Program shutdown time when shifting from the stream program in the present phase to the next phase can be reduced by gradually shifting empty tasks in the present phase to the next stream program as alternative tasks in consideration of the cost of switching between tasks, the cost of transferring data among resources, and so on. | 04-25-2013 |
20130103830 | Time Monitor - A method and system for measuring latency is provided. A monitor node is used to measure latency in a computer network or in a computing device by time stamping signal messages sent from nodes in the computer network and/or tasks in a particular node or device. The time stamps are generated using a system clock of the monitor node to reduce any discrepancies in timing. In addition, the monitor node may compensate for latencies between the monitor node and each of the one or more nodes or devices across which latency is to be measured. Signal messages may include a data message ID and/or a node ID identifying the message that is being tracked and for which latency is being measured. Latency may further be measured across multiple tasks being performed in the same or different nodes or devices by transmitting signal messages for each of the multiple tasks. | 04-25-2013 |
20130103831 | ASSESSING CONDITIONS OF POWER CONSUMPTION IN COMPUTER NETWORK - A display apparatus including: a collecting unit that collects power consumption information, wherein the power consumption information shows power consumption of a connecting device, and the connecting device interconnects a plurality of communication paths in a computer network; and a display unit that displays power consumption of the computer network, based on the power consumption information and constituent units based on a virtual network which is configured virtually on the computer network. | 04-25-2013 |
20130103832 | STREAM APPLICATION PERFORMANCE MONITORING METRICS - Techniques are disclosed for calculating performance metrics associated with a data stream. A processing element configured to process data tuples flowing through a stream-based computing system receives data tuples via the data stream. Each of the one or more tuples is processed at the processing element, and each of the one or more tuples are associated with metadata that includes information related to the processing of the tuple by the processing element. Performance metrics are then calculated for the data stream based on the metadata associated with the one or more tuples. | 04-25-2013 |
20130103833 | METHOD AND APPARATUS FOR A MOBILE NODE TO CONNECT DIFFERENT ACCESS ROUTERS WHILE MAINTAINING A CONSISTENT NETWORK ADDRESS - In a Proxy Mobile IPv6 (PMIP) network, a mobile node can roam between different access networks while maintaining a consistent IP address for session continuity. To provide access to a user's home LAN resources, even when the user's mobile node is not directly attached to the home LAN, a local mobility anchor and mobility access gateway are configured to authenticate the mobile node credentials and if authorised, to provide access to the user's LAN resources by via data tunnels and routing table reconfigurations. | 04-25-2013 |
20130111005 | Online Active Learning in User-Generated Content Streams | 05-02-2013 |
20130111006 | REAL TIME ENTERPRISE INFORMATION SYSTEM FOR SYMBIOTIC COMPUTING | 05-02-2013 |
20130111007 | MOBILE AND BROWSER APPLICATION PERFORMANCE MANAGEMENT | 05-02-2013 |
20130111008 | NETWORK SERVICE MONITORING AT EDGE NETWORK DEVICE | 05-02-2013 |
20130111009 | Method and System for Indirectly Establishing a Unique Communication Channel Between a Plurality of Devices | 05-02-2013 |
20130111010 | APPLICATION SCOPE ADJUSTMENT BASED ON RESOURCE CONSUMPTION | 05-02-2013 |
20130111011 | SERVER-SIDE TRACING OF REQUESTS | 05-02-2013 |
20130111012 | SYSTEM AND METHOD FOR EVENT DETECTION AND CORRELATION FROM MOVING OBJECT SENSOR DATA | 05-02-2013 |
20130111013 | SYSTEMS, METHODS, AND APPARATUS TO IDENTIFY MEDIA PRESENTATION DEVICES | 05-02-2013 |
20130111014 | NETWORK ANALYSIS DEVICE AND METHOD | 05-02-2013 |
20130111015 | SERVER CLUSTER MONITORING | 05-02-2013 |
20130111016 | Distributed capture and aggregation of dynamic application usage information | 05-02-2013 |
20130111017 | STATE TRACKING SYSTEM VIA SOCIAL NETWORK INTERFACE AND METHOD THEREOF | 05-02-2013 |
20130111018 | PASSIVE MONITORING OF VIRTUAL SYSTEMS USING AGENT-LESS, OFFLINE INDEXING | 05-02-2013 |
20130111019 | USER BEHAVIOR ANALYZER | 05-02-2013 |
20130111020 | Monitoring Application Program Resource Consumption | 05-02-2013 |
20130111021 | REAL-TIME NETWORK MONITORING AND SECURITY | 05-02-2013 |
20130111022 | MONITORING CONTROL DEVICE, SERVER DEVICE AND MONITORING CONTROL METHOD | 05-02-2013 |
20130111023 | METHOD FOR APPLICATION EXTENSION AND IMAGE DISPLAY APPARATUS USING SAME | 05-02-2013 |
20130117434 | SERVICE ASSURANCE USING NETWORK MEASUREMENT TRIGGERS - A method performed in a network element for reacting to communication performance measurements that fall outside of communication performance thresholds. The network element generates a communication performance measurement between a first endpoint and a second endpoint, wherein each endpoint is a point of communication in the network and at least the first endpoint resides on the network element. The network element retrieves a communication performance threshold and determines whether the communication performance measurement falls outside of the communication performance threshold. The network element generates a trigger associated with the communication performance measurement and the communication performance threshold when it is determined that the communication performance measurement falls outside of the communication performance threshold. The network element retrieves a registered handler associated with the generated trigger to indicate that the registered handler requires execution in response to the generated trigger and executes the registered handler. | 05-09-2013 |
20130117435 | Context-Aware Model-Driven Hierarchical Monitoring Metadata - Metrics are defined and collected for an application. The metrics are organized in hierarchical trees with metrics aggregated at each node in the trees. Each tree represents a different permutation of the metrics. A particular metric may occur in more than one tree. A user interface provides a default drill-down that allows users to jump from one metric to another so that only the most useful information is presented to the user. The default drill-down is defined to provide the user with a best practices method to identify and correct problems or errors in the application. Users may modify the default drill-down path. | 05-09-2013 |
20130117436 | AUTOMATIC CONFIGURATION CONSISTENCY CHECK - Reliability and performance of complex applications executed across workload groups of one or more host computer systems may be improved by automating the verification of consistent policies across the workload groups. An automatic verification process may be executed on a host computer system to identify workload groups that are not collecting statistics, to identify polices that are not enforced on certain workload groups, to identify policies that are not in force for certain periods of the day, and to identify policies that are disabled. Where an application has a complex configuration, the automatic verification process allows an administrator to identify inconsistent policies. | 05-09-2013 |
20130117437 | METHOD FOR ESTABLISING TCP CONNECTING ACCORDING TO NAT BEHAVIORS - The present invention is to provide a method for establishing TCP connection according to NAT (Network Address Translation) behaviors, which is applied to a network system having a NBA (NAT Behavior Aware Server) located in the Internet and connected to two NATs in two private networks respectively. The method enables two network devices in the respective private networks to send testing messages to the NBA via the respective NATs. In response, the NBA sends reply messages to each network device to test the behaviors of the NATs respectively. Afterward, each network device generates a test result message according to each behavior of the corresponding NAT and sends the same to the NBA. Based on the test result messages, the NBA selects an optimal traversal technique from candidate traversal techniques, thereby allowing the network devices to respectively and directly traverse the NATs and establish a direct TCP connection therebetween. | 05-09-2013 |
20130117438 | METHODS FOR ADAPTING APPLICATION SERVICES BASED ON CURRENT SERVER USAGE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that monitor one or more capacity related factors of one or more servers providing one or more services to one or more client computing devices to obtain one or more values. An adaption factor for at least one of the one or more client computing devices is determined based on the one or more obtained values for the one or more monitored capacity related factors and one or more adaption rules. The adaption factor may further be determined based on obtained user profile information. The determined adaption factor to adapt operation of the one or more provided services at the at least one of the one or more client computing devices is provided. | 05-09-2013 |
20130117439 | METHOD FOR DISCOVERING A DYNAMIC ADDRESS OF A COMMUNICATION DEVICE - A method for discovering a communication device is disclosed. The method includes: receiving in the communication device a communication including a request for an address and an identification of an application, in response to receiving the communication, associating a dynamic address of the communication device with the identified application, and sending a second communication directly or indirectly to a client device, the second communication including the dynamic address. The communication device may further obtain a dynamic address in response to receiving the communication. The dynamic address may be used for a dedicated purpose, such as for receiving a file for subsequent use by the application. | 05-09-2013 |
20130117440 | SERVICE COLLABORATION DEVICE, SERVICE COLLABORATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A service collaboration device | 05-09-2013 |
20130117441 | UPGRADING ENTERPRISE MANAGERS - Techniques are described for upgrading systems that include a first set of agents for collecting target data from a plurality of targets and sending the target data to a first management server. In an embodiment, a second set of agents is pre-deployed. Each pre-deployed agent is configured to, upon activation, collect target data from a respective target of the plurality of targets and send the target data to a second management server. While the pre-deployed agent remains inactive, an agent from the first set of agents collects and sends the target data to the first management server. When a first batch of one or more pre-deployed agents is activated, each activated agent begins collecting target data and sending the target data to the second management server. For agents not in the first batch, the first set of agents continues to collect and send the target data. | 05-09-2013 |
20130117442 | NETWORK CONTENT MONITORING - A set-top-box is provided for receiving broadcast media content and processing said content for presentation on a display. A processor 304 of the STB is configured to receive, from between a router circuit and a modem circuit, data packets sent over a local network. The data packets are sent to or from a local internet connected user device via the router as part of the local network. The processor is further configured to analyse the received data packets to determine whether they contain undesired content and, if so, to control the display to present an indicator containing at least one property of the detected undesired content. Because the STB is coupled to a display that tends to be the main display in a household, the indicator is more likely to be seen and acted on by a responsible party, thus parents will be more easily able to monitor the activity of their children when they use user devices to access the internet over a home network. | 05-09-2013 |
20130117443 | METHOD, APPARATUS AND SYSTEM FOR JOINT OPTIMIZATION - Embodiments of the present invention disclose a method, an apparatus and a system for joint optimization. The method for joint optimization includes: decomposing the joint optimization of an entire network into the joint optimization performed in each sub-network, regarding a bandwidth requirement for a server off the sub-network as a bandwidth requirement for a virtual server on a port, iteratively performing the joint optimization in each sub-network, and applying results of the joint optimization in the network. In the embodiments of the present invention, the bandwidth requirement for the server off the sub-network is regarded as the bandwidth requirement for the virtual server on the port, the joint optimization is iteratively performed in each sub-network, and the results of the joint optimization are applied in the network, so that the joint optimization of the entire network is performed in parallel. | 05-09-2013 |
20130117444 | LOAD-BALANCING DYNAMIC WEB SERVICES SYSTEM AND METHOD - A Dynamic Web Service server may facilitate custom Enterprise Application interface development with little or no developer input by dynamically creating a web service for performing a particular transaction according to a transaction map. An Enterprise Application client device may create a transaction map by “recording” a transaction between an Enterprise Application client and an Enterprise Application server and mapping transaction fields to a custom interface generated to collect data for re-performing the recorded transaction. The Enterprise Application client device may call the dynamic web service, and the Dynamic Web Service server may then select a worker to perform the recorded transaction using input data collected in the custom interface. | 05-09-2013 |
20130117445 | SYSTEM AND METHOD FOR MONITORING AND MAINTAINING A WIRELESS DEVICE - A system is disclosed in which a wireless device is monitored and maintained over a network. One embodiment of the system comprises a wireless device including: a service to maintain data objects, provide messaging capability, and provide data access capability on behalf of a user of the wireless device; and a rules engine communicatively coupled to the service to execute a set of rules transmitted to the wireless device from a server, the set of rules to instruct the rules engine to gather information related to the wireless device and to take action on the wireless device based on the gathered information. | 05-09-2013 |
20130117446 | ADDRESS MANAGEMENT IN A CONNECTIVITY PLATFORM - Disclosed are an approach form managing and assigning addresses in a connectivity platform that allows for proprietary connectivity modules (Providers) to plug into the operating system. In this disclosure, when a user/application/computing device, connects to another user on another computing device an address is generated for that user. However, because of a limited number of addresses that are available in an address space, it is necessary to ensure that a conflicting address is not present. To ensure this the connectivity platform determines if the address assigned is in conflict with another address associated with users that are located on the other computing devices. If an address is found to be in conflict the connectivity platform reassigns the address until a non-conflicting address is found. If a non-conflicting address cannot be found the connectivity platform blocks the connection between the user and the other user. | 05-09-2013 |
20130117447 | COMPUTER-READABLE RECORDING MEDIUM STORING PROCESS FOR MONITORING COMPUTER, ITS METHOD AND APPARATUS - For each group including a plurality of computers, a monitoring computer includes a storage storing a monitoring path which associates a monitoring-source computer that is an origin of monitoring with at least one computer that is both a monitored target and a monitoring source. When an instruction including specification information specifying a group is given, the monitoring computer references the monitoring path in the storage and distributes a monitoring path related to the group specified by the specification information to each computer belonging to the group specified by the specification information. The monitoring computer makes a request for the monitoring-source computer that is the origin of monitoring in the monitoring path to monitor another computer in conformity with the monitoring path. | 05-09-2013 |
20130124712 | ELASTIC CLOUD NETWORKING - A device receives network infrastructure requirements, and determines availabilities of network resources based on the network infrastructure requirements. The device recommends one or more of the network resources based on the availabilities of the network resources, and receives selection of particular network resources from the recommended one or more network resources. The device also connects the particular network resources to create a virtual network template, and verifies requirements for the particular network resources. The device further tests the virtual network template, and deploys the virtual network template via the particular network resources when the testing of the virtual network template is successful. | 05-16-2013 |
20130124713 | PATTERN-BASED COMPUTATIONAL HEALTH AND CONFIGURATION MONITORING - Monitoring knowledge is distilled into platform-nonspecific patterns of high-level language elements compiled into management packs or other rule packs targeting specific platforms. A server health and/or configuration monitoring knowledge compiler accepts distillation document(s) and target-specific information, and generates target-specific rule packs to be consumed by monitoring tools to monitor specific target platforms consistent with the platform-nonspecific monitoring elements. Computational rule pack generation is qualitatively different from manual rule pack creation. Plug-ins tailor the compiler to generate on-premises or cloud-based rule packs. Distillation element examples include monitor alert types, instructional content types, target attributes and tags, monitored item types, event alert types, performance collection types, policy monitor types, and threshold monitor types. Tags on monitoring elements indicate relevant products, locations, product features, monitoring tool features, contributors, etc. Runtime code is shared by multiple rule packs for different target platforms. | 05-16-2013 |
20130124714 | VISUALIZATION OF COMBINED PERFORMANCE METRICS - Embodiments provide a visualization of combined performance metrics representing the operation of a plurality of computing devices. Sets of host performance metrics corresponding to a plurality of host computing devices are combined to create combined performance metrics, each of which is associated with a performance metric type. The combined performance metrics are plotted in a chart that includes a plurality of axes, each associated with a performance metric type. In addition, a baseline value may be plotted on one or more of the axes. A portion, or the entirety, of the chart may be graphically distinguished when a combined performance metric violates a threshold value. | 05-16-2013 |
20130124715 | APPLET SYNCHRONIZATION ACROSS MULTIPLE ROUTERS - In one embodiment, a method is presented for determining which downloadable applets are exposed to a user of a computer when the computer is connected to a network. Included are the steps of detecting a change in the topology of a network, requesting from a router device topology information for the network, comparing the topology information against a requirements list associated with an application executing on the computing device, where the requirements list delineates at least one of a capability and a service necessary for the application to operate properly within a network, and determining whether the application is supported by the topology of the smart home network. If the application is supported, then the application is exposed, unless the application is not permitted to operate within the network. If the application is not supported or not permitted to operate within the network, then the application is not exposed. | 05-16-2013 |
20130124716 | SYSTEM AND METHOD FOR VIDEO CACHING BASED ON AVAILABLE RESOURCES - A method is provided in one example and includes receiving a data stream; determining a prediction of the amount of resources used to cache the data stream at a network element; identifying current resources being consumed by the network element; and determining whether to cache the data stream based on a sum of the current resources being consumed and the prediction of the amount of resources used to cache the data stream at the network element. | 05-16-2013 |
20130124717 | SELECTIVE IP ADDRESS ALLOCATION FOR PROBES THAT DO NOT HAVE ASSIGNED IP ADDRESSES - Systems and methods for managing communication in an IP network between a server and a probe that does not maintain an IP address by selectively restricting which IP addresses that are identified as active in the network may be borrowed for the probes. Restriction of IP addresses may include a black list to exclude specific IP addresses, a white list from which IP addresses can be drawn or both. This permits control over which IP addresses may be borrowed by probes, reducing false alarms, alerts or other network concerns caused by unexpected IP traffic on a particular IP address in the network. | 05-16-2013 |
20130124718 | DISTRIBUTED APPLICATION USING DIAGNOSTIC HEARTBEATING - A method, system, and computer program product for a improving a distributed application using diagnostic heartbeating are provided in the illustrative embodiments. An application, executing using a processor and a memory in a first data processing system, sends a registration to a component in the first data processing system. The registration requests state information for a set of member components in a distributed domain. After the application sends the registration to the component, the application receives the state information from the component. The state information includes current status and diagnostic information relating to the set of member components obtained from diagnostic attributes of diagnostic heartbeat packets received by the component. A diagnostic heartbeat packet is a packet comprising a header, a set of heartbeat parameters, and a set of diagnostic attributes. | 05-16-2013 |
20130124719 | DETERMINING A BANDWIDTH THROUGHPUT REQUIREMENT - Determining whether an adjustment in the bandwidth allocated to a particular network is appropriate may include polling a bandwidth usage of a device operating on a network over a fixed time interval of time by an application installed on network device, determining whether a current allocated bandwidth level allocated to the network satisfies the polled bandwidth usage, and requesting additional bandwidth from a bandwidth service provider upon determining that the current allocated bandwidth level does not satisfy the polled bandwidth usage. | 05-16-2013 |
20130124720 | USAGE REPORTING FROM A CLOUD-HOSTED, DISTRIBUTED SYSTEM - Collecting usage data in a cluster computing environment. A method includes at a tracker service receiving a request from an at least partially cloud based deployment for an interval for the deployment to report usage information in usage reports. The usage information includes information defining how software in a deployment is used. In response to the request from the deployment, the method further includes, the tracker service providing an interval to the deployment. The method further includes at the tracker service, receiving usage reports from the deployment according to the provided interval. | 05-16-2013 |
20130124721 | Detected IP Link and Connectivity Inference - Embodiments provide systems, methods, and computer program products for inferring the switch port connectivity of discovered but. unmanaged devices in a network without direct access to the devices. Embodiments operate by generating a physical address-to-port map based on collected operational data and then pruning the generated map based on switch port connectivity information and/or inferred link connectivity information. The switch port connectivity of discovered unmanaged devices is then generated or updated based on the pruned map. The switch port connectivity information can be used by various other tools to enable diagramming, asset inventory, and network planning, design, and optimization workflows. | 05-16-2013 |
20130124722 | SYSTEM AND METHOD FOR ADJUSTING CENTRAL PROCESSING UNIT UTILIZATION RATIO - A method for adjusting a central processing unit (CPU) utilization ratio of a cloud server of a datacenter using a remote server. The remote server sets a CPU utilization ratio range for a host operating system (OS) installed in a cloud server. The remote server calculates a score after the guest OS is transferred into the host OS, and calculates the score for revising CPU utilization ratio range after the guest OS is transferred out of the host OS. The remote server revises the CPU utilization ratio range according to the score. | 05-16-2013 |
20130124723 | BUILDING AND SWITCHING IP MULTIMEDIA SESSIONS - Embodiments of the present disclosure include methods and systems of building an IP multimedia session without the use of a central server and switching IP multimedia session among devices. The method of building an IP multimedia session includes receiving a registering request from a plurality of IP multimedia session participant devices, electing a service device from the plurality of participant devices, and building IP multimedia session among the plurality of participant devices by using the elected service device. | 05-16-2013 |
20130124724 | DISTRIBUTED MONITORING AND CONTROL OF NETWORK COMPONENTS - A distributed monitoring system and a computer-implemented method monitors and controls locally situated network components through a monitoring and control device or processor querying the network component operating parameters and sending control commands for controlling the parameters queried. Reports of the status of the monitored network components are periodically generated from throughout the network and sent to a remotely located status viewing station configured to generate a monitoring interface and display the operational status of the network based on the status reports. If necessary, the status viewing station automatically transmits instructions, or a user enters instructions into the status viewing station, for instructing action be taken by the monitoring and control device or processor, e.g., to adjust one or more operating parameters queried. The distributed monitoring system may be particularly useful in monitoring and managing the health of a digital signage network. | 05-16-2013 |
20130124725 | AUTOMATED MANAGEMENT OF GENERALIZED CENTRAL NAME SERVICES BY DISTRIBUTED REMOTE DEVICES - Systems and methods of the present disclosure facilitate updating the translation provided by one or more name servers from symbolic names to network addresses. In some embodiments, the system includes one or more remote devices, a management server, a configuration module, a detection module, and/or an update module. The management server may be configured to monitor and manage the remote device, which may be provided with network addresses by one or more address provisioning servers. Responsive to the detection module detecting a change in the network address of a remote device, the update module may update one or more name servers using an update program that includes templates for a control file, authentication information, and/or a template obtained from the management server. The detection and update modules can execute on remote devices or on the address provisioning server, and can be installed and configured automatically by the management server. | 05-16-2013 |
20130124726 | DYNAMIC RESOURCE ADJUSTMENT FOR A DISTRIBUTED PROCESS ON A MULTI-NODE COMPUTER SYSTEM - A method dynamically adjusts the resources available to a processing unit of a distributed computer process executing on a multi-node computer system. The resources for the processing unit are adjusted based on the data other processing units handle or the execution path of code in an upstream or downstream processing unit in the distributed process or application. | 05-16-2013 |
20130124727 | CLIENT SUITABILITY TEST APPARATUS AND METHOD FOR A SUBSTATION AUTOMATING SYSTEM - The present invention relates to a client suitability test apparatus for a substation automating system with regard to IEC 61850 service between virtual intelligent electronic devices (IEDs) and clients for a plurality of IEDs, wherein the apparatus comprises: a suitability test process generating unit using at least one test model selected from among a plurality of predefined test models, and modeling a suitability test process to test the suitability of a client; a suitability test executing unit for calling a test process model, and executing a suitability test on a client according to the content of the test process model; a communication packet analyzing unit capturing and analyzing a communication packet on a communication response of a virtual IED and the communication request of a client according to the suitability test executing unit; and a test grading unit for grading the suitability test of the client based on test grading conditions of the test process model called by the suitability test executing unit. | 05-16-2013 |
20130132556 | PROVIDING STATUS INFORMATION FOR VIRTUAL RESOURCE IMAGES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for an image provider to specify data (e.g., commands to run, files to read), etc., about an image of a virtual resource (e.g., virtual machine, etc.) in a networked computing environment (e.g., a cloud computing environment). Such data may be used (e.g., at runtime) by a client application to obtain specific information about a running instance that is provisioned based on the image (e.g., operating system health, middleware health, etc.). | 05-23-2013 |
20130132557 | Group User Experience - Disclosed is a method, system and computer programs to provide emergent behavior in a network of connected mobile user devices. The method includes advertising with a mobile wireless communication device to other mobile wireless communication devices a vector list that includes at least mobile wireless communication device specific vectors and mobile wireless communication device user specific vectors. The method further includes determining, in cooperation with a cloud-based data processing environment, whether to connect to a network of other mobile wireless communication devices based at least on at least one element that comprises part of vector lists associated with the other mobile wireless communication devices, the vector lists being stored at the cloud-based data processing environment. | 05-23-2013 |
20130132558 | Server-Side Web Analytics System and Method - There is provided a server-side web analytics computer implemented system and method. In an embodiment the system has at least one computer server for receiving an electronic request from a web enabled source. The computer server has a web application for creating a log message from the electronic request. The computer server further has an automated server-side web analytics system for processing the log message into an action message and for processing the action message into a reporting message. The server-side web analytics computer implemented system generates asynchronously and in near real-time web analytics data from the reporting message. | 05-23-2013 |
20130132559 | USER DEVICE APPLICATION MONITORING AND CONTROL - A system is configured to receive traffic information that identifies an application that is installed on a user device and resources being used to process traffic associated with the application; obtain, as a result of receiving the traffic information, a policy that identifies a particular amount of resources that are authorized for processing particular traffic associated with the application; determine that an amount of the resources being used to process the traffic is greater than the particular amount of resources authorized for processing the particular traffic; and transmit a notification to cause the traffic to be controlled based on the determination that the amount of the resources is greater than the particular amount of resources. The notification to cause the traffic to be controlled causes a base station to reduce the amount of the resources to a level that is less than the particular amount of resources. | 05-23-2013 |
20130132560 | DYNAMIC ADAPTATIONS FOR NETWORK DELAYS DURING COMPLEX EVENT PROCESSING - A message handler may receive a plurality of messages associated with a plurality of events, the events having a temporal relationship to one another. A header inspector may extract latency information from the plurality of messages, the latency information characterizing a transmission duration experienced by each message in traveling from the one or more source nodes through the network. A window manager may correct a disruption in the temporal relationship between at least two events of the plurality of events, the disruption including relative differences in the transmission duration experienced by the at least two events, including relating the at least two events to a time window for processing the at least two events. An event processor may process the at least two events relative to the time window. | 05-23-2013 |
20130132561 | SYSTEMS AND METHODS FOR MONITORING AND CONTROLLING A SERVICE LEVEL AGREEMENT - Methods and systems for monitoring and controlling a service level agreement are disclosed. A disclosed embodiment comprises a cloud platform hosting at least one application associated with at least one service level agreement, a monitoring module for collecting at least one metric relating to an application hosted on the cloud platform and terms of a service level agreement associated with each of the one or more metrics, and monitoring the metric collected against a service level objective in the service level agreement. The system may additionally comprise a controlling module for mapping a service level objective to a predefined operation rule, identifying one or more actions to be taken in accordance with the rule, assigning a priority to the one or more actions identified in accordance with the rule; and performing the one or more actions in accordance with the assigned priority of each of the one or more actions. | 05-23-2013 |
20130132562 | SYSTEM AND METHOD FOR AGGREGATING BANDWIDTH OF MULTIPLE ACTIVE PHYSICAL INTERFACES ON APPLICATION LAYER - The present invention provides a computationally efficient system and method for aggregation of bandwidth of multiple active physical Interfaces based on an application layer. The said system comprises: a user interface for receiving the user defined input; at least one routing table updater for creating and updating routing table that lists the routes to particular destination of the communication link; at least one control module resides in the application layer of protocol stack; and multiple physical interfaces linked with the application layer for receiving and transmission of the data assigned by the said control module. | 05-23-2013 |
20130132563 | BROKERING NETWORK RESOURCES - A method of brokering a network resource | 05-23-2013 |
20130132564 | Electronic Device, System on Chip and Method for Monitoring a Data Flow - An electronic device is provided which comprises a plurality of processing units (IP | 05-23-2013 |
20130132565 | METHOD AND SYSTEM FOR APPLICATION SECURITY EVALUATION - A system and method may be used in generating security profiles for mobile device applications. An application may be installed and executed in a controlled execution environment. Physical, functional, data and/or communications parameters of the executing application may be monitored and/or analyzed. In this regard, the analysis may comprise evaluation based on comparison against benchmark data for the specific type of application being executed and for the specific execution environment. A security profile may be generated based on the monitoring and/or analysis. In this regard, the security profile may include security classification information for the application. The security profile may be made available to servers and/or to user mobile devices. | 05-23-2013 |
20130132566 | METHOD AND APPARATUS FOR DETERMINING USER CONTEXT - An approach is provided for training a device to associate user, object or device context information with a user defined context. The context information platform receives recorded context information from a device. The associated recorded context information is then associated with the context to enable training of a context model associated with the context. | 05-23-2013 |
20130132567 | MOBILE TERMINAL, METHOD AND SYSTEM FOR SHIELDING MOBILE TERMINAL FROM ACCESSING WIRELESS NETWORK INFORMATION - The present invention relates to the technical field of information processing and provides a method for shielding a mobile terminal from accessing wireless network information, which is applied to ensure the mobile terminal to shield the information in a wireless network. The method comprises the steps of: receiving an access command and acquiring a corresponding domain name according to a webpage address in the access command; querying a domain name evaluation record of the domain name and acquiring evaluation of the domain name, wherein the domain name evaluation record comprises the domain name and the evaluation of the domain name; and generating a prompt according to the evaluation of the domain name. The present invention also provides a mobile terminal capable of shielding the information in the wireless network. The present invention also provides a system for shielding the mobile terminal from accessing the wireless network information. | 05-23-2013 |
20130132568 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 05-23-2013 |
20130132569 | USING ENDPOINT HOST CHECKING TO CLASSIFY UNMANAGED DEVICES IN A NETWORK AND TO IMPROVE NETWORK LOCATION AWARENESS - A device receives, from a managed device, endpoint information associated with an unmanaged device connected to the managed device in a network. The device also receives unmanaged device information that partially identifies the unmanaged device, and completely identifies the unmanaged device based on the endpoint information and the unmanaged device information. | 05-23-2013 |
20130132570 | METHOD AND APPARATUSES FOR POLICY DECISIONS ON USAGE MONITORING - The present invention improves control rules requests between reporting periods, and provides for enhanced PCRF and PCEF carrying out a method of controlling usage of network resources. This method comprises: determining at the PCEF events requiring control rules; requesting control rules and providing information about usage of network resources during the re-porting period from the PCEF to the PCRF; determining at the PCRF first control rules by using the information about usage of network resources; determining at the PCRF second control rules by using an initial value for usage of network resources during a next reporting period; submitting from the PCRF to the PCEF the first and second control rules; enforcing at the PCEF the first control rules received from the PCRF; and upon starting the next reporting period for the user, inactivating the first control rules and enforcing at the PCEF the second control rules received from the PCRF. | 05-23-2013 |
20130132571 | METHOD AND DEVICE FOR NETWORK TRAFFIC MANIPULATION - A device for manipulating data traffic related to a target connected to a data communications network whose elements communicate by means of an HTTP protocol comprises: a redirection device, which is adapted to be connected to the data communications network by means of a plurality of sniffing interfaces and a packet sending interface; a proxy, which is adapted to be connected to the data communications network by means of an HTTP connection interface, a packet receiving interface and a packet injection interface; and is characterized in that the redirection device is configured to monitor, by means of the sniffing interfaces, the network traffic in order to identify within the network traffic at least one data packet associated with the target and to redirect, by means of the packet sending interface, the at least one data packet associated with the target toward the proxy. | 05-23-2013 |
20130138795 | Cache Eviction During Off-Peak Transactions - Transaction activity of a cache maintaining content may be monitored to determine periods of transaction activity below a first threshold amount of transactions. A period of anticipated transaction activity above a second threshold amount of transactions may be determined. A period of anticipated transaction activity below the first threshold may be selected based upon the monitored periods of transaction activity below the first threshold and the determined period of anticipated transaction activity above the second threshold. Content then may be evicted from the cache during the selected period of anticipated transaction activity. | 05-30-2013 |
20130138796 | DISTANCE-BASED NETWORK RESOURCE DISCOVERY - An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource. | 05-30-2013 |
20130138797 | CONTEXT AWARE DEVICE DISCONNECTION - Systems, methods and products directed toward context aware device disconnection are provided herein. One aspect includes obtaining one or more physical measurements of an information handling device connected to one or more external systems, the one or more physical measurements being measured using one or more physical characteristic measurement elements; analyzing the one or more physical measurements using one or more policy settings configured in one or more disconnection policies stored on the information handling device; and initiating one or more disconnection events responsive to the one or more physical measurements matching the one or more policy settings. Other embodiments are described herein. | 05-30-2013 |
20130138798 | PREDICTIVE AND DYNAMIC RESOURCE PROVISIONING WITH TENANCY MATCHING OF HEALTH METRICS IN CLOUD SYSTEMS - According to one embodiment of the present invention, a method computing resources are dynamically provisioned to meet service level objectives in a cloud computing environment. Resources available for provisioning to the cloud computing environment are determined and the quality thereof monitored. Current resource needs for a cloud job tenancy are determined, and selected resources are dynamically provisioned from resources available for provisioning based on the current resource needs and the quality of the resources available in order to meet the cloud job tenancy and the service level objectives. | 05-30-2013 |
20130138799 | ADAPTIVE POWER MANAGEMENT FOR MULTIMEDIA STREAMING - What is disclosed is a method and system for determining whether to continue or halt the transmission of a keep-alive message to a streaming media provider when a streaming session is paused. At least one characteristic of a wireless device streaming media data playback from a streaming media provider is monitored. A determination is made whether the playing of the media data from a streaming media provider has been paused. Based on the characteristic and the playing of the media data from a streaming media provider being paused a transmission of a keep-alive message to the streaming media provider is halted. Media characteristics and operating characteristics are used in the determination of whether a keep-alive message is continued to be transmitted. | 05-30-2013 |
20130138800 | SYSTEM FOR OPTIMIZING LATENCY IN AN AVB NETWORK - A network communication system includes a talker that may communicate a data stream having an optimal presentation time to a plurality of listeners over a network, such as an Ethernet Audio/Video Bridging network. The optimal presentation time may be determined by a maximum latency among a plurality of latencies for connections between the talker and the listeners. A controller may communicate with the listeners to determine the maximum latency. The controller may also provide the maximum latency to the talker and the listeners. The talker may determine the optimal presentation time based on the maximum latency. The listeners may allocate an optimum amount of resources to buffer the data stream before the data in the data stream is presented. | 05-30-2013 |
20130138801 | SYSTEM AND METHOD FOR ADAPTIVE DATA MONITORING - A monitoring information reporting system for a client computer, the system provides monitoring information to a server computer which receives monitoring information for analysis. The system provides a framework for a client computer to identify to a server computer the monitoring information it can provide. The server computer then determines, based on the notification, whether monitoring information is to be provided, and if so, the specific monitoring information that will be provided. When monitoring information is to be provided, the server computer sends a response to the client computer with a command to control the client computer to collect monitoring information, which is then provided to the server computer. In this way, the server computer can control the amount and nature of monitoring information collected and transferred. | 05-30-2013 |
20130138802 | METHOD AND SYSTEM FOR FUNCTIONAL MONITORING IN MULTI-SERVER RESERVATION SYSTEM - Methods and systems for functional monitoring of a reservation system. A specific architecture, which reproduces a system of monitored terminals, includes gauges connected in a specific manner to take into account rules already set between the terminals. The architecture is produced in order to monitor a specific part of the system of terminals as requested by the user. New indicators are defined with specific rules and calculated with corresponding formulae based on the existing indicators. For example, a rule can be a request for receiving an indication of when a specific level of occupied seats in a plane is reached in order to allow the flight to occur. The answer to the request refers to a specific calculation based on current data coming from a real situation of checking the number of occupied seats on a regular basis. | 05-30-2013 |
20130138803 | METHOD FOR MONITORING A PLURALITY OF RACK SYSTEMS - A method for monitoring a plurality of rack systems is provided, which includes the following steps. The rack systems are provided, in which each rack system includes an integrated management module (IMM) and a plurality of servers, and the IMM is communicatively connected to the servers and manages and controls the servers. The rack systems are distributed into at least one rack system group, in which each rack system group includes a first rack system and a second rack system, and the first rack system and the second rack system respectively include a first IMM and a second IMM. The first IMM and the second IMM are communicatively connected, monitor each other, and judge whether an anomaly occurs in each other. When the first IMM judges that an anomaly occurs, the first IMM sends a warning message including the anomaly of the second rack system. | 05-30-2013 |
20130138804 | SERVER RACK SYSTEM - A server rack system includes a rack, a rack management module, a plurality of servers, a management network connection module, and an identification module. The rack management module is located in the rack and is coupled to a management network line. Each server is respectively plugged in the rack, and respectively has a baseboard management controller (BMC) used to monitor a working state of the server. The management network connection module is located in the rack and used to connect the rack management module and the BMCs through the management network line. The identification module is located in the rack, so as to enable the corresponding server to generate an identification code signal. The rack management module identifies a physical position of each server in the rack according to the identification code signal of each server and a corresponding relation record between the identification code signal and the physical position. | 05-30-2013 |
20130138805 | METHOD FOR MONITORING A PLURALITY OF RACK SYSTEMS - A method for monitoring a plurality of rack systems is provided, which includes the following steps. The rack systems are provided, in which each rack system includes an integrated management module (IMM) and a plurality of servers. The IMM is communicatively connected to the servers in each rack system and manages and controls the servers. The rack systems are distributed into at least one rack group, and one of the IMMs in each rack group is selected to serve as a primary IMM, in which the IMMs in each rack group are communicatively connected to each other. The primary IMM monitors other IMMs than the primary IMM in the corresponding rack group. When an anomaly occurs in one of the other IMMs, the primary IMM sends a warning message including the abnormal IMM. | 05-30-2013 |
20130138806 | PREDICTIVE AND DYNAMIC RESOURCE PROVISIONING WITH TENANCY MATCHING OF HEALTH METRICS IN CLOUD SYSTEMS - According to one embodiment of the present invention, a method computing resources are dynamically provisioned to meet service level objectives in a cloud computing environment. Resources available for provisioning to the cloud computing environment are determined and the quality thereof monitored. Current resource needs for a cloud job tenancy are determined, and selected resources are dynamically provisioned from resources available for provisioning based on the current resource needs and the quality of the resources available in order to meet the cloud job tenancy and the service level objectives. | 05-30-2013 |
20130138807 | Pre-Scheduling of Quality of Service Reservation - The present disclosure relates to a technique for scheduling resource reservations of services in a service providing network. A method embodiment comprises the steps of receiving a resource reservation request indicating a preferred time period for delivery of a requested service available in the network; and scheduling resource reservation of the requested service based on statistical information related to resource utilisations or reservations of one or more services available in the network and the preferred time period for delivery of the requested service. | 05-30-2013 |
20130138808 | MONITORING AND MANAGING DATA STORAGE DEVICES - Monitoring and managing multiple data storage devices in association with multiple computers by obtaining at a data storage device manager a value for an attribute associated with at least one data storage device that is accessible to a first computer, obtaining at the data storage device manager a value for an attribute associated with at least one data storage device that is accessible to a second computer that is separate from the first computer, determining at the data storage device manager whether any of the attribute values meets a predefined condition that is associated with the attribute, and if any of the attribute values meets the predefined condition, causing any of the computers from which the attribute value was received to perform a maintenance operation in association with the data storage device that is associated with the attribute value. | 05-30-2013 |
20130138809 | RELEVANT ALERT DELIVERY IN A DISTRIBUTED PROCESSING SYSTEM - Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system. | 05-30-2013 |
20130145014 | PROVIDING NOTIFICATION OF DOCUMENT REPOSITORY EVENTS TO EXTERNAL SYSTEMS - Remote event receivers can register with a document repository computing system to receive notifications of events occurring at a document repository. The remote event receivers may register to receive notifications synchronously, whereby the remote event receivers can provide a response to the notification prior to the occurrence of the event, or asynchronously, whereby the remote event receivers provide no response. Synchronous remote event receivers can also specify in a response to the notification that the event should be canceled or may specify properties that should be changed. Remote event receivers can be pre-event receivers that receive notifications prior to the occurrence of an event, or post-event receivers that receive notifications following the event. When an event is to occur at the document repository, notifications are provided to the pre-event remote event receivers. Once the event has occurred, notifications are provided to the post-event remote event receivers. | 06-06-2013 |
20130145015 | OVERHEAD MANAGEMENT FOR EVENT TRACING - The present invention relates to managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data. | 06-06-2013 |
20130145016 | METHODS AND APPARATUSES FOR DOMAIN MANAGEMENT - The distribution of media content within a subscriber domain is controlled at a server. A subscriber domain is defined as an association including one or more subscriber devices, which can be protected with different Digital Rights Management (DRM) systems and one or more gateways, which can source different media content, with different format using different content distribution networks. The server is responsible for distributing, authorizing and monitoring media content within a subscriber domain of devices. | 06-06-2013 |
20130145017 | OPTIMIZATION OF MOBILE TRAFFIC DIRECTED TO PRIVATE NETWORKS AND OPERATOR CONFIGURABILITY THEREOF - Systems and methods for optimization of mobile traffic directed to private networks and operator configurability thereof are disclosed. One embodiment includes a method, which may be implemented on a system, for identifying a network accessed by mobile traffic at a mobile device, identifying an operator of the network, and/or determining whether the mobile traffic is directed towards a private or public network. In response to determining that the mobile traffic is directed towards a private network, determining whether the private network is owned by or operated by the operator. Optimization of the mobile traffic is performed based on policies set by the operator. In general, the system maintains and/or enforces different sets of policies regarding mobile traffic optimization set by different and multiple operators. | 06-06-2013 |
20130145018 | OPERATION DELAY MONITORING METHOD, OPERATION MANAGEMENT APPARATUS, AND OPERATION MANAGEMENT PROGRAM - A delay in a configuration changing operation of a computer system including a manual procedure and an automatic procedure is detected. | 06-06-2013 |
20130145019 | METHOD AND APPARATUS FOR OPTIMIZING RESPONSE TIME TO EVENTS IN QUEUE - A system for optimizing response time to events or representations thereof waiting in a queue has a first server having access to the queue; a software application running on the first server; and a second server accessible from the first server, the second server containing rules governing the optimization. In a preferred embodiment, the software application at least periodically accesses the queue and parses certain ones of events or tokens in the queue and compares the parsed results against rules accessed from the second server in order to determine a measure of disposal time for each parsed event wherein if the determined measure is sufficiently low for one or more of the parsed events, those one or more events are modified to a reflect a higher priority state than originally assigned enabling faster treatment of those events resulting in relief from those events to the queue system load. | 06-06-2013 |
20130145020 | Method and System for Identifying Website Visitors - A website server computer hosting a website can identify a visitor to the website by using information provided by a visitor server computer that interacts with the visitor. The information provided by the server computer, in some embodiments, can be a combination of an IP address and characteristics of a computing device from where the visitor visits the website. In some embodiments, the IP address of the visitor server computer is used. In embodiments where the visitor may be sharing the computing device with other users, the characteristics may include at least one characteristic that is uniquely associated with the visitor. The website server computer can use a visitor identifier thus generated to start tracking the pages that the visitor requests during the session and can generate and customize pages for the visitor by using characteristics originated from the visitor. | 06-06-2013 |
20130145021 | Intelligent Network Alarm Status Monitoring - Systems and methods enable automated, transparent and efficiently scalable alarm monitoring, display, notification, redundant alarm suppression and root-defect resolution in telecom networks, resulting in transparent visibility with intuitive navigation from a network management GUI down to the network element hardware status registers of concern. A logical alarm propagation hierarchy enables efficient root defect resolution in large networks with extensive amounts of individual defects capable of causing alarms, based on hyperlinked navigation from top-level NE alarm indicators down to bottom-level defect status registers. Un-monitored defects (e.g., non-service affecting defects) are prevented from causing unnecessary alarms, and alerts are produced to notify the network operations staff of new NE alarms. Techniques are used to minimize the frequency of such alarm notifications while providing a comprehensive and clear view of the network alarm status, even under heavy loads of defect activity. | 06-06-2013 |
20130145022 | METHODS AND APPARATUS TO DETERMINE MEDIA IMPRESSIONS - Examples to determine media impressions are disclosed. An example method includes detecting a cookie identifier established by a database proprietor at a computing device, determining an impression of media, wherein the impression occurs after the cookie identifier is established, determining a first panelist identifier associated with the impression based on the cookie identifier, determining a second panelist identifier associated with the impression based on determination of a user identity by a panelist meter associated with the computing device, and storing an adjustment factor determined by comparing the first panelist identifier and the second panelist identifier. | 06-06-2013 |
20130145023 | PERSONALIZATION OF INFORMATION CONTENT BY MONITORING NETWORK TRAFFIC - A home network system that personalizes the selection of information content in accordance with an interest of a user of the network is disclosed. More specifically, a method and apparatus are described for automatically presenting an information content of interest to the user, being provided by an Internet site external to the network. The contents of interest may be determined in accordance with an access pattern of the user or a frequency of the use of particular topic in the content. | 06-06-2013 |
20130145024 | METHOD AND APPARATUS FOR TRANSFER OF RADIO RESOURCE ALLOCATION - An approach is provided for initiating a device action in response to determining context information associated with a device, a user of the device, or a combination thereof. Activity information on at least one of the device and one or more other devices is monitored by a context processing platform. The context processing platform defines a context based on the activity information. An action is then executed by the device or the one or more other devices based on the determined context. | 06-06-2013 |
20130145025 | PROGRAMMABLE CONTROLLER - The present invention includes a connection unit that performs reception of a request from an upper-level device and transmission of a response thereto via the established connection for each application; a communication buffer that temporarily stores requests received by the connection unit for each connection; a system main unit that reads a requested device value from the input/output memory area; a priority storage area that stores setting of a priority level for each connection; and a communication scheduling unit that successively obtains requests from the communication buffer, transfers the obtained request to the system main unit, and transfers the device value read by the system main unit to the connection unit as a response, wherein the communication scheduling unit obtains requests with a higher frequency for a connection for which a higher priority is set in the priority storage area. | 06-06-2013 |
20130145026 | SIGNAL MANAGER - A signal manager includes a signal monitor [ | 06-06-2013 |
20130151687 | Systems and Methods for Monitoring Content Consumption - Embodiments provide methods and systems for monitoring consumption of pieces of content. One exemplary embodiment is a method that comprises providing an identification of a piece of content for incorporation into the piece of content. When the piece of content is consumed at a consumption environment (e.g., on a particular instance of a video content player), the identification of the piece of content is extracted and sent to a consumption monitor along with an identification of the consumption environment. This information is used to monitor consumption of the piece of content at the consumption monitor. For example, monitoring consumption may involve counting the number of unique consumption environments in which the piece of content was or is being consumed. | 06-13-2013 |
20130151688 | OPTIMIZATION MECHANISMS FOR LATENCY REDUCTION AND ELASTICITY IMPROVEMENT IN GEOGRAPHICALLY DISTRIBUTED DATA CENTERS - Various exemplary embodiments relate to a method for reallocating loading from a datacenter site to other datacenter sites in a cloud computing network using an objective function that defines a performance characteristic of the cloud computing network at each datacenter site and a derivative of the objective function, the method comprising: evaluating the derivative for each of a set of other datacenter sites; identifying based upon the evaluated derivatives a datacenter site in the set of datacenter sites that results in the smallest increase in the objective function; and reallocating loading among the datacenter site and the other datacenter sites based upon the evaluated derivatives and the identified other datacenter site. | 06-13-2013 |
20130151689 | Measuring Provisioning Capacity Across Distributed Systems - Provisioning capacity measuring may be provided. First, a provisioning monitoring job may run on a grid manager that spawns a plurality of farm monitoring jobs onto a respective plurality of farms. Next, a user count for each of the respective plurality of farms may be respectively provided. The user count may comprise a number of users on each of the respective plurality of farms. An event alert may be provided when the user count for any of the respective plurality of farms is greater than a threshold. | 06-13-2013 |
20130151690 | TECHNIQUES TO MANAGE REMOTE EVENTS - Techniques to manage remote events are described. An apparatus may comprise a processor circuit and a remote event application arranged for execution by the processor circuit. The remote event application may be operative to manage remote event notifications for a publisher entity and a subscriber entity. The remote event application may comprise, among other elements, an event monitor component operative to receive an external event notification message with a publisher entity event for the publisher entity. The event monitor component may select a custom event receiver component associated with the publisher entity from among multiple custom event receiver components, and send the external event notification message to the selected custom event receiver component. The custom event receiver component may implement custom business logic, such as code callouts designed for specific application programs or system programs. Other embodiments are described and claimed. | 06-13-2013 |
20130151691 | Analyzing and Reporting Business Objectives in Multi-Component Information Technology Solutions - A method, data processing system, and computer program product for analyzing components in a network data processing system. A computer identifies a relationship of a set of components in the network data processing system with a function in an organization. The computer monitors a first set of metrics for the set of components over a time period, wherein the first set of metrics indicates a performance for the set of components. The computer monitors a second set of metrics for the function in the organization over the time period, wherein the second set of metrics indicates a use of the function in the organization. The computer selects a component in the set of components. The computer identifies an impact of the selected component on the second metrics for the function in the organization using the relationship and the second set of metrics. A user can provide comments regarding the impact. | 06-13-2013 |
20130151692 | POLICY AGGREGATION FOR COMPUTING NETWORK HEALTH - A network health monitoring application computes aggregate reports of network health by combining status results from a group of segments to render a summary health status indicative of the entire group. Individual status values result from policies, which monitor various segments and metrics, or performance parameters (such as byte counts orretransmissions), concerned with providing a particular service. The policies form a hierarchy defining the general or specific nature of the segments included in the policy according to a range of attributes, in which the attributes define a scope of the segments included in the policy group. Multiple metrics gathered on each segment allow filtering by polices based on the metric, rather than the attribute (hierarchy level), thus lending a hierarchy filtering based on “vertical” slices of the hierarchy, allowing the user flexibility to filter on specific attribute values while still computing aggregate health at a particular attribute level. | 06-13-2013 |
20130151693 | DATA SYNCHRONIZATION LATENCY INDICATOR - A method and apparatus for modifying data synchronization of a portable computing device responsive to movement of the portable computing device are disclosed. Data exchange quality associated with multiple locations is captured and stored. A predicted location of a portable computing device is determined from stored data describing previous locations of the portable computing device or navigation data. Data exchange quality associated with the predicted location is retrieved and analyzed to modify data exchange between the portable computing device and a server. For example, if the data exchange quality of the predicted location is low, a fault-tolerant data exchange method is selected or if data exchange is not possible at the predicted location, data exchanges occur more frequently prior to the portable computing device reaching the predicted location. | 06-13-2013 |
20130151694 | CORRELATING EVENT STREAMS FROM INDEPENDENT PROCESSES IN A COMPLEX BUSINESS SYSTEM USING METADATA ASSOCIATED WITH THE TRANSPORT INTERCONNECTIONS - A method, system and computer program product for correlating business events in a complex business system. A flow diagram containing a collection of nodes (representing processes) and links (representing the transport connections) between these nodes is generated. An instance of an event stream from a node that is to be connected to an instance of an event stream from a neighboring node is identified when a node transports a transaction across a link. The metadata associated with the utilized link that was used to transport the transaction between the nodes is obtained. The instances of the event streams are then correlated using the obtained metadata. Further, each instance of the event streams is assigned an identification. In this manner, business events are correlated without the requirement of users providing a common key as well as without the requirement of monitoring each user of the system throughout the entire transaction. | 06-13-2013 |
20130151695 | CORRELATING EVENT STREAMS FROM INDEPENDENT PROCESSES IN A COMPLEX BUSINESS SYSTEM USING METADATA ASSOCIATED WITH THE TRANSPORT INTERCONNECTIONS - A method for correlating business events in a complex business system. A flow diagram containing a collection of nodes (representing processes) and links (representing the transport connections) between these nodes is generated. An instance of an event stream from a node that is to be connected to an instance of an event stream from a neighboring node is identified when a node transports a transaction across a link. The metadata associated with the utilized link that was used to transport the transaction between the nodes is obtained. The instances of the event streams are then correlated using the obtained metadata. Further, each instance of the event streams is assigned an identification. In this manner, business events are correlated without the requirement of users providing a common key as well as without the requirement of monitoring each user of the system throughout the entire transaction. | 06-13-2013 |
20130151696 | TRIGGER METHOD OF COMPUTATIONAL PROCEDURE FOR VIRTUAL MACHING MIGRATION AND APPLICATION PROGRAM FOR THE SAME - A trigger method of computational procedure for virtual machine migration is disclosed. A cloud server simultaneously receives reply connection data from a client end host, and determines if the computational procedure for migration virtual machines is initiated according to the connection data. The virtual machines migration is performed upon the computational procedure completed, wherein, the browser intercepts the connection data to reply to the server when client end host accessing to web page via browser. The reply connection data from the client end host is used for the determining if the computational procedure is initiated or not so as to lower the server computation loading by reducing the computational procedures performed. | 06-13-2013 |
20130151697 | TRACKING OBJECTS WITHIN DYNAMIC ENVIRONMENTS - Embodiments provide systems, methods, and computer program products for tracking objects within a domain and their possible changes and genealogy over time. An object identifier and an interval identifier are associated with an object that enters the domain with an unknown set of attributes and genealogy. The object identifier is analyzed to determine whether it is a pre-existing object identifier. A comparison of the interval identifier is performed to determine whether the object is a copy of a prior object. The object identifier is replaced with a new object identifier and the interval identifier reset when the object is new or a copy. Based on the object identifier and the interval identifier, which represents the possibility of change during each interval, information about the tracked object may be derived and analyzed to enhance performance. | 06-13-2013 |
20130151698 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR TAGGING CONTENT ON UNCONTROLLED WEB APPLICATION - Communications by a device in a private network to a site operating outside of the network can be programmatically inspected. Unstructured data, including messages and application content, originating from outside of the network may be disassembled, analyzed, and categorized into source specific application element types (AETs). A monitoring layer may allow a user of the device in the network to switch between different modes of interaction with the site operating outside of the network. Interactions and activities in different modes can be monitored and processed differently according to internal policies and/or business rules. | 06-13-2013 |
20130151699 | PERSONAL ITEMS NETWORK, AND ASSOCIATED METHODS - A personal items network, comprising a plurality of items, each item having a wireless communications port for coupling in network with every other item, each item having a processor for determining if any other item in the network is no longer linked to the item, each item having an indicator for informing a user that an item has left the network, wherein a user may locate lost items. A method for locating lost personal items, comprising: linking at least two personal items together on a network; and depositing one or both of time and location information in an unlost item when one of the items is lost out of network. | 06-13-2013 |
20130151700 | NEE INDICATING METHOD, INDICATOR AND SYSTEM - Embodiments of the present invention disclose a network energy efficiency (NEE) indicating method, which is used to display NEE status with high efficiency and real-time. The method according to embodiments of the present invention comprises: obtaining report data which are reported by network element(s); performing pre-analysis process on the report data to get valid data used for obtaining a NEE parameter, wherein the valid data are taken as pre-analysis result which includes traffic amount data and power consumption data; obtaining the NEE parameter according to the traffic amount data and the power consumption data; and displaying the obtained NEE parameter. The embodiments of the present invention also disclose a NEE indicator and a NEE indicating system. The embodiments of the present invention can display the NEE status with high efficiency and real-time. | 06-13-2013 |
20130151701 | METHOD FOR ALLOCATING A SERVER AMONGST A NETWORK OF HYBRID STORAGE DEVICES - Methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution. | 06-13-2013 |
20130151702 | REQUEST ROUTING BASED ON CLASS - A system and method for management and processing of resource requests is provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a requested resource from the client computing device. The content delivery network service provider associates the client computing device with a cluster of other client computing devices. Based on routing information for the cluster, the content delivery network service provider routes the DNS query. The process can further include monitoring performance data associated with the delivery of the requested resource and updating the routing information for the cluster based on the performance data for use in processing subsequent requests from client computing devices in the cluster. | 06-13-2013 |
20130151703 | INFORMATION NOTIFICATION APPARATUS, INFORMATION NOTIFICATION SYSTEM, INFORMATION NOTIFICATION METHOD, AND PROGRAM - An information notification apparatus includes a first reception unit that receives a first state change notification indicating that the operating state of an electrical appliance has changed to a first state, a transmission unit that transmits a state notification indicating that the operating state of the electrical appliance is the first state to an information terminal, and a second reception unit that receives an acknowledgement notification. The first reception unit further receives a second state change notification indicating that the electrical appliance has been changed to a second state from the electrical apparatus. The transmission unit calculates a correlation value for each of information terminals and transmits the state notification to an information terminal having a calculated correlation value higher than a threshold value, the correlation value indicating a degree of likelihood that the owner of the information terminal has performed an operation corresponding to the second operating state. | 06-13-2013 |
20130159493 | PROVIDING SERVER PERFORMANCE DECISION SUPPORT - An application provides server performance decision support to end-users. The application monitors the transaction data of servers. The transaction data includes network communications as well as server specific information such as resource utilization. The application captures a sample of the transaction data. The captured sample can be random or predetermined. The sample is limited in length according to a preset time value. The application analyzes the sample to determine performance metrics for the server. The application presents the performance metrics within a business intelligence data structure to enable an end-user to data mine the performance metrics according to additional variables. | 06-20-2013 |
20130159494 | METHOD FOR STREAMLINING DYNAMIC BANDWIDTH ALLOCATION IN SERVICE CONTROL APPLIANCES BASED ON HEURISTIC TECHNIQUES - Systems and methods for a predictive bandwidth control module comprising means for maintaining a database of currently active subscribers by receiving the subscriber's authentication events and identifying one or more classes of subscribers based upon the authentication information they provide. The current behavior of the subscribers is recorded based on the applications they launch. The current behavior of the subscribers is correlated with a history database having snapshots of subscriber level requirements for the next few seconds, wherein the correlation provides correlated snapshots values based on the history of subscriber behavior over time. The correlated snapshot values are fed to an existing bandwidth controller that operates at various levels to allocate or de-allocate bandwidth to a corresponding class of subscribers based on a predicted future behavior of the subscribers. | 06-20-2013 |
20130159495 | Controlling Bit-Rates for Media Streaming Sessions - In one embodiment, a method includes (a) discerning whether an average packet delay in a media streaming session is increasing or decreasing over a first defined time window, (b) discerning whether an average jitter in the media streaming session is increasing or decreasing over a second defined time window, (c) in response to (a) and (b), calculating a specific bit-rate quantity corresponding to a change in bit-rate, and (d) controlling a bit-rate of the media streaming session in accordance with the specific bit-rate quantity. | 06-20-2013 |
20130159496 | Normalizing Network Performance Indexes - Normalization of a network performance index is achieved. Data is stored that groups devices in a network into groups or families according to their estimated life cycles. Data is stored representing a group-specific time window based on the estimated life cycle for devices in that group. Data is stored representing a count of the number of devices in the network within each group during a given unit of time, dynamic sliding windows over successive units of time. A sliding window group count is generated that represents the number of devices within each group in the network as of a current unit of time and prior units of time within the group-specific time window. A total group count is generated by adding the dynamic sliding window group counts for each of the groups. A normalized network performance index is generated by dividing a network performance index by the total group count. | 06-20-2013 |
20130159497 | Heuristic-Based Rejection of Computing Resource Requests - A computing system includes an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources, and a command layer, the command layer being programmed to execute one or more commands from the request for resources, wherein the command layer logs characteristics associated with one or more of the commands, wherein the computing system monitors each logged command to determine when a threshold is met, and wherein the computing system blocks a subsequent request for resources from the user when the threshold is met. | 06-20-2013 |
20130159498 | MEASURING USER QUALITY OF EXPERIENCE FOR A STREAMING MEDIA SERVICE - Techniques are disclosed for representing a user quality of experience (QoE) experienced by users of a streaming media service using a single QoE metric. The single QoE metric may be determined based on a set of empirical characteristics relating to the streaming video service such as startup latency, video quality, and the likelihood of interruptions in streaming playback. The empirical characteristics may be weighted according to how much one factor influences user quality of experience, relative to the others. Representing the QoE as a single metric may allow a streaming media service provider to improve key business measures such as subscriber retention and engagement. | 06-20-2013 |
20130159499 | SYSTEMS, METHODS, AND APPARATUS TO IDENTIFY MEDIA PRESENTATION DEVICES - Systems, methods, and apparatus to identify media presentation devices are disclosed. An example method includes receiving a domain name service query from a first device at a server, the first device and a second device being associated with a same public Internet protocol address. The first device is identified as originating the domain name service query based on an identity of the server. The first device is credited with accessing content associated with a domain name identified in the domain name service query. | 06-20-2013 |
20130159500 | DISCOVERY AND MINING OF PERFORMANCE INFORMATION OF A DEVICE FOR ANTICIPATORILY SENDING UPDATES TO THE DEVICE - The subject disclosure relates to techniques for monitoring contextual and performance information of a device for anticipatorily sending update information to the device. An interface component can receive, from the client, contextual information indicating an operating environment of the client and performance information that is associated with one or more operations being performed by the client based on the operating environment, and send, based on correlation information, update information to the client. Further, a service component can to infer a relationship between the contextual information and the performance information to obtain the correlation information. In other embodiments, a client can populate a cache with portion(s) of the contextual information to obtain cached information, and send at least a portion of the cached information to a system including one or more aspects of the service component. | 06-20-2013 |
20130159501 | DYNAMIC RESOURCE ADAPTATION - A system may include determination of historical resource load information associated with an enterprise computing system, determination of resource needs of the enterprise computing system associated with a future time based on the historical resource load information, and, at the future time, automatic allocation and de-allocation of resources to the enterprise computing system based on the determined resource needs. | 06-20-2013 |
20130159502 | Methods for Monitoring Computer Resources - One embodiment of a method of the present invention for monitoring computer resources provides for retrieving a set of resource-metric records for a predetermined time interval, forming a first mathematical matrix containing metric's values arranged on date-time and resource-metric axes, creating a second mathematical matrix containing features and a third mathematical matrix containing weights, building a feature relationship tree, generating a predicted value for the resource-metric identifier, determining a variance between predicted value and metric's value, and triggering an alert if the variance exceeds a predetermined alert threshold. | 06-20-2013 |
20130159503 | METHOD AND APPARATUS FOR DETECTING TETHERING IN A COMMUNICATIONS NETWORK - A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature. | 06-20-2013 |
20130159504 | Systems and Methods of Automated Event Processing - Systems and methods of automated event processing include at least one of notification extraction, development of event engineering rules, and testing. Notification extraction may include extracting notification information from the documentation. Automatic development of event engineering rules may receive and process each trap for a centralized monitoring system. An example embodiment would work with Netcool monitoring system from IBM. A set of software code or a software program may process and receive the alarms. Example embodiments of the program automate the implementation process for the code. The testing function automates the testing of the alarms. In an example embodiment, rules set parameters to test the alarms to ensure that the code processes the alarms correctly and as expected. | 06-20-2013 |
20130159505 | SYSTEMS AND METHODS FOR IDENTIFYING PHRASES IN DIGITAL CONTENT THAT ARE TRENDING - The present disclosure is directed to systems and methods to identify trending or temporally popular phrases based on aggregating multiple users' interactions with an aggregate of content. A server may receive identification of a plurality of clicks of encoded uniform resource locator (URL) links. The server may identify, for each of the plurality of clicks, in content identified from decoding the encoded URL links, a plurality of phrases that correspond to a predetermined set of keywords. The server may determine a velocity of clicks on content corresponding to each phrase of the plurality of phrases and identify a trend in one or more phrases of the plurality of phrases based on the velocity of clicks. | 06-20-2013 |
20130159506 | SYSTEMS AND METHODS FOR TRENDING AND RELEVANCE OF PHRASES FOR A USER - The present disclosure is directed to a method for identifying which phrases are trending across an aggregate of users that are relevant to a specific user. The method may include receiving, by a server, identification of a user. The server may identify a plurality of phrases that are trending upwards based on velocity of clicks to content containing, related to or associated with the plurality of phrases. The server may identify trending or temporally popular phrases based on aggregating multiple users' interactions with an aggregate of content. The server may determine a relevance score for each phrase of the plurality of phrases that are trending upwards based on identification of the user and actions of the user on content associated with each phrase, such as user clicking on content identifying or related to each phrase. The server may identify one or more phrases of the plurality of phrases based on relevance score. | 06-20-2013 |
20130159507 | SYSTEMS AND METHODS FOR INFLUENCE OF A USER ON CONTENT SHARED VIA 7 ENCODED UNIFORM RESOURCE LOCATOR (URL) LINK - The present disclosure is directed to systems and methods for measuring influence of a user may identify what level of engagement the user drives to content when the user shares content with other users, such as via encoded links. A high influencer may be a user who drives a high level of engagement with content when the user shares content. A low influencer may be a user who does not drive a high level of engagement, or otherwise drives a low level of engagement with content when the user shares content. | 06-20-2013 |
20130159508 | METHODS AND APPARATUS FOR HARDWARE REGISTRATION IN A NETWORK DEVICE - Methods and apparatus for control of a client device (e.g., consumer premises equipment in a cable network) using applications. In one aspect, an improved hardware registry is provided within the device with which the application(s) can interface to both identify and control available hardware resources. In one exemplary embodiment, the client device comprises a digital set-top box having digital video recording (DVR) capability. An application downloaded to the device discovers the registry and software interfaces associated therewith, and then utilizes the interfaces to automatically control the requisite hardware capability. Improved client device, network and head end configurations, as well as methods of operating these systems, are also disclosed. | 06-20-2013 |
20130159509 | METHOD AND SYSTEM FOR CONTROLLING DATA COMMUNICATION WITHIN A NETWORK - A method for controlling data communication within a network with multiple interconnected network elements includes: generating a representation of the network; detecting changes in the network and updating the representation of the network; receiving a request from a client network element, wherein the request comprises information which identifies a source network element and at least two destination network elements; determining for each identified destination network element, a ranking value for the communication path between the source network element and the respective identified destination network element based on the representation of the network; generating an ordered list of the identified destination network elements based on the respective ranking values; transmitting the ordered list to the client network element from the central network element; and selecting, based on the ordered list, at least one of the identified destination network elements for data communication with the source network element. | 06-20-2013 |
20130159510 | Event Correlation Between Protocol Layers in a Network Device - A system and method for correlating events between protocol layers of a protocol stack of a network device includes detecting, at a first protocol layer, an occurrence of a first event associated with one or more data units received by the network device over physical media. A first times-tamp is associated with the first event. At a second protocol layer, an occurrence of a second event associated with the one or more data units is detected The second protocol layer is at a higher protocol layer of a protocol stack than the first protocol layer. A second timestamp is associated with the second event. A determination is made whether there is a correlation between the first and second events based on the first and second timestamps. Causation of the second event at the second protocol layer may be attributable to the first event at the first protocol layer. | 06-20-2013 |
20130159511 | SYSTEM AND METHOD FOR GENERATING A REPORT TO A NETWORK OPERATOR BY DISTRIBUTING AGGREGATION OF DATA - System and method for generating a report to a network operator by distributed aggregation of data are disclosed. One embodiment includes determining, by a server-side proxy, optimization efficiency for wireless network traffic; tracking, by the server-side proxy, user-related information in the wireless network; based on the optimization efficiency and/or the user-related information, generating the report to be delivered to the network operator or queried by the network operator. In one embodiment, the server-side proxy performs functions related to traffic optimization and management in the wireless network effectuating in traffic alleviation in the wireless network measured by the optimization efficiency. | 06-20-2013 |
20130159512 | METHODS AND SYSTEMS FOR EFFICIENT UPDATING OF TIME-ALIGNED GRAPHS IN A MONITORING SYSTEM - The present invention relates to displaying data in a time-aligned fashion. A dashboard may have a defined time window and a plurality of graphs for various types of monitoring data metrics. Updates to each of the graphs may occur at different intervals while the graphs stay aligned to the same time window. The updates may be asynchronously received and displayed in the dashboard in real-time or near real-time. The graphs are aligned to the same time window in a dashboard by adding a future time buffer. When the live data reaches the end of the time window, the future time buffer allows a brief overflow period for updates to be added to the graphs while keeping all the graphs on a common time axis. Once the current time reaches the end of the future time buffer, the dashboard is then shifted forward and a future time buffer is added. | 06-20-2013 |
20130159513 | INFORMATION PROCESSING SYSTEM AND OPERATION MANAGEMENT METHOD - An object is to prevent overload on a shared resource. In an information processing system including a resource possibly shared between a plurality of work loads, an additional load is applied to the resource while operating the work loads, and the performances of the work loads are monitored. | 06-20-2013 |
20130159514 | INFORMATION PROCESSING APPARATUS AND REMOTE MAINTENANCE METHOD - An information processing apparatus may include a first sending unit to send, to a remote maintenance center, virtual domain configuration information indicating configurations of a plurality of virtual domains formed within the information processing apparatus, together with a virtual domain configuration event, and a second sending unit to send, to the remote maintenance center, information of a periodic connection event including a next periodic connection time of each of the plurality of virtual domains, together with a periodic connection event. | 06-20-2013 |
20130159515 | Providing a Monitoring Service in a Cloud-Based Computing Environment - Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to the monitoring service. The monitor workflow may correspond to the monitoring service. A first call to a finder application is executed over a communications network to retrieve data points according to the monitor workflow. A second call to an analyzer application is executed over the communications network to identify a relevant data point in the data points. A third call to a notifier application is executed over the communications network to notify the user of the relevant data point. | 06-20-2013 |
20130159516 | MAIN ELECTRONIC DEVICE FOR COMMUNICATING WITHIN A NETWORK AND METHOD FOR OPERATING A MAIN ELECTRONIC DEVICE FOR COMMUNICATING WITHIN THE NETWORK - The present invention relates to a main electronic device for communicating within a network comprising an interface for enabling communication within the network and a controller for sending polling messages via the network to logical addresses via said interface in order to request information from at least one further electronic device. | 06-20-2013 |
20130159517 | SENDING SYNCHRONOUS RESPONSES TO REQUESTS FROM FRONTEND APPLICATIONS - A system comprising includes a first node and a second node. The first node includes a first memory storing executable instructions for configuring the first node to receive a service request from a frontend application. The first node identifies a timeout required for processing the service request and sends the service request to a backend application for processing. The second node includes a second memory storing executable instructions for configuring the second node to monitor for a response regarding results of processing of the service request. In response to the timeout for the service request elapsing before receiving a backend application response to the service request, the second node sends a response informing the frontend application from which the service request was received that the backend application has not responded to the service request. | 06-20-2013 |
20130159518 | TRANSMISSION OF INFORMATION RELATING TO A QUALITY OF SERVICE - Methods of transmitting information relating to a quality of service are shown, which information is to be transmitted in at least one direction between a first device | 06-20-2013 |
20130166721 | SYSTEMS AND METHODS FOR A SOCIAL MEDIA NETWORK/BUSINESS PLATFORM INTERFACE - According to some embodiments, information associated with a task may be received, including a trigger entity and a related action entity. A social media network/business platform interface may monitor a trigger condition associated with the trigger entity. The social media network/business platform interface may then automatically detect that the trigger condition is satisfied. Responsive to that detection, an action defined by the action entity related to the trigger entity may be automatically performed. | 06-27-2013 |
20130166722 | HANDLING INCIDENTS RELATED TO BUSINESS PROCESSES - In one embodiment, the method includes identifying an incident associated with a scene. The incident is identified through a reporter object associated with the scene. Based upon the identified incident, one or more observer objects related to the scene is determined. The incident is communicated to the one or more observer objects. | 06-27-2013 |
20130166723 | DUPLICATE IP ADDRESS DETECTION BY A DHCP RELAY AGENT - Techniques are described for detecting duplicate IP addresses at a DHCP relay agent. Embodiments identify a list of DHCP clients that have valid IP address leases from one or more DHCP servers. Additionally, network traffic from a first node passing through the DHCP relay agent is monitored. Embodiments then determine whether the first node is using a duplicate IP address, based on the monitored network traffic and the identified list of DHCP clients. | 06-27-2013 |
20130166724 | Dynamic Instantiation and Management of Virtual Caching Appliances - A service level objective (SLO) violation is detected for a workload of a networked storage system, based on a performance metric not being satisfied for the workload. In response to detecting the SLO violation, a controller determines that changing a level of caching at a node of the networked storage system will improve the performance metric for the workload. The controller implements the change by adjusting an operation of a virtual cache appliance (VCA) of the networked storage system. The adjusting can be instantiating a new VCA, or adjusting the level of caching at an existing VCA. The adjusting can be for caching related to the workload itself, or it can be caching for an intertering workload. | 06-27-2013 |
20130166725 | Measuring Page Viewership in a Social Network - A social networking system includes pages created by users for providing content related to topics of interest. An interaction engine captures data and maintains analytical information about how users interact with pages and posts. When a user takes an action such as liking a page or a post, the interaction engine updates the page's activity history to reflect the activity and information about the user who took the action. The interaction engine also measures the reach of pages and posts, by determining how and from where each user viewed the page and its contents. The interaction engine further tracks the community's interest in pages and posts by determining how many unique users create stories that include a page or its content. An insights module uses the data obtained by the interaction engine to synthesize graphical reports about page interactions and present the reports to page administrators. | 06-27-2013 |
20130166726 | METHOD AND APPARATUS FOR PROVIDING INTENT-BASED MONITORING USING SENSORY INFORMATION - An approach is provided for providing intent-based monitoring using sensory information. The monitoring platform determines to detect, at a device, sensory information from an environment, the environment relating to a user of the device, one or more other users, or a combination thereof. Next, the monitoring platform processes and/or facilitates a processing of the sensory information to determine intent information associated with the user, the one or more other users, or a combination thereof. | 06-27-2013 |
20130166727 | Management of Storage System Access Based on Client Performance and Cluser Health - In one embodiment, a method includes determining a previous client performance value in terms of a performance metric for a volume in a storage system. The previous client performance value is related to previous access for a client to the volume. Also, the storage system is storing data for a plurality of volumes where data for each of the plurality of volumes is striped substantially evenly across drives of the storage system. The method applies criteria to the previous performance value to determine a target performance value. Performance of the client with respect to access to the volume is regulated in terms of the performance metric based on the target performance value. | 06-27-2013 |
20130166728 | COMPUTER-IMPLEMENTED SYSTEM FOR ANALYZING AN INSTANCE OF A PROCESS - The invention relates to a computer-implemented system for analyzing an instance of a process in a network environment, wherein the instance of the process includes a screen-based user session ( | 06-27-2013 |
20130166729 | METHOD AND SYSTEM FOR MESSAGE TRACKING AND CHECKING - An invalidation tracker system for tracking messages in a caching architecture of a pricing and shopping platform. The caching architecture includes of multiple levels each comprising one or more servers. Invalidation messages are communicated from one level to another to send invalidation messages to all servers in the caching architecture. The system receives data from provider databases to be communicated to the servers in the caching architecture. The system includes a recording module for recording all invalidation messages communicated to the servers in the caching architecture to form a set of sent invalidation messages, an analyzing module for determining the invalidation messages received at each server in the caching architecture and comparing this with the set of sent invalidation messages to identify one or more undelivered invalidation messages, and a reply module for resending the one or more identified undelivered invalidation messages to an appropriate server in the caching architecture. | 06-27-2013 |
20130166730 | Confidence Intervals for Key Performance Indicators in Communication Networks - Systems and methods for calculating and presenting confidence interval(s) for key performance indicator(s) (KPIs) are described. For example, in some embodiments, a method may include identifying vectors representing network events observed by a network monitoring system, each vector including: a dimension, an indication of a sampling ratio with which a respective event was observed, and a value associated with the dimension. The method may also include calculating a KPI corresponding to the observed events for the dimension based, at least in part, upon the values. The method may further include calculating a confidence associated with the KPI, based, at least in part, upon the sampling ratios. In some cases, events may be observed with different sampling ratios. Additionally or alternatively, sampling ratios may include adaptive sampling ratios controlled by the network monitoring system in response to network or resource loading (e.g., subject varying over time), whitelist differentiated sampling ratios, etc. | 06-27-2013 |
20130166731 | APPARATUS, MOBILE TERMINAL, AND METHOD TO ESTIMATE QUALITY OF EXPERIENCE OF APPLICATION - A method of notifying estimated QoEs (Quality of Experiences) for applications between a mobile terminal and a plurality of application servers that provide services of the applications, may measure first QoEs for the applications between the apparatus and the mobile terminal, measure second QoEs for the applications between the apparatus and the application server, estimate the estimated QoEs for the applications, based on the first and second QoEs for the applications, and notify the estimated QoEs to the mobile terminal. | 06-27-2013 |
20130166732 | CLIENT MANAGING SYSTEM, CLIENT MANAGING METHOD, AND INFORMATION PROCESSING APPARATUS - In one embodiment, there is provided a client managing system including: a server; a client connected to the server via the Internet. The server includes: a generator configured to generate a policy data for the client; a first storage configured to store the policy data; a delivering module configured to deliver the policy data to the client; and a second storage configured to store a first index data therein, wherein the first index data corresponds to a first log data representing contents of operations performed on the client. The client includes: a sender configured to: i) generate a second log data representing contents of operations performed on the client; ii) send the second log data to a file storage connected to the client via a network; iii) generate a second index data corresponding to the second log data; and iv) send the second index data to the server. | 06-27-2013 |
20130166733 | NETWORK BANDWIDTH DISTRIBUTION DEVICE AND METHOD THEREOF - Disclosed is a network bandwidth distribution device which includes an information collector which collects information associated with a connection environment; a controller which judges a state of a connection environment according to the collected information and collects information of each user to judge whether an occupied bandwidth of each user is exceeded; and a bandwidth allotter which limits an occupied bandwidth of each user based on the judged state of a connection environment and whether an occupied bandwidth of each user is exceeded. | 06-27-2013 |
20130166734 | SYSTEM AND METHOD FOR ACCESS TO CONTINOUSLY RUNNING APPLICATION PROGRAMS BY NETWORK CONNECTED END-USER DEVICES - A system for providing access to one or more application device, such as a respective processed application program, is connected to a telecommunications network including at least one user device. The system includes a manager device connected to the respective application device, and the manager device communicatively connects to the respective user device. Each application device includes a respective processing state and a state table of each respective processing state. The manager device updates the respective processing state of the state table for each application device and respective user device. Each user device accesses the manager device to obtain the respective processing state in the state table of the particular application device for the particular user device. User devices can switch communications with the manager device and application device, providing continuing operations of the application device with same processing state. | 06-27-2013 |
20130166735 | LOCATION SPECIFIC EVENT BROADCASTING - Applications in a broadcast environment distribute events in real-time to a large number of receivers within specified geographic locations while efficiently sharing bandwidth resources with other applications using the same broadcast network. Applications need not be aware of the other applications sharing the resources, nor of the methods, protocols, and other mechanisms used to actually broadcast the data over the broadcast medium. Server-side applications that serve data, send notifications, or distribute events to specific locations within the network use a broadcast location manager. Client applications that receive such data, notifications, or events use a client location filter to obtain events that are relevant based on the location of the device. The broadcast location manager and client location filter work together to reliably and efficiently transmit data, notifications, and events to specific locations over the broadcast network for all applications involved. | 06-27-2013 |
20130166736 | GEOLOCATION ENGINE - Embodiments of the present invention for determining a geo-location begin with receiving, from a client computing device, information regarding one or more Wi-Fi networks in range of the client computing device a MAC address of the client computing device. A geo-location is determined from the received Wi-Fi network information and the MAC address. An indication may be recorded as to whether the client computing device geo-location satisfies a geo-location requirement. | 06-27-2013 |
20130166737 | DUPLICATE IP ADDRESS DETECTION BY A DHCP RELAY AGENT - Techniques are described for detecting duplicate IP addresses at a DHCP relay agent. Embodiments identify a list of DHCP clients that have valid IP address leases from one or more DHCP servers. Additionally, network traffic from a first node passing through the DHCP relay agent is monitored. Embodiments then determine whether the first node is using a duplicate IP address, based on the monitored network traffic and the identified list of DHCP clients. | 06-27-2013 |
20130166738 | Web Page Download Time Analysis - Systems and methods for determining web page download times are described. HTTP transactions data is collected from flow records or PDUs. A subscriber IP address, HTTP URI, and referrer are extracted from the flow records. A subscriber record is identified using the subscriber IP address, and a configured web page is identified using the HTTP URI. A processing path is then determined for the HTTP transaction The processing path is selected from one of: a new page download path for a configured page, a collision path for HTTP transactions that collide with an existing page download, and a page object path for artifacts pages that are already being tracked. | 06-27-2013 |
20130166739 | Localization Of Peer To Peer Traffic - A method of processing peer-to-peer requests is provided. The method may include; storing, at a network element, peer information in a database for each peer of a plurality of peers, the peer information indicating at least one ISP associated with the peer and the content contained by the peer, receiving a request for content from a requester, and sending a response to the content requester based on the ISP with which the requester is associated and the stored peer information. | 06-27-2013 |
20130166740 | NETWORK EVALUATION DEVICE, METHOD FOR EVALUATING NETWORK, AND RECORDING MEDIUM - A network evaluation device evaluates a communication state of an information processing apparatus including a plurality of processors which communicate with one another and which execute a program. The network evaluation device includes: a memory configured to store a network evaluation program; and a processor configured to execute a process based on the network evaluation program in the memory. The process includes: obtaining first communication processing time between the plurality of processors while the plurality of processors are not executing the program; recording the first communication processing time; obtaining second communication processing time between the plurality of processors while the plurality of processors are executing the program; comparing the first communication processing time with the second communication processing time; and outputting a time difference between the first communication processing time and the second communication processing time. | 06-27-2013 |
20130166741 | EFFICIENT MONITORING IN A SOFTWARE SYSTEM - A monitoring of a server system during an execution of a server system processing logic, includes: during collection and storage of operational metrics by a given thread in a thread-local memory, determining that a checkpoint within the server system processing logic is reached; determining whether a threshold number of checkpoints have been encountered by the given thread; in response to the threshold number of checkpoints having been encountered, determining whether a threshold time interval since a last rollup of the collected operational metrics has been exceeded; and in response to the threshold time interval being exceeded, performing a rollup of the collected operational metrics from the thread-local memory to an accumulation point in a shared memory, where the accumulation point stores aggregated operational metrics from a plurality of threads. | 06-27-2013 |
20130166742 | SYSTEMS, METHODS AND MEDIA FOR IDENTIFYING AND ASSOCIATING USER DEVICES WITH MEDIA CUES - Systems, methods, and media for identifying and associating user devices with media cues are provided. In some embodiments, a plurality of data streams from a plurality of endpoints is received. At least one media segment is then received from a user device. It is determined whether the at least one media segment from the user device corresponds with one of the plurality of data streams from the plurality of endpoints. In response to being unable to match the at least one media segment, a media cue is inserted into one of the plurality of data streams. In response to detecting that the media cue in that data stream is received by the user device, identification infomlation is transmitted to the user device that associates the user device with one or more services on a communications server. | 06-27-2013 |
20130166743 | Relevant Alert Delivery In A Distributed Processing System - Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system. | 06-27-2013 |
20130166744 | DISPLAY PROCESSING SYSTEM, DISPLAY PROCESSING METHOD, AND PROGRAM - A display processing system ( | 06-27-2013 |
20130166745 | NETWORK EVENT MANAGEMENT - An apparatus for predicting a network event flood comprises an event rate detector for detecting rates of event emissions from one or more devices; an aggregator for producing an aggregate rate and an aggregate rate trend of the rates of event emissions from a plurality of the devices; a level generator for generating a plurality of levels comprising maximum acceptable event rate values of a plurality of the aggregate rate trends over plural time periods; a storage component for storing the plurality of levels; a comparator for comparing a current aggregate rate trend with at least a selected one of the levels; and a signaller for signalling a predicted event flood responsive to the comparator detecting that the current aggregate rate trend will exceed the at least a selected one of the levels at a first point in time. | 06-27-2013 |
20130173777 | Mining Execution Pattern For System Performance Diagnostics - This application describes a system and method for diagnosing performance problems on a computing device or a network of computing devices. The application describes identifying common execution patterns between a plurality of execution paths being executed by a computing device or by a plurality of computing device over a network. The common execution pattern being based in part on common operations being performed by the execution paths, the commonality being independent of timing of the operations or the sequencing of the operations and individual executions paths can belong to one or more common execution patterns. Using lattice graph theory, relationships between the common execution patterns can be identified and used to diagnose performance problems on the computing device(s). | 07-04-2013 |
20130173778 | MONITORING NETWORK PERFORMANCE REMOTELY - According to one general aspect, a method may include establishing at least a first and a second network tap point near, in a network topology sense, an intranet/internet access point device and a server computing device, respectively. The method may include monitoring, via the first and second network tap points, at least partially encrypted network communication between a client computing device and the server computing device. A second network tap point analyzer device may decrypt at least a portion of the encrypted network communication that is viewed by the second tap point analyzer device. The method may include analyzing the monitored encrypted network communication to generate aset of metrics regarding the performance of the network communication between the client computing device and server computing device. In some embodiments a plurality of tap points and tap point analyzer devices corresponding to a multitude of network segments may be employed. | 07-04-2013 |
20130173779 | METHODS FOR IDENTIFYING NETWORK TRAFFIC CHARACTERISTICS TO CORRELATE AND MANAGE ONE OR MORE SUBSEQUENT FLOWS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed. | 07-04-2013 |
20130173780 | RESOURCE THROTTLING AND AUTOMATED POLICY MANAGEMENT IN A VIRTUAL MACHINE ENVIROMNENT - A method for providing resource throttling management. The method includes accessing a distributed computer system having a plurality of nodes, initiating a new object policy object backup protection for a new object, and implementing a discovery process to determine computer environment components subject to stress. The method further includes generating a physical resource throttling protocol in accordance with the components subject to stress, and processing the new object in accordance with the object management policy and in accordance with the throttling protocol. | 07-04-2013 |
20130173781 | ACTIVITY-BASED VIRTUAL MACHINE AVAILABILITY IN A NETWORKED COMPUTING ENVIRONMENT - An approach for activity-based virtual machine (VM) availability in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a system provided under the present approach monitors and logs network traffic and performs network packet inspections. Based on the contents of the network packets, the system may determine which applications/processes on particular VMs that are associated with the traffic. Users of this system may configure rules and thresholds. Regardless, if an availability threshold is not met as compared to a volume of network traffic, certain network traffic disablement actions can be taken. Users may also configure those conditions that will result in re-enablement of the network and/or processes that were disabled. | 07-04-2013 |
20130173782 | METHOD AND SYSTEM FOR ENSURING AUTHENTICITY OF IP DATA SERVED BY A SERVICE PROVIDER - A computer-implemented method and system identifies whether web content stored in a repository deviates from authentic web content being web content that is approved by authorized personnel of the web content prior to serving to a client requesting the web content. Web communications to the repository are monitored and web content is intercepted and analyzed in a safe environment for establishing that the web content conforms to a predetermined standard. If not, a web host serving the web content is alerted. In one embodiment, the web content is intercepted and analyzed prior to serving to the client and is served to the client only if either authenticated or after suitable modification to render it acceptable. | 07-04-2013 |
20130173783 | SYSTEM AND METHOD FOR ESTIMATING ORGANIC WEB TRAFFIC FROM A SECURED SOURCE - One embodiment includes a method for estimating web traffic to a website. The method comprises obtaining a first set of reporting information from a secured external source that directs traffic to the website, the first set of reporting information having a corresponding portion of reporting information which is not provided from the secured external source, obtaining a second set of reporting information from a unsecured external source that directs traffic to the website, the second set of reporting information being different than the first set of reporting information, and generating an estimation of the corresponding portion of reporting information which is not provided from the secured external source by correlating the second set of reporting information with the first set of reporting information. | 07-04-2013 |
20130173784 | MONITORING SERVER LOAD BALANCING - Embodiments described herein discuss an approach to implementing load-balancing across multiple monitoring servers. One such embodiment describes a network monitoring device. The network monitoring device includes an ingress port, for receiving mirrored network packets, and a number of egress ports. The egress ports are associated with a number of monitoring servers, and used to forward the mirrored network packets to the monitoring servers. A packet classifier, coupled to the ingress port, examines the mirrored network packets, and determines which of the monitoring servers should receive the packets. | 07-04-2013 |
20130173785 | Generating Metrics for Networked Devices - Groups of network devices may be identified automatically based on interface tags associated with network device interfaces such that network devices within a group are automatically identified, periodically or otherwise, based on an association of one or more common interface tags between the group and the network device interface. | 07-04-2013 |
20130173786 | SCALABLE NETWORK APPARATUS FOR CONTENT BASED SWITCHING OR VALIDATION ACCELERATION - A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded together. According to one embodiment, the plurality of network units comprise a plurality of content based message directors, each to route or direct received messages to one of a plurality of application servers based upon the application data in the message. According to another embodiment, the plurality of network units comprise a plurality of validation accelerators, each validation accelerator to validate at least a portion of a message before outputting the message. | 07-04-2013 |
20130173787 | SYSTEM FOR DETECTING WHETHER CLIENT STATE MATCHES PREDETERMINED STATE - A server connectable to a client able to manage successively transitioned-to states. The server has a set storage unit for storing a set including a predetermined state; a server-side communication unit for communicating with the client using a privacy-preserving set-intersection protocol for detecting whether an element in a mutual set is a common element between mutual sets while preserving privacy; and a determining unit for determining whether the state of the client is included in the set stored by the set storage unit on the basis of ciphertext received in accordance with the privacy-preserving set-intersection protocol. Also provided is an information processing method which is able to manage successively transitioned-to-states. | 07-04-2013 |
20130173788 | NETWORK ACCESS APPARATUS - A network access apparatus comprising a tunneling interface to collect device access information of network devices of a first computer network having a first network gateway device and device access information of network devices of a second computer network having a second network gateway device, wherein the apparatus is to send device access information of network devices of said first computer network to said second computer network upon receipt of an inquiry for request of device access information from said second computer network, and vice versa. | 07-04-2013 |
20130173789 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 07-04-2013 |
20130173790 | SYSTEM AND METHOD FOR ASSIGNING NETWORK BLOCKS TO SENSORS - A system includes a processor device. The processor device is configured to detect a physical topology of a network comprising hosts and sensors in the network. The processor device is also configured to generate a sensor policy for assignment of the sensors to network blocks of the hosts, that balances a processing load and accuracy of the sensors in the network based on physical closeness of the sensors to different divisions of hosts within a same network block. | 07-04-2013 |
20130173791 | Mapping Network Addresses to Organizations - Network addresses (e.g., IP addresses) are considered candidates for association with organizational entities (organizations or various subgroups thereof), based on some evidence of a relationship between them. The candidate addresses are scored based on one or more factors that indicate a probability that the candidate address actually belongs to the organizational entity. The candidate addresses with sufficient scores are stored as actual associations between the candidate address and the organizational entity. | 07-04-2013 |
20130173792 | DATA COLLECTION DEVICE FOR MONITORING STREAMS IN DATA NETWORK - The invention relates to a data collection device for monitoring streams in a data network using a packet transmission mode, including an extractor for extracting data contained in packets belonging to a stream defined by a transmitter, a receiver, and a protocol. The collection device also includes a syntax analyzer which receives data in real time from the extractor and breaks the data down into elements according to the syntactic rules of the protocol, said syntactic rules enabling the elements to be represented as a tree structure. The syntax analyzer combines respective tree state indicators with at least some of the elements, wherein the tree state indicator combined with an element locates said element within the tree structure. An interface transmits the tree state indicators, together with the elements with which the latter have been combined, to a stream analyzer external to the collection device. | 07-04-2013 |
20130173793 | SYSTEM AND METHOD FOR TRAFFIC ANALYSIS - A system for traffic analysis which includes an analyzer ( | 07-04-2013 |
20130179559 | CONTROL METHOD FOR WIRELESS COMMUNICATIONS DEVICE COMPATIBLE WITH UNIVERSAL SERIAL BUS MASS STORAGE DEVICE CLASS PROTOCOL - A control method for a wireless communications device compatible with a universal serial bus mass storage device class (UMS) protocol includes: monitoring an occurrence of a change in the file system; and when the change in the file system is detected, performing at least one predetermined operation corresponding to a specific predetermined file associated with the change. For example, the change in the file system may be removing the specific predetermined file from the file system or adding the specific predetermined file to the file system. | 07-11-2013 |
20130179560 | Tracking Changes to Data Within Various Data Repositories - A computer system retrieves from data repositories change information indicating changes to entries. Each data repository is associated with a corresponding interface and at least two data repositories are associated with different interfaces, and at least one data repository lacks tracking of changes to entries stored therein. The change information retrieved from the data repository is stored within a storage unit. The stored information includes identification of each repository entry change without storage of the changed entry. Requests are processed to provide change information for entries within the data repositories, wherein processing the change information request for one of the entries includes retrieving from the storage unit the identification of the repository entry change for the one of the entries. Embodiments of the present invention further include a method and computer program product for tracking changes within data repositories in substantially the same manner described above. | 07-11-2013 |
20130179561 | RULE-BASED CLASSIFICATION OF ELECTRONIC DEVICES - The disclosed embodiments provide a system that facilitates interaction between an electronic device and a content provider. During operation, the system obtains a device profile containing a set of properties for the electronic device and a set of classification rules associated with the content provider. Next, the system identifies a device class of the electronic device based on the device profile and the classification rules. Finally, the system provides the device class to the content provider, wherein the content provider selects content to transmit to the electronic device based on the device class. | 07-11-2013 |
20130179562 | NETWORK AUDITING TOOL - A method, performed by a computer device, may include scanning a network of digital cross connect devices to identify an open port and determining that the identified open port has been designated as unavailable in a provisioning database. The method may further include determining that the identified open port corresponds to a recoverable port and recovering the identified open port by designating the identified open port as available in the provisioning database, in response to determining that the identified open port corresponds to a recoverable port. | 07-11-2013 |
20130179563 | INFORMATION SYSTEM, COMPUTER AND METHOD FOR IDENTIFYING CAUSE OF PHENOMENON - An information system has a plurality of network apparatuses, a plurality of node apparatuses and a computer that analyzes a cause of an event that occurred. A storage resource for the computer stores rules including conditions indicating events that occur in the network apparatuses and the node apparatuses, and conclusion. The computer generates an aggregate internal condition object for aggregating information on the occurrences of events of a plurality of condition objects corresponding to the conditions of the plurality of network apparatuses, and associates the aggregate internal condition object with the condition objects corresponding to the conditions of the network apparatuses, condition objects corresponding to the conditions of the node apparatuses, and conclusion objects corresponding to the conclusions. | 07-11-2013 |
20130179564 | COMPUTER-READABLE RECORDING MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS - A computer-readable recording medium having stored therein a program for causing a computer to execute a digital signature process, wherein the digital signature process includes distributing packets to machines based on session durations according to a communication of the packets in a given duration, and performing verification tests based on the packets distributed to the machines by each of the machines. | 07-11-2013 |
20130179565 | System and Method for Dynamically Grouping Devices Based on Present Device Conditions - A method to dynamically group devices based on device information, which is associated with a system for monitoring the device information that communicates information between a device and an enterprise. Information is collected from a device information source to obtain an actual status of a device. The actual status of the device is compared to a stored status of the device. The stored status is stored on a server of the enterprise. The enterprise determines if the actual status has been changed from the stored status. When a change is detected, the method performs at least one of the acts of automatically disassociating the device from a group that reflects the stored status and automatically associating the device with a new group to reflect the actual status. | 07-11-2013 |
20130179566 | NATIVE BI-DIRECTIONAL COMMUNICATION FOR HARDWARE MANAGEMENT - A communication system includes a storage operable to host an operating system and a management controller configured to directly communicate with the operating system. The management controller directly communicates with the operating system through a communication channel free of an intermediate agent. The management controller is operable to asynchronously send management information to the operating system over the communication channel. The management controller is also operable to asynchronously receive management information from the operating system over the communication channel. | 07-11-2013 |
20130179567 | Network performance monitoring in a content delivery system - A method for Internet delivery in a delivery network established at network locations, the delivery network comprising a plurality of content servers for serving resources. The servers include a plurality of subsets, each subset being located at one of a plurality of Internet data centers. For each Internet Protocol (IP) address block from which requests for content resources are expected to be received, the method generates a candidate list of data centers to be used to service the requests. For the IP address block, the method selects at least one of the data centers from the candidate list. The selected Internet data center for the IP address block is written into a network map. In response to a DNS query, the map is used to identify one of the Internet data centers from the candidate list to be used to service a request for a content resource. | 07-11-2013 |
20130179568 | METHOD AND APPARATUS FOR ANALYSIS OF THE OPERATION OF A COMMUNICATION SYSTEM USING EVENTS - The present invention relates to a method and apparatus for event analysis in a communication (telecommunication or computer) system. In particular, the invention relates to a method and apparatus for analysing events representing activity in the communication system. Embodiments provide a progressive technique for the analysis of the operation of a communication system. Embodiments provide a bottom-up approach by first detecting burst of events, and establishing causal relationships between events and system operation reports using detected event burst records representing the occurrence of burst behaviors in events in a system. Based on the causal relationships found, causes of a change in system operation may be identified by determining parameters associated with events of an event burst relevant to the change in system operation. | 07-11-2013 |
20130179569 | SYSTEMS AND METHODS FOR GATEWAY STATUS INFORMATION HANDLING - A gateway information system employs redirecting of a browser connected through a gateway to a page on the gateway which gives details of important gateway exceptions. In other instances, the gateway information is only generated and displayed for certain users, allowing transparent gateway access to other users Administrators of a network can be automatically directed to the gateway generated page and only when there are significant exceptions that need to be addressed. | 07-11-2013 |
20130185411 | SYSTEM AND METHOD FOR IMPLEMENTING HISTOGRAM CONTROLLED MOBILE DEVICES - A communication network and software for its implementation that controls a mobile device based on historical user activity is provided. The mobile device communicates with a server and includes a function that is dependent on the user activity. The server senses the user activity over time and produces a histogram of that activity. The rate at which the server attempts to sense the user activity depends on the histogram. An application might change the function depending on the result of detecting the user activity and the rate at which it does so. | 07-18-2013 |
20130185412 | CROSS-PROPERTY IDENTITY MANAGEMENT - Embodiments are directed to creating a persona from observed characteristics of content and to sharing a network persona derived from observed characteristics of content. In one scenario, a computer system observes one set of properties for a first portion of content on a network. The first portion of content is from a first account. The computer system also observes a different set of properties for a second portion of content on the network, where the second portion of content is from a second account. The computer system then correlates an association between the first account and the second account as part of a network persona that is based on the first properties and one or more corresponding properties from the second portion of content. | 07-18-2013 |
20130185413 | Integrated Metering of Service Usage for Hybrid Clouds - An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider. | 07-18-2013 |
20130185414 | Method And Apparatus For Network And Storage-Aware Virtual Machine Placement - Various embodiments provide a method and apparatus of providing a network and storage-aware virtual machine (VM) placement that optimizes placement based on network layer metrics, performance characteristics of the storage arrays and application constraints. Advantageously, since storage is often necessary in servicing application requests, basing VM placement on performance characteristics of the storage arrays as well as network layer metrics can lead to a significant improvement in VM performance. | 07-18-2013 |
20130185415 | Managing Workload Distribution Among A Plurality Of Compute Nodes - Methods, apparatuses, and computer program products for managing workload distribution among a plurality of compute nodes are provided. Embodiments include monitoring, by the distribution controller, consumption of workload assignments by each compute node of the plurality of compute nodes; and distributing, by the distribution controller, unconsumed workload assignments to one or more compute nodes of the plurality of compute nodes based on the consumption of the workload assignments of each compute node of the plurality of compute nodes. | 07-18-2013 |
20130185416 | Controlling an Apparatus - An apparatus in a LAN has first and second hardware interfaces to connect to the LAN. First and second monitoring request messages are transmitted to one or more devices in a first VLAN and one or more devices in a second VLAN respectively, via both the first and second hardware interfaces. The monitoring request messages use the Address Resolution Protocol (ARP) or the Neighbor Discovery Protocol (NDP). First and second monitoring response messages are received via the first and/or second hardware interfaces in response to the first and second monitoring request messages respectively. A selection is made between the first and second hardware interfaces for performing data communication, based on the first and second monitoring response messages. The selection is performed independently for data communication via the first and second VLANs based on at least one characteristic of the first and second monitoring response messages respectively. | 07-18-2013 |
20130185417 | REMOTE MONITORING SYSTEM, NETWORK INTERCONNECTION DEVICE AND COMMUNICATION CONTROL METHOD - Even though a network with communication rate large fluctuations is applied to a remote monitoring system, data communication delay time is kept smaller for which a shorter communication delay time is demanded and a high throughput is implemented. A sensor equipped terminal sends measurement data to a network interconnection device. A priority level determining unit of the device sorts the data into first data necessary to be delivered to a monitoring center within requested communication delay time and second data not necessarily to be delivered to the center within requested communication delay time. A transmission buffer unit is a buffer storing the first and second data accumulated in first and second data accumulating units in sending the data to a wide area network by FIFO. A transmission control unit dynamically controls a rate in causing the data to come in the transmission buffer unit based on a network communication rate. | 07-18-2013 |
20130185418 | EFFICIENTLY RELATING ADJACENT MANAGEMENT APPLICATIONS MANAGING A SHARED INFRASTRUCTURE - A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application. | 07-18-2013 |
20130185419 | OFSense: Light-Weight Networking Sensing With OpenFlow - A method for determining the state of an entire network, including state of applications and infrastructure includes receiving network control messages in an OpenFlow network, passing normal network control messages through OFSense, a control plane middleware, and constructing from the network control messages an application level connectivity graph to infer network delay between any two communicating server in the network and estimating an application response time of a given server in the network; and providing state of the network for enabling intelligent detection and diagnosis of infrastructure and application performance. | 07-18-2013 |
20130185420 | METHOD FOR CONTROLLING VIRTUAL MACHINE - A first computer starts to copy data of a virtual machine running on the first computer from the first computer to a second computer. The first computer monitors an index value related to conditions of running the virtual machine on the second computer. The first computer causes, based on the index value, the second computer to start operation of the virtual machine based on the data copied from the first computer to the second computer and terminating operation of the virtual machine running on the first computer. | 07-18-2013 |
20130185421 | Method, Terminal, and Server for Obtaining Heartbeat Period - The present invention provides a method, a terminal, and a server for obtaining a heartbeat period. According to the present invention, the terminal sends a first heartbeat message that includes location information of the terminal to the server and obtains a heartbeat period which corresponds to the foregoing location information directly from the server. This avoids each terminal needing to perform multiple heartbeat message interactions with the server when determining a heartbeat period that best matches a current network, thereby reducing power consumption of the terminal and signaling loads of a device at the network side. | 07-18-2013 |
20130185422 | MEDIA TOOLBAR AND AGGREGATED/DISTRIBUTED MEDIA ECOSYSTEM - A method and network architecture through which user-specific media profile data can be made available to third parties. A browser is optionally enhanced to facilitate playback and control of one or more media players, thereby allowing the user to play content via the browser. As the user plays content in the browser or any of the media players, information is collected about the content and stored in a database. By monitoring all media-related interactions made by the user within the browser, the collected content information can encompass information from a wide range of sources. User-specific profile data is then determined based on the collected data and such user-specific profile data is made available to third parties. The user-specific profile data can be used, for example, for social networking purposes, and may also be used to drive advertisements or other content to the user. | 07-18-2013 |
20130185423 | DYNAMIC DISTRIBUTION OF NODES ON A MULTI-NODE COMPUTER SYSTEM - I/O nodes are dynamically distributed on a multi-node computing system. An I/O configuration mechanism located in the service node of a multi-node computer system controls the distribution of the I/O nodes. The I/O configuration mechanism uses job information located in a job record to initially configure the I/O node distribution. The I/O configuration mechanism further monitors the I/O performance of the executing job to then dynamically adjusts the I/O node distribution based on the I/O performance of the executing job. | 07-18-2013 |
20130185424 | APPARATUS, METHOD AND SYSTEM FOR MANAGING EVENT INFORMATION - An apparatus, method, and system for managing event information are provided. The apparatus for managing event information includes an event management module which receives event information on an event generated in an event generator located in the same network in a multicast manner, and manages the received event information, a storage module which stores the received event information, and a control module which controls the event generator. The event management module provides the received event information to an event-management-requesting device which requests storage of event information. | 07-18-2013 |
20130185425 | Method for Optimizing Network Performance After A Temporary Loss of Connection - A communication apparatus includes a computer supported telecommunications application (“CSTA”) session established between a computing function and switching function that includes a time period where monitors and registrations are preserved by the switching function if the computing function is able to restart the session within that time period after a temporary connection failure. The switching function tracks call and non-call related device activity that occurs from the time a session failure is detected until the computing function is able to restart the application session in a first list. If the computing function restarts that application within the time period, the switching function sends the computing function a list of devices whose activity was detected during the outage. The computing function uses the list of devices to query the status of those devices to reduce the amount of time needed to perform a recovery and less system performance impacts. | 07-18-2013 |
20130191527 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 07-25-2013 |
20130191528 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 07-25-2013 |
20130191529 | Information processing unit, program execution method, and program for controlling electric appliance - An information processing unit, a program execution method, and a program are capable of identifying the type of an electric appliance and then automatically performing the setting operation, the setting information viewing, and the like of the electric appliance in order to enhance the user convenience. The information processing unit detects the electric appliance connected with a network and then determines the model related information of the detected electric appliance. The information processing unit selects a program corresponding to the model related information based on the determined model related information and then executes the selected program in a device communicatively connected with the electric appliance. | 07-25-2013 |
20130191530 | FlowSense: Light-Weight Networking Sensing With OpenFlow - A method for determining the state of an entire network, including state of applications and infrastructure includes receiving network control messages in an OpenFlow network; passing normal network control messages through FlowSense, a control plane middleware, and constructing from the network control messages an application level connectivity graph to infer network delay between any two communicating server in the network and estimating an application response time of a given server in the network, the FlowSense including a network utilization procedure for computing the utilization of each link in the network derived from using captured messages triggered by switches when flow entries expire and providing state of the network for enabling intelligent detection and diagnosis of infrastructure and application performance. | 07-25-2013 |
20130191531 | ITERATIVE SIMULATION OF REQUIREMENT METRICS FOR ASSUMPTION AND SCHEMA-FREE CONFIGURATION MANAGEMENT - Technologies are presented for a method and a system that is configured to receive a topology description of an existing customer deployment and a set of achieved performance metrics at a current datacenter and iterate simulations using policy settings across available service levels to find settings that match or exceed the achieved performance levels. Customer specifications may be received in a standardized format along with measured performance so that settings can be derived from fundamental simulation. The resulting simulations may be used to generate a menu of options and their performance automatically for a customer and that information may be provided to a configuration manager when the customer chooses a setup. | 07-25-2013 |
20130191532 | NETWORK APPLICATION PROXY SYSTEMS AND METHODS - Systems and methods disclosed herein receive a network application proxy (NAP)-extended API function call issued by a networking-aware host application. The NAP-extended API function call provides parameter values associated with a host off-loadable packet exchange sequence. Using the parameter values, a NAP module intercepts and responds to one or more incoming network packets associated with the host off-loadable packet exchange sequence while the host processor is in a sleep mode state or is transitioning between sleep mode states. | 07-25-2013 |
20130191533 | SERVER RESOURCE MANAGEMENT, ANALYSIS, AND INTRUSION NEGATION - A console host and intrusion negation system (CHAINS) includes a host component and a console component. The host component monitors resources at a server. Resources that are becoming overloaded can be throttled back. Reports relating to resource usage may be transmitted to the console component. At the console component, resource reports from multiple host components may be viewed and managed. | 07-25-2013 |
20130191534 | APPARATUS AND METHOD FOR CAPACITY PLANNING FOR DATA CENTER SERVER CONSOLIDATION AND WORKLOAD REASSIGNMENT - A server migration tool used to construct data center migration scenarios allowing for a user to rapidly manipulate a large number of input parameters required to describe a transformation from one data center configuration to a new data center configuration. The tool then performs the transformation and allows the user to interact with new data center configuration to understand its performance. A novel parameterization, speed independent service demand (SISD), greatly facilitates scaling performance metrics between different hardware platforms. | 07-25-2013 |
20130191535 | METHOD AND SYSTEM FOR CLOUD-BASED MEDIA ADAPTATION AND TRANSCODING SERVICE - A system for establishing a communication session between an originating device and a terminating device using at least one media adaptation and transcoding service (MATS) host comprises at least one computing device which searches a domain associated with the at least one originating and terminating device, for the at least one MATS host. The at least one MATS host comprises a resource configured to establish a communication session between the originating device and the terminating device. If at least one MATS host is available in the domain, the at least one computing device establishes the communication session between the originating device and the terminating device by using the resource of the at least one MATS host. The used resource is monitored during the established communication session. | 07-25-2013 |
20130191536 | Method and Network Entity for Checking, in an IP Based Communications Network, a Status of a Destination Network - Method for checking, in an IP based communications network, a status of destination network entity. The method comprises transmitting, by a requesting network entity, a probe request towards the destination network entity. Said probe request requests said destination network entity to indicate to the requesting network entity its status. The method further comprises transmitting by the destination network entity, or a service acting for the destination network entity, in response to receiving the probe request, a final response. Herein the final response provides an indication of the status of the destination network entity. | 07-25-2013 |
20130191537 | COMMUNICATIONS NETWORK - A network element and method for marking traffic in a packet-switched data network which comprises a distributed hierarchical naming system and the network element. The network element comprises a marking rule store for storing marking rules, in which each marking rule is indicative of a quality of service level allocated to traffic on a connection impinging on the network element. The network element derives from the distributed hierarchical naming system quality of service level data for a connection, stores in the marking rule store a marking rule for the connection based on the retrieved quality of service level data and marks traffic on the connection in accordance with the marking rule. | 07-25-2013 |
20130198362 | System for Identifying a Server to be Decommissioned - An embodiment of the invention provides a device for monitoring activity of a computing device connected to a network cable. The device includes a first interface for connecting the device to the network cable, a second interface for connecting the device to the computing device, and a third interface for connecting the device to a power cable. The device includes a first sensor for measuring network traffic to the computing device and/or network traffic from the computing device. The first sensor identifies an IP address accessing the computing device and/or a protocol used to access the computing device. The device further includes a second sensor for measuring power consumption of the computing device and a third sensor for identifying the computing device. A wireless communications module connected to the first sensor and/or the second sensor wirelessly transmits data from the first sensor and/or the second sensor to an external device. | 08-01-2013 |
20130198363 | TECHNIQUES FOR TRACKING RESOURCE USAGE STATISTICS PER TRANSACTION ACROSS MULTIPLE LAYERS OF PROTOCOLS - Techniques to track resource usage statistics per transaction across multiple layers of protocols and across multiple threads, processes and/or devices are disclosed. In one embodiment, for example, a technique may comprise assigning an activity context to a request at the beginning of a first stage, where the activity context has an initial set of properties. The values of the properties may be assigned to the properties in the initial set during the first stage. The value of a property may be stored on a data store local to the first stage. The activity context may be transferred to a second stage when the request begins the second stage. The transferred activity context may include a property from the initial set of properties. The stored values may be analyzed to determine a resource usage statistic. Other embodiments are described and claimed. | 08-01-2013 |
20130198364 | METHOD OF DETERMINING HTTP PROCESS INFORMATION - A method of determining http process information while executing a secure web application which redirects to a separate an unsecure web application to determine the information and redirect the information back to the secure web application. An example method includes redirecting the web browser software to an unsecure web application for obtaining the information by the computer during execution of the secure application, executing the unsecure web application using the web browser software by the computer to obtain the information about the http process, and redirecting the web browser software to provide the information from the unsecure web application to the secure web application by the computer. | 08-01-2013 |
20130198365 | Enhanced GSLB Keepalive - Systems and methods are disclosed for designating a network device as a primary device for probing a virtual IP address and designating a second network device as a standby device for probing the virtual IP address. Results of probe requests may be shared with a plurality of network devices within a mesh. | 08-01-2013 |
20130198366 | DEPLOYING AN EXECUTABLE WITH HISTORICAL PERFORMANCE DATA - Techniques for incorporating performance data into an executable file for an application are described. Embodiments monitor performance of an application while the application is running. Additionally, historical execution characteristics of the application are determined based upon the monitored performance and one or more system characteristics of a node on which the application was executed on. Embodiments also incorporate the historical execution characteristics into executable file for the application, such that the historical execution characteristics can be used to manage subsequent executions of the application. | 08-01-2013 |
20130198367 | OPTIMIZATION OF RESOURCE USAGE IN A MULTI-ENVIRONMENT COMPUTING SYSTEM - A method and apparatus for modifying resource usage by a computing system including a first environment and a second environment is disclosed. A status signal is received and applications executed by the first environment and by the second environment are monitored. The status signal may indicate whether the computing system is coupled to an external device. It is determined whether a first application is executed by the first environment and by the second environment. Responsive to determining the first application is executed by the first environment and by the second environment, an amount of resources allocated to the first application by each of the environments is calculated. Based on the first amount of resources allocated by the different environments, execution of the first application by the first environment or by the second environment is halted. | 08-01-2013 |
20130198368 | LATENCY-BASED ROUTING AND LOAD BALANCING IN A NETWORK - Aspects of the disclosure relate to routing queries to a network repository and load balancing in a network. For a network repository having a plurality of content storage sites, relative replication latency of data among a pair of content storages sites can be monitored. Data indicative of such replication latency can be distributed among the content storage sites and can be provided, for example, to a network node in a system layer. A traffic and control manager can determine routing pathways for queries based at least in part on the relative replication latency data and performance conditions of network nodes. | 08-01-2013 |
20130198369 | METHOD AND APPARATUS FOR MAPPING LOCATOR AND IDENTIFIER OF MOBILE HOST - Disclosed are a method and an apparatus for mapping a locator and an identifier of a host by using an administrative domain identifier. | 08-01-2013 |
20130198370 | METHOD FOR VISUALIZING SERVER RELIABILITY, COMPUTER SYSTEM, AND MANAGEMENT SERVER - The disclosed method quantifies the reliability of hardware and software installed in a physical server, and calculates an indication of the reliability of each of a plurality of physical servers. Configuration information, failure information, and running information of the hardware and software installed in the physical servers are collected while taking into account lifecycle information of the physical servers, and an indicator for the reliability of the hardware and software is quantified and calculated. Furthermore, an indicator of the reliability of a physical server as a whole is determined based on the indicators for the reliability of the hardware and the software. | 08-01-2013 |
20130198371 | DEPLOYING AN EXECUTABLE WITH HISTORICAL PERFORMANCE DATA - Techniques for incorporating performance data into an executable file for an application are described. Embodiments monitor performance of an application while the application is running. Additionally, historical execution characteristics of the application are determined based upon the monitored performance and one or more system characteristics of a node on which the application was executed on. Embodiments also incorporate the historical execution characteristics into executable file for the application, such that the historical execution characteristics can be used to manage subsequent executions of the application. | 08-01-2013 |
20130198372 | DISTRIBUTED NEWTON METHOD AND APPARATUS FOR NETWORK UTILITY MAXIMIZATION - A distributed inexact Newton-type second order method for Network Utility maximization problems is provided. Such methods are capable of achieving superlinear convergence rates (in primal iterates) to some error neighborhood, can be implemented in a decentralized manner using a matrix splitting scheme, and is compatible with current information exchange mechanisms. | 08-01-2013 |
20130198373 | MANAGING DATA TRANSFERS OVER NETWORK CONNECTIONS BASED ON PRIORITY AND A DATA USAGE PLAN - Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits. | 08-01-2013 |
20130198374 | ON-DEVICE ATTRIBUTION OF NETWORK DATA USAGE - Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review. | 08-01-2013 |
20130198375 | SYSTEMS AND METHODS FOR DISPLAYING STATISTICAL INFORMATION ON A WEB PAGE - A method for displaying information on a display screen of a user computer comprises sending a computer readable document from a server computer to the user computer for display on the display screen. The computer readable document includes links that are viewable on the display screen and are selectable to cause subsequent documents to be rendered on the display screen. The computer readable document further includes viewable information regarding selection of the links over a certain time. | 08-01-2013 |
20130198376 | HYBRID INTERNET TRAFFIC MEASUREMENT USING SITE-CENTRIC AND PANEL DATA - This disclosure concerns a hybrid method for estimating Internet traffic including determining a fraction of a target population consisting of users displaying an identified characteristic by analysis of a census-based measurement of internet traffic for at least one website and receiving their clickstream data. The method also includes identifying a fraction of the group of participants that share the one or more characteristics, determining a behavioral composition by scaling the fraction of the group of participants by the fraction of the target population, and producing, at the host processing facility, an estimate of the target population's activity with respect to at least a part of the Internet that includes the at least one website by scaling the clickstream data for the subset of the group of participants by applying a weight based on the behavioral composition and the relative size of the target population. | 08-01-2013 |
20130198377 | CONTROL METHOD, CONTROL SYSTEM, INFORMATION PROCESSING APPARATUS, AND COMPUTER-READABLE NON-TRANSITORY MEDIUM - A computer-readable, non-transitory medium storing therein an application control program that causes an information processing machine to execute a procedure, the procedure includes, receiving an activation request that requests an activation of a first application of the information processing machine, monitoring another information processing machine that executes a second application corresponding to the first application, and, activating the first application in response to the activation request when a stoppage of an operating system of the another information processing machine is detected. | 08-01-2013 |
20130198378 | RESPONDING TO QUALITY OF SERVICE EVENTS IN A MULTI-LAYERED COMMUNICATION SYSTEM - A method for providing broadband communications over a multi-layer network having a plurality of Open System Interconnection layers. The method stores information in a memory, the information indicating for each of a plurality of communication resources within the multi-layer network, one or more layers of the network with which that communication resource is associated. The method monitors the multi-layer network to detect a quality of service event that has occurred at a first of a plurality of communication resources, and in response to the monitoring, uses the information to determine a layer of the multi-layer network that is associated with the first of the plurality of communication resources. The method responds to the quality of the service event by changing provisioning of the multi-layer network at a layer that is different from the layer of the multi-layer network that is associated with the first of the plurality of communication resources. | 08-01-2013 |
20130198379 | LOGGING CONTROL PLANE EVENTS | 08-01-2013 |
20130198380 | VIOLATION SIGN CONDITION SETTING SUPPORTING SYSTEM, VIOLATION SIGN CONDITION SETTING SUPPORTING METHOD, AND VIOLATION SIGN CONDITION SETTING SUPPORTING PROGRAM - It is an object of the present invention to reduce a work load in setting a violation sign condition. A violation sign condition setting supporting system includes a violation-condition-similarity calculating unit | 08-01-2013 |
20130205001 | MODIFYING APPLICATION DATA SYNCHRONIZATION BASED ON APPLICATION USAGE FREQUENCY - A method and apparatus for modifying data synchronization of an application responsive to the frequency of application usage are disclosed. Data describing a frequency with which the application is used is captured by a portable computing device. For example, data describing timestamps when the application receives input or data describing a timestamp when the application was the primary application being executed are captured. It is determined whether the frequency of interaction with which the application is used equals or exceeds a threshold value. For example, the portable computing device determines whether the application has received an input or was the primary application within a predetermined time interval from the current time. Responsive to determining the frequency of interaction with the application does not equal or exceed the threshold value, data synchronization for the application is disabled. In one embodiment, the portable computing device stops data synchronization for the application. | 08-08-2013 |
20130205002 | WIDE AREA NETWORK OPTIMIZATION - In one embodiment, a method includes receiving application traffic at a network device from one or more endpoints, measuring performance of applications at the network device, optimizing TCP (Transmission Control Protocol) applications and UDP (User Datagram Protocol) applications based on the measured performance and policy input received at the network device, queuing the application traffic at the network device such that the application traffic shares available bandwidth in accordance with the measured performance and the policy input, and transmitting the application traffic over a wide area network. An apparatus is also disclosed. | 08-08-2013 |
20130205003 | REDUCING THE SIZE OF VOLATILE MEMORY IN AN END DEVICE DESIGNED TO OPERATE WITH MULTIPLE VERSIONS OF INTERNET PROTOCOL - An end device in a network is designed to operate consistent with multiple versions of the internet protocol. The end device determines which version of the internet protocol, according to which the network is operative, by monitoring a set of packets on the network. Based on the determination of the version of internet protocol, the end device loads in an internal volatile memory only those instructions and data required for operation according to the determined version. Instructions and data required for operation according to other version(s) are not loaded into the volatile memory. Size requirements of the volatile memory are thereby reduced. | 08-08-2013 |
20130205004 | Apparatus and Method to Retrieve and Store Link Results for Later Viewing - The system, a link monitor and predictor unit, monitors the user's habits, interests, attention span, etc. and analyzes the user's interest in a continuous fashion to determine the user's profile. This occurs in the background without the user's knowledge. The system automatically scans and updates the user's recently opened websites. The profile will contain the habitual websites and/or any particular categories that the user tends to view. These are the links that the system automatically downloads when the user is active looking at another website or performing some other function. The habitual system reads the user's profile and provides background instructions to the PC to start uploading the local memory (cache) with the specified website content. Then, when the user requests one of these links, it is readily available. | 08-08-2013 |
20130205005 | ALLOCATION AND BALANCING OF STORAGE RESOURCES - A system and technique for allocating and balancing storage resources includes: a plurality of storage controllers each controlling one or more storage volumes, and a processor unit operable to execute a management application to: determine, for each controller, an input/output (I/O) latency value based on an I/O latency associated with each storage volume controlled by a respective controller; determine network bandwidth utilization and network latency values corresponding to each controller; responsive to a request to allocate a new storage volume, select a controller having a desired I/O latency value; determine whether the network bandwidth utilization and network latency values for the selected controller are below respective network bandwidth utilization and network latency value thresholds; and responsive to determining that the network bandwidth utilization and network latency values for the selected controller are below respective thresholds, allocate the new storage volume to the selected controller. | 08-08-2013 |
20130205006 | INTELLIGENT FAILOVER OR SHUTDOWN OF AN APPLICATION USING INPUT/OUTPUT SHIPPING IN RESPONSE TO LOSS OF CONNECTIVITY TO DATA STORAGE IN A CLUSTER - When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request. | 08-08-2013 |
20130205007 | SUGGESTING MIGRATION TO A CLOUD COMPUTING INFRASTRUCTURE - Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated. | 08-08-2013 |
20130205008 | SELECTIVELY TRIGGERING EXECUTION OF SERVICES IN A COMPUTING ENVIRONMENT - Rule-based triggering of execution of services is provided. An advisor program identifies an application attribute(s) about which data is to be obtained, based on the presence of the application attribute(s) in one or more logical expressions of one or more rules. The one or more rules are developed and managed separate from the program code of the application and use at least one identifier employed by the application in identifying application attributes. Data about the application attribute(s), for instance user behavior with respect to the application attribute(s), is obtained, and the logical expression(s) of the rule(s) are evaluated based on the obtained data to determine whether to trigger execution of one or more services specified in the rule(s). | 08-08-2013 |
20130205009 | OVERHEAD MANAGEMENT FOR EVENT TRACING - The present invention relates to managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data. | 08-08-2013 |
20130205010 | WORKLOAD PATTERNS FOR REALISTIC LOAD RECREATION IN PERFORMANCE TESTING - Various technologies related to uniform resource locator (URL) sequence patterns are described. Such patterns can be used to determine a distribution of a mix of the URL sequence patterns occurring within given URL sequences. A production environment URL log can be analyzed using the technologies described herein to recreate a production environment load in a test environment. Transaction sequences and strongly coupled relationships can be supported. | 08-08-2013 |
20130205011 | SERVICE PROVIDING SYSTEM - In a system with a terminal sending a request, when a load distributing unit distributes the request to many service providing apparatuses, the load distributing unit becomes a bottleneck of performance and/or a single point of failure. When the load is distributed to the service providing apparatuses without using the load distributing unit, a particular function is required on the terminal side to appropriately select one of apparatuses. A name resolution unit including an address group management table with IP addresses to select, for a request from a terminal, an address from the table to return the address to the terminal and a plurality of service providing apparatuses to which at least zero IP address selected from the table is allocated without duplication are arranged such that each service providing apparatus is allocated with IP addresses according to processing performance thereof, thereby conducting appropriate load distribution. | 08-08-2013 |
20130205012 | APPARATUS AND METHOD FOR TRANSMITTING NODE DISCOVERY MESSAGES - Disclosed herein are an apparatus and method for transmitting Node Discovery Messages. The apparatus includes a Medium Access Control layer information collection unit, a Discovery Window Slot calculation unit, a DW size determination unit, a DWS selection unit, and an NDM processing unit. The MAC layer information collection unit collects time slot information for NDMs in a previous round. The DWS calculation unit generates information about the slots of a Discovery Window of a discovery frame in the previous round based on the time slot information. The DW size determination unit determines the size of the DW in a current round based on the information about the slots of the DW. The DWS selection unit selects Discovery Window Slots in the current round based on the size of the DW. The NDM processing unit sends the NDMs during respective times corresponding to the DWSs. | 08-08-2013 |
20130205013 | NETWORK MANAGEMENT IN A COMMUNICATIONS NETWORK - A method and an apparatus discover a node in a communications network. The method and apparatus deploy a first crawler program in the network, where the first crawler program encounters a first node of the network. Network management information is collected from the first node using the first crawler program. An identity of a second node in communication with the first node is determined from the network management information using the first crawler program. The method and apparatus avoid or reduce the need for human operator involvement when the communications network is configured for the first time, or when there has been a change in the communications network such as the addition of a new node. | 08-08-2013 |
20130205014 | COMPUTER SYSTEM AND RULE GENERATION METHOD - Disclosed is a computer system provided with a plurality of sensors provided in a plurality of devices to observe a predetermined amount, and a server for examining the physical amount transmitted from the sensors, wherein the plurality of devices are classified into a first device group and a plurality of second device groups, a plurality of second examination rules indicating the examination methods of the physical amount are set in the plurality of second device groups, the server calculates the similarity between the first device group and each of the second device groups, and, on the basis of the calculated similarity, a first examination rule to be set in the first device group is extracted from the plurality of second examination rules set in the plurality of second device groups. | 08-08-2013 |
20130205015 | Method and Device for Analyzing Data Intercepted on an IP Network in order to Monitor the Activity of Users on a Website - A method is provided. The method includes the steps acquiring a complete data frame from an HTTP request, selecting the data frame acquired if the binary structure thereof meets a plurality of conditions including at least one condition corresponding to the IP layer of the frame, at least one condition corresponding to the transport layer of the frame and at least one condition corresponding to the application layer of the frame, extracting data of interest from the application layer of the selected frame and recording the extracted data in a database. | 08-08-2013 |
20130205016 | REMOTE MONITORING AND CONTROLLING OF NETWORK UTILIZATION - A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management computer, receiving, from a gateway located in a managed network, device information about devices in the managed network; for a particular device: determining a match between the device capabilities of the particular device and features of a particular network software application configured to control the particular device, and determining a particular protocol endpoint configured to communicate control instructions from the particular network software application to the particular device; receiving, from the gateway, aggregated data that reflects network utilization by the devices located in the managed network; for the particular device: based at least in part on the aggregated data, using the particular network software application, determining control instructions for the particular device; causing the particular protocol endpoint to transmit the control instructions for the particular device to the device. | 08-08-2013 |
20130205017 | COMPUTER FAILURE MONITORING METHOD AND DEVICE - Disclosed is a non-transitory computer-readable medium storing a program that causes a client device to execute a sequence of processing. The sequence of processing includes generating, by a processor, a processing request message by attaching status information including information indicating a status of a first server device stored in a storage part to a processing request addressed to the first server device, transmitting the generated processing request message to the first server device and a second server device monitoring the first server device, and receiving from the first server device a new status information of the first server device. | 08-08-2013 |
20130205018 | EXTENDING SERVICE DISCOVERY INTO CLOUD COMPUTING - Providing service discovery in a communication network comprises adding service discovery information for a first network to a domain name system (DNS). The service discovery information provides for devices to discover devices and services that the devices support. Service information is discovered from the service discovery information over the communication network. One or more services from the first network are selected from the discovered service information. One or more services are accessed over the communication network from the first local network. | 08-08-2013 |
20130205019 | SYSTEMS AND METHODS FOR MANAGING API INTERACTIONS - Systems and methods for enabling and managing API interactions through one or more location-agnostic software brokers interchangeably on premises as well as in a cloud environment are provided. These systems and methods may include a tree-based hierarchy of hypermedia components and additional metadata to enable comparisons between distinct APIs accessed via various and wide-ranging protocols. These systems and methods may provide portability across relational and non-relational data stores to support hybrid and location-specific installations of software brokers and allow users to access and leverage on-premises (e.g., private) model entities side-by-side with off-premise (e.g., public or cloud) model entities. Flexibility across model entities may provide portability and sharing across multiple environments, thereby providing a highly leveraged environment that may reduce duplication of efforts in the management of API interactions. | 08-08-2013 |
20130205020 | REAL-TIME ANALYTICS OF WEB PERFORMANCE USING ACTUAL USER MEASUREMENTS - A method for real-time capture of actual user experiences on a website, web application or mobile app includes receiving, in first servers, one or more beacons, each containing data items. Each beacon is generated in real-time from a user session. The data items are aggregated in one or more first sets of N data buckets associated with each of the first servers. Each of the first servers transmits the data items of each of the N data buckets to a second server over a network, which further aggregates the data items received in one or more sets of N data buckets corresponding to and identically configured as the data buckets of the first servers. The corresponding data contents of the one or more second sets of N data buckets is aggregated into one or more final sets of N data buckets used in generating a real-time analytic dashboard. | 08-08-2013 |
20130205021 | PRIVATE NETWORK WITH ENHANCED USER EXPERIENCE - A private network capable of locating a user through a network-enabled device, via the media access control address, while the user is in range of a halo device. | 08-08-2013 |
20130205022 | SYSTEMS AND METHODS FOR PROCESSING METER INFORMATION IN A NETWORK OF INTELLIGENT ELECTRONIC DEVICES - Systems and methods are provided for managing software scripts. One system comprises one or more meters, each configured to measure parameters of a commodity. The system also comprises a server and a plurality of client devices. The server is in communication with the one or more meters by way of a communication network and is configured to receive and store the measured parameters from the one or more meters. The client devices communicate with the server via the communication network. Also, the system includes a base device in communication with the client devices. The base device is configured to store one or more functional chains, each of the one or more functional chains comprising software code defining a plurality of functional actions to be performed in a specific sequence. The base device comprises an interface that allows the plurality of client devices to reference the functional chain. | 08-08-2013 |
20130205023 | SYSTEM AND METHOD FOR DETERMINING AND OPTIMIZING RESOURCES OF DATA PROCESSING SYSTEM UTILIZED BY A SERVICE REQUEST - A computer-implemented method for determining resources utilized by a service request in a data processing system. The method includes determining monitored relationship types from monitoring data, determining relationship domains, determining intra-domain relationships from relationships that are internal to the relationship domains and determining cross-domain relationships from the intra-domain relationships that are linked between pairs of the relationship domains, and determining resources utilized by the service request from the intra-domain and cross-domain relationships. The domains are derived from one of the relationship types that is monitored by a single monitoring application. | 08-08-2013 |
20130205024 | SERVER SYSTEM, MANAGEMENT DEVICE, SERVER MANAGEMENT METHOD, AND PROGRAM - A server system ( | 08-08-2013 |
20130212250 | USER PRESENCE DATA FOR WEB-BASED DOCUMENT COLLABORATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, include sending a first electronic document to a first client device over a data network from a web server. The first electronic document includes multiple document elements formatted according to a first document schema for a first client application. The document elements include multiple content elements and one or more presence elements. Presence data is received over the data network at the web server from the first client device. The presence data includes an identification of one or more of the content elements of the first electronic document. The presence data also includes an identification of a status of the first electronic document for the first client device. An updated presence element for the first electronic document, which includes a first presence object, is stored. The first presence object includes the presence data received from the first client device and an identification of the first client device and/or a first user associated with the first client device. The first presence object is sent over the data network from the web server to a second client device. | 08-15-2013 |
20130212251 | METHOD AND SYSTEM FOR ACCESS POINT CONGESTION DETECTION AND REDUCTION - A method and system for detecting and reducing data transfer congestion in a wireless access point includes determining a round-trip-time value for an internet control message protocol (ICMP) packet transmitted from a source computing device to a first computing device of a plurality of computing devices via the wireless access point. A data rate for data transmissions from the source computing device is increased to a value no greater than a peak data rate value if the round-trip-time is less than a first threshold value. The data rate is decreased if the round-trip-time value is greater than a second threshold value. Additionally, the peak data rate value may also be decreased if the round-trip-time value is greater than the second threshold value. | 08-15-2013 |
20130212252 | REPRESENTING REMOTELY AVAILABLE USERS THROUGH WORKING ELSEWHERE STATUS - An application provides a “working elsewhere” status for users working at a location other than their regular work location and still available for meetings, communication sessions, etc. The application determines a user location being other than regular work location and the user still being available through user selection, information from user associated application(s), and/or from a presence notification. The application adjusts the user status to a working elsewhere status and makes the new status available to other applications such as calendaring, communication applications, presence service(s), and comparable ones. Meetings may be scheduled, communication sessions facilitated if the working elsewhere status is sufficient/acceptable for other users. | 08-15-2013 |
20130212253 | Calculating A Checksum With Inactive Networking Components In A Computing System - Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data. | 08-15-2013 |
20130212254 | NETWORK ARRANGEMENT OF LOW POWERED MONITORING DEVICES - A network arrangement of low powered monitored devices which are linked together along with a control device in a mesh network configuration. Each of the security devices and the control devices are powered by an on board power source. To maximise the lifetime of the of the power supply the devices are monitored periodically and synchronously, and the devices are only activated during monitoring. | 08-15-2013 |
20130212255 | METHOD AND SYSTEM FOR GENERATING TRANSACTION DATA FROM NETWORK TRAFFIC DATA FOR AN APPLICATION SYSTEM - A method for generating transaction data from network traffic data for an application system which is distributed across a plurality of network connected nodes, comprising: gathering the network traffic data, the network traffic data including syntactic information; storing the network traffic data and the syntactic information in field-sets; deriving semantic information from the network traffic data and the syntactic information with a first module which implements a first semantic model relating to first transactions, and modifying the field-sets to include the semantic information; passing the field-sets to a second module; deriving additional semantic information from the network traffic data, the syntactic information, and the semantic information with the second module which implements a second semantic model relating to second transactions, and further modifying the field-sets to include the additional semantic information; and, outputting the field-sets from the second module to provide the transaction data for the application system. | 08-15-2013 |
20130212256 | SYSTEMS AND METHODS FOR ACCESSING TELESCOPES - A user obtains, views and stores image data of a selected celestial object from a network of available telescopes using a computer-generated user interface. Based on the selected object, information is accessed regarding each telescope from data sources such as databases and/or live data feeds to automatically select telescopes that are suitable for imaging the object, e.g., according to factors such as telescope type, power and configuration, location, weather conditions and altitude. The user may select a particular telescope and imaging time from a schedule of available telescopes and imaging times. At the scheduled time, an image is recorded of the celestial object and communicated to a central data store for access by the user, e.g., via a web site The user may be charged for the service based on factors such as exposure time, scheduling priority, type of telescope and the like. | 08-15-2013 |
20130212257 | COMPUTER PROGRAM AND MONITORING APPARATUS - To analyze the cause if an event occurred to a plurality of monitoring targets. A monitoring computer | 08-15-2013 |
20130212258 | CALCULATING A CHECKSUM WITH INACTIVE NETWORKING COMPONENTS IN A COMPUTING SYSTEM - Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data. | 08-15-2013 |
20130212259 | SERVICE SCRIPTING FRAMEWORK - Receiving and executing at a server a script provided by a client, e.g., in a service request sent by a web services or other service client and/or consumer, is disclosed. In various embodiments, the script is configured to cause the server to do one or more of the following: pre-process at least a portion of the services request; post-process a response data associated with the services request; and replace an operation comprising the service at least in part with a replacement operation defined or identified at least in part in the script. | 08-15-2013 |
20130212260 | SYSTEM AND METHOD FOR AUTOMATIC PRIORITIZATION OF COMMUNICATION SESSIONS - The disclosed techniques apply automatic prioritization to communication sessions conducted by users of a communication network, and present the sessions to an operator in accordance with the priorities. Each session is assigned an initial priority depending on the user who conducts the session (referred to as “target user”). The priority is then adjusted in accordance with a set of rules defined for that target user, and possibly based on activities of the target user as analyzed using the reconstructed communication. The rules typically consider metadata of the session. The sessions are typically held in a queue and presented to an operator in accordance with their respective priorities. | 08-15-2013 |
20130212261 | INFORMATION PROCESSING SYSTEM, PORTABLE INFORMATION TERMINAL, INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM - An information processing system comprises an information processing device and a portable information terminal that allow communication therebetween. The portable information terminal includes: an application detection part for detecting a running application; a management part for detecting a cloud service to which the application connects and managing the application and the cloud service; a destination information generation part for generating destination information required for the information processing device to use the cloud service; and a transmission part for sending the destination information to the information processing device. The information processing device includes: a destination setting part for automatically configuring the destination to connect to the cloud service the same as that used by the running application on the portable information terminal in accordance with the destination information; and a data processing part for connecting to the cloud service to send and receive data. | 08-15-2013 |
20130212262 | ENERGY MANAGEMENT APPARATUS - A gateway includes a processor operable to manage energy use at a site. The processor is configured to receive network device data from a long range communication network, wherein the network device data is initiated from at least one of a mobile device or a cloud service to alter an operating condition of a network device located at a site. The processor is also configured to detect an availability of the network device connected to a second network configured as a local network, and format the network device data to a message bus format configured to be output to a communication device configured to access the second network. The processor is further configured to receive response data from the network device formatted to be communicated using the second network, and translate the received response data to another format capable of being output over the long range communication network. | 08-15-2013 |
20130212263 | ENCAPSULATING DATA PACKETS - A network captured traffic distribution device may receive captured data packets including original destination information. The captured data packets may then be encapsulated with, for example, new address information so that they may be transmitted toward a destination intended by the network capture traffic distribution device and not the original destination. Captured data packets may also be reformatted by the network capture traffic distribution device in order to, for example, be compatible with one or more devices communicatively coupled to the network capture traffic distribution device. Optionally, the encapsulated and/or reformatted captured data packets may further be encrypted prior to transmission toward their intended destination. | 08-15-2013 |
20130212264 | Controlling access of clients to service in cluster environment - First, second, and third sets of addresses are created. The first set includes addresses registered in a name server; both the second and third sets include addresses not registered in the name server and that are disjoint. A first address of a first server that has failed and to which access is to be prohibited is moved from the first to the third set., is removed from the first server, assigned to a second server, and removed from the name server. Usage parameter values of the first address are monitored to determine whether at least one is below a value. If so, the first address is removed from the second server and moved from the third to the second set. Upon access to the first server no longer being prohibited, a second address of the second set is assigned to the first server and added to the name server. | 08-15-2013 |
20130212265 | METHOD AND APPARATUS FOR TRAFFIC CLASSIFICATION - A Policy and Charging Rules Function server (PCRF) of a Policy and Charging Control (PCC) Architecture for deciding control rules applicable to user traffic flows to be inspected, in accordance with applicable telecommunication protocols for each traffic flow, by a Policy and Charging Enforcement Function server with Deep Packet inspection capabilities (PCEF-DPI) of the PCC Architecture. The PCRF includes a database having a list of protocols used in the user tialYtc flow s The PCRF includes an interface unit which receives a query from the PCEF-DPI about applicable control rules for an IP Connectivity Access Network (IP-CAN) session established for a user at the PCEF-DPI The PCRF includes a processing unit which sends the applicable control rules for the IP-CAN session and the list of protocols through the interface unit to the PCEF-DPI. A Policy and Charging Enforcement Function, server having Deep Packet Inspection capabilities (PCEF-DPI) of a Policy and Charging Control (PCC) Architecture. A method of a Policy and Charging Rules Function server (PCRF) of a Policy and Charging Control (PCC) Architecture. A method of a Policy and Charging Enforcement Function server having Deep Packet inspection capabilities (PCFF-DPI) of a Policy and Charging Control (PCC) Architecture. | 08-15-2013 |
20130212266 | ROUTING CLIENT REQUESTS - Methods and systems for routing client requests are provided. According to one embodiment, a request handling server obtains a rule set for managing the traffic of a content publisher. A request associated with the content publisher is received at the request handling server. When the received request is a content request, directly servicing the received request or redirecting the received request by the request handling server to another server capable of handling the request based on the rule set. When the received request comprises a Domain Name System (DNS) request, responding to the DNS request, by the request handling server, with a DNS response based on the rule set. | 08-15-2013 |
20130212267 | Dynamically Balancing Resources In A Server Farm - Dynamically balancing resources in a server farm, where the server farm includes servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, and the balancing of resources includes: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 08-15-2013 |
20130212268 | Route Control Method and System, and Route Computing Apparatus - A route control method is disclosed in the present document. The method includes: a path computing apparatus acquiring a latency value of each node and a latency value of a link between each node and each adjacent node thereof; and when receiving a route computing request, according to each latency value acquired, the path computing apparatus computing an end-to-end path satisfying a latency requirement of a service corresponding to the route computing request. A path computing apparatus and a route control system are also disclosed in the present document. With the present document, a route control computed by the latency provides a solution for a latency Service Level Agreement (SLA) of operators. | 08-15-2013 |
20130219042 | MANAGING CLOUD SERVICES - A system, and computer program product for managing cloud services are provided in the illustrative embodiments. A first set of management functions is instantiated external to a microkernel of a management system for managing a set of cloud services. The management system further includes a second set of management functions executing within the kernel of the management system. A subset of the first set of management functions is associated with a cloud service in the set of cloud services. A management task for the cloud service is handled using the subset of the first set of management functions. A usage information corresponding to the use of the subset of the first set of management functions for handling the management task for the cloud service is reported. | 08-22-2013 |
20130219043 | METHOD AND APPARATUS FOR AUTOMATIC MIGRATION OF APPLICATION SERVICE - A method and apparatus for dynamically migrating a virtual desktop (VD) user from a first data center (DC) to a second DC in response to a determination made using DC management information and communications network management information that a user quality of experience (QoE) is deficient. | 08-22-2013 |
20130219044 | Correlating Execution Characteristics Across Components Of An Enterprise Application Hosted On Multiple Stacks - An aspect of the present invention provides for monitoring components of an enterprise application distributed across stacks. In an embodiment, a digital processing system receives a monitoring data indicating a first component and a second component of an enterprise application, with the monitoring data further indicating that the first component executes in a first stack and the second component executes in a second stack. The digital processing system collects execution characteristics of the two components and displays the collected execution characteristics of both the components. According to another aspect, the execution characteristics for both the components are displayed on a common user interface for a same time window, such that a user (e.g., an administrator of the enterprise application) is facilitated to correlate the execution characteristics of different components executing across multiple stacks. | 08-22-2013 |
20130219045 | KEEPALIVE MECHANISM TO MAINTAIN LINKS IN A LOSSY ENVIRONMENT - In one embodiment, a particular device determines a selected link from the particular device toward a root device in a computer network, wherein traffic destined away from the root device via the particular device utilizes the selected link in reverse. By monitoring a link quality of the selected link in reverse based on received traffic over the selected link, the particular device may determine whether the link quality is below a lower threshold. In response to the link quality being below the lower threshold, the particular device activates use of keepalive messages from the particular device over the selected link. | 08-22-2013 |
20130219046 | DYNAMIC APPLICATION-AWARE ROUTING TOPOLOGIES - In one embodiment, an application flow of traffic may be detected within a computer network, e.g., by a root node, border router, network management server, etc. Thereafter, one or more traffic requirements of the application flow may be determined, and a corresponding routing topology objective function may be established based on the traffic requirements. Accordingly, creation of a specific routing topology based on the objective function may then be initiated for use with the application flow. | 08-22-2013 |
20130219047 | DESKTOP CONTROL OF TRAFFIC TRANSMITTED TO A USER DEVICE - A system is configured to obtain information that identifies a first rate for first traffic associated with an object within a desktop associated with a user device and a second rate for second traffic associated with another object within the desktop; provide a virtual desktop based on the information; create a first zone, within the desktop, associated with the object; create a second zone, within the desktop, associated with the other object; compare the first rate and the second rate to a threshold; provide, via the virtual desktop, the first zone, having first appearance attributes, based on the first rate being greater than the threshold, and the second zone, having second appearance attributes, based on the second rate not being greater than the threshold; receive selection of the first zone; and output a request to control the first traffic based on the selection of the first zone. | 08-22-2013 |
20130219048 | Quantifying User Quality of Experience by Passive Monitoring - A method is implemented in a network element to generate quality of experience (QoE) metrics for hypertext transfer protocol (HTTP) sessions over a network between a user device and an HTTP server. The QoE metrics are based on detecting premature termination of a download process that indicate low QoE. This QoE metric data can then be utilized by network administrators or service providers to adjust network characteristics to improve the QoE or to offer changes in services to a customer that would improve the QoE. | 08-22-2013 |
20130219049 | FILE MONITORING - A server receives a first set of file activity data from a first file monitor. The first set of file activity data indicates activity associated with a first set of files accessed at a first compute node in communication with a network. Further, the server receives a second set of file activity data from a second file monitor. The second set of file activity data indicates activity associated with a second set of files accessed at a second compute node in communication with the network. In addition, the server aggregates the first set of file activity data and the second set of file activity data into an aggregated set of network file activity data. | 08-22-2013 |
20130219050 | CLOUD SERVICE ACCESS APPARATUS, CLOUD SERVICE ACCESS METHOD, AND CLOUD SERVICE ACCESS SYSTEM - A method for controlling a cloud file includes determining whether a scanning file corresponding to the cloud file is available, obtaining the scanning file from a virtual folder storage unit of a terminal, identifying a cloud plug module (CPM) corresponding to a cloud service in which the cloud file is stored based on the scanning file, and accessing the cloud service through the CPM. A cloud service access apparatus includes a cloud service access unit including a CPM, a virtual folder storage unit to store a scanning file associated with the CPM, and a control unit to determine whether the scanning file corresponds to a cloud file, to obtain the scanning file from a virtual folder storage unit, to identify the CPM corresponding to a cloud service storing the cloud file based on the scanning file, and to access the cloud service through the CPM. | 08-22-2013 |
20130219051 | COMPUTER-BASED COMPARISON OF HUMAN INDIVIDUALS - A test person is compared to a reference person by comparing detailed information regarding the configuration, capabilities and usage of computers—such as installed hardware devices, makes and models and firmware versions of such hardware devices, installed software, versions of installed software, and usage logs—used by the respective individuals. In effect, each person's computer is considered a proxy for the person herself, representing countless purchasing, maintenance, pastime choices in the configuration and use of a thoroughly complex personal and professional tool. | 08-22-2013 |
20130219052 | DYNAMIC CONFIGURATION OF INTERCONNECTED DEVICES FOR MEASURING PERFORMANCE CHARACTERISTICS IN A NETWORK - Dynamic configuration of interconnected devices for measuring performance characteristics in a network is disclosed. The present invention relates to measurement of performance characteristics and, more particularly, to measurement of performance characteristics of interconnected devices in a network. In existing systems there is no mechanism to dynamically determine the performance characteristics of the network and automate the test process between devices of the network. Disclosed system allows configuring the devices such as provider edge devices dynamically in the network. Further, it is possible to determine the capabilities of the devices under test and accordingly configure the test parameters. Further, the devices may be synchronized and the test may be carried out. The test process is thus automated and hence eliminates manual configuration that is error prone and tedious. | 08-22-2013 |
20130219053 | METHOD FOR IMPROVED HANDLING OF INCIDENTS IN A NETWORK MONITORING SYSTEM - A method for operating a monitored telecommunications network, the telecommunications network management system being monitored by a network management system, the network management system processing alarm messages generated by monitoring components within the telecommunications network, incidents of technical failure or error within the telecommunications network resulting in the generation of the alarm messages by the monitoring components, includes: monitoring the telecommunications network, observed incidents of technical failure or error, and generated alarm messages during a preparatory period of time; determining a scaling parameter per type of alarm message, wherein the scaling parameter is related to the number of incident tickets generated during the preparatory period of time; and suppressing the generated alarm message based on the value of the scaling parameter associated to the type of the generated alarm message. | 08-22-2013 |
20130219054 | WORKLOAD MANAGEMENT IN HETEROGENEOUS ENVIRONMENTS - A system for managing a workload in a heterogeneous environment comprising at least one application, an interoperability layer for inter-application communication, and at least one adapter for connecting the at least one application to the interoperability layer, is disclosed. Such a system includes a self-adapting application connector management component which includes the following: a monitoring component for monitoring the performance and workload characteristics of one or more applications and/or one or more adapters; a computing component for computing a configuration change based on the monitored performance and workload characteristics; a change component for changing the configuration of the one or more adapters in accordance with the computed configuration change; and a change component for changing the configuration of the one or more applications in accordance with the computed configuration change. | 08-22-2013 |
20130219055 | METHOD AND APPARATUS FOR INTERFERENCE REPORTING IN A N-MIMO COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate interference measurement and reporting in a network multiple-in-multiple-out (N-MIMO) communication system. As described herein, a network device can measure and report interference corresponding to network nodes outside a designated set of nodes that can cooperatively serve the device. Respective interference reports can additionally identify dominant interfering nodes, correlation between transmit antennas of respective nodes, or the like. Subsequently, respective interference reports can be combined with per-node channel information to manage coordination and scheduling across respective network nodes. As further described herein, interference from a network node can be measured by observing reference and/or synchronization signals from the network node. To aid such observation, respective non-interfering network nodes can define null pilot intervals in which transmission is silenced or otherwise reduced. As additionally described herein, loading information broadcasted by respective interfering network nodes can be identified and utilized in connection with interference calculation. | 08-22-2013 |
20130219056 | System and Method for Optimization of Network Delivery of Streaming Data - A system and method for optimizing network delivery of streaming data is provided. Streaming delivery of data using point-to-point transmitters and broadcast transmitters can be dynamically controlled to maximize the usage of network resources. Current usage of respective systems can be analyzed, as can projected usage be analyzed. Network resources can be reallocated, and connecting devices can be redirected as needed to maintain high efficiency of allocated resources. | 08-22-2013 |
20130219057 | Relationships Derived from Trace Data - An analysis system may perform network analysis on data gathered from an executing application. The analysis system may identify relationships between code elements and use tracer data to quantify and classify various code elements. In some cases, the analysis system may operate with only data gathered while tracing an application, while other cases may combine static analysis data with tracing data. The network analysis may identify groups of related code elements through cluster analysis, as well as identify bottlenecks from one to many and many to one relationships. The analysis system may generate visualizations showing the interconnections or relationships within the executing code, along with highlighted elements that may be limiting performance. | 08-22-2013 |
20130219058 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 08-22-2013 |
20130219059 | Internet-Wide Scheduling of Transactions - A method and system for distributing content on a network through network-wide transactions is disclosed. The method and system monitors the network using triggered measurement of the performance of an element of the network, dynamically computing, based on the monitoring, the regions of the network with available performance capacity for the transaction to proceed at a given time, determining, based on the computing, a scheduled time for the transaction to proceed, and distributing the content according to a schedule related to the scheduled time. | 08-22-2013 |
20130219060 | REMOTE ACCESS APPLIANCE HAVING MSS FUNCTIONALITY - A remote access appliance is disclosed for facilitating communications between a managed device and a user located remotely from the appliance and from the managed device. The appliance may have a processor adapted to facilitate the communication of keyboard, video and mouse information between the appliance and the managed device. A manageability subsystem may be incorporated for communicating with the managed device and collecting information concerning operation of the managed device, without the need to first transmit the information over a network. | 08-22-2013 |
20130227112 | SMART CACHE LEARNING MECHANISM IN ENTERPRISE PORTAL NAVIGATION - The disclosure generally describes computer-implemented methods, software, and systems for optimizing portal navigation node caching. A computer-implemented method includes starting a learning process to analyze at least one navigation request to at least one navigation node, wherein the navigation request requests at least one property of the at least one navigation node, examining properties of the at least one navigation node, recording to a property list at least one requested navigation node property of the at least one navigation node, calculating, using at least one computer, a variance between the at least one navigation node property recorded to the property list, and determining whether the calculated variance is above a threshold. | 08-29-2013 |
20130227113 | MANAGING VIRTUALIZED NETWORKS BASED ON NODE RELATIONSHIPS - Systems and methods for optimizing a virtualized communication network are provided. The method comprises monitoring traffic among nodes in a virtualized communication network to determine one or more relationships among the nodes, wherein the nodes include physical and logically defined components; determining whether one or more edges connecting the nodes in the communications network satisfy a rule; grouping the nodes connected by the one or more edges that satisfy the rule into at least one group; ranking the nodes in the group in accordance with a parameter; and implementing a policy to optimize the virtualized communication network in accordance with information determined from the ranking or the grouping of the nodes. | 08-29-2013 |
20130227114 | HIERARCHICAL SCHEMA TO PROVIDE AN AGGREGATED VIEW OF DEVICE CAPABILITIES IN A NETWORK - In one embodiment, an aggregation device within a computer network domain receives one or more capability messages from one or more devices in the computer network domain. The aggregation device may then aggregate device capabilities from the capability messages, and provides the aggregated device capabilities to a management device located outside of the computer network domain. | 08-29-2013 |
20130227115 | METHOD FOR DETERMINING WHETHER A COMMUNICATIONS SERVICE ROUTE IS OPERATING PURSUANT TO A SERVICE LEVEL AGREEMENT - A communications method may be for communications devices configured to define a plurality of communications service routes each subject to a respective service level agreement. The communications devices for each service route may include, in a series coupled arrangement, a customer edge router, a local exchange carrier (LEC) access circuit, an interchange carrier transport circuit, a provider edge router, and an internet protocol computing cloud. The method may include operating a controller coupled to the communications devices to poll each of the communications devices for a device health status. The controller may further be operated to correlate the health statuses to a given communications service route and determine a service state of the given communications service route based upon the health statuses. The controller may further be operated to determine whether the given communications service route is operating pursuant to the service level agreement based upon the service state. | 08-29-2013 |
20130227116 | DETERMINING OPTIMAL COMPONENT LOCATION IN A NETWORKED COMPUTING ENVIRONMENT - Service data and service management data traffic in a networked computing environment (e.g., a cloud computing environment) may flow thorough a large number of devices (e.g., storage, network, cache and other devices and appliances) when the data move from one or more source systems to one or more target systems (or end user systems). Embodiments of the present invention provide a data analysis driven approach that detects patterns in data movements, and data traffic can be used to determine placement of certain network service components such as, among others, storage devices and appliances, server devices and appliances, network devices and appliances, etc. | 08-29-2013 |
20130227117 | SYSTEM AND METHOD FOR DYNAMIC SESSION MAPS - Systems, methods, and non-transitory computer-readable storage media for creating dynamic session maps. The method is discussed in terms of a system implementing the method. The system generates a dynamic session map token for a packet in a communication session, wherein the dynamic session map token instructs a node to send a copy of the packet to a specified destination. The dynamic session map token includes a unique dynamic session map identifier, a port number, and an IP address associated with the specified destination. Next, the system adds the dynamic session map token to the packet to yield a tracing packet. The dynamic session map token can be incorporated into the header portion of the packet, for example. Finally, the system transmits the tracing packet to the node. In one embodiment, the system also sends the copy of the packet to the specified destination. | 08-29-2013 |
20130227118 | SYSTEM AND METHOD FOR PROVIDING ACCESS TO PRESENCE STATUS FOR MOBILE DEVICES - A system and method are provided for enabling access to presence status for mobile devices. The method comprises receiving, via an application programming interface, an application inquiry, the application inquiry requesting a presence data for at least one mobile device; responsive to receiving said inquiry, obtaining network data from one or more network infrastructure nodes associated with providing service to the at least one mobile device; determining a response to the application inquiry based upon the network data; and providing the response via the application programming interface. | 08-29-2013 |
20130227119 | SYSTEM AND METHOD FOR PROVIDING ACCESS TO PRESENCE STATUS FOR MOBILE DEVICES - A system and method are provided for enabling access to presence status for mobile devices. The method comprises receiving, via an application programming interface, a subscription request, the subscription request requesting a presence data for at least one mobile device; registering a subscription for a subscriber device according to the subscription request; obtaining network data from one or more network infrastructure nodes associated with providing service to the at least one mobile device; determining that at least a portion of the network data is associated with the subscription; and providing the at least a portion of the network data to the subscriber device via the application programming interface. | 08-29-2013 |
20130227120 | Method, Device, and System for Acquiring Wireless Network Quality Information - Embodiments of the present invention provide a method, a device, and a system for acquiring wireless network quality information. In an embodiment method, a terminal acquires wireless network quality information sent by a network element on a network side. The terminal displays the wireless network quality information to a user. A terminal may acquire wireless network quality information and display the wireless network quality information to a user. | 08-29-2013 |
20130227121 | MONITORING A PATH OF A TRANSACTION ACROSS A COMPOSITE APPLICATION - At each intermediate transaction hop from among multiple transaction hops in a transaction flow through a composite application, an entry with tracking data for a current transaction hop of the multiple transaction hops is inserted into a tracking envelope associated with the transaction flow and the tracking envelope is passed to a next transaction hop of the transaction hops in the transaction flow. At a final transaction hop of the multiple transaction hops, a final entry with tracking data for the final transaction hop is inserted into the tracking envelope and the multiple entries with tracking data for each of the transaction hops in the tracking envelope are exposed in a single tracking event. | 08-29-2013 |
20130227122 | DASH CLIENT AND RECEIVER WITH BUFFER WATER-LEVEL DECISION-MAKING - A client/receiver downloads data over a network path between a source and the receiver coupled by the network path and stores the media data in a presentation buffer of the receiver and from there it is consumed by a presentation element. The receiver monitors a presentation buffer fill level that represents what portion of the presentation buffer contains media data not yet consumed by a presentation element. The receiver makes requests for additional data to download. If the fill level is above a high fill threshold, the receiver does not make further requests and eventually the fill level goes down. If the fill level is below a low fill threshold, the receiver restarts the downloading and updates the fill level as media data is consumed by the presentation element. The fill level might be measured in units of memory storage capacity and/or units of presentation time. | 08-29-2013 |
20130227123 | Methods and Systems for Network Connectivity - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers. | 08-29-2013 |
20130227124 | APPARATUS AND METHOD OF PORTABLE TERMINAL FOR TRANSMITTING CONTENTS ACCORDING TO NETWORK ENVIRONMENT - A method of operating a portable terminal is provided. The method includes confirming a delay in reception of an Internet Protocol (IP) address of a specific server requested to a Domain Name System (DNS) server, re-requesting the IP address of the specific server to the DNS server by increasing an interval of a DNS query, confirming a delay in a socket connection requested to the specific server, and re-requesting the socket connection to the specific server by increasing an interval of a sync. | 08-29-2013 |
20130227125 | METHOD AND SYSTEM FOR MONITORING MESSAGES PASSED OVER A NETWORK - A method for monitoring an application, comprising: receiving a message from the application; storing the message in a message data buffer in a data store; selecting one or more module instances to define a monitoring function for the application, each module instance for independently performing a respective aspect of the monitoring function, each module instance independently accessing the message data buffer directly from the data store to process data contained therein to perform its aspect of the monitoring function; and, initiating operation of the one or more module instances in accordance with a schedule defined by one or more routing rules, the one or more routing rules for routing a pointer to the message, as stored in the message data buffer, between the one or more module instances to thereby perform the monitoring function without passing the message itself between the one or more module instances. | 08-29-2013 |
20130227126 | ZONE BASED ENERGY MANAGEMENT SYSTEM - A method of managing a site in a mobile environment including detecting an availability of at least one network device having an operating condition at a site. First and second boundaries of the site having respective first and second boundaries, which are different, are detected. A plurality of zones including an on-site zone having an area within the first boundary, a first zone including an area beyond the first boundary and within the second boundary, and a second zone including an area beyond the second boundary are each detected. A predetermined operating condition of the at least one network device at the site is implemented in response to detecting a relative location of the mobile device with respect to the on-site zone, the first zone and the second zone. An on-site operating condition corresponding to the on-site zone is implemented. | 08-29-2013 |
20130227127 | SCHEDULE MANAGEMENT METHOD AND SCHEDULE MANAGEMENT SERVER - A reservation method of computer resources having short idle periods is provided. A schedule management method includes: a terminal; computers that perform tasks; and a schedule management server that manages the allocation of the computers. Each computer includes a virtual machine monitor that manages virtual computers. The schedule management server includes a schedule management part that manages reservation information including reservation state of each virtual computer, and creates reservation schedules for allocating the virtual computers to the tasks. The schedule creation method includes extracting a free period of each virtual computer, and creating a reservation schedule that secures a period that coincides with the reservation request period by reserving one virtual computer, and another virtual computer so that the end-point of a reservation period configured in the free period of the one virtual computer coincides with or overlaps the start-point of a reservation period configured in the free period of the another computer. | 08-29-2013 |
20130227128 | Graphical Tools For Obtaining Data From A Medical Device - A system and method to allow for connectivity of a plurality of medical devices in a health care setting and the delivery of data from those medical devices to an individual to utilize the information received is provided. In typical medical devices, the reporting of data is distinct and hard to interpret. The present invention provides a set of graphical tools that allow the interpretation of different data from different medical devices. Additionally, the present invention provides a set of software tools that allows the data received from a plurality of different medical devices to be separated into more appropriate fields based on pre-determined configuration to assign specific flagged data to specific devices. This information allows the user to receive data whereby the data is previously interpreted to determine from what medical device the information has been received and how to interpret the data for further processing. The present invention also allows for interpreted data received from a plurality of medical devices to be sent to a health care information system department for further processing and analysis. | 08-29-2013 |
20130227129 | DEVICE AND METHOD FOR MAINTAINING A COMMUNICATION SESSION DURING A NETWORK TRANSITION - Provided are a device and method for maintaining a communication session during a network transition. In one example, the method includes monitoring, by a client, a connection with a first network to determine whether a signal strength of the connection falls below a threshold value. The client establishes a connection with a second network if the signal strength of the connection with the first network falls below the threshold value. Establishing the connection with the second network includes obtaining an address and port assignment corresponding to the client from the second network. The client uses the obtained address and port assignment to maintain a communication session during the changeover from the first network to the second network. | 08-29-2013 |
20130227130 | MANAGING SERVICE LEVELS PROVIDED BY SERVICE PROVIDERS - A method and system for managing at least one service level of a service provided by a service provider to a customer of the service provider under a service level agreement. The service level agreement is a contract between the service provider and the customer. Measurement data and at least one adjudication element associated with a service level of the at least one service level are retrieved in an electronic format. The measurement data and the at least one adjudication element are stored in a datastore. The measurement data includes at least one data point measured on a respective resource that provides the service. The retrieved measurement data are adjudicated for the service level in accordance with the at least one adjudication element such that the adjudication generates a respective adjudicated data point for each data point of the measurement data. | 08-29-2013 |
20130227131 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 08-29-2013 |
20130227132 | AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment. | 08-29-2013 |
20130227133 | Methods, Systems, And Computer Program Products For Providing Intelligent Monitoring Services - Methods, systems, and computer program products for intelligent monitoring services are provided. A method includes sampling data for a subject over a defined time period and calculating a normative value for the defined time period based on the sampled data. The method also includes monitoring incoming data for the subject, comparing a monitored value for the incoming data to the normative value, and generating a responsive action when the monitored value deviates from the normative value. | 08-29-2013 |
20130227134 | Method and Apparatus for Measuring the End-to-End Performance and Capacity of Complex Network Service - A method and system of measuring performance and capacity of a network includes monitoring network activity using an application programming interfaces (API) monitoring system with a web services definition language (WSDL) file and a probe. The WSDL file provides instructions to a probe control system in the API monitoring system and the probe control system provides regular expressions to the probe. Performance data are collected using the probe. The performance data includes a collection of performance information. Using the probe, performance data are transmitted between the network and the API monitoring system. The API monitoring system stores the performance data in a database of performance data monitored and analyzes the performance data to determine performance and capacity of the network. The API monitoring system reports information on performance and capacity of the network to a network operations center dashboard. | 08-29-2013 |
20130227135 | MONITORING RESOURCE CONGESTION IN A NETWORK PROCESSOR - Embodiments of the invention are directed to monitoring resources of a network processor to detect a condition of exhaustion in one or more of the resources over a predetermined time interval and to provide an indication of the condition. Some embodiments periodically sample various resources of a network processor and from the samples calculate utilization of the network processor's memory bus and core processor, and determine if an interworking FIFO packet queue error has occurred. Such information may help network operators and/or support engineers to quickly zero in on the root cause and take corrective actions for network failures which previously could have been attributed to many different causes and that would have required significant time and effort to troubleshoot. | 08-29-2013 |
20130227136 | SYSTEM AND METHOD FOR MONITORING AND MANAGING DATA CENTER RESOURCES IN REAL TIME - In one aspect the present disclosure relates to a remote access appliance for facilitating communications between a managed device and a user located remotely from the managed device. The appliance may have a processor adapted to facilitate the communication of keyboard, video and mouse information between the appliance and the managed device. A rack data unit (RDU) subsystem may be used which is adapted to manage communications with, and to receive sensor data directly from, at least one remotely located sensor located at the managed device, without the need to transmit the sensor data over a network. An interface may also be used for interfacing the appliance to the managed device. | 08-29-2013 |
20130227137 | METHOD AND ARRANGEMENT FOR ENABLING SERVICE DELIVERY IN A TELECOMMUNICATIONS NETWORK - A method and arrangement for enabling delivery of an IT-service to a client, wherein execution of the IT-service requires resources in a cloud architecture. First, a plurality of predefined cloud computing services and respective requirements for resources, are registered. Then, service subscriptions and associated subscription identities, valid in a telecommunications network, are provisioned for the predefined cloud computing services. One of the service subscriptions and associated subscription identity is assigned to an identity module, for enabling delivery of the IT-service to the client by providing an associated predefined cloud computing service when the client uses the identity module. Then, activity of the assigned service subscription is monitored in the network based on the associated subscription identity, and resources are allocated in the cloud architecture according to the assigned service subscription, when it is detected that the assigned service subscription is activated or has been activated. | 08-29-2013 |
20130232251 | Network Appliance for Monitoring Network Requests for Multimedia Content - A network appliance that monitors multimedia content requested by at least one networked computer coupled to a local area network and the Internet. The appliance includes a database, at least one interface processing packetized data encapsulating TCP/IP packet data generated by the network computer(s) and communicated over the local area network, routing logic for the TCP/IP packet data, and processing means processing the TCP/IP packet data to identify whether it specifies a URL representing at least one particular type of multimedia content, and if so, adds the specified URL and an associated date and time to the database. It can include a first mechanism monitoring physical connections/disconnections to the local area network over time, and a second mechanism monitoring Internet connectivity over time. It can also provide access to information stored in the database and/or provide upload of stored information to a remote system for remote access to such information. | 09-05-2013 |
20130232252 | Assigning States to Cloud Resources - Methods and systems for management of cloud computing resources are described herein. A management server for a cloud of physical computing resources may assign states to individual physical computing resources or groups of physical computing resources. The states may include a disabled state, in which only administrator access to the resources is permitted; an enabled state, in which user access to the resources is permitted; a restricted state, in which some, but not all user requests to the resources are permitted; and an unmanaged state, in which no communications between the resources and the management server are permitted. | 09-05-2013 |
20130232253 | PEER-TO-PEER DISCOVERY - A wireless device that discovers other wireless devices for the formation of a peer-to-peer connection may perform a scan that is limited in duration and power consumption. The scan nonetheless is highly likely to discover a device, if a discoverable device exists. In addition, the scan may be performed in compliance with parameters of a peer-to-protocol such that the scan may be readily implemented in a wireless device, in some embodiments even as a firmware upgrade on a wireless network interface card. Parameters of the scan may be adjusted to increase the likelihood that, if the scan completes without discovering a device, no discoverable device exists. The scan may be used in an overall process in which discovery ends or the scan is selectively repeated following an unsuccessful scan, without entering a find phase. | 09-05-2013 |
20130232254 | CLOUD RESOURCE UTILIZATION MANAGEMENT - User are alerted by software and hardware when the in-use dynamic computing resources are underutilized so as to allow the user to effectively contain and reduce the operating cost of computing resources' services and application. The software categorizes and publishes workloads and suggests low cost alternatives to the user so as to match a user search criteria or usage pattern of computing resources or workloads. | 09-05-2013 |
20130232255 | EVENT COLLECTION METHOD AND INFORMATION PROCESSING APPARATUS - An event collection method collects an event from a sensor network, the method includes: retrieving on a per process basis for a module, based on a module definition information and an occurred event information, an occurrence node identifier categorized by an attribute value corresponding to an attribute name, with input event type associated with an occurred event type; determining, when there is a single retrieved occurrence node identifier with respect to the process of the module, a node identified by the occurrence node identifier as an installation destination of the module that is identified by the module identifier; referencing, when there is a plurality of retrieved occurrence node identifiers with respect to the process of the module, a connection relation information of nodes and determining an upper node common to the plurality of occurrence node identifiers as an installation destination of the module identified by the module identifier. | 09-05-2013 |
20130232256 | SYSTEM AND METHOD FOR PROVIDING RANKING INFORMATION OF MOBILE APPLICATION - Provided is a system and method for providing ranking information of a mobile application using information obtained from a user terminal. A server for providing ranking information of an application on the Internet may include a collecting unit to collect, with regard to at least one first application installed in a communication terminal, at least one of use information indicating a position of an icon of the first application on a wallpaper, that is, an application managing interface of the communication terminal, and use information indicating the first application currently being executed in the memory of the communication terminal; and a providing unit to provide a ranking of the first application based on statistics of use information. | 09-05-2013 |
20130232257 | Network System, Network Apparatus, And Computer-Readable Storage Medium - Provided is a network apparatus that has a function of receiving a wake-up instruction from a terminal apparatus over a network and thereby waking up, including a wake-up instruction receiving unit that receives the wake-up instruction, a wake-up control unit that performs wake-up processing in a case of receiving the wake-up instruction, and a state transmitting unit that transmits a state notification of the wake-up processing to the terminal apparatus in the case of receiving the wake-up instruction. | 09-05-2013 |
20130232258 | SYSTEMS AND METHODS FOR DIAGNOSTIC, PERFORMANCE AND FAULT MANAGEMENT OF A NETWORK - A system for analyzing, monitoring and detecting fault and performance across a network comprised of one or more networks of external elements, wherein the networks may be under different administrations. Among other things, the system permits users to monitor the connectivity status of the different links of the network; provides users event and system performance information; permits users to isolate certain portions of the network and review system performance data and events related to those isolated portions of the network; and permits such fault management across multiple connected networks, portions of which may be owned by different parties. | 09-05-2013 |
20130232259 | Method and Apparatus for Handling Network Resource Failures in a Router - There is provided a method for use by a router in a communications network. Forwarding information is maintained (S | 09-05-2013 |
20130232260 | SYSTEMS AND METHODS FOR GSLB MEP CONNECTION MANAGEMENT ACROSS MULTIPLE CORE APPLIANCES - The present disclosure presents systems and methods for obtaining metric information by a multi-core GSLB intermediary device and providing global server load balancing services using the obtained information. A first core of a multi-core GSLB appliance establishes a transport layer connection to a remote load balancer at a site of a plurality of sites. The first core transmits a message to each of the other cores of the multi-core GSLB appliance that the first core is a master core for receiving metric information from the load balancer. The first core receives metric information of the remote site from the load balancer. The first core propagates the metric information to each of the other cores of the GSLB appliance. A GSLB virtual server on a slave core receives a DNS request. The GSLB virtual server determines a DNS resolution for the DNS request based on the metric information. | 09-05-2013 |
20130232261 | QUALITY OF SERVICE POLICY SETS - Disclosed are systems, computer-readable mediums, and methods for receiving client quality of service values associated with a first client. Client metrics of a volume in a storage system are determined for the first client. The client metrics reflect usage of the storage system by the first client. A client load value based is determined upon the client metrics. A quality of service management policy for the first client is determined from a plurality of quality of service management policies based upon the client load value. Each quality of service management policy comprises a formula based on a quality of service parameter. A client target performance value is determined based upon the formula of the quality of service management policy and the received client quality of service values. Performance of the storage system is adjusted for the first client based upon the client target performance value. | 09-05-2013 |
20130232262 | FLOW CONTROL FOR RELIABLE MESSAGE PASSING - A message flow controller limits a process from passing a new message in a reliable message passing layer from a source node to at least one destination node while a total number of in-flight messages for the process meets a first level limit. The message flow controller limits the new message from passing from the source node to a particular destination node from among a plurality of destination nodes while a total number of in-flight messages to the particular destination node meets a second level limit. Responsive to the total number of in-flight messages to the particular destination node not meeting the second level limit, the message flow controller only sends a new packet from among at least one packet for the new message to the particular destination node while a total number of in-flight packets for the new message is less than a third level limit. | 09-05-2013 |
20130232263 | SYSTEM AND METHOD FOR CLASSIFYING A CONTAGIOUS PHENOMENON PROPAGATING ON A NETWORK - This disclosure concerns systems and methods for classifying at least one contagious phenomenon propagating on a network. Classifying may be based on one or more of a peakedness, a commitment, a commitment by subsequent uses, a commitment by time range, and a dispersion related to engagement with the contagious phenomenon. | 09-05-2013 |
20130232264 | NETWORK FAULT MANAGER - A computer-implemented method for detecting alarm conditions, the method involving receiving at a first time a trigger notification describing a monitored occurrence on a network; setting a redundancy window to begin at the first time and to end at an expiration time; designating a first alarm condition to represent the trigger notification; receiving a second notification at a second time after the first time, the second notification describing the monitored occurrence; and determining whether a second alarm condition exists by testing whether the second time is within the redundancy window. | 09-05-2013 |
20130232265 | PROCESSING OF DATA FOR THE MANAGEMENT OF PLACEMENT ON STANDBY - A processing of data for the management of the placement on standby of a client terminal connected to an operator terminal of an access network, the method comprising, in said client terminal, the following steps: a) determining a policy for placing the client terminal on standby, b) monitoring a client interface of said client terminal, disposed between said client terminal and a part of a local network situated downstream of said client terminal, c) monitoring an access network interface of said client terminal, disposed between said client terminal and said operator terminal. | 09-05-2013 |
20130238780 | MANAGING RISK IN RESOURCE OVER-COMMITTED SYSTEMS - Risk associated with over-committing shared resources is determined. In response to receiving a request to provision a new workload, a candidate mix of virtual machines is selected from plurality of virtual machines already running on a cloud infrastructure. A utilization profile is then created for an aggregate behavior of the candidate mix of virtual machines and a new virtual machine running the new workload. A risk inherent in over-commitment if the new workload is grouped with the candidate mix of virtual machines is determined, and whether that risk is acceptable. If the risk is acceptable, the new workload is provisioned by over-committing the candidate mix of virtual machines with the new virtual machine running on the cloud infrastructure. | 09-12-2013 |
20130238781 | SNMP-BASED MANAGEMENT OF SERVICE ORIENTED ARCHITECTURE ENVIRONMENTS - A Simple Network Management Protocol (SNMP)-based apparatus including an SNMP manager to monitor network hardware devices and define object identifiers (OIDs); a Simple SOA Performance Monitor (SSPM) manager to augment the OIDs with service-specific object identifiers to monitor services; and an SSPM agent associated with at least one service to collect details pertaining to the service, the details of the service being provided to the SSPM manager which in turn provides the details of the service to the SNMP manager. The SNMP-based apparatus may be implemented by at least one computing device. Also disclosed is a method of monitoring services and a computer program product. | 09-12-2013 |
20130238782 | METHOD AND APPARATUS FOR IDENTIFYING AN APPLICATION ASSOCIATED WITH AN IP FLOW USING DNS DATA - A method of identifying application data associated with IP flows traveling between a plurality of mobiles and a network element in a communications network includes receiving, at a network element, one or more domain name system (DNS) packets being sent to one or more mobiles from among of the plurality of mobiles; and building, at the network element, a mapping table mapping one or more IP addresses, respectively, to corresponding application information, based on mapping information within the one or more DNS packets received at the network element. | 09-12-2013 |
20130238783 | PERSONALIZED NAVIGATION SHORTCUTS - Systems, methods, and other embodiments associated with generating suggested shortcuts are described. In one embodiment, a method includes identifying a user that accesses an intranet portal and tracking navigation paths taken by the user within the intranet portal. The navigation paths are stored in a user profile associated with the user, where the navigation paths indicate a sequence of visited locations and a destination location for the sequence. When the user visits a location within the intranet portal, a list of suggested destination locations are generated as navigation shortcuts to allow the user to directly access a desired destination. | 09-12-2013 |
20130238784 | Location-Aware "Ghost" Profiles in a Balloon Network - Disclosed embodiments may help a balloon network to provide substantially continuous service in a given geographic area. An example method may be carried out at a balloon that is at a location associated with the first geographic area in a balloon network that includes a plurality of geographic areas. The balloon may determine that it should update its balloon-state in accordance with a balloon-state profile for the first geographic area. Then, in response, the balloon may determine the balloon-state profile for the first geographic area, which may include one or more state parameters for balloons operating in the first geographic area. The balloon may then operate according to the balloon-state profile for the first geographic area. | 09-12-2013 |
20130238785 | System and Method for Metadata Discovery and Metadata-Aware Scheduling - A cloud computing system including a plurality of computing devices configured to host virtual machine instances, each computing device in the plurality of computing devices including a monitor operable to collect metadata about the associated computing device. The system also includes a registry operable to receive and store the metadata from the plurality of computing devices and a scheduler operable to select a host computing device out of the plurality of computing devices on which to instantiate a virtual machine instance based on the metadata stored in the registry. | 09-12-2013 |
20130238786 | SECURE MIGRATION OF VIRTUAL MACHINES - Technologies are generally described for the secure live migration of virtual machines. The migration may take place in the context of, for example, public clouds. In various embodiments, by using a hidden process incorporated in a virtual machine's kernel and a trusted wireless and/or wired positioning service, a cloud provider and/or cloud user may be alerted about possible virtual machine hijacking/theft. The provider or user may also be provided with an approximate physical location of the platform running the compromised virtual machine for further investigation and enforcement measures. | 09-12-2013 |
20130238787 | CLUSTER SYSTEM - A cluster system of the present invention is a cluster system including a plurality of node devices. Each of the node devices is connected with the other node devices by a first network and a second network, and includes: a first node managing unit configured to operate on an operating system embedded in an own device and detect operation statuses of the other node devices via the first network; a second node managing unit configured to operate without being affected by the operating system and detect operation statuses of the other node devices via the second network; and a node status judging unit configured to judge whether each of the node devices is in a down state according to a preset standard, based on results of the detection of the other node devices by the first node managing unit and the second node managing unit. | 09-12-2013 |
20130238788 | CLOUD SERVICES SYSTEM - A cloud services system includes an access services layer, a cloud service manager, and a service platform layer. The access services layer provides front-end functionality for users and service providers to order and manage cloud services, including software applications provided for use by the users. The cloud manager exposes services provided by the cloud services system to the users, and orchestrates delivery of the services and provisioning of resources for the services. The service platform layer activates virtual machines and virtual desktops to provide the services. | 09-12-2013 |
20130238789 | MONITORING GEOGRAPHIC LOCATION CHANGES OF ASSETS IN A CLOUD - A monitoring tool can monitor network location of a digital asset hosted by a cloud service provider. Movement of the digital asset from a first network location to a second network location is detected. In response to detecting that the digital asset moves, a geographic location that corresponds to the second network location is determined. It is then determined that the geographic location deviates from a geographic setting configured for the digital asset. A notification that the digital asset has been moved to the geographic location that deviates from the geographic setting is generated. | 09-12-2013 |
20130238790 | METHODS AND SYSTEMS FOR DETECTING ANOMALIES DURING IO ACCESSES - An anomaly in a shared input/ouput (IO) resource that is accessed by a plurality hosts or clients is detected when a host that is not bound by any QoS policy presents large workloads to a shared IO resource that is also accessed by hosts or clients that are governed by QoS policy. The anomaly detection triggers a response from the hosts or clients as a way to protect against the effect of the anomaly. The response is an increase in window sizes. The window sizes of the hosts or clients may be increased to the maximum window size or in proportion to their QoS shares. | 09-12-2013 |
20130238791 | System for Monitoring Elastic Cloud-Based Computing Systems as a Service - Provided is a computing-system monitor configured to monitor a plurality of computing-systems each having a plurality of monitored computing-instances. The computing-system monitor may include a plurality of collectors, each collector executed by one of a plurality of monitored computing-instances, wherein the plurality of monitored computing-instances each are part of one of a plurality of separately monitored computing systems, and wherein each of the collectors is operable to output metrics of a corresponding monitored computing-instance executing that collector. The computing-system monitor may also include an analytics platform, the analytics platform having a plurality of analytic computing-instances, the analytics platform being operable to receive metrics output by the plurality of collectors, calculate statistics with the analytic computing-instances based on the received metrics, and output the calculated statistics. | 09-12-2013 |
20130238792 | APPARATUS AND METHOD FOR ANALYZING A NETWORK - An apparatus and method for analyzing a network flow. The apparatus includes a parser for extracting flow identification information from the network flow, a flow metering unit, and a programmable controller and the parser, wherein the parser and flow metering unit are controlled in parallel by the programmable controller, wherein the programmable controller is implemented as state machine, and wherein the state machine includes a transition rule memory, a rule selector, and a state register, wherein the rule selector is configured for receiving an external input signal and an internal input signal from the state register and wherein the rule selector is configured for observing the internal and external input signal by means of the transition rule memory for transition rules and for changing the state of the state register and generation of an output signal having parsing or flow metering instructions when a transition rule applies. | 09-12-2013 |
20130238793 | Methods And Apparatus For Analyzing User Information To Identify Conditions Indicating A Need For Assistance For The User - Systems and techniques for analyzing information relating to a user to determine whether the user requires assistance. Information for a user is received from sources selected to provide information relating to the user's activities and analyzed to determine whether conditions exist indicating a possible need for assistance for the user. User location, motion, and activity information is received and analyzed against expected information stored in the user profile and analyzed to determine if assistance is needed. If a determination is made that the user's behavior indicates that assistance may be needed, communication is initiated to summon appropriate assistance. | 09-12-2013 |
20130238794 | ENHANCED HIGH AVAILABILITY FOR GROUP VPN IN BROADCAST ENVIRONMENT - A light-weight resilient mechanism is used to synchronize server secure keying data with member devices in a highly-scalable distributed group virtual private network (VPN). A server device generates an initial secure keying data set, for the VPN, that includes a first version identifier, and sends, to member devices and via point-to-point messages, the secure keying data set. The server device sends, to the member devices, heartbeat push messages including the first version identifier. The server device generates an updated secure keying data set with a second version identifier and sends, to the member devices, a key push message that includes the updated data set. The server device sends, to the member devices, heartbeat push messages including the second version identifier. Member devices may use the first and second version identifiers to confirm that secure keying data sets are current and quickly identify if updates are missed. | 09-12-2013 |
20130238795 | SYSTEM AND METHOD FOR MONITORING AND MANAGING DATA CENTER RESOURCES IN REAL TIME INCORPORATING MANAGEABILITY SUBSYSTEM - The present disclosure is directed to a system for controlling a plurality of managed devices. The system may involve a manageability services module adapted to facilitate communication between the plurality of managed devices and a central user located remotely from the plurality of managed devices. The system may also involve a manageability engine module that communicates with the manageability services module. The manageability engine module may have an element library storing parameters associated with the plurality of managed devices, and may be configured to perform a number of useful operations such as: facilitating communication between the managed devices and the manageability services module; discovering a new managed device; and collecting, aggregating and providing real time analytics on the data collected from the managed devices. A database may be used to store data collected by the manageability engine module. | 09-12-2013 |
20130246603 | System, method, and computer program product for automatic router discovery - A system, method, and computer program product are provided for network device discovery. In use, information is received relating to a plurality of network devices on a network. Such information is then correlated, such that additional network devices on the network may be discovered utilizing the information. To this end, the discovery is enhanced as a result of the correlation. | 09-19-2013 |
20130246604 | SERVER-BASED SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SCANNING DATA ON A CLIENT USING ONLY A SUBSET OF THE DATA - A server-based system, method, and computer program product are provided for scanning data on a client using only a subset of the data. In operation, a request is received for a subset of data stored on a client that is required for determining whether the data is unwanted. Additionally, a representation of only the subset of data is sent from the client to a server over a network. Furthermore, a response is received from the server over the network. Still yet, there is a reaction based on the response. | 09-19-2013 |
20130246605 | LOCAL REPUTATION TO ADJUST SENSITIVITY OF BEHAVIORAL DETECTION SYSTEM - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the sensitivity of a behavior detection process on a per-device basis based on a local reputation for each device. | 09-19-2013 |
20130246606 | Detecting Transparent Network Communication Interception Appliances - Mechanisms are provided for identifying transparent network communication interception appliances in a network topology. The mechanisms collect network configuration data from a plurality of devices in the network topology and analyze the collected network configuration data using one or more heuristics to identify patterns in the collected network configuration data indicative of the presence of a transparent network communication interception appliance. The mechanisms calculate a confidence measure value based on results of the analysis of the collected network configuration data. The mechanisms further send a notification of a detected presence of a transparent network communication interception appliance to a computing device in response to the calculated confidence measure value meeting or exceeding at least one threshold value. | 09-19-2013 |
20130246607 | AUTONOMIC DISCOVERY AND INTEGRATION OF COMPLEMENTARY INTERNET SERVICES - A method can include discovering a plurality of services that are complementary to an offered service and selecting a service from the plurality of services as a candidate for integration with the offered service. The method further can include automatically generating a new service, using a processor, by integrating the candidate service with the offered service. The new service can be included in a service catalog. | 09-19-2013 |
20130246608 | COUNT TRACKING IN DISTRIBUTED ENVIRONMENTS - Count tracking in distributed environments is described, for example, as in data centers where many sites receive data and a coordinator node estimates a sum of the data received across the sites. Count tracking may be used in database applications, search engines, social networking applications and others. In various embodiments sites and a coordinator node work together to implement a process for summing data received at sites, where the sum takes into account both increments and decrements. In examples, a site decides whether to notify the coordinator node of a new data item according to a sampling probability that is related to an estimate of the current global sum of the data input across sites. In some examples a multi-mode algorithm is implemented which increases or decreases communication between the sites and the coordinator node according to behavior of the estimated global sum such that communications costs are optimized. | 09-19-2013 |
20130246609 | METHODS AND APPARATUS TO TRACK WEB BROWSING SESSIONS - Methods and apparatus to tracker web browsing sessions are disclosed. An example method includes computing a sequence of numbers to be generated by a random number generator during a first browsing session associated with a browser given a first seed value; and determining whether a web site visit is associated with the first browsing session based on a received number. | 09-19-2013 |
20130246610 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - An information processing apparatus includes a detector, a first determination unit, an identification unit, a second determination unit, and a transmitting unit. The detector detects an event which has occurred in the information processing apparatus. The first determination unit determines whether or not a type of event into which the event is classified is included in types of events determined in advance. The identification unit identifies data which is a target for the event. The second determination unit determines whether or not a type of data into which the data is classified is included in types of data determined in advance. The transmitting unit transmits, to another apparatus, information indicating a specific operator who is operating the information processing apparatus, information indicating a time at which the event occurred, the data or information used to refer to the data, and information indicating the details of the event. | 09-19-2013 |
20130246611 | METHOD AND APPARATUS FOR SHARING A FUNCTION WITH AN EXTERNAL DEVICE AND PERFORMING AN OPERATION - A method which performs an operation in a device on a network by sharing functions with at least one external device includes receiving, from a server, operation information defining an operation to be performed by executing a combination of at least one function of the device and at least one function of the at least one external device. The method may further include registering the operation defined by the operation information in the device and performing an operation selected from among one or more registered operations including the operation defined by the operation information. The operation may be performed by executing a combination of functions corresponding to the selected operation. | 09-19-2013 |
20130246612 | HTML delivery from edge-of-network servers in a content delivery network (CDN) - A content delivery network provides delivery of cacheable content files, such as HTML. To support HTML delivery, the content provider provides the CDNSP with an association of the content provider's domain name to an origin server domain name at which default HTML files are published. The CDNSP provides its customer with a CDNSP-specific domain name. The content provider then implements DNS entry aliasing so that domain name requests for the host cue the CDN DNS request routing mechanism. This mechanism identifies a content server to respond to a request directed to the customer's domain. The CDN content server returns a default HTML file if such file is cached; otherwise, the content server directs a request for the file to the origin server to retrieve the file, after which the file is cached on the content server for subsequent use. | 09-19-2013 |
20130246613 | ANALYSIS METHOD AND INFORMATION PROCESSING APPARATUS - In an information processing apparatus, an extraction unit extracts, from a storage unit, processing period records corresponding to operations whose response times from respective request input times to respective response output times are greater than a threshold. With respect to the operations whose response times are greater than the threshold, a first analysis unit analyzes, based on the request input times in the extracted processing period records, variations in input frequency of operation requests, and a second analysis unit analyzes, based on the response output times in the extracted processing period records, variations in output frequency of responses. A determination unit determines the cause of occurrence of the operations whose response times are greater than the threshold based on the variations in input frequency and output frequency. | 09-19-2013 |
20130246614 | METHOD OF UPDATING AGENT SERVICE - A host server electronically connects to one or more agent servers via one or more network ports. Each agent server includes a control module and an agent service that is available to one or more clients. The host server requests the control module and the agent service in an agent server to start each other and monitor running of each other. When the agent service in the agent server needs to be updated, the host server requests the control module to suspend the agent service and write updated data into the agent service to update the agent service. Furthermore, the host server requests the control module to restart the updated agent service. | 09-19-2013 |
20130246615 | METHOD AND APPARATUS FOR FACILITATING REMOTE HEALTH MONITORING OF A COMPUTERIZED HEALTHCARE SYSTEM - A method, apparatus and computer program product are provided to facilitate the monitoring of the health of a plurality of computerized healthcare systems deployed at a plurality of different sites, such as at various healthcare facilities. In the context of a method, one or more sensor(s) may be identified that are to be downloaded and executed by a plurality of remote servers in order to provide for health monitoring of a computerized healthcare system. The method also receives the results of the health monitoring from the plurality of remote servers and determines a health score for the computerized healthcare system of a respective remote server based upon the results. The method may further cause a technician to be advised of the results and the healthcare score. | 09-19-2013 |
20130246616 | APPARATUS AND METHOD FOR DETERMINING SOURCE DEVICE IN CONTENTS SHARING SYSTEM - A method for determining a source and a transmission path to provide content includes receiving a message comprising at least one of channel information of a link between a request device which requests content download and a central management device, available resource amount information of a candidate device, channel information of a link between the candidate device and the central management device, and channel information of a link between the request device and one candidate device. The method also includes determining a source device and the transmission path for providing the content to the request device using an available resource amount of the candidate device, a data rate of the link between the request device and the central management device, a data rate of the link between the request device and the candidate device, and a data rate of the link between the candidate device and the central management device. | 09-19-2013 |
20130246617 | METHOD AND SYSTEM FOR PROCESSING NETWORK DATA - A method is provided for processing network data. The method includes detecting a network status, determining whether the network status meets one or more normal operating conditions, and entering an offline mode when it is determined that the network status does not meet the normal operating conditions. The method also includes detecting a user instruction, and determining whether or not the user instruction is a submission instruction for submitting user data to be submitted. Further, the method includes obtaining the user data to be submitted and caching the user data as offline data when it is determined that the user instruction is a submission instruction, and continuing detecting the user instruction when it is determined that the user instruction is not a submission instruction. | 09-19-2013 |
20130246618 | Systems and Methods to Emulate User Network Activity - A method includes monitoring network activity corresponding to a user device to detect a period of inactivity and generating additional network activity that is different from the network activity in response to detecting the period of inactivity. The additional network activity obscures a profile of a user. The profile is generated by a remote user tracking engine. | 09-19-2013 |
20130246619 | SYSTEMS AND METHODS FOR OBJECT RATE LIMITING IN MULTI-CORE SYSTEM - The present invention is directed towards systems and methods for managing a rate of request for an object transmitted between a server and one or more clients via a multi-core intermediary device. A first core of the intermediary device can receive a request for an object and assume ownership of the object. The first core can store the object in shared memory along with a rate-related counter for the object and generate a hash to the object and counter. Other cores can obtain the hash from the first core and access the object and counter in shared memory. Policy engines and throttlers in operation on each core can control the rate of access to the stored object. | 09-19-2013 |
20130254372 | COMPUTER ACTIVITY MONITORING DEVICE - A monitoring device for indicating computing activities occurring at a computing device is provided. A control module receives signals from the computing device. The signals correspond to an activity state of the computing device. A first visual indicator is coupled to the control module. The control module activates the first visual indicator in response to receipt of a signal corresponding to an approved activity state. A second visual indicator is also coupled to the control module. The control module activates the second visual indicator in response to receipt of a signal corresponding to an unapproved activity state. | 09-26-2013 |
20130254373 | METHOD AND SYSTEM OF PROVIDING A SUMMARY OF WEB APPLICATION PERFORMANCE MONITORING - The performance of several application servers is monitored. Based on the monitoring, performance metrics of the several application servers is collected by several clusters of collectors. Each cluster of collectors is associated with a respective manager of performance metrics. Each manager of performance metrics receives collected performance metrics from their respective collectors. An Enterprise Manager Extension plug-in module enables each manager of performance metrics to synthesize the performance metrics of its respective cluster of collectors. A summary manager summarizes the synthesized performance metrics of the various server clusters received from the manager of performance metrics and provides it as an output presentation. | 09-26-2013 |
20130254374 | RESOURCE ALLOCATION BASED ON SOCIAL NETWORKING TRENDS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for allocating computing resources based on social networking/media trends in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a baseline computing resource allocation will be determined for the networked computing environment based upon historical computing resource data (e.g., stored in at least one computer storage device). Social networking trend data corresponding to usage of a set of social networking websites may be received and analyzed to determine a forecasted computing resource allocation (e.g., based on social networking trends). The baseline computing resource allocation may be compared to the forecasted computing resource allocation to identify any difference therebetween. A computing resource allocation protocol/plan may then be determined based on the comparison (e.g., to address the difference). | 09-26-2013 |
20130254375 | ACHIEVING ENDPOINT ISOLATION BY FAIRLY SHARING BANDWIDTH - Computerized methods, systems, and computer-storage media for fairly sharing available bandwidth among endpoints (including physical or virtual machines) of a multitenant environment are provided. Initially, a load balancer of the network is programmed to monitor bandwidth used by the endpoints, respectively, and to compare an aggregation of the usage against a network threshold. Also, the load balancer is equipped to dynamically classify the endpoints using the respective monitored bandwidth. Classifying generally involves designating some endpoints as small entities, which individually consume an amount of bandwidth less than an endpoint threshold, and designating other endpoints as large entities, which individually consume an amount of bandwidth greater than the endpoint threshold. Upon the aggregate bandwidth usage overcoming the network threshold, data packets being sent to or transmitted from the large entities are randomly dropped, while data packets being sent to or transmitted from the small entities are unrestrained. | 09-26-2013 |
20130254376 | DYNAMIC CONTROL OVER TRACING OF MESSAGES RECEIVED BY A MESSAGE BROKER - A method, system and computer program product for dynamically controlling a tracing of messages. A header (referred to herein as the “trace header”) is placed in a message by a sending application, where the trace header includes a structure for storing fields of data for defining tracing operations. Once the message with the trace header is received by a message broker after being sent by the sending application, the message broker will analyze the fields of the trace header and perform the appropriate tracing operation in response to the information provided in the trace header. Through the use of the trace header, the tracing overhead can be minimized as well as a faster diagnosis of the problem (e.g., errors while processing the messages through a message flow of the message broker) can be provided since less data will be needed to be analyzed. | 09-26-2013 |
20130254377 | SERVER AND METHOD FOR MANAGING MONITORED DATA - A monitoring server receives the latest monitored data and corresponding monitoring time from monitoring devices connected to the server at a specified time interval. The monitoring server records monitored data of each monitoring item and the corresponding monitoring time to a pointed node of a device data list, and adds the monitored data and the corresponding monitoring time, which are recorded in the pointed node of the device data list, into a monitored data list. When a web server requests real-time monitored data, corresponding monitored data is read from the device data list and sent to the web server. When the web server requests historical monitored data of an designated period, corresponding monitored data of the designated period is read from the monitored data list and sent to the web server. | 09-26-2013 |
20130254378 | SYSTEMS AND METHODS FOR NETWORK QUALITY ESTIMATION, CONNECTIVITY DETECTION, AND LOAD MANAGEMENT - Systems, methods, and devices related to estimating backhaul quality, detecting Internet connectivity, and managing server load are described herein. In some aspects, a wireless device is configured to determine a characteristic of an active communication link. The device includes a processor configured to determine an allowability for accessing a server, via the active communication link, based on a first access restriction. The device further includes a transmitter configured to transmit a request for a communication from the server upon allowability for accessing. The device further includes a receiver configured to receive the communication from the server, over the communication link, in response to the request. The processor is further configured to determine a characteristic of the communication link based on the communication from the server. | 09-26-2013 |
20130254379 | SYSTEMS AND METHODS FOR NETWORK QUALITY ESTIMATION, CONNECTIVITY DETECTION, AND LOAD MANAGEMENT - Systems, methods, and devices related to estimating backhaul quality, detecting Internet connectivity, and managing server load are described herein. In some aspects, a wireless device is configured to determine a characteristic of a communication link. The device includes a transmitter configured to transmit a request for a communication from a server. The device further includes a receiver configured to receive the communication from the server, over the communication link, in response to the request. The device further includes a processor configured to compute a target amount of at least one of traffic or time to receive the communication. The processor is further configured to terminate the communication based on the computed time or amount of traffic received. The processor is further configured to determine a characteristic of the communication link based on the communication from the server. | 09-26-2013 |
20130254380 | COMPUTER SYSTEM COMPRISING A PLURALITY OF SERVERS - A computer system includes a plurality of servers, a connection unit, and a control unit. Each of the plurality of servers generates feedback signals, a first type of control signals, and high-speed signals. The control unit includes an integrated baseboard management controller (IBMC) and a strobe circuit, and the IBMC generates a second type of control signals. Each of the plurality of servers is electrically connected to the control unit via the connection unit. The feedback signals and the first type of control signals generated by each of the plurality servers are transmitted to the IBMC via the connection unit. The second type of control signals are transmitted to each of the plurality of servers via the connection unit, and the strobe circuit selectively transmits the high-speed signals generated by one of the plurality of servers to the IBMC. | 09-26-2013 |
20130254381 | SYSTEM AND METHOD FOR CREATING AND ESTABLISHING A WORKFLOW BASED TEMPLATE FOR A DOMAIN SERVER OR IP SERVER IN DATACENTERS - A computer implemented method for creating and establishing one or more workflow based template for a one or more domain servers by a one or more users using a centralized application management system is provided. The one or more users include a first user and a second user. The computer implemented method includes (i) creating, at a template module, a first workflow based template for a first domain server by the first user, the first workflow based template includes one or more root node, the one or more root node includes a one or more patent nodes, (ii) sending, by the first user, the first workflow based template for validation and approval by the second user, and (iii) establishing the first workflow based template in the first domain server. | 09-26-2013 |
20130254382 | HARDWARE BASED DETECTION DEVICES FOR DETECTING NETWORK TRAFFIC CONTENT AND METHODS OF USING THE SAME - A device for detecting network traffic content is provided. The device includes a first input port configured to receive one or more signatures, each of the one or more signatures associated with content desired to be detected, a second input port configured to receive data associated with network traffic content. The device also includes a processor configured to process the one or more signatures and the data to determine whether the network traffic content matches the content desired to be detected, and an output port configured to couple the device to a computer system of an intended recipient of the network traffic content. The output port passes the network traffic content to the computer system when it is determined that the network traffic content does not match the content desired to be detected. | 09-26-2013 |
20130254383 | FLEXIBLE STORAGE PROVISIONING - Embodiments may enable enterprise cloud based computing infrastructures to instantiate child virtual machines that may be linked to parent virtual machines where the child virtual machines and the parent virtual machines share storage that resides on a high-speed storage area network. Performance metrics of the child virtual machines may be monitored and collected for a period of time generating performance characteristics of the child virtual machines. In at least one of the various embodiments, if the monitoring period may have expired that child virtual machine may be moved to a storage pool that may be selected based on the performance characteristics of the child virtual machine. In at least one of the various embodiments, if the child virtual may be moved from the high-speed SAN to a storage pool the linked between the child virtual machine and the parent virtual machine may be broken. | 09-26-2013 |
20130254384 | CLOUD APPLICATION SCALING FRAMEWORK - The various embodiments may enable enterprise cloud based computing infrastructure to automatically scale cloud based applications in response to changing service demands. In at least one of the various embodiments, the monitoring application may collect operational and performance statistics about a cloud application from both internal and external monitors. In at least one of the various embodiments, a cloud application owner (user) may provide information to the system identifying one or more critical paths for one or more cloud applications. In at least one of the various embodiments, based on the monitoring data and the critical path information the cloud application scaling framework may determine the resource scaling and/or caching that may be appropriate for a monitored application. | 09-26-2013 |
20130254385 | CROWD BASED CONTENT DELIVERY - Methods and systems for crowd based content delivery are provided. According to one embodiment, a preference of a content publisher is received at a resource manager. An indication is received at the resource manager that the resource manager is to redirect a request for a content item. A state of a network is monitored by the resource manager. A resource provider in the network capable of servicing the request is selected based at least in part on the state of the network and the preference of the content publisher. The request is redirected to the resource provider. | 09-26-2013 |
20130254386 | SCHEDULING APPARATUS AND METHOD FOR LOAD BALANCING WHEN PERFORMING MULTIPLE TRANSCODING OPERATIONS - According to one embodiment, a scheduling method for load balancing in an electronic device such as a server when performing multiple transcoding operations includes performing a first transcoding operation in order to transmit at least one moving image file to a first terminal. The server receives a request from a second terminal to transmit at least one moving image file while performing the first transcoding. The server performs a second transcoding operation in order to transmit the requested moving image file to the second terminal. The server monitors output frame rates of the first transcoding operation and the second transcoding operation, to control the output frame rates. | 09-26-2013 |
20130254387 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MONITORING DATA ACTIVITY UTILIZING A SHARED DATA STORE - In accordance with embodiments, there are provided mechanisms and methods for monitoring data activity utilizing a shared data store. These mechanisms and methods for monitoring data activity utilizing a shared data store can enable enhanced data monitoring, more efficient data storage, improved system resource utilization, etc. | 09-26-2013 |
20130254388 | STATUS DETERMINATION IN COMPUTER NETWORK-BASED COMMUNICATIONS SYSTEM - A method for determining a status of a presentity by determining a success rate for a plurality of transactions of the same transaction type that are initiated by at least one entity in a first computer network-based communications system in a plurality of corresponding transaction requests, where the transactions relate to a presentity, identifying a status descriptor that has a predefined association with the transaction type, identifying a condition that has a predefined association with the status descriptor and the transaction type, and associating the status descriptor with the presentity if the success rate meets the condition. | 09-26-2013 |
20130254389 | System and Method for Reporting Website Activity Based on Inferred Attribution Methodology - A method and system for reporting website activity. According to an example embodiment, the system receives event-level data representing visitor activity on a client website, infers attribution of one or more metrics to at least one navigation entity based on the visitor activity, and provides reports based on the inferred attribution. | 09-26-2013 |
20130254390 | SERVICE METHOD OF GAS APPLIANCES - A service method of gas appliances includes: Detecting the gas appliances at the client ends to generate detecting signals. Transmitting the detecting signals to a service end. Identifying which client end the detecting signals come from. Examining the detecting signals to find whether the gas appliance has an abnormal condition; and informing the client end when the abnormal condition is found. After all, the service end may monitor the gas appliances at the client end, and inform the client for repair when the gas appliance has detected an abnormal signal or has damaged parts. | 09-26-2013 |
20130254391 | METHOD AND APPARATUS FOR DETECTING UNSOLICITED MULTIMEDIA COMMUNICATIONS - A service for searching for unsolicited communications is provided. For example, the service may inspect e-mail messages, instant messaging messages, facsimile transmissions, voice communications, and video telephony, and analyze these communications to determine whether an intended communication is unsolicited. In connection with voice and video telephony, a voice sample may be obtained from the caller and voice recognition may be performed on the sample to determine an identity of the person or the voice. The voice sample may also be used to determine the type of voice—i.e., if the voice is live, machine generated, or prerecorded. Where the call is a video telephony call, image recognition may be used to inspect an image of the person. The information obtained from voice recognition, voice type recognition, and image recognition may be used to detect whether the messages if from a known source of unsolicited communications. | 09-26-2013 |
20130254392 | DYNAMIC MANAGEMENT OF MAINTENANCE ASSOCIATION MEMBERSHIP IN A COMPUTER NETWORK - In one embodiment, a particular maintenance end-point (MEP) transmits, during a joining phase, one or more join announcement messages (JAMs) to other MEPs in a network. The one or more JAMs request addition of the particular MEP without generation of a first alarm. The particular MEP transmits, during an operational phase, continuity check messages (CCMs) to the other MEPs in the network. Alarm generation is active during the operational phase. The particular MEP transmits, during a leaving phase, one or more leave announcement messages (LAMs) to the other MEPs in the network. The one or more LAMs request removal of the particular MEP without generation of a second alarm. | 09-26-2013 |
20130254393 | MONITORING OF AVAILABILITY DATA FOR SYSTEM MANAGEMENT ENVIRONMENTS - A method and system for monitoring availability data of a system management (SM) environment. A connection configuration associated with the SM environment is retrieved from a central repository, wherein the SM environment is coupled to a SM portal server that includes the central repository, and wherein the SM environment includes one or more terminal systems. In response to determining that the retrieved connection configuration properly establishes communication between the SM portal server and the SM environment, availability data pertaining to availability of resources at endpoints of the one or more terminal systems is collected. The collected availability data recorded in the central repository. | 09-26-2013 |
20130254394 | SHARED TERMINAL IDENTIFICATION SYSTEM USING A NETWORK PACKET AND PROCESSING METHOD THEREOF - The present invention relates to a system and method for authenticating, monitoring, and managing all terminals connected to a wireless/wired network to use Internet. A shared terminal management system comprises a management server, a charging server, a central server, a central authentication G/W server, and a proxy server, and assigns a terminal identification value for every terminal that uses Internet, authenticates terminals by reading and analyzing the assigned terminal identification value, monitors and manages shared terminals used as being connected to one line to classify lines into a basic line and an additional line, and charges for the additional line. The shared terminal identification system for identifying and managing terminals connected to one Internet line comprises a subscriber line authentication unit, a packet collecting unit, a first packet analyzing unit, an element packet transmission unit, a data management unit and a terminal determining unit. The shared terminal processing method for managing the shared terminals comprises the following steps: detecting users of a sharing device; selecting target users for sharing devices; transmitting a notification; applying for an additional terminal service subscription; and ceasing the connection to the Internet. | 09-26-2013 |
20130262651 | METHODS AND APPARATUS FOR IMPROVING COMPATIBILITY BETWEEN NETWORK DEVICES - In some embodiments, an apparatus includes a network device configured to receive an anomaly database of a first image that stores a set of differences between the first image and a base image. The network device is configured to compare the anomaly database of the first image with an anomaly database of a second image storing a set of differences between the second image and the base image to determine if the first and second images include at least one incompatible critical feature or incompatible non-critical feature. The network device is configured to send a signal associated with a first action if the first and second images include the at least one incompatible critical feature. The network device is configured to send a signal associated with a second action different from the first action if the first and second images include the at least one incompatible non-critical feature. | 10-03-2013 |
20130262652 | ARTICLES OF MANUFACTURE, SERVICE PROVIDER COMPUTING METHODS, AND COMPUTING SERVICE SYSTEMS - Articles of manufacture, service provider computing methods, and computing service systems are described. According to one aspect, an article of manufacture includes a computer-readable storage medium storing programming configured to cause processing circuitry of a client computing device within a client network to perform processing comprising creating an outbound network connection to a service provider which is external of the client network and which is to provide computing services to the client network, accessing an inbound communication from the service provider received via the outbound network connection during the providing of the computing services by the service provider to the client network, and communicating data of the inbound communication to another client computing device within the client network. | 10-03-2013 |
20130262653 | Construction Of Social Structures - Embodiments of a method for determining a mapping are illustrated. In an embodiment, the method includes receiving a log record from a tracking component that is located on a plurality of web pages. The method further includes determining a first mapping between a plurality of anchors associated with the plurality of users. The method also includes determining a second mapping between the plurality of users based on the first mapping. | 10-03-2013 |
20130262654 | RESOURCE MANAGEMENT SYSTEM WITH RESOURCE OPTIMIZATION MECHANISM AND METHOD OF OPERATION THEREOF - A method for operating a resource management system includes: identifying a total-usage status of a resource currently being supplied; calculating a current production amount of supplying the resource using the total-usage status; calculating an assessment structure directly reflecting the current production amount; adjusting the assessment structure for modifying behavior associated with the current consumption of the resource. | 10-03-2013 |
20130262655 | MONITORING NETWORK PERFORMANCE OF ENCRYPTED COMMUNICATIONS - According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information. | 10-03-2013 |
20130262656 | SYSTEM AND METHOD FOR ROOT CAUSE ANALYSIS OF MOBILE NETWORK PERFORMANCE PROBLEMS - A method and system for identifying causes of performance metric changes in a network by selecting, from a pool of network event counters, a plurality of candidate counters relevant to a performance metric; grouping the candidate counters into clusters of similar counters; selecting, from each cluster, one or more representative counters; and fitting the selected representative counters to a model of the performance metric to determine thereby a set of representative counters most relevant to the performance metric. | 10-03-2013 |
20130262657 | METHODS, APPARATUS, AND MACHINE READABLE STORAGE MEDIA TO MONITOR A MEDIA PRESENTATION - Methods, apparatus, and machine readable storage media to monitor media presentations are disclosed. An example method includes receiving a status from a media presentation status server indicating whether there is more than a sufficient likelihood of media being presented at a present location of a mobile device; collecting audio with the mobile device when the status indicates there is more than the sufficient likelihood of media being presented; and not collecting audio when the status indicates there is not more than the sufficient likelihood of media being presented. | 10-03-2013 |
20130262658 | SYSTEMS AND METHODS FOR ADVANCED TARGETING - A system for testing the effectiveness of webpage configurations is disclosed. Tags indicating dependency between sections of a webpage may be associated with the sections. In response to a version of a first section of a webpage being tested, an associated tag may indicate that the content or behavior of a second section is dependent on the first section. A webpage configuration including content of the first section, and corresponding behavior and content of the second section, may be transmitted to a web client. Data may be collected indicating the effectiveness of the webpage configuration. | 10-03-2013 |
20130262659 | Measuring Web Browsing Quality of Experience in Real-Time at an Intermediate Network Node - A method including acquiring a current HTTP transaction; determining whether the current HTTP transaction relates to web browsing for a specific client; acquiring a previous transactions set of the specific client; evaluating whether the current HTTP transaction belongs with the previous transactions set; if the current HTTP transaction belongs with the previous transactions set, adding the current HTTP transaction to the previous transactions set; and if the current HTTP transaction does not belong with the previous transactions set, creating a boundary of a page unit that includes the HTTP transactions of the previous transactions set for computing a page unit time. | 10-03-2013 |
20130262660 | OPTIMIZATION OF PATH SELECTION FOR TRANSFERS OF FILES - A system may include a file transfer manager that determines a file for transfer from a source location to a target location, the file being associated with file metadata characterizing the file, and with an organization. The file transfer manager may include an orchestrator that determines at least two transfer paths for the transfer, including at least a first transfer path utilizing a private wide area network (WAN) of the organization and a second transfer path utilizing a publicly available data hosting service, access transfer metadata characterizing the at least two transfer paths, and access organizational metadata characterizing organizational transfer path usage factors. The file transfer manager also may include a heuristics engine configured to execute path decision logic using the file metadata, the transfer metadata, and the organizational metadata, to select a selected transfer path from the at least two transfer paths. | 10-03-2013 |
20130262661 | SOLVING UNDER-DETERMINED PROBLEMS FOR NETWORKS - There is provided a computer-implemented method of solving an under-determined problem. The method includes partitioning the under-determined problem into a plurality of sub-problems of reduced order. The method also includes receiving a plurality of local solutions to the plurality of sub-problems. Additionally, the method includes fusing the local solutions to generate a global solution to the under-determined problem. | 10-03-2013 |
20130262662 | METHODS AND SYSTEMS FOR SMART ADAPTERS IN A SOCIAL MEDIA CONTENT ANALYTICS ENVIRONMENT - Methods and systems are provided for retrieving social media content metrics from a plurality of websites using a single multi-site adapter. The method includes constructing a respective plug-in for each website; constructing a database of M plug-ins corresponding to M websites, respectively; selecting a plug-in from the database; feeding the selected plug-in into the multi-site adapter; and applying the adapter to a particular website corresponding to the plug-ins to thereby retrieve the analytics (metrics) for pages on a website. | 10-03-2013 |
20130262663 | SYSTEM AND METHOD FOR PROCESSING SHAREWARE USING A HOST COMPUTER - In a method for processing shareware using a host computer, a plurality of installation modes and authorization modes are sent to a client computer if the client computer requests the host computer for a shareware installation file of the shareware in the host computer. A selected installation mode and a selected authorization mode of the client computer are determined by decrypting encrypted data from the client computer using a preset decryption formula. The method further monitors the client computer according to the selected authorization mode to determining whether the client computer is allowed to run the shareware. When the client computer runs the shareware, the method records usage status of all functions of the shareware in the client computer and receiving error reports from the client computer. The method further sends solutions to the client computer in response to the error reports. | 10-03-2013 |
20130262664 | COMPUTER SYSTEM AND SUBSYSTEM MANAGEMENT METHOD - A computer system, comprising a plurality of subsystems coupled via a network, each of the plurality of subsystems comprising at least one computer and at least one network device, the computer system comprising a subsystem control module for managing the plurality of subsystems, the subsystem control module being configured to: select at least one subsystem as a group management node from among the plurality of subsystems, in a case of receiving a build request for a group which is used for providing a service and which includes at least one subsystem; command the at least one subsystem selected as the group management node to measure a network quality; determine, based on the received measurement result of the network quality, a configuration of the group; and transmit to the group management node a group build command. | 10-03-2013 |
20130262665 | REMOTE SERVER AND METHOD FOR MANAGING RUNNING STATUS OF REMOTE SERVER - A method for managing running status of a remote server includes the steps of: monitoring a running status of the remote server in response to a monitoring request received from at least one client; obtaining corresponding status data of the remote server; transmitting the obtained status data to the at least one client, receiving a control signal generated by the at least one client according to the status data, and adjusting the running status of the remote server to a normal status according to the control signal. | 10-03-2013 |
20130262666 | NETWORK CONNECTIVITY METHODS AND SYSTEMS - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers. | 10-03-2013 |
20130262667 | SYSTEMS AND METHODS FOR CATEGORIZING NETWORK TRAFFIC CONTENT - A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability of accuracy associated with the first characterization, and categorizing the network traffic content based at least in part on the first characterization and the first probability of accuracy. A method for use in a process to categorize network traffic content includes obtaining a plurality of data, each of the plurality of data representing a probability of accuracy of a characterization of network traffic content, and associating each of the plurality of data with a technique for characterizing network traffic content. A method for categorizing network traffic content includes determining a characterization of the network traffic content, determining a weight value associated with the characterization, and categorizing network traffic content based at least in part on the characterization of the network traffic content and the weight value. | 10-03-2013 |
20130262668 | PORTABLE TERMINAL DEVICE, DATA MANAGEMENT METHOD, AND DATA MANAGEMENT PROGRAM - A portable terminal device that is enabled to use data with a certain degree of protection against information leakage. The portable terminal device uses data stored in a server by communicating with the server via a network, and includes: a connection monitor that monitors a connection state of the portable terminal device with the server; and a data manager that deletes same data as data stored in the server from the portable terminal device when the connection monitor detects that the portable terminal device goes into the online state. | 10-03-2013 |
20130262669 | DEVICE DETECTION SYSTEM FOR MONITORING USE OF REMOVABLE MEDIA IN NETWORKED COMPUTERS - A device detection system for detecting use of removable media such as flash drives, portable storage, disks, and digital cameras in computers. From each monitored client, messages are sent by a client device detection application to a server application running on a central or administrator computer or node. The messages include relevant information for the client computer such as IP address, computer name, and user name along with the device. Generally, a message will be sent when the device is first detected such as when it is attached to the client computer or connected to a port and when the device is later changed such as when the device is removed, and detection is achieved by a function intercepting event messages in the operating system environment combined with a drive detector. The messages are stored in system memory so as to log the attachment or use of removable media. | 10-03-2013 |
20130262670 | MANAGEMENT SYSTEM, MANAGEMENT APPARATUS AND MANAGEMENT METHOD - A management system includes an application source node that applies for subscription of alive and dead state information to a node to be monitored, a node to be monitored that interconnects with the application source node and makes a request to a node whose routing table includes the node to be monitored for monitoring the node to be monitored and notifying the application source node of a monitoring result when receiving the subscription application, and a monitoring node that monitors the node to be monitored when receiving the request from the node to be monitored and makes a notification to the application source node when a response from the node to be monitored stops. The application source node determines that the node to be monitored stops when communication with the node to be monitored is disconnected and the notification is received from the monitoring node. | 10-03-2013 |
20130262671 | MONITORING DOMAIN ALLOCATION PERFORMANCE - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance metric information to determine an allocation of one or more domains to be associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent requests for the two or more embedded resources using each of a variety of alternative allocations of domains associated with the two or more embedded resources. The processing device may also consider a number of factors, including domain selection criteria obtained from an original content provider. Aspects of systems and methods for generating recommendations to use a particular allocation of domains to process a subsequent request corresponding to the two or more embedded resources are also provided. | 10-03-2013 |
20130262672 | METHOD AND SYSTEM FOR MONITORING LOCATOR/IDENTIFIER SEPARATION NETWORK - A method and system for monitoring a locator/identifier separation network. The method includes: a supervision center sending identity information of a monitored to an authentication center, querying and obtaining an identity identifier of the monitored; the supervision center obtaining a location identifier of the monitored according to the identity identifier of the monitored; the supervision center sending a command of monitoring the identity identifier of the monitored to an edge router corresponding to the location identifier of the monitored; and the edge router mirroring a data packet containing the identity identifier of the monitored in address information to the supervision center. With the method and system for monitoring the locator/identifier separation network, a monitoring function under a locator/identifier separation network architecture can be implemented. | 10-03-2013 |
20130268649 | PROCESS FOR SELECTING AN AUTHORITATIVE NAME SERVER - Methods and systems for intelligently choosing an authoritative name server from among a group of name servers for resolving Domain Name System requests. Systems and methods are provided that enable choosing of a first server associated with and/or operated by a first service provider based on a first measurement associated with that first server. The systems and methods further comprise requesting first data from that first server, determining that the first server is unresponsive, and choosing a second server. The second server is chosen based on a second measurement, and chosen contingent on it being associated with and/or operated by to a different service provider than that associated with the first server. The systems and methods then comprise requesting second data from the second server. | 10-10-2013 |
20130268650 | ENTERPRISE LEVEL DATA COLLECTION SYSTEMS AND METHODOLOGIES - An enterprise data collection system including at least one database for receiving over a network and storing data collected from data resources at a plurality of physical sites located at disparate locations, a plurality of remotely synchronizable probes (RSPs) located at the plurality of physical sites, the remotely synchronizable probes (RSPs) performing at least one of the following data collection functions: real time event collection, file system crawling for data structure and permissions, data content analysis, data indexing, data tagging and event triggered alerts, and at least one RSP manager located remotely from at least one of the plurality of remotely synchronizable probes and being operative to govern the operation of and orchestrate data collection and transmission by the plurality of remotely synchronizable probes (RSPs). | 10-10-2013 |
20130268651 | CONTENT PACKAGE MODIFICATION BASED ON PERFORMANCE DATA - The performance of a content package can be influenced by a variety of factors, at least some of which can be identified by analyzing user interaction events. The user interaction events can be analyzed to generate data representative of the current performance of the content package. Based on the performance data, one or more modifications can be identified and recommended to the content package owner. A modification can include a change in file size, a change in encoding quality, a change in a component, and/or a change in a presentation rule. | 10-10-2013 |
20130268652 | OPPORTUNISTIC SYSTEM SCANNING - Opportunistic scans can be performed by identifying, using at least one processing device, a detection of a particular computing device on a network of a computing environment. At least one scan to be performed on the detected particular computing device can be is identified and a particular scan engine, in a plurality of scan engines, is identified that is adapted to perform the at least one scan. The at least one scan is caused to be performed on the detected particular computing device while the detected particular computing device is on the network using the particular scan engine. | 10-10-2013 |
20130268653 | System for Distributing Requests Across Multiple Servers Using Dynamic Metrics - A system for distributing incoming client requests across multiple servers in a networked client-server computer environment processes all requests as a set that occur within a given time interval and collects information on the attributes of the requests and the resource capability of the servers to dynamically allocate requests in a set to the appropriate servers upon completion of the time interval. Preferably, a request table collects at least two requests incoming within a predetermined time interval, a request examiner routine analyzes each collected request with respect to at least one attribute, a system status monitor collects resource capability information of each server in a resource table and an optimization and allocation process distributes collected requests in the request table across the multiple servers upon completion of said time interval based on an optimization of potential pairings of the requests in the request table with servers in the resource table. | 10-10-2013 |
20130268654 | DEVICES AND METHODS FOR COMMUNICATION IN AD-HOC NETWORKS - In a particular embodiment, a method includes determining, by a first device, a number of discovery messages received during at least one discovery interval. Based on the number of discovery messages, an estimated number of devices in an ad-hoc network is determined The method further includes transmitting, during a second discovery interval that is subsequent to the at least one discovery interval, a discovery message. The discovery message indicates the estimated number of devices in the ad-hoc network. | 10-10-2013 |
20130268655 | METHOD AND SYSTEM FOR MANAGEMENT OF A VIRTUAL NETWORK CONNECTION WITHOUT HEARTBEAT MESSAGES - Systems and methods for management of a network connection without heartbeat messages are disclosed. One embodiment of a distributed proxy system performs a method for the communication of state between a client and a server in a distributed content delivery network using a state map. The state map sets a predicted communication correspondence frequency and thus eliminates the use or need of heart beat messages to manage session state and/or convey health status of system components. | 10-10-2013 |
20130268656 | INTELLIGENT CUSTOMER SERVICE/CALL CENTER SERVICES ENHANCED USING REAL-TIME AND HISTORICAL MOBILE APPLICATION AND TRAFFIC-RELATED STATISTICS COLLECTED BY A DISTRIBUTED CACHING SYSTEM IN A MOBILE NETWORK - Systems and methods of intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network are disclosed. The data can be tracked by a client-side and/or a server-side reporting engine and usage analytics engine. Reports can also be generated by the system from the data and provided to the customer service/call center, such as trend charts showing optimization efficiency of traffic over a network and battery consumption vs. application load for a mobile device as a function of time. | 10-10-2013 |
20130268657 | Sampling from Distributed Streams of Data - The present disclosure is directed to systems, methods, and computer-readable storage media for sampling from distributed data streams. Data elements are received at site servers configured to collect and report data to a coordinator device. The site servers assign a binary string to each of the data elements. Each bit of the binary strings can be independently set to a 0 or a 1 with a probability of one half. The binary string is used to sample from the received data elements, and the data elements and/or the sampled data elements can be transmitted to a coordinator device. The coordinator device can examine one or more bits of the binary string to draw samples of the received data elements in accordance with desired probabilities. | 10-10-2013 |
20130268658 | METHOD AND APPARATUS FOR MONITORING CLIENT SOFTWARE USAGE IN END USER DEVICE - The present invention enables a capability for packet-switched network service providers, e.g., VoIP network service providers, to monitor the CPE application usage of their subscriber to ensure that changes to the network do not interfere with these applications and to potentially provide changes to the network to enhance these premise based applications. Monitoring software will be installed in the CPE to monitor upgrades and features installed by the end users so that any potential impact to these applied applications can be assessed before a VoIP network upgrade is carried out. | 10-10-2013 |
20130268659 | CONGESTION MANAGEMENT AND LATENCY PREDICTION IN CSMA MEDIA - A facility for congestion management and latency prediction is described. In various embodiments, the facility sums a series of fractional transmission delays wherein each fractional transmission delay is measured as a probability of a failed transmission attempt multiplied by the cost of the failed transmission attempt, and provides the sum. | 10-10-2013 |
20130268660 | Providing and Resolving an IP Address for Swarm-Based Services - According to one embodiment of the disclosure, a non-transitory computer readable medium (CRM) comprising instructions, which when executed by one or more hardware processors, causes performance of operations comprising: listening, by a first digital device in a group of digital devices, for any advertisement for a particular service; responsive to the first digital device not receiving any advertisement for the particular service for a predetermined period of time: transmitting, by the first digital device, a first advertisement for the particular service; and providing, by the first digital device, the particular service. | 10-10-2013 |
20130268661 | Automatically Managing Objectionable Behavior In A Web-Based Social Network - A system and method for curtailing objectionable behavior in a web-based social network is disclosed. The method includes monitoring various actions of users of a web-based social network for objectionable behavior. The monitored actions are those that affect other users of the social network. A policy is determined based on behaviors of users. The policy may be violated by a user if the user exceeds a policy threshold. Some monitored actions include the poking, friend requesting, and wall posting. A policy may be violated by multiple occurrences of a single type of action or by a combination of different types of actions. Upon a policy violation, a warning may be issued to the user or the user's account may be suspended. | 10-10-2013 |
20130268662 | HYPERTEXT TRANSFER PROTOCOL HTTP STREAM ASSOCIATION METHOD AND DEVICE - Embodiments of the present invention provide a hypertext transfer protocol HTTP stream association method and device. The method includes: receiving a hypertext transfer protocol request HTTP Get; if the HTTP Get does not include a referer Referer field, storing a request uniform resource locator URL in the HTTP Get to an association record table; and if the HTTP Get includes a Referer field, storing a URL included in the Referer field to the association record table, and searching for a same URL in the association record table and performing association matching. By using the hypertext transfer protocol HTTP stream association method and device provided in the embodiments of the present invention, association matching is performed through a URL on multiple mutually associated streams generated in an HTTP event, thereby implementing accurate control and processing on the HTTP event. | 10-10-2013 |
20130268663 | COMMUNICATION NETWORK SYSTEM - A communication network system in which a plurality of communication stations are connected to perform sending to or receiving from each other, wherein each station includes one or more processing units, when the processing unit receives a request message including an instruction to measure a transient-transmission processing time, the processing unit stores a first time required for the processing unit to process the request message in a storage unit included in the processing unit, and sends the request message, and when the processing unit receives a response message that is a response to the request message including an instruction to measure a transient-transmission processing time, the processing unit stores a second time required between when the request message is sent and when the response message is received and a third time required for the processing unit to process the response message in the storage unit, and sends it. | 10-10-2013 |
20130268664 | Method and Network Node for Providing Dynamic Subscriber Profiling Information - In the embodiments of the present invention, a network node in an operator network is introduced. The network node is an analysis component configured to analyze the subscriber behavior based on the internet traffic data within the network. The network node is configured to provide a dynamic profile of the subscribers based on the current and past internet traffic. The dynamic profile may be used by other applications in the operator network or third parties. For example, a content provider can take a decision on what content to provide to a certain subscriber, based on dynamic subscriber profile information of this certain subscriber received from the network node according to the embodiments of the present invention. Another example is that an operator can use the dynamic subscriber profile when selecting commercial offers to his own subscribers e.g. when a subscriber has a new music mobile when visiting music sites. | 10-10-2013 |
20130268665 | Method and System for Handling Service Requests in a Telecommunications Network - One aspect of the disclosure relates to a method for handling a service request from a requesting entity in a telecommunications network. A first service request for a particular service is received from the requesting entity. A sequence identifier is assigned to the requesting entity from which the first service request is received. The first service request is rejected by sending a reject message to the requesting entity and the assigned sequence identifier is also communicated to the requesting entity. At some later time, the sequence identifier is transmitted (e.g. broadcasted) in the telecommunications network in order. A second service request for the particular service is then received from the requesting entity and the serving entity now allows the request for the service. | 10-10-2013 |
20130275573 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DEFERRING INTERFACE MONITORING BASED ON WHETHER A LIBRARY ASSOCIATED WITH THE INTERFACE IS LOADED - An interface monitoring system, method and computer program product are provided. In use, an interface is identified. In addition, monitoring of the interface is deferred based on whether a library associated with the interface is loaded. | 10-17-2013 |
20130275574 | ASSET DETECTION SYSTEM - A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system. | 10-17-2013 |
20130275575 | NETWORK ADDRESS REPOSITORY MANAGEMENT - A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor. | 10-17-2013 |
20130275576 | Network condition-based monitoring analysis engine - The present disclosure relates to profiling industrial networks as part of an engineering, commissioning, modification, maintenance, or repair process. The comparison of a current running profile of an industrial network to previous or archived profiles provides unique information for the commissioning, modification, maintenance, or repair of the network. Further, the comparison of the current running profile of a network to reference profiles is provided. Generally, a network condition-based monitoring analysis engine is provided. | 10-17-2013 |
20130275577 | Selecting Content Within a Web Page - A method of selecting content within a web page (FIG. | 10-17-2013 |
20130275578 | METHOD AND APPARATUS FOR DYNAMIC BANDWIDTH ALLOCATION FOR OPTIMIZING NETWORK UTILIZATION - An apparatus is configured to receive at a time a datum associated with use of a network by a set of compute devices using the network. The apparatus is also configured to calculate at least one threshold value based, at least in part, on the datum and a bandwidth capacity of the network at the time. The apparatus is also configured to receive a usage value associated with bandwidth use of a compute device from the set of compute devices and associated with a time period immediately preceding the time. The apparatus is further configured to compare the usage value with the at least one threshold value to determine a usage category associated with the compute device. The apparatus is configured to limit bandwidth use of the network for the compute device based on the usage category. | 10-17-2013 |
20130275579 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 10-17-2013 |
20130275580 | CLICK THROUGH RATE ESTIMATION IN VARYING DISPLAY SITUATIONS - The presently disclosed subject matter includes at least a method, system and a program storage device of estimating click through rate (CTR) of a pair of source and recommendation, the source comprising a plurality of slots, each slot configured to present a served recommendation. The CTR estimation is performed by first determining an estimated calibration CTR coefficient for each slot and then using this information for calculating an estimated CTR of a given slot when served with a given recommendation in a given source. | 10-17-2013 |
20130275581 | Method for Monitoring Running Information of Applications and Related Apparatus - A method, used in an electronic device supporting a diagnostics and monitoring (DiagMon) management interface having a management object with a plurality of nodes, for monitoring running information of an application is disclosed. The method comprises identifying the application on a first node of the plurality of nodes; recording a total running time of the application on a second node of the plurality of nodes; recording a total user interactive time of the application on a third node of the plurality of nodes; recording a maximum memory usage which the application has used on a fourth node of the plurality of nodes; and recording a number of times which the application is activated by a user on a fifth node of the plurality of nodes. | 10-17-2013 |
20130275582 | SYSTEMS AND METHODS FOR TRAP MONITORING IN MULTI-CORE AND CLUSTER SYSTEMS - In a multi-core device or clustered system, instead of snmpd polling for configured monitoring values of an entity to determine if reached a threshold, each core in a multi-core system or node in a clustered system triggers information to the snmpd about entities that may be or are generating SNMP traps. A configured threshold T is distributed among the cores or nodes, as the case may be, based on the number of cores or nodes. If there are ‘n’ cores in a multi-core device, and the configured threshold is ‘T’, then each core checks for a per-core threshold value ‘T/n’. If there are ‘n’ nodes in a clustered system, and the configured threshold is ‘T’, then each node checks for a per-node threshold value ‘T/n’. According to the pigeonhole principle, if an entity has reached or exceeded the threshold ‘T’, then the entity must have reached or exceeded a value of ‘T/n’ on at least one core or node. Upon the entity crossing a ‘T/n’ value on any core or node, the core or node informs snmpd about this entity. Snmpd then gathers information about this entity from all the cores and checks for the threshold ‘T’. | 10-17-2013 |
20130275583 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PERFORMING DIAMETER OVERLOAD CONTROL - According to one aspect, the subject matter described herein includes a system for performing Diameter overload control. The system occurs at a Diameter routing node. The system includes a network interface for receiving a Diameter message. The system also includes a Diameter overload control unit configured to detect an overload condition for a Diameter session associated with the Diameter message and to communicate an indication of the overload condition to a second Diameter node using a Diameter message defined for a purpose other than overload control. | 10-17-2013 |
20130275584 | AUTONOMIC DISCOVERY AND INTEGRATION OF COMPLEMENTARY INTERNET SERVICES - Autonomic discovery and integration of complementary Internet services can include discovering a plurality of services that are complementary to an offered service and selecting a service from the plurality of services as a candidate for integration with the offered service. A new service can be automatically generated by integrating the candidate service with the offered service. The new service can be included in a service catalog. | 10-17-2013 |
20130275585 | SYSTEM AND METHOD FOR PERFORMANCE MEASUREMENT OF NETWORKED ENTERPRISE APPLICATIONS - A method for measuring performance of a networked application is provided. The method enables retrieving performance measurement data from an application database. The data relates to one or more transactions executed via the networked application. The method further enables reconstructing request and response messages using the retrieved data. The messages are reconstructed based on at least one of: web based and socket based calls related to one or more captured transactions. Further, the method enables determining one or more performance measurement metrics based on data obtained by communicating with one or more servers using the reconstructed messages. | 10-17-2013 |
20130275586 | MANAGING CACHE TO PREVENT OVERLOADING OF A WIRELESS NETWORK DUE TO USER ACTIVITY - System and method of detection and management of user interactions with foreground applications on a mobile device in distributed caching are disclosed. One embodiment includes a method of mimicking, remote from the mobile device, timing characteristics of user activity with the mobile client, polling a content source for the mobile application based on the timing characteristics of the user interaction, on behalf of the mobile device and allowing responses cached on the mobile device for the user activity to be used until a change at the content source is detected, remote from the mobile device. | 10-17-2013 |
20130275587 | SYSTEM AND METHODS FOR IDENTIFYING AND REMEDYING TRAFFIC IMBALANCES AND INEQUITIES BETWEEN NETWORKS - Implementations described and claimed herein providing systems and methods for modeling and visualizing interconnection relationships between a first provider network and a partner. In one implementation, a partner of a provider network is defined by at least one interconnection point where network traffic may be exchanged between the provider network and the partner. An interconnection relationship is generated based on the at least one interconnection point. The interconnection relationship is modeled. | 10-17-2013 |
20130275588 | METHODS, DEVICES, AND SYSTEMS FOR ALLOCATING IP ADDRESS - The embodiments of the present disclosure provide a method, a device and a network system for allocating an IP address. The allocating method comprises: allocating a first IP address to a first server; allocating a second IP address to a client connected to the first server; monitoring the client allocated with the second IP address; allocating a third IP address to the first server when a monitoring result indicates that an IP address conflict exists between the first IP address and a current IP address of a second server; wherein the second server is connected to the client allocated with the second IP address. The method may reallocate the IP address automatically when a subnet conflict occurs. | 10-17-2013 |
20130275589 | COMMUNICATIONS NETWORK MANAGEMENT - The present invention provides a communications network which is divided into a plurality of segments, with each segment comprising one or more routers and one or more communications links that connect the routers. Quality of service (QoS) thresholds can be defined for each of the segments and if it is predicted that one of these thresholds is to be breached in one of the segments, for example due to a communications link or a router being overloaded, then a segment management module associated with that segment will re-route the traffic. | 10-17-2013 |
20130282889 | Graphic Visualization for Large-Scale Networking - Systems, computer implemented methods, and engines are directed to identifying a network of associations for a user. A visualization of the network of associations may be provided as a graph, the graph having an edge and a node, the node representing a member of the network of associations and the edge representing an association between the member and the user. | 10-24-2013 |
20130282890 | IN-STREAM COLLECTION OF ANALYTICS INFORMATION IN A CONTENT DELIVERY SYSTEM - Analytics information is collected in a content delivery network when content requests are received by a content router. Analytics information may be gleaned from uniform resource identifiers, and additional augmented analytics information may be specified by either the client that issued the request or an intermediate network node that proxied the request. The augmented analytics information may be specified in proprietary HTTP header fields. Information collection includes intercepting content requests; correlating URIs with known content assets; associating content requests with session state; extracting downstream node augmented information from the content requests; updating session information in persistent storage; selecting target locations from which to retrieve the content assets; and redirecting the content requests to the target locations. | 10-24-2013 |
20130282891 | Resource Usage Pattern Matching - A method comprises accessing on an electronic device, measurement information related to the operation of an electronic device under evaluation, dividing the measurement information into time slices, organizing the measurement information into a calendar chart, determining a pattern of measurement information, providing the measurement information associated with the pattern in the calendar chart at the associated time slices, and suppressing measurement information unassociated with the pattern in the calendar chart. The measurement information comprises analysis of measurements of the operation of the electronic device under evaluation. The pattern considers a plurality of the time slices. | 10-24-2013 |
20130282892 | EVENT EXTRACTOR - A system can comprise a memory to store machine readable instructions. The system can also comprise a processing unit to execute the machine readable instructions. The machine readable instructions can comprise an event extractor to parse a packet capture (pcap) file that includes a packet transmitted via a network between an application under test (AUT) executing on a mobile device and a server to determine a network event based on the packet. The event extractor can also generate an application programming interface (API) command file that includes an API command generated based on the network event. | 10-24-2013 |
20130282893 | METHOD AND APPARATUS FOR SUPPORTING CALL ADMISSION CONTROL USING GRAPH ASSEMBLY AND FATE-SHARE IDENTIFIERS - In one embodiment, a method includes obtaining a potential bandwidth deduction at a call agent, the call agent being associated with an intercluster call admission control (CAC) arrangement in which bandwidth is shared, the potential bandwidth deduction being associated with a session. The method also includes determining whether the potential bandwidth deduction is a duplicate bandwidth deduction, deducting the potential bandwidth deduction from a bandwidth bucket when it is determined that the potential bandwidth deduction is not the duplicate bandwidth deduction, and ignoring the potential bandwidth deduction when it is determined that the potential bandwidth deduction is the duplicate bandwidth deduction. | 10-24-2013 |
20130282894 | VALIDATING CONTENT FOR A WEB PORTAL - Techniques for validating web content include identifying web content including web content portions, wherein a particular web content portion includes a content and a format; comparing the format of the particular web content portion against a specified format; and based on the comparison including a difference between the format of the particular web content portion and the specified format, displaying a message indicating the difference between the format of the particular web content portion and the specified format. | 10-24-2013 |
20130282895 | CORRELATION BASED ADAPTIVE SYSTEM MONITORING - A method, system and computer program product for adaptive system monitoring. In one embodiment, the method comprises generating time-varying correlation graphs indicating correlations between a multitude of parameters of the system, and using the correlation graphs to identify monitoring logic for monitoring the system. In an embodiment, the correlation graphs are used to select a group of the parameters as monitoring parameters, and these monitoring parameters are dynamically changed. In one embodiment, the monitoring parameters form sets of monitoring parameters, and each set of monitoring parameters is used to monitor the system for an associated period of time. The lengths of these monitoring periods are changed based on the rate of change of the correlation graphs. In an embodiment, the rate at which the monitoring parameters are changed is itself changed based on the rate of change of the correlation graphs. | 10-24-2013 |
20130282896 | Passive And Comprehensive Hierarchical Anomaly Detection System And Method - A technique for monitoring performance in a network uses passively monitored traffic data at the server access routers. The technique aggregates performance metrics into clusters according to a spatial hierarchy in the network, and then aggregates performance metrics within spatial clusters to form time series of temporal bins. Representative values from the temporal bins are then analyzed using an enhanced Holt-Winters exponential smoothing algorithm. | 10-24-2013 |
20130282897 | SYSTEMS AND METHODS FOR IDENTIFYING AND REMEDYING TRAFFIC IMBALANCES AND INEQUITIES BETWEEN NETWORKS - Implementations described and claimed herein provide systems and methods for balancing network loads across distinct provider networks using enriched network traffic flow data. In one implementation, network traffic flow data representative of network traffic exchanged between a first provider network and a second provider network is generated. The network traffic flow data is enriched using at least one enrichment feed. A network load indication for the first provider network is calculated using the enriched network traffic flow data. The network load indication is a function of a bandwidth measurement and a distance measurement. | 10-24-2013 |
20130282898 | METHODS AND APPARATUS TO DETERMINE MEDIA IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Examples to determine media impressions using distributed demographic information are disclosed. Some disclosed example methods involve sending a request to an impression monitor system in response to detecting a login event at a client device. The login event is associated with an Internet-based service of a first Internet domain different from a second internet domain of the impression monitor system. Such disclosed example methods also involve sending a login reporting message to a database proprietor that provides the Internet-based service. The login reporting message including first and second cookie identifiers. The first cookie identifier is associated with the first Internet domain of the Internet-based service, and the second cookie identifier is associated with the second Internet domain of the impression monitor system. | 10-24-2013 |
20130282899 | AGGREGATE MONITORING OF INTERNET PROTOCOL TELEVISION (IPTV) CHANNEL ACTIVITY ACROSS USER-BASED GROUPS OF PRIVATE COMPUTER NETWORKS - A system for aggregate monitoring Internet Protocol television (IPTV) channel activity across user-based groups of private computer networks includes monitoring servers for monitoring private networks. Each private network has a monitoring server operable to receive multicast stream information from at least one switch on the private network, the multicast stream information indicating which ports of the at least one switch are joined to one or more multicast streams. A central server stores information associating users with a group of one or more of the private networks. The central server receives a request from a remote device via the WAN, determines the group of private networks associated with the requesting user, automatically generates a set of IPTV channel activity statistics according to only the statuses collected for each private network in the group associated with the requesting user, and sends the set of statistics to the remote device. | 10-24-2013 |
20130282900 | Communication system and method for discovering end-points that utilize a link layer connection in a wired/wireless local area network - A communication system and method are provided for discovering wireless client devices within a local area network. A discovery message may be broadcast to a plurality of access points via a select access point to discover an access point. A response may be received from the discovered access point that may report a presence of a particular wireless client device located within a coverage area of the discovered access point. A status of the particular wireless client device may then be requested from the discovered access point. | 10-24-2013 |
20130282901 | COMPUTER NETWORK NODE DISCOVERY - A computer network node discovery process provides for collecting discovery data at least in part by having a computer query computer network nodes. The discovery data can include IPv6 addresses or MAC addresses or both. The discovery data can be expanded by converting IPv6 addresses to MAC addresses or converting MAC addresses to IPv6 addresses. The resulting expanded discovery data can be used to update a network inventor database at least in part by entering IPv6 or MAC addresses resulting from the conversions. | 10-24-2013 |
20130282902 | COMPUTER NETWORK NODE DISCOVERY SEQUENCING - A computer network node discovery process ( | 10-24-2013 |
20130290508 | METHODS AND APPARATUS TO MEASURE EXPOSURE TO STREAMING MEDIA - Methods and apparatus to measure exposure to streaming media are described. An example method includes extracting metering data from media obtained from a media provider. Metadata identifying the media based on the extracted metering data is generated. The media is transcoded into a transport stream, the transport stream having a streaming format. The metadata is embedded in a timed text track accompanying the transport stream. | 10-31-2013 |
20130290509 | DETERMINING A NETWORK ADDRESS FOR MANAGED DEVICES TO USE TO COMMUNICATE WITH MANAGER SERVER IN RESPONSE TO A CHANGE IN A CURRENTLY USED NETWORK ADDRESS - A plurality of network addresses identify a source device in the network. A plurality of subscriptions for the source device to receive messages from the target devices each identify one of the target devices and one of the source network addresses the identified target device uses to communicate with the source device. Upon detecting a change to a changed network address, a determination is made of a subscription indicating the changed network address and the target device indicated in the determined subscription is determined. A selection is made of a selected network address, other than the changed network address is selected. If the selected network address can be used to communicate between the determined target device and the source device, then the selected network address is used and provided to the determined target device. | 10-31-2013 |
20130290510 | SYSTEMS AND METHODS FOR REWARDING SOCIAL NETWORK USERS FOR CONTENT - Social networking users are rewarded with points for creating content or commenting on the content of other social networking users. The rewards engine may be a part of a social networking site, or may be a stand-alone system which may be used by social networking sites to offer rewards to users. Upon receiving an event including a user and event type, the system determines a point value, instantly and/or in the future. Different point values may be assigned to different event types, or points may be awarded based upon the measured impact over time, or points may be awarded according to user votes. Points may be awarded for enrolling, making new friends, creating content, commenting on content, among other event types. Points may be revoked for deleting content or blocking users, among other event types. A hierarchy of point values may assign fewer or greater points to particular event types. | 10-31-2013 |
20130290511 | MANAGING A SUSTAINABLE CLOUD COMPUTING SERVICE - A method for managing a cloud using a cloud controller and a sustainability metrics manager having executable computer-readable instructions stored on a database first includes receiving a request from a cloud user to implement a new cloud service having at least one service characteristic. Once the request is received, the controller computes a prediction of a first sustainability impact based on the service characteristic for an implementation of the cloud service on a high quality of service (QoS) server operating in the cloud, and also computes a prediction of a second sustainability impact based on the service characteristic for an implementation of the cloud service on a high sustainability server operating in the cloud. The controller then presents the first and second predicted sustainability impacts to the cloud user so that the cloud user can make an informed decision with regard to the new cloud service request. | 10-31-2013 |
20130290512 | Network configuration predictive analytics engine - A mechanism associated with a network management system (NMS) interprets and predicts the impact on a network of a network configuration change proactively. By providing pre-configuration analysis in this manner, a network administrator can determine the potential effect of the proposed configuration change in advance of actually inserting a configuration command in the network that might otherwise have unforeseen and damaging consequences. The technique is implemented using a predictive analytics engine that receives a proposed network command and, using a current network topology, executes the command against one or more NMS algorithms to verify that the command can be implemented safely. | 10-31-2013 |
20130290513 | Intelligent Work Load Manager - A management system for processing message-based communications comprising a plurality of servers configured to implement a plurality of sessions that process a plurality of messages, a plurality of message queues coupled to the servers and configured to exchange the messages with the servers, and a workload manager coupled to the servers and the message queues and configured to reallocate the sessions to the different servers and the corresponding message queues to achieve load balance between the servers and the message queues in a recurring manner during processing of the messages by the servers based on a depth of each of the message queues, a quantity of sessions for each of the servers, and a workload manager configuration. | 10-31-2013 |
20130290514 | DYNAMIC INTERSTITIAL TRANSITIONS - Techniques are disclosed for managing streaming content. For example, one method comprises monitoring one or more operating conditions of a communications network configured to provide at least one content stream to one or more communications devices. The method further comprises selecting an interstitial transition for insertion into the content stream based on a length of the interstitial transition, in response to the one or more monitored operating conditions of the communications network, wherein the interstitial transition is selected from a plurality of varied-length interstitial transitions. | 10-31-2013 |
20130290515 | Method and Apparatus for Redirecting Webpage Requests to Appropriate Equivalents - Apparatuses, methods, and computer readable medium, for redirecting a webpage request for a webpage to a webpage request for a more compatible webpage, the method including receiving the webpage request from a user device for the webpage, determining whether a cookie exists for the user device, and if the cookie does not exist, then modifying the received request for the webpage to include a type of the user device, wherein the cookie indicates the type of the user device; retrieving instructions from the requested webpage; and sending a response to the user device to redirect to the more compatible webpage if the type of the user device indicates the user device is more compatible with the more compatible webpage, wherein the sending the response is based on the instructions retrieved from the requested webpage. | 10-31-2013 |
20130290516 | REAL-TIME AND INTERACTIVE COMMUNITY-BASED CONTENT PUBLISHING SYSTEM - A system and method is provided to enable clients to interact with a content resource (e.g., a webpage) in real-time, so that contributions from each client is communicated to the other clients in real-time. | 10-31-2013 |
20130290517 | NAT TRAVERSAL UNDER TCP FOR REAL TIME STREAMING PROTOCOL - The present invention provides an improved RTSP protocol. Concepts and components similar to the SIP proxy server are introduced into conventional RTSP architecture. RTSP proxy server not only can assist RTSP media server under NAT firewall in positioning location and ensure that it can keep the RTSP channel connection but also provide the service about NAT port prediction. Furthermore, a brand new method about TCP traversal through NAT is applied in the improved RTSP in order to solve the peer to peer problem when the client and RTSP media server are both under NAT. | 10-31-2013 |
20130290518 | GINA WorldSpace - A multi-dimensional information access capability, WorldSpace, within a Global Information Network Architecture (GINA) can create a user-definable environment for managing information access within the GINA object-oriented, software-based modeling environment for the modeling of various data sources and allowing queries and transactions across those sources. The modeling environment is described in itself, and is used to describe the model for information access. GINA WorldSpace allows different users to have different views of data sources depending upon their WorldSpace definition, which controls a user's view of the data source. The WorldSpace definition can use the attributes that makes the user unique and map them through GINA vectors to the characteristics of information to which the user has access. Attributes can include username, roles, language, locale, organization, and/or others. WorldSpace views can also impact the behavior of the data sources. | 10-31-2013 |
20130290519 | WRITING AND ANALYZING LOGS IN A DISTRIBUTED INFORMATION SYSTEM - Writing logs in a distributed information system are provided. The logs are related to a transaction instance. A method includes retrieving a log proxy instance from a log server. The log proxy instance includes information related to the transaction instance and information related to currently running component in the transaction instance. The method also includes writing the logs for the transaction instance based on the log proxy instance. Aspects of the present invention further provide a method of facilitating writing logs and analyzing logs. Moreover, the embodiments further provide corresponding apparatuses and system. | 10-31-2013 |
20130290520 | Network configuration predictive analytics engine - A mechanism associated with a network management system (NMS) interprets and predicts the impact on a network of a network configuration change proactively. By providing pre-configuration analysis in this manner, a network administrator can determine the potential effect of the proposed configuration change in advance of actually inserting a configuration command in the network that might otherwise have unforeseen and damaging consequences. The technique is implemented using a predictive analytics engine that receives a proposed network command and, using a current network topology, executes the command against one or more NMS algorithms to verify that the command can be implemented safely. | 10-31-2013 |
20130290521 | METHOD AND SYSTEM FOR ANNOTATING NETWORK FLOW INFORMATION - A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure. | 10-31-2013 |
20130290522 | Engine, System and Method of Locating a Mobile Device and Reporting on Other Devices Proximately Located Thereto - The present invention provides an engine, system and method for providing a method of locating a mobile device and reporting on other devices proximately located thereto. | 10-31-2013 |
20130290523 | INFORMATION PROCESSING APPARATUS AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - There is provided an information processing apparatus, including an acquiring unit that acquires first information representing at least one of a characteristic and a status of delivery data and second information representing at least one of a characteristic and a status of a terminal in which the delivery data is usable, a comparing unit that compares the first information and the second information acquired by the acquiring unit, and determines whether or not the delivery data is usable in the terminal, and a presentation information generating unit that generates information of the delivery data usable in the terminal based on a determination result of the comparing unit as presentation information. | 10-31-2013 |
20130290524 | SYSTEM AND METHOD FOR CLUSTERED TRANSACTIONAL INTEROPERABILITY OF MULTIPLE MESSAGING PROVIDERS USING A SINGLE CONNECTOR MECHANISM - A system has at least one requesting application residing upon a requesting application server, a cluster of processing message servers, a resource adapter in the form of executable code being executed by a processor on a first computer, the resource adapter to receive a request from the requesting application; transmit the request to the cluster of processing message servers; monitor processing of the request on the cluster of processing message servers; handling any exception in the processing of the request; and responding to the requesting application when the processing is complete. The system also includes an interposed transaction manager in the form of executable code being executed by a processor, the interposed transaction manager to receive transactional operations associated with the requests, and providing transaction guarantees related to the transactional operations. | 10-31-2013 |
20130290525 | Service Performance in Communications Network - A method for monitoring performance of a service delivered to user equipment devices via a communications network as perceived by a user comprising the steps of collecting Resource Service Key Performance Indicators from network resources and collecting System Service Key Performance Indicators from a representative sample of reporting user equipment devices using the service. In the next step relationship between the collected values of R-KPIs and S-KPIs is determined and then userr equipment from the representative sample is clustered. In the following step non-reporting user equipment devices are assigned to the clusters and then the method comprises collecting R-KPIs from network resources to estimate S-KPI values based on the R-KPIs collected after determination of the relationship and the relationship. | 10-31-2013 |
20130290526 | NETWORK ASSISTED POWER MANAGEMENT - Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range. | 10-31-2013 |
20130290527 | SYSTEM AND METHOD FOR STATELESS, FAULT TOLERANCE AND LOAD BALANCED DATA COLLECTION USING OVERLAY NAMESPACES - A resource monitoring method may include receiving a request to perform a read operation on an object at a first monitoring node of a plurality of monitoring nodes, and determining whether or not a copy of the object is present in a namespace associated with the first monitoring node. The namespace may include an overlay namespace and a local namespace. The local namespace may identify objects being monitored by the first monitoring node. The overlay namespace may include local viewpoints for other monitoring nodes of the plurality of monitoring nodes. Each local viewpoint may identify one or more objects that are monitored by a respective other monitoring node. The method may further include performing, by the first monitoring node, the read operation on the object if the copy of the object is determined as present in the namespace associated with the first monitoring node. | 10-31-2013 |
20130290528 | SYSTEM AND METHOD FOR STATELESS, FAULT TOLERANCE AND LOAD BALANCED DATA COLLECTION USING OVERLAY NAMESPACES - A resource monitoring method may include determining, at a first monitoring node, a load level for each monitoring node of a plurality of monitoring nodes including the first monitoring node and a second monitoring node based on a namespace associated with the first monitoring node. The namespace may include an overlay namespace and a local namespace. The local namespace may identify objects being monitored by the first monitoring node. The overlay namespace may include local viewpoints for other monitoring nodes of the plurality of monitoring nodes including the second monitoring node. Each local viewpoint may identify one or more objects that are monitored by a respective other monitoring node. The method may further include prohibiting the first monitoring node from instituting a new object creation request if the load level of the second monitoring node is lower than the load level of the first monitoring node. | 10-31-2013 |
20130290529 | LARGE SCALE STORAGE SYSTEM - A distributed storage system comprising: an infrastructure layer including interconnected computer nodes, wherein: each one of the interconnected computer nodes comprising processing resources configured to execute a Unified Distributed Storage Platform (UDSP) agent configured to: receive a task having assignments, calculating grades for assignments such that each grade is indicative of a suitability to execute assignments while meeting at least one Service Level Specification (SLS) requirement. The grade is calculated based on storage related resources parameters data. The task is routed to a more suitable computer node based on the calculated grades. The updated infrastructure layer is created in response to adding interconnected computer nodes and executing assignments of following tasks or routing the following tasks to a more suitable computer node based on the calculated grades. | 10-31-2013 |
20130290530 | ENHANCED DEVICE DISCOVERY TECHNOLOGY - A method for updating information about network devices and/or network services available in a network, the information being stored in a memory, the method including: scanning data packets transmitted on the network, a data packet including at least a destination address field and/or a source address field; evaluating the destination address field and/or the source address field; and updating the information in response to the evaluating. | 10-31-2013 |
20130297767 | AUTOMATED ANALYSIS SYSTEM FOR MODELING ONLINE BUSINESS BEHAVIOR AND DETECTING OUTLIERS - A two-module system is created for automated web activity monitoring. A model is generated and model outliers are identified by the first module of the system. Reports are generated that identify the events based on their significance to the outliers. The model may be automatically and periodically regenerated for different historical time periods of the web sessions. New groups of events may be periodically extracted from new web sessions and applied to the previously generated model by the second module of the system. Model outliers may be identified from the new groups of events. The new events may be analyzed and reported to a web session operator based on their contribution to any identified outliers. Even if no outliers are detected, the new events having a most significant impact on web session operating conditions may be identified and reported in real-time. | 11-07-2013 |
20130297768 | METHOD AND APPARATUS FOR PROVIDING TENANT INFORMATION FOR NETWORK FLOWS - In one embodiment, a method includes generating at a network device comprising a virtual switch, a tenant record comprising tenant information for a context defined within the virtual switch, exporting the tenant record to a collector, monitoring network flow at the virtual switch, and exporting network flow data in a data record to the collector. The data record includes an identifier associating the data record with the context. An apparatus is also disclosed. | 11-07-2013 |
20130297769 | SYSTEM AND METHOD FOR SIMULATING VIRTUAL MACHINE MIGRATION IN A NETWORK ENVIRONMENT - A method includes simulating network resources of a portion of a cloud in a simulated cloud within a enterprise network, the cloud being communicable with the enterprise network over a first communication channel, which may be external to the enterprise network. The method can also include simulating network behavior of the first communication channel in a second communication channel within the enterprise network, and validating application performance in the simulated cloud. Simulating network resources includes providing a cloud resources abstraction layer in the enterprise network, and allocating enterprise network resources in the enterprise network to the simulated cloud by the cloud resources abstraction layer. The method further includes adding a virtual network service appliance to the simulated cloud, and determining a change to a network topology of the enterprise network to accommodate the virtual appliance without materially impacting application performance. | 11-07-2013 |
20130297770 | Intelligent Data Center Cluster Selection - A method and technique for autonomous selection of a Data Center Cluster (DCC) for fulfilling a cloud computing service request, including a technique for grouping data centers (DCs) in a cloud network according to a ranking of eligible DCCs based on selection criteria. In various embodiments, the selection criteria may include a cluster performance metric, a cluster resource equivalence metric, a balance of resource performance metric, a DCC load index, or combination thereof. Other aspects include techniques for computing/determining each of the selection criteria. | 11-07-2013 |
20130297771 | COORDINATED COLLECTION OF METERING DATA - Collection of resource consumption data may be coordinated by designating, for each endpoint in a utility communication network, a single data collector to be responsible for reporting resource consumption data of the respective endpoints to a head-end computing device. If the head-end computing device does not receive resource consumption data from one or more endpoints, the head-end computing device may request the missing resource consumption data from one or more secondary or tertiary data collectors that receive resource consumption data from the one or more endpoints. Additionally, if a data collector is missing resource consumption data from an endpoint during a reporting period, upon receiving resource consumption data from the endpoint during a subsequent reporting period, the data collector may request the missing resource consumption data. | 11-07-2013 |
20130297772 | UNIFIED CLOUD COMPUTING INFRASTRUCTURE TO MANAGE AND DEPLOY PHYSICAL AND VIRTUAL ENVIRONMENTS - A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface. | 11-07-2013 |
20130297773 | UNIFIED CLOUD COMPUTING INFRASTRUCTURE TO MANAGE AND DEPLOY PHYSICAL AND VIRTUAL ENVIRONMENTS - A method, system and computer program product for managing and deploying physical and virtual environments across multiple hardware platforms. A single unit, referred to herein as a cloud construction block, contains both the hardware and software components used to build a cloud computing environment. By having such a single unit contain both the hardware and software components needed to build a cloud computing environment, the user no longer needs to purchase and integrate different hardware and software components. Furthermore, the cloud construction block contains modular pieces of hardware, such as compute hardware, memory hardware, storage hardware and network hardware, that are integrated with management software configured to manage both the hardware and the cloud computing environment in a seamlessly integrated package. Since there is a single management system, the management software allows the user to manage the modular pieces of hardware via a single user interface. | 11-07-2013 |
20130297774 | AVOIDING DELAYED DATA - Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain characteristic, transmits the packet only if the sending queue has authority to send packets having that characteristic. The data packet characteristics can include transport protocol number, source and destination port numbers, source and destination IP addresses, for example. Authorizations can be programmed into the NIC by a kernel routine upon establishment of the transmit queue, based on the privilege level of the process for which the queue is being established. In this way, a user process can use an untrusted user-level protocol stack to initiate data transmission onto the network, while the NIC protects the remainder of the system or network from certain kinds of compromise. | 11-07-2013 |
20130297775 | PERSIST AND PROCESS ANALYTICS DATA DIMENSIONS FOR SERVER-SIDE SESSIONIZATION - The subject technology provides configurations for propagating information from an initial analytics tracking data communication to subsequent analytics tracking data communications at an analytics server. In one example, the subject technology receives an analytics tracking data communication. The subject technology determines if the received analytics tracking data communication includes state changing information based on analytics tracking data included in the analytics tracking data communication. The subject technology then determines one or more attributes for propagating to subsequent analytics tracking data if the analytics tracking data communication includes state changing information. The state changing information are stored as one or more of the determined one or more attributes. The subject technology stores the analytics tracking data including the determined one or more attributes. | 11-07-2013 |
20130297776 | TECHNIQUES FOR DELAY PROCESSING TO SUPPORT OFFLINE HITS - The subject technology provides configurations for processing late and/or out-of-order analytics tracking data communications. An analytics tracking data communication is received. The subject technology determines a timestamp included in the analytics tracking data from the received analytics tracking data communication. The subject technology determines a session based on the determined new state changing information. The subject technology determines other analytics tracking data included in the analytics tracking data communication to associate with the determined new state changing information in the determined session if new state changing information is included in the analytics tracking data from the received analytics tracking data communication. The analytics tracking data and the other analytics tracking data associated with the new campaign information is then stored. | 11-07-2013 |
20130297777 | SERVER-SIDE CONFIGURATION DRIVEN SESSIONIZATION TO PROVIDE CONSISTENT BUSINESS LOGIC - The subject technology provides configurations for determining resource configuration information for applying to analytics tracking data. Resource information is determined based on analytics tracking data from an analytics tracking data communication in which the resource information includes a corresponding resource associated with a source, and the analytics tracking data includes data for tracking an activity associated with the source. The subject technology determines resource configuration information based on the determined resource information in which the resource configuration information includes one or more attributes associated with the corresponding resource. One or more attributes are then applied from the determined resource configuration information to the analytics tracking data. | 11-07-2013 |
20130297778 | SYSTEM FOR CENTRALIZED ANALYTICS TRACKING VIA SERVER-SIDE SESSIONIZATION - The subject technology provides a session associated with web site or application traffic data. An analytics tracking data communication is received. The subject technology determines analytics tracking data from the received analytics tracking data communication in which the analytics tracking data includes data for tracking an activity associated with a web site or application and includes visitor information. A new session associated with the analytics tracking data is created if it is determined that the activity is associated with an initial visit of a unique visitor corresponding to the visitor information. The subject technology determines campaign information for populating the new session associated with the analytics tracking data. The analytics tracking data including the determined campaign information is then stored. | 11-07-2013 |
20130297779 | ELECTRONIC DEVICE AND METHOD FOR DETECTING NETWORK CONNECTION BETWEEN THE ELECTRONIC DEVICE AND NETWORK - In a method for detecting a network connection between an electronic device and a network, the method firstly records in real time busy time periods and idle time periods of the network connection. Secondly, the method adjusts a detection frequency of a current time period to meet a need of the current time period, and computes all of the network detection time. At last, the method detects the network connection when a current time is same as the network detection time, and builds a new network connection between an electronic device and a network when the network connection between the electronic device and the network is disconnected. | 11-07-2013 |
20130297780 | Method and System for Data Transmission - Embodiments as disclosed provided methods or systems for sending data over a network. Specifically, in certain embodiments, data is received and a datagram comprising at least a portion of the data can be created and sent to a terminal. Control data can be received from the terminal and the sending of the data to the terminal adjusted based on the received control data. In certain embodiments both the datagram and the control data may be sent over an unreliable protocol. Thus, embodiments as disclosed may provide an increased level of reliability and adaptability to differing network conditions in conjunction with the use of an unreliable protocol. | 11-07-2013 |
20130297781 | Methods and Apparatus for Tuning a Network for Optimal Performance - In exemplary implementations of this invention, one or more computer processors receive electronic data indicative of, or compute (i) at least three different topologies of a network and (ii) a level of network performance of a task for each of the different topologies, respectively. The processors also calculate (i) a cascade probability for each of the different topologies, respectively, (ii) a curve indicative of correlation between the cascade probabilities and levels of network performance, and (iii) an optimal cascade probability which optimizes the level of network performance. A topological change in the network is produced (or its likelihood is increased). The topological change makes or would make the cascade probability closer to the optimal cascade probability. The processors output control signals (i) to make the topological change or (ii) to communicate an incentive for the topological change to an electronic node device in the network. | 11-07-2013 |
20130297782 | REGION IDENTIFICATION SERVER, REGION IDENTIFICATION METHOD, REGION IDENTIFICATION PROGRAM, AND COMPUTER READABLE RECORDING MEDIUM STORING THE PROGRAM - A content server ( | 11-07-2013 |
20130297783 | NETWORK - In a having a plurality of levels, each level has at least one information node; a number of information nodes of a lower k+1-th level are assigned to an information node of a k-th level configured thereabove and linked to this one information node; one information node of the lower k+1-th level is designed to inform the information node of the k-th level configured thereabove, which pieces of information the information node of the k+1-th level needs, and which pieces of information the information node of the k+1-th level is making available. | 11-07-2013 |
20130297784 | METHOD AND SYSTEM FOR DATA PACKET QUEUE RECOVERY - Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead. | 11-07-2013 |
20130297785 | USER STATUS ANALYZING METHOD AND APPARATUS USING ACTIVITY HISTORY - A user status analyzing apparatus including an activity history acquiring module configured to acquire, in a form of activity history time series data, activity history information in which a user activity is written through a home network to which a plurality of sensor devices is connected; an activity history storage configured to store the plurality of activity history time series data obtained by the activity history acquiring module; and an activity history analyzing module configured to analyze a user status depending on a correlation and characteristics perceived on a basis of the plurality of activity history time series data stored in the activity history storage. | 11-07-2013 |
20130297786 | CLASSIFIED MEDIA QUALITY OF EXPERIENCE - A method for reporting a streaming quality is shown, wherein at least one continuous media stream is streamed to a client ( | 11-07-2013 |
20130297787 | Method And System For Managing Network Power Policy And Configuration Of Data Center Bridging - Certain aspects of a method and system for managing network power policy and configuration of data center bridging may include a network domain that comprises a single logical point of management (LPM) that coordinates operation of one or more devices, such as network interface controllers (NICs), switches, and/or servers in the network domain: The single LPM may be operable to manage one or both of a network power policy and/or a data center bridging (DCB) configuration policy for the network domain. | 11-07-2013 |
20130297788 | COMPUTER SYSTEM AND DATA MANAGEMENT METHOD - In a computer system, plural computers perform an analysis processing of a data set including plural data configured by a key and a data value. Each of the computers retains division information which manages a division position key indicating a division position of a division area obtained by dividing the data set for every predetermined key range, for every data set, all division position keys included in the division information of each of the data sets are the same. When a new data set is stored in the file system, the computer system determines whether there is a target area which is the division area having a data size larger than a predetermined threshold value, based on a data size of each of the division areas after storing the new data set, and if the target area is present, it divides the target area into plural new division areas. | 11-07-2013 |
20130297789 | METHOD FOR REGISTERING AND PROVIDING NOTICE OF A TRAP EVENT, AND TERMINAL USING SAME - Provided is a method for notifying a trap to other functional components. The method includes receiving a trap register request from a server, wherein the trap register request includes a target identifier; checking whether the server has a permission to execute an executable node indicated by the target identifier; registering a trap if the server has the permission to execute the executable node, wherein the trap includes a trap event and is associated with a server identifier and a trap identifier; detecting the trap; checking whether a server identified by the server identifier has the permission to execute the executable node; and notifying the executable node of the trap if the server identified by the server identifier has the permission execute the executable node. | 11-07-2013 |
20130297790 | NETWORK SYSTEM, CONTROL UNIT AND OPTIMAL ROUTE CONTROLLING METHOD - In a central control-type network system, a flexible network control is carried out to improve operability and performance of the network. Specifically, in a network system which carries out a central control to a communication route, an optimal route is selected in consideration of a load situation of network equipments, a load situation of server equipments, and a load situation of applications. A control unit, which carries out the central control to all the equipments of a system such as a network and a server, calculates an optimal route and sets a communication route to the network equipments. Also, the optimal route is determined in consideration of a congestion situation of the network equipments and the load situation of the server equipments and the applications. Moreover, the optimal route is determined in consideration of a phenomenon which could occur in the future from a past congestion situation and a past load situation in addition to a current situation. | 11-07-2013 |
20130297791 | Method of and Device For Service Monitoring and Service Monitoring Management - The invention relates to a method of and device for service monitoring and a method of and device for service monitoring management. In particular the invention relates to a method of and device for service monitoring wherein terminal operation information is monitored to determine the occurrence of session events of each of a plurality of stages of a user service session. Values for service monitoring metrics | 11-07-2013 |
20130304896 | TRIGGER-BASED DATA COLLECTION SYSTEM - A system for collecting and communicating data associated with at least one of a plurality of machines includes a sensor. The sensor is configured to monitor an operational condition of the at least one associated machine and provide signals indicative of the operational condition. The system includes at least one local data system, including a processor, associated with the machine and configured to receive signals from the sensor, detect an event affecting the at least one machine based on the signals received from the sensor, and communicate data relevant to the detected event to a location remote from the at least one machine. A central data system including a processor and configured to receive the data relevant to the detected event and communicate with other machines of the plurality of much such that the other machines communicate data relevant to the detected event to the central data system is included. | 11-14-2013 |
20130304897 | METHOD AND SYSTEM FOR PROACTIVELY PROVIDING TROUBLESHOOTING INFORMATION - An approach is provided for collecting a plurality of life cycle events relating to one or more customer premise devices associated with a user account, the user account, or the combination thereof, analyzing the plurality of life cycle events to determine a potential service issue with the one or more customer premise devices, the user account, or the combination thereof, and generating a notification based on the analysis to proactively provide troubleshooting to resolve the potential service issue. | 11-14-2013 |
20130304898 | METHOD FOR PROXIMITY DETERMINATION BETWEEN MOBILE PEERS WHILE MAINTAINING PRIVACY - This disclosure describes systems, methods, and apparatus for determining proximity between networked devices without requiring those devices to share location information either because of privacy or because such information cannot be obtained. To do this, access points for a plurality of networked devices are compared, and those devices detecting, or detected by, the same access points are deemed proximal to each other. Software, or features of software, can be initiated on those networked devices that are proximal to other networked devices and the proximal networked devices can be given information enabling them to identify and communicate with each other. | 11-14-2013 |
20130304899 | VIRTUAL MACHINE ALLOCATION AT PHYSICAL RESOURCES - Communications between virtual machines are monitored to identify virtual machines that have an affinity with each other, such as where the virtual machines have greater than a threshold of communication between each other. An affinity table tracks virtual machines having an affinity relationship and is referenced upon start-up or migration of a virtual machine so that a starting-up or migrating virtual machine will run on the same processing resource as virtual machines with which it has an affinity relationship. | 11-14-2013 |
20130304900 | REPUTATION MANAGEMENT USING EVOLVING REPUTATION SCORES - An evidence monitor may monitor interactions between at least one service provider and at least one service consumer during a time period. The evidence monitor may receive negative feedback from the at least one service consumer regarding a corresponding interaction of the interactions. A reputation engine may increase a reputation score of the at least one service provider during the time period in accordance with a growth rate, as the interactions occur during the time period. The reputation engine may also decrease the reputation score of the at least one service provider in response to the negative feedback and in accordance with a negative feedback response characteristic. | 11-14-2013 |
20130304901 | AUTOMATED INTEGRATION OF DISPARATE SYSTEM MANAGEMENT TOOLS - Control over servers and partitions within a computer network may be automated to improve response to disaster events within the computer network. For example, a monitoring server may be configured to automatically monitor servers through remote communications sessions. A disaster event may be detected based on information received from the partitions and servers within the network. The monitoring server may monitor system of different types and/or configurations. For example, a first server monitored by the monitoring server may be different type of server than the second server. Each of the servers may be monitored through a remote communications session, such as a telnet session. In addition to monitoring the servers, the monitoring server may remotely manage the servers of different types. | 11-14-2013 |
20130304902 | Cooperative Proxy Auto-Discovery and Connection Interception - In a network supporting transactions between clients and servers and proxies that are interposable in a network path, a pair of proxies can modify a packet stream such that packet data from client to server is transformed at a client-side proxy of the pair and untransformed at a server-side of the pair and packet data from server to client is transformed at the server-side proxy and untransformed at the client-side proxy. A discovering proxy transparently discovers its position in a proxy pair by using proxy signals. A discovering proxy might determine that it is a client-side proxy by receipt of a packet from client without a proxy signal, or that it is a server-side proxy by receipt of a packet from server without a return proxy signal. Once a proxy pair is discovered, it might transform traffic from server to client or vice versa, transforming and untransforming the traffic. | 11-14-2013 |
20130304903 | Market-Based Virtual Machine Allocation - A cloud computing system management system including a plurality of computing devices configured to host virtual machine instances, each computing device in the plurality of computing devices including a local agent that continuously evaluates the observed load relative to a utility maximization function. If observed load is higher than a calculated optimal level, individual loading processes are offered for “sale” via a market scheduler. If observed load is lower than a calculated optimal level, then available capacity is offered as a bid via the market scheduler. The market scheduler matches bids with available processes and coordinates the transfer of load from the selling device to the buying device. The offered prices and utility maximization functions can be employed to optimize the performance of the cloud system as a whole. | 11-14-2013 |
20130304904 | SYSTEMS AND METHODS FOR METRIC-BASED CLOUD MANAGEMENT - Systems and methods for a cloud management system which utilizes both technical and business metrics to achieve operational efficiencies. The systems and methods can be used to provide an elastic infrastructure model for an emergency notifications system which delivers near infinite scale with guaranteed near 100% uptime. In an embodiment, a mass recipient emulator can be utilized for testing of the notifications system with actual phone call or message exchange. | 11-14-2013 |
20130304905 | SYSTEM AND METHOD FOR IMPROVED END-USER EXPERIENCE BY PROACTIVE MANAGEMENT OF AN ENTERPRISE NETWORK - A method for improved end-user experience in an enterprise network is disclosed. In one embodiment, key performance indicators (KPIs) of network devices, applications and input services are determined. Further, KPIs of base services are determined using the KPIs of network devices, applications and input services. Furthermore, the KPIs are compared with KPI threshold levels and KPI level alerts are generated. Moreover, key quality indicators (KQIs) of base services are determined using the KPIs. Also, the KQIs are compared with KQI threshold levels and KQI level alerts are generated. Further, a composite service quality (CSQ) index of a composite service is computed using the KQIs. Furthermore, the CSQ index is compared with CSQ index threshold levels and a CSQ level alert is generated. In addition, possible problem conditions are detected and then possible problem scenarios are determined and analyzed. Also, actionable items are identified based on the possible problem scenarios. | 11-14-2013 |
20130304906 | METHOD AND SYSTEM FOR MONITORING AND TRACKING BROWSING ACTIVITY ON HANDLED DEVICES - A method for monitoring and tracking browsing activity of a user on a client device is provided. The method comprises receiving, from the client device, browsing activity information of a user interacting with at least a page displayed over the client device, wherein the client device is at least a handheld device having a touch screen display; receiving, from the client device, page information identifying in part the page displayed over the client device; and generating based on the browsing activity information and the page information an exposure map at a page view level, wherein the exposure map indicates a salience of each area of a page-view respective of the page displayed over the client device and visited by the user. | 11-14-2013 |
20130304907 | Dynamically Determining How Many Network Packets to Process - A packet quota value, which indicates a maximum number of network packets that a network appliance processes before switching to a different task, is modified. Log data, which includes multiple log entries spanning a time interval, is accessed. Each log entry includes a processing time that indicates how much time the network appliance spent performing network traffic tasks before switching to the different task. The log data is analyzed. Responsive to the analysis indicating that a current state of network traffic is heavier than a maximum state of network traffic that was observed during the time interval, the packet quota value is increased. Responsive to the analysis indicating that the current state of network traffic is lighter than a minimum state of network traffic that was observed during the time interval, the packet quota value is decreased. | 11-14-2013 |
20130304908 | SYSTEM AND METHOD FOR SUPPORTING PERSISTENT SECURE MANAGEMENT KEY (M_KEY) IN A NETWORK ENVIRONMENT - A system and method can support security management in a network environment. A switch in the network environment includes a switch chip, which is configured with a secure management key (M_Key) prior to one or more external links becoming operational. Furthermore, a local daemon in the switch can monitor the secure M_key on the switch chip, and persistently store a current M_key used by a local subnet manager (SM). The current M_key is a state that is dynamically updated in a fabric in the network environment. | 11-14-2013 |
20130304909 | SYSTEM AND METHOD FOR ENSURING SUBSCRIBER FAIRNESS USING OUTLIER DETECTION - Various embodiments of the present invention relating to a subscriber fairness solution are disclosed. The subscriber fairness solution contemplates a variety of improved techniques for using a flow-based statistical collection mechanism to monitor subscriber usage across various attributes (e.g., subscriber byte count, flow count, etc.) and maintain subscriber usage information for different time frames. In embodiments, the subscriber fairness solution includes a detection phase and a mitigation phase. In the detection phase, “outliers,” or subscribers who are using more than their fair share of network resources, are identified. In the mitigation phase, appropriate action is taken to resolve the constraints on the network resources, caused by these outliers. The subscriber fairness solution may be embodied in hardware, software, or a composite approach of both hardware and software. | 11-14-2013 |
20130304910 | METHOD AND SYSTEM FOR GENERATING AND PROVIDING DATA ALERTS - Methods and systems for providing alerts to users of data aggregation systems. Alerts are generated when data usage patterns relating to data items of interest exceed a threshold level. Alerts can be provided in real-time or at intervals, via alerts or other notification methods. Alerts can be based on individual data items or correlations of data items, where the data items can be provided by local or external sources. | 11-14-2013 |
20130304911 | SUPPLYING NOTIFICATIONS RELATED TO SUPPLY AND CONSUMPTION OF USER CONTEXT DATA - Techniques are described for providing information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a module a request related to the modeling of the current state with the multiple state attributes. In such situations, the providing further includes, without further intervention related to the request by the module, determining that the request cannot currently be satisfied, and indicating to the module that the request cannot currently be satisfied, monitoring at later times after the indicating to determine whether the request can be satisfied, and indicating to the module that the request can be satisfied if it is determined at one of the later times that the request can currently be satisfied. | 11-14-2013 |
20130304912 | ENTERPRISE SERVICE BUS DEPLOYMENT AT THE LEVEL OF INDIVIDUAL SERVICES - A method and system for automatic ESB deployment at the level of individual services is described. In one method, a load balancer repeatedly monitors performance of individual services installed on ESB nodes. The performance is measured in view of utilization metrics of the individual services. The load balancer periodically determines whether the performance of one or more of the individual services falls below a performance threshold and deploys duplicate services for the one or more of the individual services that falls below the performance threshold at one or more additional ESB nodes without user intervention in response to the periodically determining. | 11-14-2013 |
20130304913 | Programmable Presence Proxy for Determining a Presence Status of a User - A method and apparatus are provided that evaluate a number of different sources of presence information to determine a presence status of a user. The presence status of a user is determined by obtaining presence information from a plurality of presence data stores; translating the obtained presence information from at least one of the presence data stores into a standard format; and determining the presence status of the user based on the obtained presence information. Presence information can also be based on user-specified rules. Presence information is obtained from a number of presence data stores and the presence status of a user is determined based on one or more rules that are applied to the obtained presence information. The rules may include, for example, aggregation rules that determines the presence status based on one or more of the obtained presence information or filter rules that determine who may receive the presence status. | 11-14-2013 |
20130304914 | Topology Aware Content Delivery Network - A method of assigning a server to a client system includes determining an ingress point of the client system and identifying possible egress points for the client system. The method further includes selecting the server from a plurality of servers to reduce network cost and delivery time. | 11-14-2013 |
20130304915 | NETWORK SYSTEM, CONTROLLER, SWITCH AND TRAFFIC MONITORING METHOD - Fine traffic monitoring is achieved in a network in which sFlow and OpenFlow are combined. Specifically, flow identifiers (flow IDs) for identifying flows (or groups of packets) are prepared, and the flow identifiers are stored in entries of flow tables to allow sFlow agents to specify the flow identifiers as data sources. Specifically, the flow identifiers are stored in cookies of entries registered in flow tables of switches from a controller, and operations are performed for received packets matching the rules of the entries in accordance with the actions defined in the entries. In the switches, the flow identifiers specified as data sources in the MIBs used in sFlow are obtained and statistic information of packets matching the entries is obtained on the basis of the flow identifiers. | 11-14-2013 |
20130304916 | APPARATUS AND METHOD FOR TRANSMITTING LIVE MEDIA CONTENT - The present invention is directed to a method and an apparatus for sending live streams to regular HTTP clients. An incoming live media stream is segmented into segment files. A segment list is used to maintain the logical representation of the segment segment files so that they look like one continuous file. Each segment file is sent to the client through regular HTTP protocol once it is available. Old segment files can be deleted to save storage space and reduce management overhead. | 11-14-2013 |
20130311637 | OVERLAY TUNNEL INFORMATION EXCHANGE PROTOCOL - In one embodiment, a system includes logic adapted for receiving, at a first end point station, an information exchange packet from each end point station in a virtual network having a specified virtual network identifier (VNID) and logic adapted for processing each received information exchange packet to retrieve information about connections at each end point station in the virtual network having the specified VNID, wherein each end point station either terminates or originates a tunnel shared by the first end point station in an overlay network. In this way, the information may be used to respond to address resolution protocol (ARP) requests sent locally in lieu of flooding the ARP request. Other systems, methods, and computer program products are also presented regarding the overlay tunnel information exchange protocol, according to various embodiments. | 11-21-2013 |
20130311638 | Reducing Metadata Controller Communication Volume - Apparatus, methods, and other embodiments associated with reducing metadata controller communication volume are described. One example apparatus produces tracking data by tracking metadata controller communications and then controls which of two different types of metadata controller communication message types are used for metadata controller communications based, at least in part, on the tracking data. One message type provides actual state and/or location information about a metadata controller. A second message type provides only information about the state and/or location information available at a metadata controller. Selectively using the second message type facilitates reducing metadata controller communication volume. | 11-21-2013 |
20130311639 | Event Precedence and Exclusivity in Computer Systems - One embodiment of a method of the present invention provides for obtaining from one or more event generators a first event for one or more hosting accounts and a second event for the one or more hosting accounts, determining whether the first event for the one or more hosting accounts requires a first event execution exclusivity, determining whether the second event for the one or more hosting accounts requires a second event execution exclusivity, and executing the first event and the second event sequentially if the first event requires the first event execution exclusivity or the second event requires the second event execution exclusivity, or parallel if the first event does not require the first event execution exclusivity and the second event does not require the second event execution exclusivity. | 11-21-2013 |
20130311640 | METHOD FOR DYNAMICALLY CONTROLLING DATA PATHS, MTC GATEWAY AND NETWORK DEVICE USING THE SAME - Method for dynamically controlling data paths of Machine-type-communication (MTC) local access device(s) are proposed along with a MTC gateway and a network device using the same method. In one embodiment, the proposed method may include following: a network device, receiving and storing capillary network information and MTC gateway interconnection information from at least one MTC server; combining the access network information with the capillary network information and the MTC gateway interconnection information to build an aggregated topology map; generating enhanced policy rules according to the aggregated topology map related to at least one capillary network; and respectively transmitting the enhanced policy rules to the interconnected MTC gateways. | 11-21-2013 |
20130311641 | TRAFFIC EVENT DATA SOURCE IDENTIFICATION, DATA COLLECTION AND DATA STORAGE - Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database. | 11-21-2013 |
20130311642 | AUTOMATED DISCOVERY OF TEMPLATE PATTERNS BASED ON RECEIVED SERVER REQUESTS - Described herein are methods for determining patterns based on requests received by a server. Based on the determined patterns, insight into the types of requests received by the server can be gained. Additionally, performance statistics and query statistics can be aggregated in a useful way. For example, performance statistics may be summarized for each determined pattern. One technique for determining patterns includes determining a sequence of template identifiers identifying templates that correspond to sub-sequences of requests in a sequence of server requests. A model may be created based on the sequence of template identifiers. Based on the model, template patterns may be determined. Template patterns may further be grouped into pattern clusters. | 11-21-2013 |
20130311643 | SYSTEM AND METHOD FOR LATENCY REDUCTION IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment that includes identifying a foreground flow that has a higher priority than at least one background traffic flow in a network. The method also includes determining (e.g., periodically) a latency metric associated with the foreground flow, and activating a latency reduction response if the latency metric exceeds a threshold. In more particular embodiments, the latency reduction response may include diverting background flows in the network to a buffer for a delay period and/or delaying acknowledgements for background flows until the latency metric is below the threshold. In yet more particular embodiments, the latency metric may be a round-trip time. | 11-21-2013 |
20130311644 | MANAGING A SERVICE CATALOG THROUGH CROWDSOURCING - A method, system, and computer program product for managing a plurality of services in a service catalog. Metadata is received about one or more services. The metadata is analyzed to determine whether to perform a management activity on the service catalog, the management activity including recommending one or more services in the service catalog or coupling two or more services in the service catalog. If it is determined that the received metadata is insufficient, a signal is generated to gather additional metadata within a time period the metadata is determined to be insufficient. | 11-21-2013 |
20130311645 | MANAGEMENT SYSTEM AND MANAGEMENT METHOD - A management system outputs catalog data, which has been created based on catalog-source data comprising data showing at least an application of a relevant resource with respect to each of multiple providable resources, and which shows the respective applications of the multiple resources, and receives a selection of a resource to be provided from the multiple resources. The management system provides the selected resource as a provided resource, and determines, based on a performance threshold configured with respect to the application of the provided resource, whether or not a performance measurement value, which relates to the processing performance of a network service using the provided resource and which can be monitored by the management system, is normal. | 11-21-2013 |
20130311646 | MANAGEMENT METHOD AND MANAGEMENT SYSTEM - The management system identifies a first event regarding a first node apparatus estimated to occur when a first maintenance work is performed on a first node apparatus based on maintenance work information that indicates a correspondence relationship between each maintenance work of one or more maintenance works for any of the plurality of node apparatuses and an event regarding a node apparatus to be the target of each maintenance work, which is estimated to occur when the maintenance work is performed. The management system identifies the range of effect and phenomenon of the case where the first maintenance work is performed on the first node apparatus, by performing simulation based on one or more rules indicating a correspondence relationship between one or more conditional events and a causal event and displays the identified range of effect and phenomenon. | 11-21-2013 |
20130311647 | CENTRAL CONTROL VERIFYING APPARATUS, CENTRAL CONTROL VERIFICATION PROGRAM, AND CENTRAL CONTROL VERIFYING METHOD - A central control verifying apparatus includes a plurality of quasi switches respectively corresponding to a plurality of switches in a network; a connection data managing section which manages connection data between the plurality of switches; and a verifying section. Each of the plurality of quasi switches is communicably connected with the network central control section through a control link. A requesting quasi switch of the plurality of quasi switch transmits a route setting request to the network central control section. A target quasi switch of the plurality of quasi switches receives the route indication data generated in response to the route setting request from the network central control section. The verifying section refers to the connection data and the route indication data received by the target quasi switch to verify whether or not a desired route setting is performed according to the route setting request by the network central control section. | 11-21-2013 |
20130311648 | Probing-Based Auto Moding - A method for selecting a mode of operation for at least two modems is described. First, a handshake procedure is performed in order to determine a set of possible modes of operation supported by said modems. From said set of possible modes of operation, a set of favorable modes of operation is derived. In case there exist two or more favorable modes of operation, a probing-based selection is performed that comprises evaluating respective performances of said favorable modes of operation. The favorable mode of operation with the best performance is selected as a resultant mode of operation. | 11-21-2013 |
20130311649 | INTERNET CONNECTED HOUSEHOLD IDENTIFICATION FOR ONLINE MEASUREMENT & DYNAMIC CONTENT DELIVERY - A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol (IP) address is received at an Internet entity. Determinations are made regarding whether the IP address belongs to an Internet Service Provider (ISP) that provides residential internet service, whether device activity from the IP address does not exceed a defined activity threshold, and whether an IP assignment age for the IP address is greater than a defined threshold age. Based on the determinations, the IP address can be identified as belonging to an ICH or not. | 11-21-2013 |
20130311650 | MANAGING ALLOCATION OF COMPUTING CAPACITY - Systems and methods are described for managing requests for computing capacity from a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. In some implementations, user requests are probabilistically denied or granted while some computing resources are still available. By denying some requests or granting only some, the rate of computing resource usage can be reduced, thus preserving some capacity for a longer period of time. In one embodiment, the capacity can be provided to clients based on client priority, provided to clients with reserved resources, provided to clients probabilistically, sold on a spot market, or allocated in some other fashion. | 11-21-2013 |
20130311651 | EVALUATION OF PERFORMANCE OF SOFTWARE APPLICATIONS - A method and system for evaluating performance of software applications of different web sites. Steps in a first software application of a first web site are mapped to respective similar-function steps in a second software application of a second web site. The mapping for each step in the first software application includes associating both each step in the first software application and the respective similar-function step in the second software with a respective task. Measures of performance of each mapped step in the first software application and measures of performance of the respective similar-function steps and of other steps in the second software application are determined and included in a report. A measure of performance of the first software application and a measure of performance of the second software application are included in the report. | 11-21-2013 |
20130311652 | DELIVERY PERFORMANCE ANALYSIS FOR INTERNET SERVICES - One preferred embodiment of the present invention provides systems and methods for analyzing the delivery performance of newsgroup services. Briefly described, in architecture, one embodiment, among others, includes a newsgroup evaluation system configured to determine a delivery rate for a newsgroup server. In other embodiments, methods and systems are provided for analyzing completion and retention for newsgroup services. | 11-21-2013 |
20130311653 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 11-21-2013 |
20130311654 | Internet Service Control Method, and Relevant Device and System - An Internet service control method, and a relevant device and system are disclosed. An Internet service control method is applied to a terminal device deployed with an Internet service client, where the method includes: monitoring a type of a message which the Internet service client is ready to send to an application server through an air interface; and when monitoring that the sent message is a heartbeat message or polling message, intercepting the heartbeat message or polling message, where the application server is configured to process a service corresponding to the Internet service client, the application server further communicates with a second service proxy function entity through a second communication channel, the second communication channel includes no air interface channel, and the second service proxy function entity proxies the Internet service client to send the heartbeat message or polling message to the application server. | 11-21-2013 |
20130311655 | SYSTEMS AND METHODS FOR COLLECTING AND STORING NETWORK TRAFFIC DATA - Systems and methods are disclosed for collecting network traffic logs at a plurality of network sites, such as DNS name servers and network routers, and transmitting data extracted from the network traffic logs to a central repository. In one implementation, a system includes a processor and a memory. The memory stores instructions that cause the processor to retrieve PCAP files from a plurality of servers and extract data from the PCAP files. The data comprises header data and digest data. The processor stores the header data and the digest data in a header/digest pair. In another aspect, the processor retrieves a sample of the PCAP files from each of the plurality of servers rather than retrieving all PCAP files. | 11-21-2013 |
20130311656 | NETWORKING DEVICE ADAPTED FOR USE AS A GATEWAY FOR A LOCAL NETWORK, AND ASSOCIATED METHOD - A networking device for use as a gateway for a local network is configured to be remotely managed by a remote management protocol. The networking device includes a controller configured to detect whether the networking device is taking part in a remote management protocol session, and an indicator configured to indicate whether the networking device is taking part in a remote management protocol session, being controlled by the controller. | 11-21-2013 |
20130311657 | METHOD OF SELECTING A COMPOSITE SERVICE FROM A PLURALITY OF COMPOSITE SERVICES - Method, for use in a telecommunications network, of selecting from a plurality of composite services a composite service to be executed in response to a network event. Each composite service has associated therewith criteria including a Boolean expression determining whether or not the composite service may be executed in response to the network event. The method comprises composing, for the network event, for each composite service an indicator indicating a) whether or not the criteria for that composite service are met by the network event, and b) a measure of conformity of the network event with said criteria. The method further includes selecting the composite service having associated therewith the indicator indicating that the criteria are met, and indicating closest conformity. | 11-21-2013 |
20130318227 | PAGE PHASE TIME - A method of measuring load time for a web page includes video recording a duration of the web page load including capturing N frames in a series of frames | 11-28-2013 |
20130318228 | Fabric Distributed Resource Scheduling - Embodiments perform centralized input/output (I/O) path selection for hosts accessing storage devices in distributed resource sharing environments. The path selection accommodates loads along the paths through the fabric and at the storage devices. Topology changes may also be identified and automatically initiated. Some embodiments contemplate the hosts executing a plurality of virtual machines (VMs) accessing logical unit numbers (LUNs) in a storage area network (SAN). | 11-28-2013 |
20130318229 | METHOD AND SYSTEM FOR NAME SPACE PROPAGATION AND FILE CACHING TO REMOTE NODES IN A STORAGE SYSTEM - Systems and methods efficiently distribute information, such as path name, attributes and object information, corresponding to changes in a content repository to remote nodes in a network using storage-layer/object-based protocols. A difference monitoring client monitors name space and object space changes by identifying inodes which have been modified on storage volumes between two or more snapshots. The monitoring client builds a list which may include name information, object space information and attributes such as file size and permissions for each of the changed inodes that is utilized to update the edge nodes. Systems and methods also provide for geo-scale content distribution from a central repository to edge nodes using a storage-layer/object protocol. A caching mechanism is utilized to cache requested content at an edge node. Cached content may be maintained at the edge node during use and/or for an additional predetermined period. Difference monitoring client may track such cached content. | 11-28-2013 |
20130318230 | STANDBY AGENT APPARATUS FOR KEEPING ACCOUNT OF CLIENT SYSTEM ON-LINE IN APPLICATION SERVER WHEN CLIENT SYSTEM IS OPERATING IN STANDBY MODE AND RELATED CONNECTION HANDLING METHOD THEREOF - A standby agent apparatus includes an interface and a standby agent controller. The interface is arranged for receiving at least first account information of a first system. The standby agent controller is coupled to the interface. When the first system is operating in a standby mode, the standby agent controller is arranged for keeping an account of the first system on-line in a first application server according to the received first account information of the first system. A connection handling method includes the following steps: receiving first account information of a first system; and when the first system is operating in a standby mode, keeping an account of the first system on-line in a first application server according to the received first account information of the first system. | 11-28-2013 |
20130318231 | PREMISES MANAGEMENT NETWORKING - Some embodiments of a method for premises management networking include monitoring premises management devices connected to a gateway at a premises; controlling premises management devices connected to the gateway at the premises; receiving, at the premises, an uplink-initiation signal associated with a network operations center server; and in response to the uplink-initiation signal, initiating, from the gateway at the premises, communications between the gateway and the network operations center server; and communicating, during the communications between the gateway and the network operations center server, information associated with the premises management devices. | 11-28-2013 |
20130318232 | SYSTEMS AND METHODS FOR PROVIDING DYNAMIC CONNECTION SPILLOVER AMONG VIRTUAL SERVERS - A method for an appliance to switch handling of transport layer connection requests from a first virtual server of the appliance managing a first plurality of services to a second virtual server of the appliance managing a second plurality of services upon exceeding, by the first virtual server, a maximum connection threshold determined dynamically from a status of the first plurality of services The appliance establishes a predetermined threshold identifying a maximum active transport layer connection capacity for the first virtual server that comprising a sum of a predetermined connection capacity for each of the plurality of services. The appliance determines via monitoring that the status of a service of the plurality of services indicates the service is not available and adjusts the predetermined threshold to comprise the sum of the predetermined connection capacity for each of the plurality of services having a status of available. | 11-28-2013 |
20130318233 | SYSTEM AND METHOD FOR REMOTE MONITORING AND CONTROL OF NETWORK DEVICES - A managed network provides unique network addresses that are assigned to nodes such that no two nodes will have the same address in the managed network and such that each node will always have the same network address regardless of changing its location or changing the network to which it is joined. The nodes, communicating together, comprise a mesh network. Remote management and control of the nodes is possible from the host server, which is located outside of the mesh network, even if a node is located behind a firewall or network address translator (NAT), because server management messages are encapsulated within headers so that a persistent connection between the node and the external host server is maintained once the node sends a message to the host. | 11-28-2013 |
20130318234 | Advanced Availability Detection - A method is provided in which the present invention is for a method in which a telecommunications terminal determines whether its user is available to accept an incoming invitation to participate in a telecommunications session based on: (1) a characteristic of the use of a software application, (2) a characteristic of the use of a resource of a terminal, (3) a sensor input, (4) a characteristic of the incoming invitation or (5) any combination of (1), (2), (3), (4), and (5). | 11-28-2013 |
20130318235 | SYSTEM AND METHOD FOR PERFORMANCE DATA COLLECTION IN A VIRTUAL ENVIRONMENT - A system and method can manage software services in virtualized and non-virtualized environments. A plurality of data collection components in a computing environment can include a plurality of virtual machines running on the one or more microprocessors, wherein the plurality of virtual machines are adapted to be deployed with services and applications. Each data collection component operates to use one or more data structures to communicate with a data consumer, wherein each data structure describes metrics to be collected by said data collection component and is capable of containing collected metric values. | 11-28-2013 |
20130318236 | KEY INDICATORS VIEW - A system and computer-implemented is provided for displaying a configurable metric relating to an environment in a graphical display along with a value of the metric calculated over a configurable time period. The metric is used to identify events of interest in the environment based on processing real time machine data from one or more sources. The configurable metric is selected and a corresponding value is calculated based on the events of interest over the configurable time period. The value of the metric may be continuously updated in real time based on receiving additional real-time machine data and displayed in a graphical interface as time progresses. Statistical trends in the value of the metric may also be determined over the configurable time period and displayed in the graphical interface as well as an indication if the value of the metric exceeds a configurable threshold value. Further, a selection of one or more thresholds for the value of the metric may be applied and an indication displayed indicating if the threshold(s) have been exceeded. | 11-28-2013 |
20130318237 | DYNAMIC CONTACT LIST - A system that can store attributes from a plurality of past communications by a terminal device to one or more recipients. The system can also identify a routine based on the stored attributes. The system can also generate a contact list including at least one of the one or more recipients according to the routine. The system can also output the contact list. The attributes may include identifications of one or more recipients of the plurality of past communications and an order in which the one or more recipients are communicated with from one or more locations of the terminal device during the plurality of past communications. | 11-28-2013 |
20130318238 | SAMPLING NETWORK TRAFFIC - Sampling network traffic includes: loading a packet sampling module into a processor-based network device coupled to a network; determining with the packet sampling module if a network packet addressed to or from the network device is selected for sampling; and transmitting data from the network packet over the network to a monitoring device external to the network device if the network packet is selected for sampling. | 11-28-2013 |
20130318239 | CONCEPT FOR PROVIDING INFORMATION ON A DATA PACKET ASSOCIATION AND FOR FORWARDING A DATA PACKET - In an apparatus for forwarding a present data packet from a present source network entity to a present destination network entity, the present destination network entity is selected from a plurality of destination network entities. The apparatus receives the present data packet and selects the present destination network entity based on a load balancing criterion. The apparatus forwards the present data packet to the present destination network entity and receives a response data packet from the present network destination entity. The response data packet includes information on a data packet association. The data packet association is an association between a plurality of different data packets belonging to a data session between a data source and a data destination. The apparatus stores the information on the association. | 11-28-2013 |
20130326046 | SYSTEMS, METHODS AND MEDIA FOR PROVIDING CLIENT-SIDE INTERPORTLET COMMUNICATION - A method for providing client-side interportlet communication includes: executing an even manager, generated at a portal server, on a client device hosting a portal page for providing interportlet communication to portlets contained in the portal page; receiving at the event manager running on a client device a registration request from each of the portlets when the portal page containing the portlets is loaded; and receiving at the event manager an event set off by one of the portlets wherein the event is defined by a token published by the one of the portlets. If the token defining the event matches the published token defined in a behavior of the portal page, the method also includes invoking at the event manager callback functions of one or more of the portlets having at least one subscription token that matches the corresponding subscribed token defined in the behavior. | 12-05-2013 |
20130326047 | ROUTER AND PERSONAL DEVICE FOR MONITORING AND CONTROLLING DATA TRANSFER RATES ON A LOCAL AREA NETWORK - A router configured to monitor data transfer to devices on a local area network can include computer instructions for identifying the devices on the local area network, monitoring the data transfer rates for each of the devices, controlling the data transfer rates for each of the devices, and for communicating with a personal device. The personal device can be configured to display the monitored data transfer rates to a user and allow the user to control the data transfer rates for each device. | 12-05-2013 |
20130326048 | CONTEXTUAL NETWORK ACCESS OPTIMIZER - A method and apparatus for optimizing access to a contextual network are described. The apparatus has a registration manager module, a configuration manager module, an access manager module, and an access optimizer module. The registration manager module registers business applications operating in the contextual network of a server with registration data having a set of parameters to define the business applications. The configuration manager module determines initial configuration settings for the business applications to identify parts of the contextual network relevant to the business applications. The access manager module provides the business applications with access to contextual network data based on distances between nodes in a contextual network graph of the contextual network data. The access optimizer module collects measurements of the access of the business applications to the contextual network data, and computes future optimal configuration settings for the business applications. | 12-05-2013 |
20130326049 | SYSTEM AND METHOD FOR SEQUENCING PER-HOP DATA IN PERFORMANCE-MONITORED NETWORK ENVIRONMENTS - A method includes asynchronously collecting performance data from distributed devices. The performance data includes information associated with a particular data stream that transits each of the distributed devices. The method further includes ordering the performance data in accordance with a specific metric included in the performance data. The method further includes generating a per-hop perspective of the ordered performance data. | 12-05-2013 |
20130326050 | Method of Organic Cloud Discovery and Transformation of Network Assets - A technology method that comprises the steps, methods and business rules of discovering network assets organically, decomposing the network into distinct layers and providing demarcation lines by normalizing the network assets into distinct cells, then mashing up the cells utilizing a Network Rules Engine to produce pre-packaged service capabilities by way of a graphical user interface and exposing these capabilities to the cloud. | 12-05-2013 |
20130326051 | PERFORMANCE ANALYSIS USING ANONYMOUS AGGREGATED DATA - An approach to improving performance of a target system is disclosed. The approach may involve determining how similar a target system being considered is to other systems in use by other clients. For each of these other separate systems, the approach may involve determining the differences between the performance of the target system and the performance of the separate system, accounting for the level of similarity. A report can be generated that identifies performance values of the target system that are outside an acceptable range, which is based on the performance of the other separate systems. Based on this report, the administrator of the target system can consider configuration changes and upgrades to improve performance of the target system. | 12-05-2013 |
20130326052 | SYSTEM FOR REAL TRAFFIC REPLAY OVER WIRELESS NETWORKS - A real traffic replay over wireless networks with environment emulation and an event-driven automata-synchronized replay method are disclosed. The system includes a first traffic capture module configured to capture packet traces and environment effects in a real environment, a first event transform module configured to transform the packet traces into a sequence of events, and a reproduce module configured to receive the environment effects from the first traffic capture module and the sequence of events from the first event transform module such as to control a replay of the environment effects in the real environment and the sequence of events coordinately by means of automata. | 12-05-2013 |
20130326053 | Method And Apparatus For Single Point Of Failure Elimination For Cloud-Based Applications - Various embodiments provide a method and apparatus of providing SPOF elimination for cloud-based applications that provides rules that support rapid elasticity, infrastructure maintenance such as, for example, software/firmware/hardware upgrades, updates, retrofit, and growth, and preventative maintenance such as, for example, cleaning fan filters and replacing failed hardware components. In particular, the SPOF elimination provided by the method and apparatus is based on network architecture and persistent storage considerations in addition to VM to host instance mappings. | 12-05-2013 |
20130326054 | Performance Estimator for Network Devices - Techniques for estimating the performance of a network device. In one set of embodiments, a network device can determine one or more performance metrics associated with a feature of the network device that is customizable by a user. An example of such a feature is a user-defined script that is executed via a scripting engine of the network device. The network device can then generate a performance estimate based on the one or more performance metrics. The performance estimate can indicate the likely performance of the network device with the feature enabled. | 12-05-2013 |
20130326055 | Method and System for Network Transaction Monitoring Using Transaction Flow Signatures - A method and system for monitoring performance of network transactions is described herein. According to the present invention, in a testing environment, transaction flow signatures representing a hierarchical flow of sub-transactions constituting the said network transactions are generated and stored for monitoring and analysis of the network transactions. In a real-time environment, the sub-transactions are identified through the stored transaction flow signatures for a particular network transaction and the identified sub-transactions are then monitored by metrics analysis engine to determine the performance of the network. | 12-05-2013 |
20130326056 | NETWORK FLOW ABNORMALITY DETECTION SYSTEM AND A METHOD OF THE SAME - A network flow abnormality detection system and method for detecting at least one network packet to determine whether a flow condition of the network packet is abnormal. The network packet includes L bit data element values. The method is fetching M data element values in above-mentioned L bit data element values by data element value fetch unit, wherein M is an odd number and larger than 1; N parallel processing units receive and process above-mentioned M data element values; comparison module compares above-mentioned M data element values and a standard threshold to generate M comparison result values; sum unit sums above-mentioned M comparison result values to obtain a comparison sum value; determination unit compares the comparison sum value and an abnormality threshold, wherein when the comparison sum value is larger than the abnormality threshold, the determination unit determines the flow condition is abnormal. | 12-05-2013 |
20130326057 | INTERNET PROTOCOL (IP) NETWORK DEVICE, NETWORK SYSTEM, METHOD THEREOF - An internet protocol (IP) network device is provided including a detector adapted to detect an event in the internet protocol (IP) network device. The network device also includes a generator adapted to generate a trap message including event information having information about the detected event. The network device also includes a transmitter adapted to transmit, to an internet protocol (IP) network management device, the trap message including the event information and a first sequence indicator. The network device also includes a timer adapted to measure a time period from a time at which the transmitter transmits the trap information. If the measured time period is equal to or longer than a predetermined time, the generator generates an empty trap message and the transmitter transmits, to the network management device, the empty trap message and a second sequence indicator. | 12-05-2013 |
20130326058 | System and Method for Seamless Horizontal Scaling using Logical Scalable Units - The performance of a scalable computing environment in a telecommunication network may be improved by configuring a server computing system to monitor a level of traffic throughput within the telecommunication network to determine whether an increase in throughput capacity is needed or a decrease in throughput capacity is acceptable, and increasing a throughput capacity of the telecommunication network when an increase in throughput capacity is needed by adding a logical scalable unit to the telecommunication network. The logical scalable unit may including a minimum combination of logical components required to provide in a single multiprocessor system a complete set of telecommunication functionalities for a subset of users in the telecommunication network. | 12-05-2013 |
20130326059 | Network Accessibility to any Network Attached Device During Reboot and Power Loss - A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a “boot once” connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to the network device's memory so that it may respond to out-of-band polling requests for device status information from network management tools. With CMP, network administrators can monitor the boot process of network devices, determine that a network device is non-functional due to power loss and can maintain an accurate inventory status of spare network devices that are stored un-powered in a spares closet. | 12-05-2013 |
20130326060 | Population Category Hierarchies - Developing a population category hierarchy can include providing a candidate category hierarchy, including a number of candidate categories, and a mapping between a number of reference pages and the number of candidate categories, including a number of mapped reference pages ( | 12-05-2013 |
20130326061 | METHOD AND APPARATUS OF DETERMINING POLICY AND CHARGING RULES BASED ON NETWORK RESOURCE UTILIZATION INFORMATION - The present invention provides a solution for determining a QoS policy and/or charging policy based on network resource utilization information in an LTE network. As compared to the current 3GPP policy and charging control architecture, the solution of the present invention determines a QoS policy and/or charging policy based on network resource utilization information in combination with existing input information, thereby making policy and charging control more flexible. | 12-05-2013 |
20130332593 | SYSTEM, METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING BEHAVIOR-BASED RELATIONSHIPS BETWEEN WEBSITE USERS - A method for determining behavior-based relationships between website users is provided. The method may include monitoring activity of a plurality of users of a website to collect data regarding interaction with one or more content items associated with the website by the plurality of users. The method may further include analyzing the collected data to determine one or more relationships among the plurality of users based at least in part on the interaction with the one or more content items by the plurality of users. The method may additionally include generating a behavior graph having a structure defined based at least in part on the determined relationships. A corresponding system, apparatus, and computer program product are also provided. | 12-12-2013 |
20130332594 | CORRELATING PERFORMANCE DEGRADATION OF APPLICATIONS TO SPECIFIC CHANGES MADE TO APPLICATIONS - An application monitoring infrastructure enables application configuration changes on multiple machines across multiple OS types to be tracked, and correlated to performance degradation and outages by receiving change event data associated with change events occurring at each computer in the computer system, each change event data including an identifier for the associated change event, a path to a data container that was changed, a time stamp representative of when the data container was changed, an identifier for an application that is affected by the change to the data container, and the time stamp representative of when the monitored data container was changed, determining a time at which correlation is to be carried out and a target application for which correlation is to be carried out, and identifying change events associated with the target application that have time stamps that are within a predetermined proximity to the determined time. | 12-12-2013 |
20130332595 | CORRECTION OF PACKETS HAVING INCORRECT MAC ADDRESS VALUES - Network traffic may be logged and analyzed to perform accounting on amount of a chargeable network resource that is consumed fulfilling requests for different clients or for different servers. A network device may report network traffic to a server through NetFlow data records. The NetFlow data records may then be analyzed to remove or correct packets containing an incorrect physical address, such as when the logged packets have a recorded physical address equal to the physical address of the network device logging the traffic. | 12-12-2013 |
20130332596 | NETWORK TRAFFIC TRACKING - Network traffic may be logged and analyzed to perform accounting on amount of a chargeable network resource that is consumed fulfilling requests for different clients or for different servers. A network device may report network traffic to a server through NetFlow data records. The network traffic records may be generated by monitoring traffic through either the ingress ports or the egress ports of a network device. Monitoring only ingress or egress ports reduces or eliminates duplication of network traffic counting. Two-directional network traffic may be monitored by transmitting traffic in one direction through a first interface and in a second direction through a second interface. | 12-12-2013 |
20130332597 | REDUCING VIRTUAL IP-ADDRESS (VIP) FAILURE DETECTION TIME - Methods and systems are provided for global server load balancing in a communication network using a global site selector and an application control engine in communication with the global site selector, in which the application control engine notifies the global site selector in response to a state change for a virtual internet protocol (VIP) address. Keepalive methods generally rely on periodically polling VIP addresses to check whether they are in an ONLINE or OFFLINE state. A minimum interval between two keepalives can be as long as 40 seconds, during which, without a mechanism to reflect state change to the load balancer in real time, if a VIP address changes state (e.g., VIP address failure), a customer can experience network outage during the time interval. Embodiments provide a mechanism to reflect, in real time, the current VIP address state to a global server load balancer to reduce failure detection time. | 12-12-2013 |
20130332598 | INTERNET PROTOCOL ADDRESS IPv4/IPv6 BASED PACKET FILTERING IN WoWLAN MODE - One embodiment of the present invention provides a system configured to apply Internet Protocol (IP) address based packet filtering prior to entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request to enter WoWLAN mode. In response to this request, the system collects a set of active IP addresses, as well as a set of active ports. Next, the system filters out packets destined to IP addresses that are not members of the set of active IP addresses, and ports that are not members of the set of active ports. Finally, the system enters WoWLAN mode. | 12-12-2013 |
20130332599 | NEIGHBOR DISCOVERY OFFLOAD IN MOBILE DEVICES - One embodiment of the present invention provides a system that facilitates offloading neighbor discovery from a host prior to the host entering Wake on Wireless LAN (WoWLAN) mode. During operation, the system receives a request from a host executing on the processor to enter WoWLAN mode. Next, the system collects a set of active IP addresses on the host. The system then places the apparatus in WoWLAN mode. Next, the system receives neighbor discovery requests from IP addresses external to the host at a networking chip external to the processor. The system then responds to the neighbor discovery requests from the networking chip on behalf of the host and without waking the host from WoWLAN mode for requests destined to IP addresses that are members of the set of active IP addresses. Finally, the system also prevents, at the networking chip, the neighbor discovery requests from waking the host. | 12-12-2013 |
20130332600 | SYSTEM FOR MONITORING ONLINE INTERACTION - A system for monitoring online communications of at least one LAN user, specially useful for controlling children's internet interactions. The system comprises a central communications server and locally deployed equipment in the user's home LAN, the locally deployed equipment comprising means adapted to automatically enumerate and store all the peers of the local user, analyze natural language of the conversations between the user and the peers to assign an age range of the peers through morphological and syntactical language use, identify customer-specified words and generate a network of peers and alarms for users according to previously determined rules; and the central communications server comprising means to collect anonymized data from the pairs. | 12-12-2013 |
20130332601 | DYNAMIC LOGGING - In general, techniques are described for dynamically modifying the extent of logging performed by logging information generators in response to events detected in logging information received by the collector. In some examples, a network device includes one or more processors and a collector executed by the processors to receive a log message that includes logging information from a generator. The network device also includes a rules engine to apply one or more rules that each specify a condition and a corresponding action to the logging information to identify a matching rule, wherein the rules engine, upon identifying a matching rule, executes the action of the matching rule to generate and send a logging modification message to increase an extent to which the generator generates logging information. | 12-12-2013 |
20130332602 | PHYSICAL PATH DETERMINATION FOR VIRTUAL NETWORK PACKET FLOWS - In general, techniques are described for determining a physical network path taken by packets of a network packet flow. The techniques may be applied to determine, or “trace,” a physical network path in the virtualized network domain. In some examples, a network device includes one or more processors and a switch executed by the processors to forward packets of a packet flow to a physical network path. The network device also includes a flow trace module to generate one or more flow trace packets having incrementally increasing respective time-to-live (TTL) values, wherein the switch module forwards the flow trace packets on an outbound interface of the network device for the physical network path, and wherein the flow trace module receives corresponding time exceeded messages for the flow trace packets, wherein each of the time exceeded message includes a source network address of a network element on the physical network path. | 12-12-2013 |
20130332603 | Sensortainment Systems and Methods - A sensor data aggregation system is presented. The aggregation system can include a sensor interface configured to obtain sensor data from multiple sensing devices (e.g., cell phone, security cameras, vehicles, etc.) associated with an event. An aggregation server compiles the sensor data into one or more event feeds representing a dynamic, immersive sensory experience of the event. The event feed can then be presented to one or more viewers where viewers can provide feedback to individuals operating the sensing devices. For example, a viewer can request a specific image or video be taken, possibly in exchange for a payment. | 12-12-2013 |
20130332604 | METHODS AND APPARATUS TO SHARE ONLINE MEDIA IMPRESSIONS DATA - Methods and apparatus to share online media impression data are disclosed. An example method includes sending a response to a request, the response including an identification of a first cookie used by an audience measurement entity and an indication of a database proprietor, and receiving a mapping of the first cookie to a second cookie used by the database proprietor and demographic information associated with the second cookie by the database proprietor. | 12-12-2013 |
20130339514 | SYSTEMS AND METHODS FOR INTERACTIVE ANALYTICS OF INTERNET TRAFFIC - A computer implemented method, a cloud system, and a log system provide interactive analytics providing various intuitive mechanisms for interaction with data visualizations of Internet traffic, email, etc. The methods and systems utilize a cloud based monitoring system where all traffic from an organization may be monitored in a location and platform independent manner. The methods and systems include context-aware drilldown with progressively applied filtering and grouping while maintaining workflow history such that a user can go back to any point in the flow and proceed down a new path of investigation. | 12-19-2013 |
20130339515 | NETWORK SERVICE FUNCTIONALITY MONITOR AND CONTROLLER - A system and method is disclosed for controlling functionality of a computer network to avoid occurrence of resource or service incidents that degrade or disrupt operation of the network. The metrics monitored are formulated into control charts. Nelson like rules analyze the control charts to identify abnormal service events and abnormal resource events. The identified abnormal service events and abnormal resource events are analyzed using various analytic modes to identify potential resource incidents and potential service incidents. The analytic modes include covariate analysis, multivariate analysis, time series analysis and similar analytic techniques. Information on the abnormal service and abnormal resource events and the information on the potential service incidents/potential resource incidents are forwarded to a control or decision center to guide actions by an autonomic system or human operator to prevent the identified potential resource incidents and potential service incidents from degrading or disrupting operation of the network. | 12-19-2013 |
20130339516 | SYSTEMS AND METHODS FOR FORWARDING TRAFFIC IN A CLUSTER NETWORK - The present invention is directed towards forwarding network packets in a cluster network. A predetermined identifier may be inserted into a Media Access Control (MAC) ID field of an Ethernet header of a packet to distinguish various types of traffic. Newly received packets may be identified due to the absence of the identifier. The identifier may be added to the source MAC ID field of the Ethernet header of the packet, and the packet may be distributed to cluster nodes for processing via an inter-node communication bus. Thus, received packets with the identifier in the source MAC ID field may be identified as steered for processing by an internal node of the cluster. After processing the packet, the internal node may transmit the processed packets via the inter-node bus with a destination MAC ID including the identifier. | 12-19-2013 |
20130339517 | TECHNIQUES FOR PROVIDING DYNAMIC ACCOUNT AND DEVICE MANAGEMENT - Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device. | 12-19-2013 |
20130339518 | Software Product Management Through the Cloud - Status of software product(s) may be monitored through the cloud by Extract, Transform, Load (ETL) of status information, in the form of business process status indicators from customer tenants. Examples of such status indicators can include a backlog of tasks to be fulfilled, or a number of business documents present in specific processing states, which describe aspects of the business application and allow an understanding of the overall status of the monitored application. A data extractor component of a customer tenant may extract and transform the status indicators from a plurality of business documents. A data import framework of a central monitoring system may in turn employ mapping to condense that heterogeneous data into a monitoring-specific simplified status model. | 12-19-2013 |
20130339519 | Systems and Methods for Performing Localized Server-Side Monitoring in a Content Delivery Network - Some embodiments provide systems and methods for performing localized and real-time server-side network performance monitoring. These systems and methods leverage the distributed architecture of a content delivery network (CDN) so as to perform distributed monitoring with each Point-of-Presence of the CDN responsible for monitoring performance to a localized set of end users. These systems and methods also leverage existing traffic flows from a server to a particular end user in order to perform real-time server-side network performance monitoring without the injection of specialized monitoring packets and without active involvement of the end user in deriving the performance measurements. The performance measurements are then used to optimize delivery of existing and future traffic flows to the end user. | 12-19-2013 |
20130339520 | METHOD AND APPARATUS FOR PERFORMING CAPABILITY DISCOVERY OF RICH COMMUNICATION SUITE IN A PORTABLE TERMINAL - A method of performing capability discovery of Rich Communication Suite (RCS) in a portable terminal is provided. The method includes displaying a predetermined number of pieces of contact information from among registered contact information when a displaying of the registered contact information is requested, displaying the registered contact information so as to correspond with a user input when the user input is determined, and selecting currently displayed contact information and performing capability discovery with respect to the selected displayed contact information, when the user input is not determined during a predetermined time. | 12-19-2013 |
20130339521 | MEDIA DATA USAGE MEASUREMENT AND REPORTING SYSTEMS AND METHODS - An audience measurement system for gathering data reflecting usage of media data by a user on a processing device configured to process and present the media data locally on the processing device. Report objects may be generated by the processing device, wherein each of the report objects reflect usage of media data by each user of a processing device. Each of the report objects are configured to be generated regardless whether the media data was received from a network source or a source local to each processing device. In certain exemplary embodiments, report objects may correspond to different media data categories, and/or different user agents. The report objects may be assembled into a macro report. | 12-19-2013 |
20130339522 | Managed Unit Device, Self-Optimization Method and System - A managed unit executes a self-optimization according to a self-optimization trigger rule. The self-optimization trigger rule relates to a self-optimization capability supported by the managed unit. The self-optimization capability supported by the managed unit includes any one of or any combination of a self-optimization type, a self-optimization trigger condition, a self-optimization objective, and a self-optimization monitoring cycle. | 12-19-2013 |
20130339523 | METHOD AND APPARATUS FOR PASSIVELY MONITORING ONLINE VIDEO VIEWING AND VIEWER BEHAVIOR - Various user behaviors are passively monitored and recorded when a user/viewer interacts with a network video player, e.g. a web video player, while watching an online video clip. For one embodiment, a data collection agent (DCA) is loaded to the player and/or to a web page that displays the video clip. The DCA passively collects detailed viewing and behavior information without requiring any specific input or actions on the part of the user. Indications of user preferences are inferred by user actions leading up to viewing the video, while viewing the video, and just after and still related to viewing the video. The DCA periodically sends this information to a central server where it is stored in a central database and where it is used to determine preference similarities among different users. Recorded user preference information may also be used to rate a video itself. | 12-19-2013 |
20130339524 | METHOD AND ARRANGEMENT FOR PROVIDING SECURITY THROUGH NETWORK ADDRESS TRANSLATIONS USING TUNNELING AND COMPENSATIONS - This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments. | 12-19-2013 |
20130346587 | METHODS AND SYSTEMS FOR ADAPTIVE CAPACITY MANAGEMENT - Techniques to adaptively manage service requests within a multi-server system. In one embodiment, a service request and a service rule associated with the service request are received. Data about operating parameters of at least one server in a multi-server system are also received as part of a feedback loop. A response to the service request based on the service rule and the operating parameters is determined. Execution of the service request may be modified according to a tiered service rule based on the at least one server reaching a capacity threshold. The modification includes omitting an action in execution of the service request. | 12-26-2013 |
20130346588 | Status Aware Media Play - Techniques for determining status aware media play are described. When current user behavior with respect to a media segment deviates from baseline user behavior, the media segment is tagged in memory, and a determination is made as to whether playback functionality with respect to the tagged media segment should be adjusted. | 12-26-2013 |
20130346589 | NOTIFICATION-BASED MONITORING OF WEB RESOURCES - A service allows client systems to register for push notifications from the service about changes to resources. The service monitors a resource for updates and then notifies the client system when the resource has an update. The client system registers a resource for monitoring and subscribes to receiving push notifications for resources that are monitored. The client system can provide a notification channel to the service over which the service can send push notifications. The service aggregates requests to monitor resources over multiple client systems. When the service detects a change to a monitored resource, the service broadcasts a push notification to the various client systems subscribed to receive notifications for that resource over their respective notification channels. | 12-26-2013 |
20130346590 | Client Side Control of Adaptive Streaming - One embodiment includes implementing adaptive streaming by a switch manager application executed at a client device. The switch manager application can determine a respective weight for a plurality of switching rules. Each switching rule can include one or more criteria for generating a recommended quality level. Each weight can include data describing a reliability of the rule. The switch manager application can select, based at least partially on the respective weight of the at least one switching rule, at least one switching rule of the plurality of switching rules to generate a recommendation. Another embodiment includes the switch manager application generating a recommendation including a quality level and a confidence level from each of the plurality of switching rules. The switch manager application can determine a selected quality level based on the weights of the switching rules and the quality levels and confidence levels of the recommendations. | 12-26-2013 |
20130346591 | Clientless Cloud Computing - Methods, apparatuses and articles of manufacture for clientless cloud-computing are provided. Clientless cloud-computing may be implemented by detecting a plurality of input/output devices, at least a portion of the plurality of input/output devices associated with a unique identifier and available to be communicatively bound to a cloud-resident computer. A binding preference, including a selection of an input/output device, is received. The selection includes the unique identifier associated with the selected input/output device. A binding request to the selected input/output device is transmitted, and the selected input/output device is communicatively bound with the cloud-resident computer. | 12-26-2013 |
20130346592 | SWITCH MONITORING STATISTICS GATHERING AT SERVERS AND GATEWAYS FOR OVERLAY NETWORKS - In one embodiment, a system includes a plurality of overlay-capable devices, each overlay-capable device having an interface adapted for terminating and/or originating tunnels in an overlay network with other overlay-capable devices, logic adapted for creating statistics about overlay-encapsulated packets which are received by or sent by the overlay-capable device, logic adapted for accumulating the statistics, and logic adapted for storing the statistics in an accessible memory of the overlay-capable device. In another embodiment, a method for generating statistics about encapsulated packets within a virtual overlay network includes creating statistics about overlay-encapsulated packets which are received by or sent by each overlay-capable device in an overlay network, accumulating the statistics for each overlay-capable device through which the overlay-encapsulated packets passed, and storing the statistics in an accessible manner. | 12-26-2013 |
20130346593 | METHOD AND APPARATUS FOR PROVIDING TRANSITION TO AN ALTERNATE SERVICE BASED ON PERFORMANCE DEGRADATION OF AN INITIAL SERVICE - An approach for providing transition to an alternate service based on performance degradation of an initial service is described. A service alternation platform processes and/or facilitates a processing of sensor data, other data, or a combination thereof to determine or predict one or more conditions that can affect a performance of at least one service of a device. The service platform also causes, at least in part, an initiation of at least one alternate service at the device. The service platform further causes, at least in part, a transition from the at least one service to the at least one alternate service based, at least in part, on a determination of at least a degradation of the performance of the at least one service. | 12-26-2013 |
20130346594 | Predictive Alert Threshold Determination Tool - Mechanisms are provided for determining threshold conditions for performing operations within a performance monitoring tool. Metric data is collected from a computing system environment and clustering analysis is performed on the metric data to generate a plurality of clusters. One or more candidate clusters are selected that are candidate clusters for generating a threshold condition for performance monitoring. At least one threshold condition for performance monitoring is generated based on a composition of the selected one or more candidate clusters. The at least one threshold condition is then applied to future performance metric data to determine whether to perform an operation in response to the future performance metric data meeting or not meeting the at least one threshold condition. | 12-26-2013 |
20130346595 | AGGREGATION AND QUEUING OF COMMUNICATIONS - A computer receives a first attempt at communication made via a first communication channel and stores a first attempt record corresponding to the first attempt at communication in an attempts file. The computer receives a second attempt at communication made through a second communication channel that is different from the first communication channel and stores a second attempt record corresponding to the second attempt at communication in the attempts file. The computer queues at least a portion of the first attempt record and at least a portion of the second attempt record. The computer determines that the first attempt at communication and the second attempt at communication were created by a common sender, determines a third communication channel for replying to the common sender, and transmits a third attempt at communication to the common sender via the third communication channel. | 12-26-2013 |
20130346596 | METHODOLOGY FOR INTELLIGENT PATTERN DETECTION AND ANOMALY DETECTION IN MACHINE TO MACHINE COMMUNICATION NETWORK - The present invention relates generally to network communications, and more particularly to machine-to-machine (M2M) data communications. The present invention provides for a method, apparatus and computer program product for detecting performance event data across a machine-to-machine (M2M) network indicative of anomalous performance of data and thereafter alerting users of performance issues in real-time or near real-time. | 12-26-2013 |
20130346597 | MANAGING NETWORK DATA DISPLAY - Systems and methods for monitoring performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to a set of resources. The processing device uses the performance metric information to identify a subset of the resources corresponding to a display location associated with a visible portion of a display and to assess performance related to processing of the identified subset of the resources. In some embodiments, the processed performance data may be used to identify timing information associated with the subset of the embedded resources. Aspects of systems and methods for identifying and testing alternative resource configurations corresponding to the content associated with the original set of resources and for determining whether to recommend a resource configuration for improving performance of subsequent client requests for the content are also provided. | 12-26-2013 |
20130346598 | MANAGEMENT SERVER, IMAGE FORMING APPARATUS, METHOD OF PROVIDING OPEN SERVICES GATEWAY INITIATIVE (OSGI)-BASED SERVICE, AND COMPUTER-READABLE RECORDING MEDIUM - A management server includes a user interface unit to select a possible event of the management server as a first condition, selecting a second condition to filter an event corresponding to the selected first condition, and to select a function to be executed by the management server when the first condition and the second condition are satisfied; and a control unit to set the selected first condition, second condition, and function as a single new service in the management server. The first condition, the second condition, and the function each use a service engine of a bundle pre-installed on the OSGi. | 12-26-2013 |
20130346599 | Systems and Methods for Monitoring Media Interactions - The embodiments disclosed herein are focussed on media interactions at mobile devices, such as tablet PCs, cellular telephones, and other handheld devices (for example iOS, Windows Mobile and Android devices). Some embodiments relate to an arrangement whereby a media item (such as video data) is streamed for playback at the mobile device. A software application executing at the mobile device monitors user interactions with the device during that media item playback (using any one or more of the available device inputs, which may include the likes of touchscreens, cameras, buttons, microphones, gyroscopes, and so on). The timing and nature of these user interactions is analysed relative to media event data defined, thereby to identify correlations. The presence/absence of such correlations may be used for a number of purposes, such as media lockout control, competitions/promotions, entertainment provision, data collection/analysis, and similar. | 12-26-2013 |
20130346600 | APPARATUS FOR PROCESSING ONE OR MORE EVENTS - Processing events for use with a complex event processing system that includes a server computer system and a client application executable on a client computer system. The processing includes analysing content of the events and assigning a plurality of attributes to associated event processing logic. A first attribute is associated with event processing logic that is operable to be applied at the client computer system and a second attribute is associated with event processing logic that is operable to be applied at a server computer system. The processing also includes using, in response to receiving a first event, assigned attributes to determine whether event processing logic associated with the first event is operable to be applied at the client computer system. The first event is forwarded to the server computer system based on determining that the event processing logic associated with the first event is not operable to be applied at the client computer system. | 12-26-2013 |
20130346601 | NETWORK DEVICE, METHOD OF CONTROLLING THE NETWORK DEVICE, AND NETWORK SYSTEM - In a proxy device that can sufficiently speed up a communication of a TCP, and is easily introduced into an existing environment, a device that can multiplex the TCP is provided. The device includes a storage area A that holds respective moving averages of a request rate for each TCP connection, and an output rate at which transfer to a network could be conducted, and a storage area B that holds the number of divided connections for each connection requested by a host, and identification information on each of the divided connections. The number of divided connections is increased or decreased according to the request rate and the output rate of the storage area A. When the number of divided connections is increased, a new TCP connection C starts, and the number of divided connection in the storage area B, and the identification information on the connection C are updated. | 12-26-2013 |
20130346602 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SELECTING A WIRELESS NETWORK BASED ON SECURITY INFORMATION - A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security information associated with each of the wireless networks is collected, such that one of the wireless networks is selected based on the security information. | 12-26-2013 |
20130346603 | Computing a Performance Characteristic of a Network Device - A traffic profile or description of a mix of different types of traffic is provided to compute, using a model, a performance characteristic of a network device. The model relates a performance characteristic of the network device to parameters associated with different types of traffic. | 12-26-2013 |
20130346604 | Passive Parameter Based Demographics Generation - A method for characterizing website visitors based on visitor passive parameters and using the characterization to select and/or market website content. The passive visitor parameters include data in the browser agent, time of a website visit, IP address, etc. Such visitor passive parameters are available each time a visitor visits a website. In a first step, a first embodiment of the method anonymously compares the visitor passive parameters with known demographics, for example, at financial websites, to create a statistical mapping between the visitor passive parameters and the demographics. In a second step, the mapping is used to estimate demographics data for future website visitors and then site content provided to the future website visitors is based on the estimated demographics. | 12-26-2013 |
20130346605 | Methods and Systems for Capturing and Transmitting Locations Events Data Using Data Networks - Computer systems and methods for efficiently capturing and transmitting location events data using data networks are provided. In some embodiments, the computer systems and methods may comprise detecting an occurrence of a state change event of interest for an Internet-connectable device; determining optimal Internet-connectable device settings for location event captures and/or transmissions performed by the Internet-connectable device based on the detected occurrence of the state change event of interest; adjusting a configuration of the Internet-connectable device based on the determined optimal settings; and capturing and/or transmitting location events based on the adjusted configuration of the Internet-connectable device. | 12-26-2013 |
20140006587 | SYSTEMS AND METHODS FOR MOBILE MUSIC ZONES | 01-02-2014 |
20140006588 | CONTEXT-DRIVEN LOCAL NETWORK SERVICES | 01-02-2014 |
20140006589 | NETWORK CAPABILITY NOTIFICATION | 01-02-2014 |
20140006590 | REAL TIME EXAMINATION OF CONDITIONS OF PHYSICAL MACHINES USING AUGMENTED REALITY IN SMARTER DATA CENTER | 01-02-2014 |
20140006591 | METHOD AND APPARATUS FOR GENERATING RECOMMENDED CHANGES TO COMMUNICATION BEHAVIORS | 01-02-2014 |
20140006592 | Model Entity Network for Analyzing a Real Entity Network | 01-02-2014 |
20140006593 | USAGE BASED ACCOUNTING FOR NETWORK DEPLOYMENT | 01-02-2014 |
20140006594 | SCALABLE OFF-LOAD OF APPLICATIONS FROM SWITCH TO SERVER | 01-02-2014 |
20140006595 | USER-SELECTABLE IEEE 1588 CLOCK CLASS AND QUALITY LEVEL MAPPING | 01-02-2014 |
20140006596 | Estimating A Composition of a Population | 01-02-2014 |
20140006597 | METHOD, SYSTEM, AND DEVICE FOR MANAGING SERVER HARDWARE RESOURCES IN A CLOUD SCHEDULING ENVIRONMENT | 01-02-2014 |
20140006598 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR FACILITATING DYNAMIC ORIGIN-BASED DOMAIN ALLOCATION | 01-02-2014 |
20140006599 | PROBABILITIES OF POTENTIAL ACTIONS BASED ON SYSTEM OBSERVATIONS | 01-02-2014 |
20140006600 | REMOTE NOTIFICATION AND ACTION SYSTEM | 01-02-2014 |
20140006601 | SERVICES MANAGEMENT APPLICATION INTEGRATING SOCIAL MEDIA AND AUTOMATED INFRASTRUCTURE MONITORING | 01-02-2014 |
20140006602 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR LOCAL CLIENT DEVICE CONTEXT-AWARE SHARED RESOURCE AND SERVICE MANAGEMENT | 01-02-2014 |
20140006603 | SYSTEM FOR MONITORING HARD DISK DRIVE | 01-02-2014 |
20140006604 | Resilient Video Encoding Control via Explicit Network Indication | 01-02-2014 |
20140006605 | METHOD AND APPARATUS FOR DISTRIBUTED CONTROL OF AN INTERFACING-DEVICE NETWORK | 01-02-2014 |
20140006606 | Message Queue Transaction Tracking Using Application Activity Trace Data | 01-02-2014 |
20140006607 | MONITORING METHOD AND APPARATUS | 01-02-2014 |
20140006608 | METHOD AND A DEVICE FOR DETECTING ORIGINATORS OF DATA FRAME STORMS | 01-02-2014 |
20140006609 | MONITORING OF HETEROGENEOUS SAAS USAGE | 01-02-2014 |
20140006610 | REAL-TIME HIGHLY ACCURATE NETWORK LATENCY MEASUREMENT WITH LOW GENERATED TRAFFIC OR DATA REQUIREMENTS | 01-02-2014 |
20140006611 | Method and System for Using Timestamps and Algorithms Across Email and Social Networks to Identify Optimal Delivery Times for an Electronic Personal Message | 01-02-2014 |
20140006612 | METHOD OF AND DEVICE FOR SERVICE MONITORING AND SERVICE MONITORING MANAGEMENT | 01-02-2014 |
20140006613 | Indicating Physical Change in Relation to an Exterior of a Network Node Module | 01-02-2014 |
20140006614 | ON-DEMAND GLOBAL SERVER LOAD BALANCING SYSTEM AND METHOD OF USE | 01-02-2014 |
20140012970 | METHODS AND DEVICES FOR FACILITATING A DOWNLOAD SESSION - Methods and devices for facilitating download of content, particularly data, from a third-party server using an administration server. The administration server determines that content is available on a third-party server. The administration server then determines that an electronic can establish a download session with the third-party server over a wireless network connection. The determination is based on analyzing one or more pre-determined rules, and the one or more pre-determined rules are based on an estimate of wireless network traffic load. In response to the determination, the administration server sends a notification to the electronic device to indicate that the content is available for download from the third-party server. | 01-09-2014 |
20140012971 | METHOD AND SYSTEM FOR PROVIDING DYNAMIC ADMISSION CONTROL - An approach for monitoring a media streaming session for a change to one or more resources negotiated outside of a session signaling channel, wherein the one or more resources relate to establishment of the media, and determining whether to accept a new media streaming session based on the change. | 01-09-2014 |
20140012972 | Method to Allocate Buffer for TCP Proxy Session Based on Dynamic Network Conditions - Allocation of buffers for a TCP proxy session between a client and a server by a service gateway includes: monitoring dynamic network behaviors for server and client side sessions of the TCP proxy session; and allocating capacity for a server side buffer and capacity for a client side buffer in a memory buffer based on the dynamic server side network behaviors, the dynamic client side network behaviors, and a weighted average of a capacity of the memory buffer. In one approach to the allocation, the gateway determines whether an available capacity of the server or client side buffer is sufficient to store a data packet. If not sufficient, the allocated capacity of the server or client side buffer is increased based on measurements of the dynamic network behaviors and the weighted average, and the available capacity of the server or client side buffer is adjusted accordingly. | 01-09-2014 |
20140012973 | USER IDENTIFICATION USING MULTIFACETED FOOTPRINTS - A method for identifying an unknown user according to a plurality of facets of user activity in a plurality of contexts includes receiving a plurality of priors for the facets with respect to the contexts, receiving a plurality of footprints of known users, aggregating the footprints of the users to determine an ensemble prior, receiving a plurality of network traces relevant to an unknown user in a computer environment, matching the network traces against each of the footprints to determine a plurality of matches, aggregating the matches using the ensemble prior according to the facets and the contexts, and outputting a probable user identity for the unknown user. | 01-09-2014 |
20140012974 | ON-LINE SYSTEM FOR MONITORING USER ACTIVITIES ON AN IT DEVICE - On-line system for monitoring user activity on an IT device, the system including a control application (APP) and a monitoring application (AG), where the control application (APP) is situated on a central server (SRV) on the Internet, and the monitoring application (AG) is installed on the monitored IT device (IT). The monitoring application (AG) can be interconnected with the control device (APP) by the Internet. The monitoring application (AG) stores the collected data in a local data store (AG-DB), and subsequently the stored data is transmitted via the Internet to the control application (APP). The collected data is processed by the control application (APP) and subsequently the collected data is stored in the database (DB). | 01-09-2014 |
20140012975 | COMPUTER CLUSTER, MANAGEMENT METHOD AND MANAGEMENT SYSTEM FOR THE SAME - A computer cluster includes a node and a management system. The node includes an agent and generates a node event message in response to occurrence of an event. The agent gathers a software behavior information set, and generates a node information set when the node generates the node event message. The management system is configured to communicate with the node and includes a database storing at least one pre-established solution information set, and an agent management module configured to search the database according to the node information set. Upon finding a solution information set from the database, the agent management module sends the solution information set to the node so that the agent generates a solution for the event. | 01-09-2014 |
20140012976 | USER IDENTIFICATION USING MULTIFACETED FOOTPRINTS - A method for identifying an unknown user according to a plurality of facets of user activity in a plurality of contexts includes receiving a plurality of priors for the facets with respect to the contexts, receiving a plurality of footprints of known users, aggregating the footprints of the users to determine an ensemble prior, receiving a plurality of network traces relevant to an unknown user in a computer environment, matching the network traces against each of the footprints to determine a plurality of matches, aggregating the matches using the ensemble prior according to the facets and the contexts, and outputting a probable user identity for the unknown user. | 01-09-2014 |
20140012977 | AGREEMENT COMPLIANCE CONTROLLED INFORMATION THROTTLE - Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events or any combination thereof. An agreement includes one or more conditions to satisfy the agreement, such as one or more tasks or activities to be performed by an agreement performer or events that may be detected, and actions performed to enforce or assert the agreement such as controlling the electronic device and/or enabling or disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. For example, the system controls the electronic device and/or enables, disables or limits the amount or type of information on an electronic device, e.g., telephone, computer, game, television, vehicle based on whether the child has finished assigned homework, chores or extracurricular activities as specified as conditions of the agreement. | 01-09-2014 |
20140012978 | AGREEMENT COMPLIANCE CONTROLLED ELECTRONIC DEVICE THROTTLE - Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events or any combination thereof. An agreement includes one or more conditions to satisfy the agreement, such as one or more tasks or activities to be performed by an agreement performer or events that may be detected, and actions performed to enforce or assert the agreement such as controlling the electronic device and/or enabling or disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. For example, the system controls the electronic device and/or enables, disables or limits the amount or type of information on an electronic device, e.g., telephone, computer, game, television, vehicle based on whether the child has finished assigned homework, chores or extracurricular activities as specified as conditions of the agreement. | 01-09-2014 |
20140012979 | METHOD OF MONITORING REMOTE ACCESS PROCESS AND CONTROLLED APPARATUS - Provided are a method of monitoring a remote access process and a controlled apparatus whereby efficiency in remote control work can be improved. The method includes executing a downloaded access file, running an application for remote access through execution of the access file and capturing an entire interface screen of a controlled apparatus showing a remote access process at predetermined periods as soon as the application is run, and transmitting the captured screen and identification information for identifying the controlled apparatus to a web server through hypertext transfer protocol (HTTP). Accordingly, even before remote access is completed, an administrator can continuously monitor a remote access process to a user terminal through an administrator terminal on the basis of a captured screen as if remote access was complete. | 01-09-2014 |
20140012980 | INTERRUPT MANAGEMENT - A method for use in a data processing system connected to a network in accordance with a data transfer protocol, the data processing system having one or more event queues for holding network events, and being capable of responding to interrupts issued in response to the presence of a network event in the data processing system by invoking a stack to cause processing in accordance with the data transfer protocol of network events on the event queues; the method comprising: deciding whether to permit the interrupts to be enabled, in dependence on the result of a determination as to the presence of current indications that the stack will be invoked by an entity in the data processing system to cause processing in accordance with the data transfer protocol of network events on the event queues. | 01-09-2014 |
20140012981 | APPARATUS AND METHODS FOR OPTIMIZING NETWORK DATA TRANSMISSION - Apparatus and methods for optimizing data transmission between two hosts via a network device. The network device initially allows a first connection to be established between the two host devices. This first connection is logically established directly between the host devices without modification by the network device. The network device analyzes data transmitted via the first connection and determines whether to allow the first connection to continue without intervention by the network device, or whether to split the connection into separate TCP connections with the network device as intermediary. The network device maintains connection state and emulates both host devices to allow the first connection to be split without disrupting the communication at either host device. | 01-09-2014 |
20140012982 | PERSONALIZATION OF INFORMATION CONTENT BY MONITORING NETWORK TRAFFIC - A home network system ( | 01-09-2014 |
20140012983 | System and Method for Providing Operational Intelligence for Managed Devices - A system and method for providing operational intelligence for managed devices are described herein. The method can include the step of receiving operational reports from a plurality of managed devices in which the managed devices include devices that have different operating environments and the step of analyzing the operational reports. Based on the analysis of the operational reports, one or more operational issues associated with a subset of the plurality of managed devices can be detected. In addition, corrective action can be taken in response to the detected operational issues. | 01-09-2014 |
20140012984 | Method and Apparatus for the Fast Detection of Connectivity Loss Between Devices in a Network - A method and apparatus for quickly determining the status of a network device in a network communicates status inquiry messages over the forwarding plane of one network device to at least one neighboring network device. The status inquiry messages indicate the connectivity status with at least one neighboring network device. | 01-09-2014 |
20140012985 | Method and Apparatus for Scheduling a Service Processing Resource - A method for scheduling a service processing resource, includes: setting multiple processing capability ranks of a processing resource and marking actual processing capability corresponding to each processing capability rank for the processing resource separately; calculating the service fluctuation quantity according to a change of the actual service quantity processed by the processing resource; calculating, according to the service fluctuation quantity, a reserved idle processing capability for eliminating an effect from a service fluctuation; and circularly scheduling the processing capability ranks of the processing resource according to the actual processing capability marked by each processing capability rank, wherein the reserved idle processing capability, service fluctuation quantity, and service quantity are to be processed. | 01-09-2014 |
20140019609 | Methods and Computer Program Products for Analysis of Network Traffic by Port Level and/or Protocol Level Filtering in a Network Device - Provided are methods and computer program products for monitoring the contents of network traffic in a network device and identifying and analyzing transactional network traffic. Methods of collecting network traffic data for transactional traffic may include application of port level filtering and/or protocol level filtering. The filtering methods described herein may assist the operator in identifying transactional and infrastructure problems resulting in application performance degradation. | 01-16-2014 |
20140019610 | Correlated Tracing of Connections through TDS - A trace identifier is sent between a database client and a database server using a pre-login data package along with pre-login connection open requests through the TDS protocol. The trace identifier gets logged by client-side connection-related traces, by server-side traces, and by database engine traces. The trace identifier can be used to exactly correlate a physical connection on the client to a physical connection on the server. This enhances troubleshooting of the database system, particularly when there are many concurrent users and threads. | 01-16-2014 |
20140019611 | DETERMINING SERVICE DEPENDENCIES FOR CONFIGURATION ITEMS - Systems, apparatus, methods, and computer program products for determining which of a plurality of services provided by a production environment depend on which of a plurality of configuration items in the production environment are disclosed. A processor executes computer-readable code to obtain status data for the plurality configuration items utilizing the one or more monitoring tools, integrate the status data for the plurality of configuration items to generate a model of the production environment that identifies the plurality of configuration items in the production environment and their dependencies on one another, and utilize the status data for the plurality of configuration items to identify a channel of configuration items for each of the plurality of services, wherein the channel for each of the plurality of services comprises two or more of the plurality of configuration items that currently are being utilized to provide that service. | 01-16-2014 |
20140019612 | CENTRALIZED MULTI-TENANT MONITORING SYSTEM - Embodiments of the present invention provide a central monitoring system for enterprise resource planning software hosted in a plurality of customer tenants. The central monitoring system may include software instructions that when executed by a computer processor, performs a method include extracting process status data from one or more customer tenants independently, transforming the extracted process status data to generate generalized status codes according to predetermined status codes, transferring the generated generalized status codes to a central monitoring system, loading the generated generalized status codes to the central monitoring system, and transforming the generalized status codes to monitoring-specific simplified status codes. | 01-16-2014 |
20140019613 | JOB MANAGEMENT SERVER AND JOB MANAGEMENT METHOD - A job management server for managing a plurality of jobs to be executed by a virtual computer generated on a computer, a job management part to manage information on a job net which configures a plurality of jobs and allocate a plurality of jobs included in a job net to the virtual computer, and a recovery part to monitor an execution status of each of the plurality of jobs included in the job net and perform recovery processing, wherein the job management server is configured to: specify a target job for changing allocation, in a case where a failure has occurred in a first virtual computer to execute a first job included in the first job net; determine a performance of a virtual computer required to execute the target job. | 01-16-2014 |
20140019614 | TECHNIQUE FOR EFFICIENTLY AND DYNAMICALLY MAINTAINING BIDIRECTIONAL FORWARDING DETECTION ON A BUNDLE OF LINKS - In one embodiment, a plurality of links between a network node and another network node are configured as a link bundle. The network node establishes one or more standby bidirectional forwarding detection (BFD) sessions. Each standby BFD session is associated with one or more links of the link bundle. The network node establishes an active BFD session. The active BFD session is associated with one or more links of the link bundle. In response to non-receipt of returned BFD messages for the active BFD session, one or more new active BFD sessions are selected from the one or more standby BFD sessions. In response to non-receipt of returned BFD messages for the one or more new active BFD sessions, it is determined that the link bundle has failed. | 01-16-2014 |
20140019615 | Monitoring Hashtags In Micro-Blog Posts To Provide One Or More Crowd-Based Features - Systems and methods are disclosed for monitoring hashtags in micro-blog posts, or status updates, from users to provide one or more crowd-based features. In one embodiment, a micro-blog post of a user in a crowd of users is obtained. The crowd of users is a group of users within a predefined spatial proximity to one another. A hashtag in the micro-blog post is then obtained, and a crowd-based feature is provided based on the hashtag. | 01-16-2014 |
20140019616 | SYSTEMS AND METHODS FOR BUSINESS NETWORK MANAGEMENT DISCOVERY AND CONSOLIDATION - According to some embodiments, a plurality of interconnected entities may be discovered in a network landscape. A subset of the entities may then be automatically consolidated into a business participant, the consolidating may performed in accordance with at least one rule based algorithm. A business process landscape, including the business participant, may then be generated and/or displayed to an operator. | 01-16-2014 |
20140025805 | HOME NETWORK OF CONNECTED CONSUMER DEVICES - A method of generating a representation of a structure includes providing an ad hoc mesh network having at least two nodes associated with the structure, obtaining time of flight data for each node in the network, and using the time of flight data to generate the representation of the structure. A method of generating a three-dimensional representation of a structure includes providing an ad hoc mesh network having at least three nodes associated with the structure, wherein at least one node is a mobile node that moves around the structure, obtaining time of flight data for each pair of nodes in the network, and using the time of flight data to generate the three-dimensional representation of the structure. | 01-23-2014 |
20140025806 | SYSTEMS AND METHODS OF DISCOVERING AND CONTROLLING DEVICES WITHOUT EXPLICIT ADDRESSING - A method of discovering a device in a communication network having multiple interconnected nodes includes continuously monitoring, by a device to be discovered, any IP packets sent by a discoverer. The method further includes transmitting, by the discoverer, an IP packet destined for a downstream device and receiving, by the device to be discovered, the IP packet. The method further includes determining, by the device to be discovered, whether the IP packet is intended for the device to be discovered. If the IP packet is not intended for the device to be discovered, retransmitting, by the device to be discovered, the IP packet to the downstream device via an egress port of the device to be discovered. | 01-23-2014 |
20140025807 | TAG LATENCY MONITORING AND CONTROL SYSTEM FOR ENHANCED WEB PAGE PERFORMANCE - Embodiments are directed towards employing a plurality of tag states to control tag suspension based on an asynchronous process that proactively monitors tag performance, response times, and latency. Tags may be in one of multiple states. Tags in a NORMAL state or a FLAGGED state may be enabled for deployment, and tags in a SUSPENSION_A state or a SUSPENSION_B state may be blocked from deployment. A tag's state may change based on monitoring the tag's latency to determine if latent events occur. Tag latency may be asynchronously monitored independent of web page requests. If latent events occur, then the tag's state may change from NORMAL to FLAGGED, from FLAGGED to SUSPENSION_A, or from SUSPENSION_B to SUSPENSION_A. If non-latent events occur, then the tag's state may change from SUSPENSION_B to FLAGGED or from FLAGGED to NORMAL, while a tag's state may change from SUSPENSION_A to SUSPENSION_B after a predetermined time period. | 01-23-2014 |
20140025808 | MONITORING SYSTEM AND MONITORING PROGRAM - A monitoring system is configured to perform a cause analysis of an event which occurs in any of a plurality of node apparatuses. The monitoring system is configured to store a plurality of rules indicating a correspondence relationship between one or more condition events regarding any of the plurality of node apparatuses, and a conclusion. The monitoring system is configured to specify the first conclusion associated with the detected condition event based on the rule, and perform a detection possibility judgment on whether the monitoring system can detect the condition event or not, for each of one or more condition events out of a plurality of condition events, and calculate the first index value indicating the certainty of the first conclusion being the cause, based on the existence of detection of one or more condition events associated with the first conclusion and the result of the detection possibility judgment. | 01-23-2014 |
20140025809 | REMOTE MONITORING OF MEDICAL DEVICES - A remote monitoring system for medical data collection can include a data-flagging process embeds authorization and settings information into a file containing the test results. Such data flagging can occur at a medical device or testing site, and may be based in policy settings received from a remote system. A file containing the test results can also include data category information that can be used to protect sensitive information by preventing such information from being communicated to the wrong server. | 01-23-2014 |
20140025810 | Collecting Processor Usage Statistics - In accordance with some implementations, a method of collecting statistics about processor usage is disclosed. The method is performed on a data storage server having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system executes one or more processes, wherein each of the one or more first processes is associated with an entity from a group of one or more entities. The server system then receives an interrupt signal at a first predetermined interval. In response to receiving the interrupt signal and for each processor of the one or more processors, the server system interrupts the process currently being executed on the processor. The server system increments the counter associated with the interrupted process. The server system then resumes the interrupted process. | 01-23-2014 |
20140025811 | CONTENT DELIVERY NETWORK WITH CUSTOMIZED TRACKING OF DELIVERY DATA - A custom tracking system can provide functionality for operators of content sites to specify types of content delivery data to be tracked in a content delivery network. The custom tracking system can propagate operator tracking preferences to edge nodes in the content delivery network, such as delivery servers, which can track delivery data according to the preferences. The custom tracking system can use one or more tracking filters to reduce the storage burden of certain tracking requests while still providing relevant results. The custom tracking system can output results of the custom tracking for presentation to the content site operator. | 01-23-2014 |
20140025812 | AUTOMATIC CONTEXT MANAGEMENT FOR WEB APPLICATIONS WITH CLIENT SIDE CODE EXECUTION - The present invention relates to a method and apparatus for providing automatic context management for simulating virtual users for testing and monitoring web applications, including those web applications that execute code on the client side, without requiring the actual execution of client side web application code or the execution of the client within the testing, monitoring, or simulation tool. Simulation tools with automatic context management according to the present invention can record and replay context-full scripts that do not require manual customization and are capable of handling state information even for web applications that execute code on the client side. These scripts are able to realistically mimic complex web application transactions on the network HTTP layer. | 01-23-2014 |
20140025813 | System and Method for Exchanging Information with a Relationship Management System - A method and system for exchanging information with a Relationship Management system that includes a connection unit to bridge first and second communications connections and capture information associated with the first and second communications connections. An interface unit is then used to receive communications connection information from the connection unit and deliver select portions of the communications connection information in a select format to the Relationship Management system. | 01-23-2014 |
20140025814 | System and Method for Monitoring and Analyzing Internet Traffic - Systems, methods and apparatus for analyzing Internet traffic. In an aspect, a method receives at a server from a client device a report request for a report related to web site traffic; in response to the report request, sends from the server web site traffic data and application code to the client device. The application code has instructions that cause the client device to: generate a report to display the web site traffic data, time the display of the web site traffic data, periodically request updated web site traffic data according to the time of the display, and update the report with the updated web site traffic data; and the method sends from the server to the client device the updated web site traffic data in response to the request for updated web site traffic data. | 01-23-2014 |
20140025815 | LINK USAGE - A method, performed by a computer system, of providing usage data for a plurality of hyperlinks in a resource is disclosed. In one aspect, the method includes maintaining hyperlink usage data for each of the hyperlinks within the resource and adjusting a copy of the resource to incorporate the hyperlink usage data associated with each hyperlink, wherein the hyperlink usage data represents the number of times users have selected a hyperlink of the resource. The method also includes sending the adjusted copy of the resource to a networked device to provide a display representing the hyperlink usage data with each associated hyperlink. The hyperlink usage data is incorporated into the copy of the resource so as to be displayed adjacent to the corresponding hyperlinks of the resource. | 01-23-2014 |
20140032735 | ADAPTIVE RATE OF SCREEN CAPTURE IN SCREEN SHARING - A method of sharing a display with another computing device is provided. Here, a rate of screenshot capture may be adjusted in reference to a variety of different parameters. For example, the rate may be adjusted in reference to a usage of a processor. In another example, the rate may be adjusted in reference to a compression ratio. The screenshots captured at the adjusted rate are then transmitted to another computing device. | 01-30-2014 |
20140032736 | Lattice Based Traffic Measurement - A lattice of interconnected concepts is constructed from flow entries. Each concept describes a subset of flows and a subset of the flow attributes. Based on user queries, the lattice is used to build disjoint sets of flows referred to as flowsets. Each user query specifies one or more of the flow attributes to be measured. Each flowset includes one or more of the flows to thereby enable sharing of the hardware counters among the flows. One hardware counter is then assigned to each flowset. | 01-30-2014 |
20140032737 | SYSTEMS AND METHODS FOR REPRESENTING A SAS FABRIC - An example provides potential solutions for SAS fabrics. The example includes identifying one or more devices directly attached to an entry point switch. The example also includes identifying one or more SAS switches that are not directly attached to the entry point switch. The example further includes receiving a request for SAS fabric information. Additionally, the example includes generating a data model in a format adapted to direct a client to generate a representation of the SAS fabric. The data model includes the one or more devices directly attached to the entry point switch, and the one or more SAS switches that are not directly attached to the entry point switch. | 01-30-2014 |
20140032738 | METHOD, APPARATUS AND SYSTEM FOR ESTIMATING SUBSCRIPTION HEADROOM FOR A STORAGE POOL - Techniques and mechanisms for determining that subscription headroom is available for a storage pool. In an embodiment, the storage pool is classified based on a current subscription level for the storage pool and respective levels of one or more metrics for the storage pool. A signal is generated in response to a storage pool classification indicating availability of subscription headroom. In another embodiment, a target subscription level is determined for generating the signal, where the target subscription level is based on the current subscription level, a first metric of the one or more metrics, and a high utilization threshold corresponding to the first metric. | 01-30-2014 |
20140032739 | SUBSCRIPTION WATCH LISTS FOR EVENT HANDLING - The present invention provides a method, system and computer program product for watch list oriented processing of events in a multi-object event data processing system. In an embodiment of the invention, a method for watch list oriented processing of events in a multi-object event data processing system, can include pre-processing a set of subscriptions against a pool of objects monitored for events in the data processing system to produce a watch list of objects. The method further can include receiving events in the data processing system corresponding to different ones of the objects in the pool of objects. The method yet further can include comparing the received events to the watch list to determine which events pertain to objects referenced in the watch list. | 01-30-2014 |
20140032740 | METHOD AND APPARATUS FOR PRIORITY BASED SESSION DELIVERY TO MULTIMODAL ENDPOINTS - Systems and methods for presenting a single invitation to join a communication directed to a multimodal endpoint are provided. More particularly, a communication directed to a multimodal endpoint is delivered to the multimodal endpoint using only a single communication network at a time. A communication server handling an incoming communication directed to the multimodal endpoint first attempts to initiate a communication session using a first, preferred communication network. If the communication is completed or is responded to by the multimodal endpoint using the first network, an attempt to complete the communication using a second network is not initiated. Alternatively, if the first communication network is not available to deliver the communication to the multimodal endpoint, an attempt to complete the communication using the second communication network is initiated. | 01-30-2014 |
20140032741 | DISTRIBUTED AGGREGATION OF REAL-TIME METRICS FOR LARGE SCALE DISTRIBUTED SYSTEMS - In one embodiment, a metric collection system may collect application metrics across multiple data centers in specific time intervals. A local collection point | 01-30-2014 |
20140032742 | WIRELESS NETWORK DEVICE BUFFERS - A wireless network device includes operating system layer buffers used by an operating system and driver layer buffers used by a wireless network interface driver in the device. Memory stores a capacity bitmap managed by the wireless network interface driver. The capacity bitmap identifies a current capacity of each of the driver layer buffers and the capacity bitmap may be provided to the operating system. | 01-30-2014 |
20140032743 | SELECTING EQUIPMENT ASSOCIATED WITH PROVIDER ENTITIES FOR A CLIENT REQUEST - In response to a request of a client device, an intermediary system selects from among equipment associated with respective provider entities, where the selecting is based on habitual information associated with a user of the client device. A task of the request is caused to be performed on the selected equipment. | 01-30-2014 |
20140032744 | METHOD OF COMPARING OUTPUTS IN A PLURALITY OF INFORMATION SYSTEMS - A test transition assistance system including the steps of: acquiring a request message and a response message from a current system by a packet capture; applying a process such as addition of an identifier and acquisition time; storing the message information in a storage; applying processes, in non-real time, such as read of the stored message information, conversion of the message corresponding to a new system, and adjustment of the time to control the number of request message transmissions per load and per unit time; transmitting a request message to the new system; receiving a response message; and comparing the old and new response messages and response times, as well as a plurality of message relations and orders, or other information. The present system reduces the number of days and man-hours and improves quality, thereby assisting in the transition of information systems from a current system to a new system. | 01-30-2014 |
20140032745 | SUBSCRIPTION WATCH LISTS FOR EVENT HANDLING - Embodiments of the present invention provide a method, system and computer program product for watch list oriented processing of events in a multi-object event data processing system. In an embodiment of the invention, a method for watch list oriented processing of events in a multi-object event data processing system, can include pre-processing a set of subscriptions against a pool of objects monitored for events in the data processing system to produce a watch list of objects. The method further can include receiving events in the data processing system corresponding to different ones of the objects in the pool of objects. The method yet further can include comparing the received events to the watch list to determine which events pertain to objects referenced in the watch list. Finally, for each one of the received events, a notification can be forwarded to one or more subscribers corresponding to an object in the watch list matching an object implicated by the one of the received events. | 01-30-2014 |
20140032746 | METHODS FOR MANAGING NETWORK ELEMENTS WITHIN A NETWORK ENVIRONMENT AND DEVICES THEREOF - A method, non-transitory computer readable medium and device that manage network elements include interacting with one or more network elements to determine one or more non-functional ones of the network elements. A network diagnostic information is obtained from the determined one or more non-functional network elements. Based on the obtained network diagnostic information, one or more snapshots of the determined one or more non-functional network elements are generated. The management server is provided with the generated one or more snapshots of the determined one or more non-functional network elements. | 01-30-2014 |
20140032747 | DETECTION OF ANOMALOUS BEHAVIOUR IN COMPUTER NETWORK ACTIVITY - A sequence of data representing network behaviour is analysed using the technique of delay space embedding. This causes a sequence of tuples to be constructed from the data sequence. This sequence of tuples can then be represented in a multi-dimensional representation space, which allows detection of network behaviour divergent from a norm. | 01-30-2014 |
20140032748 | CONFIGURABLE NETWORK MONITORING METHODS, SYSTEMS, AND APPARATUS - Configurable network monitoring systems, apparatus, and methods are described. The configurable system includes storage devices, processing modules, and a system chassis housing the processing modules. Each processing module includes a processing unit, a network interface card coupled to the processing unit and configured for receiving data from a communication network, a storage controller coupled to the processing unit and configured to access a corresponding one of the storage devices, and a module chassis housing the processing unit, the network interface card, and the storage controller. The system can be reconfigured by adding/removing processing modules from the system chassis. | 01-30-2014 |
20140032749 | AUTOMATIC PERFORMANCE AND CAPACITY MEASUREMENT FOR NETWORKED SERVERS - Measuring performance and capacity of a networked server coupled to a cluster of client machines, including: initializing each client machine of the cluster of client machines with a number of client applications; performing a first feedback process of configuring the number of client applications for the each client machine such that each client application adjusts its own operation to achieve a first balance point of a client application count for the each client machine; and performing a second feedback process in which the networked server and the cluster of client machines achieve a second balance point of a client machine count for the networked server. | 01-30-2014 |
20140032750 | SYSTEMS AND METHODS FOR HEALTH BASED SPILLOVER - The present solution provides a spillover management technique for virtual servers of an appliance based on health. Using a health based spillover technique, a network appliance may direct requests to a backup or second virtual server upon determining that a predetermined percentage of services being load balanced are down. In this manner, the spillover will occur based on a user controlled determination of a level of services being down to the number of services enabled. Instead of waiting for a last service of a virtual server to be marked down to spillover to another virtual server, the spillover may occur based on a user specified percentage. For example, the appliance may spillover from one virtual server to another virtual server when the number of services marked down relative to the number of enabled services falls below a specified percentage. | 01-30-2014 |
20140032751 | METHODS AND SYSTEM FOR TRACKING WEB PAGE ANALYTICS - A system and methods for a web-based analytics tracking system are provided. The system includes a data structure having a plurality of web page identifiers that are each associated with a respective web page, the web pages each located on a respective one of plurality of first servers connected together using a network, the data structure further including tag information specific to each of the plurality of respective web pages, the data structure is located on a second server different than the first servers. The system also includes a tracking script including a programmed to load a loader program located on the second server, the loader program is configured to query the data structure for tag information relating to the selected web page, build an image tag request using the tag information, and insert the image tag request into the selected web page. | 01-30-2014 |
20140032752 | COMPUTER, RESOURCE USAGE CALCULATION METHOD, AND RESOURCE USAGE CALCULATION PROGRAM - Provided is a computer, comprising a memory which stores a program and a processor which executes the program which is stored in the memory for each predetermined processing unit, with which a computer resource usage is calculated by a process which is executed for each predetermined processing unit. The computer resources include overlapping resources which are used in an overlapping manner when the program is executed and non-overlapping resources which are not used in an overlapping manner when the program is executed. When calculating the computer resource usage by the process which is executed for each predetermined processing unit, the processor determines, by analyzing the computer resources, the overlapping resources which are used by the process and the non-overlapping resources which are used by the process, and calculates the computer resource usage by the process on the basis of the result of the determination. | 01-30-2014 |
20140032753 | COMPUTER SYSTEM AND NODE SEARCH METHOD - A computer system and node search method capable of reducing node discovery time in the computer system with a large number of nodes and a large number of supported protocols is proposed. The computer system includes a management server which is connected to each of first and second nodes via a network and collects and manages first information for each of the first and second nodes including network addresses of the first and second nodes and a protocol type of a communication protocol to be used when communicating with the first or second node. When the management server searches the first and second nodes over the network and detects the second node, it acquires the network address of each first node managed by the second node and the protocol type of the communication protocol to be used when communicating with the first node. | 01-30-2014 |
20140040451 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero. | 02-06-2014 |
20140040452 | PROCESSING REQUESTS - Requests are processed at a computer server by receiving a request for service from a user terminal, the request including distress information representing a degree of failure to process at least one prior similar request from the user terminal for the service. The distress information is received from the request and the request is processed in accordance with the distress information. A user terminal provides distress information in a request, based on responses received from the server. | 02-06-2014 |
20140040453 | DOWNTIME CALCULATOR - A downtime calculator for a computer network system has a downtime request module, a user activity computation engine, and a downtime computation engine. The downtime request module receives attributes of a downtime request for the computer network system. The user activity computation engine determines activities of the computer network system based on geographic regions and local times of users accessing the computer network system. The downtime computation engine calculates a recommended downtime of the computer network system based on the attributes of the downtime request and user activities on the computer network system. | 02-06-2014 |
20140040454 | CLOUD RULES AND ALERTING FRAMEWORK - Systems, methods, and computer-readable media having computer-executable instructions embodied thereon for providing cloud rules and an alerting framework are provided. In embodiments, one or more rules associated with one or more healthcare information systems are received. The one or more rules each designate an initiating and at least one target application. One or more actions are associated to each target application. The initiating application is monitored for a trigger associated with the one or more rules. In embodiments, the trigger causes the one or more actions to be communicated to each target applications. In embodiments, the one or more actions initiate various changes in a display associated with each target application. | 02-06-2014 |
20140040455 | METHODS AND SYSTEMS FOR DETERMINING THE EFFECT OF A HOST ON NETWORK LATENCY WHILE DELIVERING ONLINE ADS - Methods and systems for determining the effect of a host on network latency while delivering online ads are disclosed. Observational test data relating to one or more network latency tests conducted on a plurality of hosts may be obtained. A first group and a second group of hosts may be created, wherein the first group includes the host and the second group doesn't include the host. At least one predetermined metric for each of the first group and the second group is computed based on the test data. A ratio of the at least one predetermined metric for the first group to the at least one predetermined metric for the second group is computed. The host may then be ranked based at least in part on the ratio. | 02-06-2014 |
20140040456 | MANAGING WEBSITE REGISTRATIONS - A method, system or computer usable program product for removing underutilized website account registrations including identifying a registration of a website account by a user on a data processing system, tracking access to the website account by the user, responsive to determining an underutilization of the website account, removing the registration of the website account. | 02-06-2014 |
20140040457 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero. | 02-06-2014 |
20140040458 | COMPONENT FOR NETWORK SYSTEM - A component for a network system is provided. The component includes an information notification part capable of notifying of one or more pieces of certain information among energy information, additional information except the energy information, and new information based on one or more the energy information and the additional information and a control unit controlling the information notification part. The information notification part notifies of the certain information when satisfying conditions for notifying of the certain information. | 02-06-2014 |
20140040459 | SYSTEM AND METHOD FOR DATA COMMUNICATION USING A CLASSIFIED FLOW TABLE IN OPENFLOW NETWORKS - A system and method for data communication in OpenFlow networks are disclosed, In one example, each flow entry, in a flow table in an OpenFlow switch of a network device, is classified as an active flow entry or an inactive flow entry upon detecting a change in a system state event or when a new flow entry is programmed by an OpenFlow controller in the OpenFlow network. Further, each incoming packet is matched against each active flow entry in the flow table by the OpenFlow switch until a matching active flow entry is found. Furthermore, each incoming packet is forwarded from the OpenFlow switch based on the found matching active flow entry in the flow table. | 02-06-2014 |
20140040460 | TRANSACTION DATA ACQUISITION METHOD, RECORDING MEDIUM, AND INFORMATION PROCESSING APPARATUS - An information processing apparatus executes a process and a second server in an information processing system including a first server, the second server, and a third server. The process includes: collecting, in a first queue, traffic data that is transmitted and received by the second server; acquiring, from the first server, a client request reception time when the first server receives a request from a client and a client response time when the first server responds to the request from the client; and moving, to a second queue, traffic data of a time period from a first server request reception time when the second server receives a request from the first server after the client request reception time to a first server response time when the second server responds to the request from the first server before the client response time. | 02-06-2014 |
20140040461 | METHOD FOR MECHANICALLY GENERATING CONTENT FOR MESSAGES - A method for inserting content through a service delivery hub includes the steps of designating a set of tags to be made available through an API, providing the API for use by third parties; intercepting a communication from the third party; interrogating the communication for a data tag, substituting content for the data tag and delivering the communication to an intended recipient. The method may further include that the content substituted for the data tag is dependent upon a parameter such as the MSISDN. | 02-06-2014 |
20140040462 | DEVICE MANAGEMENT SYSTEM, DEVICE MANAGEMENT APPARATUS, AND DEVICE MANAGEMENT METHOD - A device management system manages an electronic device and a lighting device via a network and includes an acquiring section configured to acquire, from the first device, first operating history information relating to an operating history of the first device and acquire, from a monitor connected to the second device, second operating history information relating to an operating history of the second device, the second operating history information being of a type different from that of the first operating history information; a first generating section configured to generate first management information based on the first operating history information; and a second generating section configured to generate second management information of a type identical to that of the first management information based on the second operating history information. | 02-06-2014 |
20140040463 | DETERMINING UNIQUE VISTORS TO A NETWORK LOCATION - A system and computer-implemented method for determining an estimated number of unique visitors to a network location from a geographical area. A non-linear approximation is utilized to determine the estimated number of unique visitors to the network location. The non-linear approximation is based on at least the estimated number of users within the geographical area, the estimated number of unique user identifiers within the geographical area, and the number of unique user identifiers from the geographical area that are observed at the network location. | 02-06-2014 |
20140040464 | REAL-TIME ADAPTIVE PROCESSING OF NETWORK DATA PACKETS FOR ANALYSIS - A network monitoring system that summarizes a plurality of data packets of a session into a compact session record for storage and processing. Each session record may be produced in real-time and made available during the session and/or after the termination of the session. Depending on protocols, a network monitoring system extracts different sets of information, removes redundant information from the plurality of data packets, and adds performance information to produce the session record. The network monitoring system may retrieve and process a single session record or multiple session records for the same or different protocols to determine cause of events, resolve issues in a network or evaluate network performance or conditions. The session record enables analysis in the units of session instead of individual packets. Hence, the network monitoring system can analyze events, issues or performance of the network more efficiently and effectively. | 02-06-2014 |
20140040465 | SYSTEMS AND METHODS FOR TAG INFORMATION VALIDATION IN WIDE PORT SAS CONNECTIONS - Methods and structures for validating tag information received in SAS frames by any of a plurality of ports comprising a SAS wide port. Each port may have a dedicated transport layer processing element. A tag information table is shared by all of the one or more transport layer processing elements. The tag information table is used to store information regarding a particular tag value being valid for use with a particular device and is updated when the particular tag value is no longer valid for use with the particular device. The information is initially stored in response to transmission of a frame that first uses the particular tag value with the particular device. The tag information table is updated to indicate the particular tag value is no longer valid upon receipt of an appropriate SAS frame or by a processing element external to the one or more transport layer processing elements. | 02-06-2014 |
20140040466 | METHOD AND ROUTER FOR PACKET PROCESSING DURING SERVER FAILURE - Embodiments of the present invention include a method and a router for packet processing during a server failure. In the present invention, a router queries a locally-stored state of a primary value-added service server, thereby immediately learning the state of the primary value-added service server, and when the queried state of the primary value-added service server is a failed state, the router may immediately forward a received request packet to a request routing server for rerouting or forward it to a backup value-added service server, thereby shortening the waiting time of a client when the client requests a video value-added service. In addition, because addresses of backup value-added service servers are stored in the router, disadvantages that client complexity increases and network security is reduced in the prior art are overcome. | 02-06-2014 |
20140040467 | Network Latency Estimation For Mobile Devices - Embodiments calculate an estimated latency between computing devices. A latency service aggregates latency records defining latency measurements and corresponding latency factors from a plurality of computing devices. From the aggregated latency records, the latency service defines relationships between the latency measurements and the corresponding latency factors. Responsive to a request for an estimated latency from a mobile computing device, the latency service applies the defined relationships to estimate the latency based on the latency factors associated with the received request. In some embodiments, the estimated latency includes three portions: a first latency value representing the latency from the mobile computing device to a cell site, a second latency value representing the latency from the cell site to an access point, and a third latency value representing the latency from the access point to a destination computing device. | 02-06-2014 |
20140040468 | PORT NUMBER IDENTIFICATION SYSTEM, PORT NUMBER IDENTIFICATION SYSTEM CONTROL METHOD, AND CONTROL PROGRAM THEREOF - A port number file verification function assesses whether a port number file is present in an administrated machine side storage module. If not present in the administrated machine side storage module, or if present in the administrated machine side storage module and communication with a port number of an administration server which is recorded in the present port number file is not possible, a port number file acquisition directive function directs a file acquisition unit to acquire a port number file of the administration server, the file acquisition unit which receives the directive requests the port number file via the administration server and a well-known port, and a port number identification function identifies a port number of the administration server on the basis of the content of the port number file which is acquired by the request. | 02-06-2014 |
20140047095 | SYSTEM AND METHOD FOR TUNING A CLOUD COMPUTING SYSTEM - The present disclosure relates to a method and system for configuring a computing system, such as a cloud computing system. A method includes initiating a plurality of executions of a workload on a cluster of nodes based on a plurality of different sets of configuration parameters. The configuration parameters include at least one of an operational parameter of a workload container, a boot-time parameter of at least one node, and a hardware configuration parameter of at least one node. A set of configuration parameters is selected for the cluster of nodes from the plurality of different sets of configuration parameters based on a comparison of at least one performance characteristic of the cluster of nodes monitored during each execution of the workload and at least one desired performance characteristic. The workload is provided to the cluster of nodes for execution. | 02-13-2014 |
20140047096 | SYSTEM AND METHOD FOR ADAPTIVE BASELINE CALCULATION - A method includes collecting, as data points, variable data associated with a monitored parameter. The method includes determining whether one or more of a first criterion and a second criterion is satisfied. The first and second criteria are satisfied based on a first quantity of the data points and a second quantity of data points in a selective subset of the data points, respectively. The method includes estimating an approximate baseline value for the monitored parameter in a first manner by utilizing each data point of a portion of the data points in response to determining that the first criterion is satisfied and the second criterion is not satisfied, and in a second manner by determining a second baseline value utilizing each data point of a portion of the selective subset of the data points in response to determining that the first criterion and the second criterion are both satisfied. | 02-13-2014 |
20140047097 | Probabilistic Inventory System - A method stores entries including user activity information for users using computing devices and unique identifiers for computing devices as inventory information for the users. For an entry, a unique identifier for a computing device is determined based on network activity for the computing device being connected to a network and user activity information for the network activity includes user identification information determined from the computing device while the computing device is connected to the network. The method then determines multiple entries for the user including user identification information and a set of unique identifiers for a set of computing devices. The multiple entries for the user are compared against criteria to determine if the user should be assigned to a computing device based on the user activity of the user. The user is assigned to the computing device using the unique identifier if the comparison meets a threshold. | 02-13-2014 |
20140047098 | PROTOCOL FOR SUPPORTING GATEWAYS WITH REDUNDANT ROUTERS IN A SHARED DOMAIN - In an example embodiment, an apparatus with a first interface coupled to a local domain with routers that employ a redundant router protocol, such as Hot Standby Router Protocol (HSRP) and/or Virtual Router Redundancy Protocol (VRRP), and a second interface coupled with a shared domain, such as Virtual Private LAN (Local Area Network) Service (VPLS), and virtual bridging logic coupled with the first and second interfaces. The virtual bridging logic performs packet snooping, filtering and/or provides a proxy service so that the routers employing the redundant router protocol are localized in the local domain, and avoids the routers employing the redundant router protocol from associating with other routers employing the redundant routing protocol that are in another local domain coupled with the shared domain. | 02-13-2014 |
20140047099 | PERFORMANCE MONITOR FOR MULTIPLE CLOUD COMPUTING ENVIRONMENTS - A system and method for monitoring the performance of cloud computing environments. The system includes provider multi-cloud monitors configured in cloud computing environments and a consumer multi-cloud monitor configured in a cloud consumer computer. The consumer multi-cloud monitor retrieves performance data on the cloud computing environments from the provider multi-cloud monitors, converts and analyzes the cloud performance data in view of service level agreements, and presents cloud performance results to a user. | 02-13-2014 |
20140047100 | ADAPTIVE CENTRALIZED COLLECTION OF PERFORMANCE MANAGEMENT DATA USING A METAMODEL - A method is provided for obtaining performance measurements via metamodels streamed from multiple types and models of network devices connected to a network. The method comprises installing a generic collection agent on a server connected to the network, retrieving the metamodels from the network devices by the collection agent, storing the metamodels in a collection of metamodels on the server to be accessed by the collection agent and the network devices, analyzing the metamodels to provide the network devices with addressing information, streaming the performance measurements from the network devices to the collection agent using the addressing information, and analyzing and storing the performance measurements for later use. | 02-13-2014 |
20140047101 | Method for Personalized Shopping Recommendations - A system, method, and computer-readable medium are disclosed for providing personalized recommendations based upon a user's system profile and usage. A personalized recommendation system receives a first set of input data and a second set of input data, the first set of input data comprising traditional recommendation input data and the second set of input data comprising recommendation input data associated with the profile and usage of a user's system. The first and second sets of input data are then processed to generate and provide a personalized recommendation. | 02-13-2014 |
20140047102 | NETWORK MONITORING - A system may include a monitoring engine to monitor configuration items of each layer of a multilayer network in a synchronized fashion in which each layer is monitored at a predefined time interval following monitoring of configuration items of another layer. | 02-13-2014 |
20140047103 | SYSTEM, METHOD AND APPARATUS FOR SUBSCRIBER USER INTERFACES - Methods, apparatus, and systems manage use of shared network resources among subscribers to a data communication service. In some implementations, a first metric is computed representing a subscriber's use of the shared network resources. A second metric may also be computed that represents the amount of network congestion of the shared network resources. Data derived from the first metric and the second metric may then be presented to the subscriber. The data may be transmitted to the subscriber over a network and/or the data may be displayed to the subscriber on an electronic display. | 02-13-2014 |
20140047104 | Systems and Methods for Load Balancing Using Predictive Routing - Systems and methods are disclosed for routing requests for information based on predictive data. The systems and methods may receive measurement data indicative of states of each of a plurality of destination servers, and generate predicted measurement data values for each of the plurality of destination servers based on the retrieved measurement data. The predicted measurement data values may represent predicted states of each of the destination servers at a time later than a time corresponding to the received measurement data. The systems and methods may also receive requests for information from a client computer, and route the received requests for information to one of the plurality of destination servers based on the predicted measurement data value. | 02-13-2014 |
20140047105 | LINK AGGREGATION USING DIGESTS - Methods, systems and computer readable media for link aggregation using digests are described. In some implementations, the method can include obtaining information about each port in a group of one or more ports. The method can also include computing a digest corresponding to each port in the group of one or more ports, the digest being based on the information about the corresponding port. The method can further include determining whether each port in the group of one or more ports is suitable for aggregation in a link aggregation group by comparing the digest corresponding to each port with a digest of a port in the link aggregation group. | 02-13-2014 |
20140047106 | REAL-TIME COMPRESSIVE DATA COLLECTION FOR CLOUD MONITORING - Technologies are presented for implementing a compressive-sensing-based data collection system in a cloud environment. In some examples, high-dimensional sensor data may be compressed using sparsity transforms and compressive sampling. The resulting low-dimensional data messages may be steered through a switch network to a cloud service manager, which then reconstructs the compressed messages for subsequent analysis, reporting, and/or comparable actions. | 02-13-2014 |
20140047107 | REMOTE INDUSTRIAL MONITORING AND ANALYTICS USING A CLOUD INFRASTRUCTURE - A cloud-based infrastructure facilitates gathering, transmitting, and remote storage of control and automation data using an agent-based communication channel. The infrastructure collects the industrial data from an industrial enterprise and intelligently sorts and organizes the acquired data based on selected criteria. Message queues can be configured on the cloud platform to segregate the industrial data according to priority, data type, or other criteria. Behavior assemblies stored in customer-specific manifests on the cloud platform define customer-specific preferences for processing data stored in the respective message queues. An agent-based analytics framework in the cloud platform performs desired analytics on the data using distributed parallel processing. | 02-13-2014 |
20140047108 | SELF ORGANIZING NETWORK EVENT REPORTING - A system and method for detecting, reporting and collecting information associated with network events is provided. A network element, such as an Event Reporter, detects an event that requires reporting to a manager of the network. The Event Reporter can determine if it is the lead responsible for reporting the event and forward it directly to the manager. Alternatively, it can forward the event report to a peer entity that has been designated as the lead. If the Event Reporter is the lead for the event, it can determine that it should relinquish the lead responsibility and initiate a hand-over of the lead role to a peer. | 02-13-2014 |
20140047109 | Integrated Adaptive Anycast For Content Distribution - A system includes first and second cache servers a domain name server, and a route controller. The cache servers are each configured to respond to an anycast address. Additionally, the first cache server is configured to respond to a first unicast address, and the second cache server is configured to respond to a second unicast address. The router controller configured to determine wither the status of the first cache server is non-overloaded, overloaded, or offline. The route controller is further configured to instruct the domain name server to provide the second unicast address when the status is overloaded or offline, and modify routing of the anycast address to direct a content request sent to the anycast address to the second cache server when the status is offline. The domain name server is configured to receive a request from a requestor for a cache server address. Additionally, the domain name server is configured to provide an anycast address to the requestor when the status of the first cache server is non-overloaded, and provide the second unicast address to the requestor when the status of the first cache server is offline or overloaded. | 02-13-2014 |
20140047110 | DEVICE LEVEL ENABLEMENT OF A COMMUNICATIONS PROTOCOL - An apparatus, system, and method are disclosed for device level enablement of a communications protocol. An adapter compatibility module determines an adapter compatibility status for a plurality of host adapters. A positive adapter compatibility status indicates that each host adapter in the plurality of host adapters is compatible with a communications protocol. A processor compatibility module determines a processor compatibility status for one or more processors. The one or more processors coordinate data transfers to and from the plurality of host adapters. A positive processor compatibility status indicates that each of the one or more processors is compatible with the communications protocol. A compatibility summary module determines a compatibility summary for the plurality of host adapters and the one or more processors. The compatibility summary indicates a positive compatibility relative to the communications protocol in response to a positive processor compatibility status and a positive adapter compatibility status. | 02-13-2014 |
20140047111 | SYSTEMS AND METHODS TO CONTROL WEB SCRAPING - Systems and methods to control web scraping through a plurality of web servers using real time access statistics are described. | 02-13-2014 |
20140047112 | NETWORK ANALYSIS ASSISTANCE DEVICE, NETWORK ASSESSMENT DEVICE, NETWORK ANALYSIS ASSISTANCE METHOD, NETWORK ASSESSMENT METHOD, NETWORK ANALYSIS ASSISTANCE PROGRAM AND NETWORK ASSESSMENT PROGRAM - A first electronic message collector collects electronic messages travelling on a first network and stores the electronic messages in a first storage. A second electronic message collector collects electronic messages travelling on a second network and stores the electronic messages in a second storage. An electronic message associator retains a mapping table in which the correlation, or similar, between electronic messages travelling from the first network to a gateway device and electronic messages travelling from the gateway device the second network are defined. The electronic message associator references the mapping table and associates the electronic messages stored in the second storage with the electronic messages stored in the first storage. From the result of the above-mentioned association, a status analyzer determines whether or not receipt of electronic message between the first network and the second network is accomplished normally. | 02-13-2014 |
20140052841 | COMPUTER PROGRAM, METHOD, AND INFORMATION PROCESSING APPARATUS FOR ANALYZING PERFORMANCE OF COMPUTER SYSTEM - In an information processing apparatus, a comparing unit determines whether the response time of each transaction falls within an acceptable time range that is specified previously. For each time window, a first calculation unit calculates a load of processes executed in parallel by the servers in a specified tier, based on transaction data of individual transactions. Further, a second calculation unit calculates a total progress quantity in each time window, based on the transaction data of transactions whose respective response times are determined to fall within the acceptable time range. A determination unit determines a specific load value as a threshold at which the total progress quantity begins to decrease in spite of an increase of the load. | 02-20-2014 |
20140052842 | MEASURING PROBLEMS FROM SOCIAL MEDIA DISCUSSIONS - Embodiments of the present invention provide a system, method, and program product to measure problems from a social media discussion. In exemplary embodiments, a computer extracts one or more problems from the social media discussion. The computer extracts one or more severity indicators and one or more complexity indicators from the social media discussion. The computer clusters the one or more problems into one or more sets of unique problems in a manner that related problems are clustered together into the one or more unique problems. The computer determines an overall severity and an overall complexity of the sets of unique problems. | 02-20-2014 |
20140052843 | Auto Management of a Virtual Device Context Enabled Network Infrastructure - In some embodiments, a virtual device context (vDC) domain may be advertised to other network devices. If at least a partition of each device is determined to belong to the same vDC domain, the network interface communicating with the at least one device may be activated. | 02-20-2014 |
20140052844 | MANAGEMENT OF A VIRTUAL MACHINE IN A STORAGE AREA NETWORK ENVIRONMENT - A computer-implemented method for management of a virtual machine in a storage area network (SAN) environment. A plurality of SAN devices for the virtual machine are discovered by a management server. Performance statistics for the plurality of SAN devices are monitored at the management server. Health of the virtual machine is determined based at least in part on the performance statistics for the plurality of SAN devices at the management server. | 02-20-2014 |
20140052845 | DISCOVERY OF STORAGE AREA NETWORK DEVICES FOR A VIRTUAL MACHINE - A computer-implemented method for discovering a plurality of storage area network (SAN) devices for a virtual machine. At a SAN device of the plurality of SAN devices, physically adjacent SAN devices connected to the SAN device are discovered. The physically adjacent SAN devices connected to the SAN device are registered at a name server. | 02-20-2014 |
20140052846 | ADAPTIVE VIDEO STREAMING OVER A CONTENT DELIVERY NETWORK - A system and method provides adaptively streaming a video over a content delivery network. A client sends a streaming request for a first portion of the video to a computer server, where the video has multiple video chunks, and each video chunk has one or more streaming parameters (e.g., priority and bitrate). The computer server retrieves the requested portion of the video and streams the first portion of the video over a content delivery network. The client monitors the video chunks received from the computer server and determines the video quality of the next portion of the video based on the monitoring. Responsive to the condition of the content delivery network being able to support streaming the next portion of the video with higher quality, the client updates the default video quality and requests the next portion of the video with the updated default video quality. | 02-20-2014 |
20140052847 | SYSTEM AND METHOD FOR NETWORK CAPACITY PLANNING - A method and system for network capacity planning are provided. The method includes: collecting utilization data related to a plurality of network resources on the network; determining a peak period for each of the network resources based on the utilization data; determining at least one key performance indicator (KPI) over the peak period for each of the network resources; aggregating each of the KPIs for each of the plurality of network resources; and outputting the aggregated KPIs. The system includes a data source module configured to collect utilization data related to a plurality of network resources; a peak period module configured to determine a peak period for each of the network resources based on the utilization data; a peak KPI module configured to determine at least one KPI over the peak period for each of the plurality of network resources; a KPI aggregation module configured to aggregate the KPIs for each of the network resources; and a processor module configured to output the aggregated KPIs. | 02-20-2014 |
20140052848 | LATENCY VIRTUALIZATION - A technique involves placing a data acceleration engine between an end user device and a host device. The host device provides data associated with a client application to the data acceleration engine, which provides the data to the end user device. If the data acceleration engine is on the host device, content from a datastore is served to the data acceleration engine as if the data acceleration engine were a client running the client application locally; therefore, latency normally associated with a network between the content datastore and the client device is eliminated. If the data acceleration engine is on the end user device and has received at least some data in advance of a relevant query, responses to the query also do not have latency associated with a network. The data acceleration engine can be implemented as a series of data acceleration engines between end user and host devices. | 02-20-2014 |
20140052849 | Sensor-based Detection and Remediation System - The invention comprises a method and system of deploying and managing sensor agents to provide services to networks and devices within a network. The invention dynamically deploys, initiates, and controls sensor agents that scan networks. Data obtained during the scan are returned to an analysis system for evaluation. Results are displayed to a user through a graphical interface or stored in a database. Results may also be used by the analysis system to remediate anomalies and provide graphical network information. Typically, a plurality of sensor agents are used to gather data in the aggregate and provide a more complete analysis on the operation and security of a network. | 02-20-2014 |
20140052850 | Datacenter Capacity Planning and Management - The present invention relates to the field of facility management, and more specifically, to methods and systems for datacenter capacity monitoring and planning. Embodiments of the present invention utilize various environmental variables to help execute and plan move/add/change work orders within a datacenter while remaining within desired guard bands. | 02-20-2014 |
20140052851 | SYSTEMS AND METHODS FOR DISCOVERING SOURCES OF ONLINE CONTENT - To determine an association between elements associated with a unified display on a screen, a request associated with the unified display is received from a browser, and a response to the request is identified as a first element associated with the unified display. A second element is identified as being spawned from the first element, if a parameter associated with the first element, which can be an event, a source, or both, is determined to be associated with the second element also. In that case, the second element is determined to be associated with the first element via the parameter. | 02-20-2014 |
20140052852 | VALIDATING NETWORK TRAFFIC POLICY - At least one inline probe is employed to test compliance of a network element with a network traffic policy. The testing capability of the probe is handled by specialized software or hardware. The inline probes hardware can be implemented in network elements such as routers or transceivers. The inline probes can be discovered, registered, and controlled by a dedicated controller disposed at a remote location. | 02-20-2014 |
20140052853 | Unmoderated Remote User Testing and Card Sorting - A computer-implemented method for performing unmoderated remote usability testing of an executable software module. The method includes identifying a multitude of participants, each of the multitude of participants being equipped with a data processing unit adapted to receive a multitude of responses from the multitude of participants. Each of the multitude of responses may be associated with using the executable software module. The method further includes connecting the multitude of participants with a server, automatically presenting at least one of a multitude of tasks associated with at least one usability metric of the executable software module to at least one of the multitude of participants, and gathering the at least one of the multitude of responses related to the at least one of the multitude of tasks. | 02-20-2014 |
20140052854 | CONTENT DELIVERY WITH LIMITED FREE SERVICE BASED ON PARAMETERIZED BEHAVIORAL MODEL - A user is allocated a first period of limited free access to content; the user's activity during the first period is monitored; and the user is assigned to a particular cohort based on the user's activity during the first period. Each cohort prescribes one or more conditions governing additional free access by users assigned to that cohort. The user is allocated a usage allowance based on the conditions prescribed in the cohort to which the user was assigned; and the user's actual usage is enforced according to the conditions prescribed in that cohort. After a time period prescribed by that cohort, the user is given an opportunity to become a subscriber to the system. If the user does not become a subscriber then the user's usage allowance is adjusted based on conditions prescribed in that cohort. | 02-20-2014 |
20140052855 | METHOD FOR PARSING AN INFORMATION STRING TO EXTRACT REQUESTED INFORMATION RELATED TO A DEVICE COUPLED TO A NETWORK IN A MULTI-PROTOCOL REMOTE MONITORING SYSTEM - A method, system, and computer program product for parsing an information string to extract requested information related to a remotely monitored device communicatively coupled to a network, including accessing the device using an HTTP protocol to obtain an information string associated with the device; determining, based on a type of the requested information, data extraction information for optimally extracting the requested information from the device; parsing the information string according to the data extraction information to identify substrings within the information string; and determining the requested information based on the information string, identified substrings, and the data extraction information. | 02-20-2014 |
20140052856 | NAMING OF DISTRIBUTED BUSINESS TRANSACTIONS - The present technology monitors a web application provided by one or more services. A service may be provided by applications. The monitoring system provides end-to-end business transaction visibility, identifies performance issues quickly and has dynamical scaling capability across monitored systems including cloud systems, virtual systems and physical infrastructures. In instances, a request may be received from a remote application. The request may be associated with a distributed transaction. Data associated with the request may be detected. A distributed transaction identifier may be generated for a distributed transaction based on the data associated with the request. | 02-20-2014 |
20140052857 | CORRELATION OF DISTRIBUTED BUSINESS TRANSACTIONS - The present technology monitors a web application provided by one or more services. A service may be provided by applications. The monitoring system provides end-to-end business transaction visibility, identifies performance issues quickly and has dynamical scaling capability across monitored systems including cloud systems, virtual systems and physical infrastructures. A first parameter may be received from a first computer by a server. A second parameter may be received from a second computer by the server. A distributed application processed on the first computer and the second computer may be correlated based on the first parameter and the second parameter. | 02-20-2014 |
20140052858 | POLICY DESCRIPTION ASSISTANCE SYSTEM AND POLICY DESCRIPTION ASSISTANCE METHOD - An object of the present invention is to assist in describing policies so that errors when describing policies are reduced. The present invention includes: referring to a parameter information storage unit that stores a plurality of parameters for a monitoring target system, and displaying the plurality of parameters on a screen of a display device; referring to a policy information storage unit that stores a plurality of policies in which a condition including at least one parameter of the plurality of parameters and a process executed when the condition is satisfied are described, displaying the plurality of policies on the screen, and adding or modifying a policy in the policy information storage unit according to a user input; dynamically determining association between the plurality of parameters stored in the parameter information storage unit and the plurality of policies stored in the policy information storage unit; and displaying the association between the plurality of parameters and the plurality of policies on the screen in an identifiable manner based on the determination results. | 02-20-2014 |
20140059199 | TRANSACTION-LEVEL HEALTH MONITORING OF ONLINE SERVICES - Embodiments are directed to verifying the accessibility and functionality of an online service and to scheduling the automatic execution of an online service. In one scenario, a computer system receives online service workflows and corresponding expected outcomes for each workflow. Each online service workflow is associated with an online service, and each online service workflow includes workflow steps that cause the online service to perform specified operations that produce observable outcomes within a specified amount of time specified by the online service provider. The computer system executes at least one of the received online service workflows and abandons execution of the online service workflow if execution is not completed within the specified amount of time. The computer system also compares the outcomes of the workflow execution to the expected outcomes corresponding to the executed online service workflow and generates a report that includes the results of the comparison. | 02-27-2014 |
20140059200 | FLOW DE-DUPLICATION FOR NETWORK MONITORING - A method is provided in one example and includes receiving flow data associated with a traffic flow. The flow data can be tagged with a data source identifier identifying a data source exporting the flow data, a source site identifier identifying a site associated with a source device of the traffic flow, and a destination site identifier identifying a destination site associated with a destination device of the traffic flow. The method further includes determining at least one authoritative data source for each site and metric type using at least one selection rule. The method further includes receiving a query for de-duplicated flow data, and generating de-duplicated flow data based on the data source identifier, source site identifier, and destination site identifier and particular flow data associated with the determined at least one authoritative data source. | 02-27-2014 |
20140059201 | PER FLOW DYNAMIC METERING SELECTION - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, at the PCRN, a request for establishment of a new service data flow (SDF) for a subscriber; generating a policy and charging control (PCC) rule based on the request; identifying a first metering object of a plurality of metering objects as currently applicable to the subscriber, wherein the first metering object includes a first monitoring key; and transmitting the PCC rule and the first monitoring key to the PCEN for installation. Various embodiments additionally include, after transmitting the PCC rule and the first monitoring key. identifying a second metering object of the plurality of metering objects as currently applicable to the subscriber, wherein the second metering object includes a second monitoring key; and transmitting the second monitoring key to the PCEN for installation in association with the PCC rule. | 02-27-2014 |
20140059202 | DETERMINING THE TYPE OF A NETWORK TIER - Examples disclosed herein relate to determining the type of a network tier. Examples include determining that a target network tier is a forwarding type network tier if a protocol of communications between the target network tier and a source network resource is the same as a protocol of communications between the target network tier and a backend network tier. Examples further include comparing select content of communications between the target and backend network tiers to select content of communications between the target network tier and the source networking resource, if the protocols are the same. | 02-27-2014 |
20140059203 | PREVENTION OF COALITION ATTACKS IN SOCIAL NETWORK COMMUNITIES - A report handler may receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim, and a source analyzer may determine at least one subset of the reporters. A content analyzer may determine a reference to the at least one potential victim in network activities of the at least one subset, and a review requester may generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset. | 02-27-2014 |
20140059204 | SYSTEMS AND METHODS FOR PROVIDING MESSAGE FLOW ANALYSIS FOR AN ENTERPRISE SERVICE BUS - A mechanism for providing message flow analysis for an enterprise bus service (ESB) system is disclosed. A method includes identifying, by a computing device executing the ESB system, messages exchanged in the ESB system in a time interval. The method also includes recording, by the computing device, a number of the identified messages exchanged in the time interval. The method further includes generating, by the computing device, a result that depicts the recorded number of the identified messages in the time interval. | 02-27-2014 |
20140059205 | SYSTEMS AND METHODS FOR SUPPORTING A NETWORK PROFILE - The present solution is directed to a system for specifying a source internet protocol (IP) address used by an intermediary device for a connection to a server. The system includes a device intermediary to a plurality of clients and a server. The device may have a net profile for sending traffic to servers. The net profile specifies one or more internet protocol (IP) addresses to use as a source IP address for a connection between the device and the server. The device receives a request from a client of the plurality of clients via a first transport layer connection between the client and the device, identifies the net profile for the request, and establishes, responsive to the request, a second transport layer connection between the device and the server using an IP address | 02-27-2014 |
20140059206 | SYSTEM AND METHOD FOR NETWORK TRAFFIC AGGREGATION AND ANALYSIS OF MOBILE DEVICES USING SOCKET WRAPPERS - This disclosure describes systems, methods, and apparatus for per-application network traffic monitoring by extending socket functionality to include socket wrappers able to identify network traffic volume, applications responsible for the traffic, the network being loaded, and distinguish between internal device traffic and external network traffic. Network traffic shaping can then be carried out by managing an offending application's traffic. | 02-27-2014 |
20140059207 | CLIENT PLACEMENT IN A COMPUTER NETWORK SYSTEM USING DYNAMIC WEIGHT ASSIGNMENTS ON RESOURCE UTILIZATION METRICS - A system and method for placing a client in a computer network system uses continuously variable weights to resource utilization metrics for each candidate device, e.g., a host computer. The weighted resource utilization metrics are used to compute selection scores for various candidate devices to select a target candidate device for placement of the client. | 02-27-2014 |
20140059208 | Methods, Systems, and Products for Monitoring Domain Name Servers - Methods, systems, and products infer performance of a domain name system. Queries to, and responses from, the domain name system are logged and categorized. Each category is associated with a different performance issue related to the domain name system. The number of entries in each category may be used to infer the performance of the domain name system | 02-27-2014 |
20140059209 | STATE MAINTENANCE AS A SERVICE - When a stateful service is implemented in a cloud architecture, a state service system receives a user interface definition for a service and generates a client proxy and optionally a storage proxy. The stateful service implements service instances to service requests from clients. The client proxy receives and logs messages from a client in a state service component and a storage proxy logs interactions with a data store. When a service instance serving existing clients is changed, the proxies replay the logged information to the new service instance to recover or maintain state for individual client sessions. | 02-27-2014 |
20140059210 | STREAM PROCESSING WITH RUNTIME ADAPTATION - Embodiments of the disclosure include a system for providing stream processing with runtime adaptation, having a stream processing application that receives an incoming data stream and a runtime infrastructure configured to execute the stream processing application. The system also includes an orchestrator configured to communicate with the runtime infrastructure and the stream processing application, the orchestrator configured to perform a method. The method includes registering one or more events, wherein each of the events is associated with a stream processing application. The method also includes monitoring, by a processor, for an occurrence of the one or more events associated with the stream processing application, wherein each of the one or more events is associated with one or more runtime metrics. The method further includes receiving an event notification, wherein the event notification includes event identification and an event context and executing an adaptation of the stream processing application. | 02-27-2014 |
20140059211 | PROCESS OBSERVER AND EVENT TYPE LINKAGE - The disclosure generally describes computer-implemented methods, software, and systems for monitoring processes. A computer-implemented method includes receiving, at a process-observer-enabled server, a communication from a non-process-observer-enabled server; translating at least event information in the communication from a non-process-observer-compatible format to a process-observer-compatible format; adding an event in the process-observer-compatible format to a process observer queue for subsequent processing by a process observer with other events. In a process observer, the events are processed from the process observer queue, application events are correlated with the defined a workflow/process model, and process instances are created in a process log. | 02-27-2014 |
20140059212 | STREAM PROCESSING WITH RUNTIME ADAPTATION - Embodiments of the disclosure include a method for providing stream processing with runtime adaptation includes registering one or more events, wherein each of the events is associated with a stream processing application. The method also includes monitoring, by a processor, for an occurrence of the one or more events associated with the stream processing application, wherein each of the one or more events is associated with one or more runtime metrics. The method further includes receiving an event notification, wherein the event notification includes event identification and an event context and executing an adaptation of the stream processing application. | 02-27-2014 |
20140059213 | METHOD AND APPARATUS FOR A RECOMMENDATION SYSTEM BASED ON TOKEN EXCHANGE - Recommendation system based on the actions of a group of users, and not requiring prior metadata, is provided. The recommendation is not limited to from user-to-item (e.g. media recommendation) type; e.g. from user-to-user (e.g. social networking), from item-to-item (e.g. “see also” in internet shopping) and item-to-user (e.g. advertizing) recommendations are supported. The solution utilizes a set of identifiable tokens, associated with each entity, an entity being either a user or an item. Whenever there is an interaction between entities, either existing token sets are updated or new token sets are created such that after an interaction each interacting entity is associated with a token set which resembles more than before the token set(s) associated with the other interacting entity. Recommendation can be produced by searching best matching token sets on the user-to-item, user-to-user, from item-to-item or item-to-user basis. | 02-27-2014 |
20140059214 | COMMUNICATION BLOCK APPARATUS AND COMMUNICATION BLOCK METHOD - A communication block apparatus that blocks communication by an information processing apparatus connected to a network. The communication block apparatus includes a guide unit that guides information transmitted from the information processing apparatus, an identification information acquisition unit that acquires identification information for identifying a notified party of a message from the message of a predetermined protocol higher than a transport layer, the message including information guided by the guide unit, a permission determination unit that determines whether to permit communication by the message at least based on the identification information acquired by the identification information acquisition unit, and a communication permission unit that forwards the message to permit the communication by the information processing apparatus when the permission determination unit determines to permit the communication, regardless of the block of the communication by a communication block unit. | 02-27-2014 |
20140059215 | SYSTEM AND METHOD FOR ENSURING INTERNET PROTOCOL (IP) ADDRESS AND NODE NAME CONSISTENCY IN A MIDDLEWARE MACHINE ENVIRONMENT - A system and method can ensure Internet Protocol (IP) address and node name consistency when performing remote transactions via multiple un-related IP addresses for the same remote peer. The system can ensure that all cooperating peer nodes are in full agreement of the names and IP addresses at any point in time. In particular, when network configurations can be updated dynamically, the system can ensure that such updates do not lead to inconsistent or failed transactions because a peer node has a stale view of what addresses to use. Furthermore, the peer node that initiates the transaction can verify that all the other peer nodes have exactly the same view of the overall system configuration, in order to ensure that each distributed transaction is carried out using consistent address information. | 02-27-2014 |
20140059216 | METHODS AND SYSTEMS FOR NETWORK FLOW ANALYSIS - A system and method comprising: receiving network flow data; identifying a peer to peer network flow within the network flow data comparing the peer to peer network flow to a known peer to peer application flow; labeling the peer to peer network flow as the known peer to peer application flow when the peer to peer network flow matches the known peer to peer application flow; and creating a data set to be associated with the labeled peer to flow. | 02-27-2014 |
20140059217 | METHOD FOR CONTENT CHANGE NOTIFICATION IN A CLOUD STORAGE SYSTEM, A CORRESPONDING CLOUD BROKER AND CLOUD AGENT - A method for notification of content changes across different applications that share same content in a cloud storage system comprises: registering at a cloud IO broker applications that require content change notification; informing a cloud IO agent about content for which applications registered with the cloud IO broker for content change notification; monitoring content changes in the cloud storage system and upon each change of a content item: sending a first content change notification from the cloud IO agent to each cloud IO broker that requested content change notification for that content item; identifying at the cloud IO broker applications registered for content change notification for that content item; and multicasting a second content change notification from the cloud IO broker to all applications registered for content change notification for that content item. | 02-27-2014 |
20140059218 | SYSTEM, APPARATUS AND METHOD FOR MANAGING CLIENT DEVICES WITHIN A WIRELESS NETWORK - According to one embodiment, a system and computer-readable storage medium for storage of software directed to the management of associations between network devices is described. The computer-readable storage medium comprising instructions which, when executed by at least one hardware processor on a network device, causes performance of operations, comprising: (1) determining a desired operating state for a client device under analysis, the client device being associated with a first network device of a plurality of network devices; (2) detecting if a triggering event has occurred based on a comparison of the desired operating state for the client device under analysis to an actual operating state for the client device under analysis; and (3) in response to detecting that the triggering event has occurred, causing the client device to wirelessly connect to a second network device of the plurality of network devices in lieu of the first network device. | 02-27-2014 |
20140059219 | MONITORING THE HEALTH OF WEB PAGE ANALYTICS CODE - A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server. The monitoring service can attempt to render any analytics code on the web pages to see if the analytics code renders or executes as expected. The monitoring service can also perform basic text searches to identify analytics code, even if it cannot be rendered, and to determine if such code is present and correctly written in the web page. For web pages that require form input, the monitoring service can prompt the user for corresponding input, or retrieve pre-recorded user input from a store. The monitoring service can determine analytics health for web pages of interest in real-time. | 02-27-2014 |
20140059220 | METHOD FOR RECOGNIZING THE LOCATIONS OF ELECTRIC APPLIANCES - The present invention relates to a method for recognizing the locations of electric appliances. The method for recognizing the locations of electric appliances according to one embodiment includes: a step of the electric appliances starting communication; a step of said electric appliances recognizing basic information required for recognizing the locations thereof; and a step of the locations of said electric appliances being recognized on the basis of the recognized basic information. | 02-27-2014 |
20140068052 | ADVANCED NOTIFICATION OF WORKLOAD - Providing advanced notification of workload. A reference to a second website provided to a first website for posting by the first website can be identified. Information associated with the first website can be analyzed to determine whether the reference to the second website will cause an increase in workload to the second website. Responsive to determining the reference to the second website will cause the increase in workload to the second website, an alert can be communicated to the second website or an entity that manages the second website, the alert indicating that the increase in workload to the second website will occur. | 03-06-2014 |
20140068053 | CLOUD ARCHITECTURE RECOMMENDER SYSTEM USING AUTOMATED WORKLOAD INSTRUMENTATION - A method, system, and computer program product for of configuring cloud computing platforms. One such method serves for recommending alternative computing architectures for a selected application using automated instrumentation of the application under an abstracted workload. The method commences by measuring workload characteristics of the selected application using pre-determined performance parameters. Additional performance parameters to be measured are selected based on previous measurements, and further analysis includes instrumenting the application to provide measurement instruments corresponding to the respective selected additional performance parameters. Such hardware- or software-based instruments are used for determining a baseline set of performance metrics by measuring the performance of the selected application on a first (e.g., currently-in-use) computing architecture, then, measuring the performance of the application on other proposed computing architectures. Charts and reports are used for comparing the performance of the selected application on the currently-in-use architecture to any of the other proposed computing architectures. | 03-06-2014 |
20140068054 | TRACE ROUTE COMMAND EXECUTION FROM A VIRTUALIZED ENVIRONMENT - A traceroute command may be used to diagnose a computer network or provide additional information regarding a computer network. A traceroute command may be provided to applications executing within a virtualized environment by allowing commands to be passed from the virtualized environment to a host operating system through a network interface. The traceroute command may be executed by the host operating system, and network information returned to the application in the virtualized environment. | 03-06-2014 |
20140068055 | RESOURCE SHARING IN COMPUTER CLUSTERS ACCORDING TO OBJECTIVES - A method of assigning resources of a computer duster with resource sharing according to objectives. The method includes monitoring resources of each of a plurality of cloud nodes, providing information descriptive of the cloud node resources, receiving a reservation, determining whether resources are available to satisfy the reservation and any other pending reservations, if resources are available, using a rapid search to determine resource assignments for the reservation and any other pending reservations according to one or more objectives, and allocating resources according to the resource assignments. | 03-06-2014 |
20140068056 | COMPUTER CLUSTER WITH OBJECTIVE-BASED RESOURCE SHARING - A computer cluster with objectives-based resource sharing. The cluster includes cloud nodes each with one or more resources, a terminal, data storage, and an allocation node to monitor cloud node resources, provide information descriptive of the cloud node resources to a customer through the terminal, receive a reservation for cloud node resources from the customer, store the reservation in the data storage, determine assignments of the cloud node resources for the reservation and any other pending reservations according to one or more objectives, and allocate the cloud node resources to customers according to the resource assignments. | 03-06-2014 |
20140068057 | Automatic Completeness Checks of Network Device Infrastructure Configurations During Enterprise Information Technology Transformation - A system and an article of manufacture for automatically determining configuration completeness during information technology (IT) transformation from a pre-transformation source environment to a post-transformation target environment include obtaining a record of each of multiple data flows in a source environment, transforming each data flow in the source environment to a transformed data flow that corresponds to a target environment, and automatically determining that each of the transformed data flows is covered by a firewall configuration of one or more interfaces in the target environment. | 03-06-2014 |
20140068058 | USAGE-BASED SORTING OF LOCAL NETWORK SERVICES - The disclosed embodiments provide a system that facilitates use of local network services from an electronic device. During operation, the system obtains a usage pattern associated with use of the local network services by a user of the electronic device. Next, upon detecting a subsequent request from the user for a list of the local network services in proximity to the electronic device, the system organizes the list based on the usage pattern. | 03-06-2014 |
20140068059 | APPROXIMATION OF THE PHYSICAL LOCATION OF DEVICES AND TRANSITIVE DEVICE DISCOVERY THROUGH THE SHARING OF NEIGHBORHOOD INFORMATION USING WIRELESS OR WIRED DISCOVERY MECHANISMS - A method of constructing an approximate spatial representation of electronic devices in a neighborhood of devices is described. The method may include collecting data from electronic devices within a range, wherein the data comprises one or more of a unique identifier for an electronic device, endpoints of original electronic devices, and level of indirection of a discovered endpoint and building a data collection representing a neighborhood of electronic devices from the collected data. The collected data may further include relative distance or received signal strength indication or other information about physical location of the electronic device. | 03-06-2014 |
20140068060 | TIME DATA COLLECTION SYSTEM - In accordance with one embodiment, a time data collection system includes a storage unit, a reception unit configured to receive an information input by a user in a process that the user is looking at and listening to content and a control unit configured to accumulate time data of when the information is received in the reception unit and store the time data in the storage unit. | 03-06-2014 |
20140068061 | METHODS AND APPARATUS FOR DETECTING AND FILTERING FORCED TRAFFIC DATA FROM NETWORK DATA - A non-transitory processor-readable medium is provided that stores code representing instructions to be executed by a processor to filter data associated with an entity for a first predefined time period in response to an access by the entity at a first time to a preselected network location from a plurality of preselected network locations. The plurality of preselected network locations are associated with forced web traffic patterns. The processor is also caused to filter data associated with the entity for a second predefined time period in response to an access by the entity at a second time to a preselected network location from the plurality of preselected network locations during the first predefined time period. The second time is after the first time. | 03-06-2014 |
20140068062 | CONTENT-RECEPTION DEVICE - A content-reception device includes a clock-time measurement unit that measures a current time, a communication unit connected via a network to a server that operates as a content-service provider that distributes content via the network, a memory unit that stores connection-setting information that indicates by associating a clock-time setting that indicates a plurality of connecting clock times when the communication unit is connected to the server, and an address of the server, a communication-control unit that connects the communication unit to the server based on the connection-setting information, and transfers predetermined data from the server to the communication unit at a time when any of a plurality of connecting clock times indicated by the clock-time setting matches the current time indicated by the clock-time measurement unit, a transfer-performance measurement unit, and a display-control unit. | 03-06-2014 |
20140068063 | TELEMETRY MONITORING APPARATUS - There is disclosed a telemetry monitoring apparatus for remotely monitoring a plurality of users, such as firefighters, working in a hazardous environment. The apparatus comprises a plurality of portable devices, each arranged to be associated with breathing apparatus worn by a user, and at least one central monitoring station onto which portable devices can be logged on and monitored. The portable devices are arranged to transmit a logon message including an identifier identifying either the user or the portable device. | 03-06-2014 |
20140068064 | METHOD FOR QOS MANAGEMENT IN HOME AND ROAMING SCENARIOS BASED ON LOCATION/APP SERVER ASSISTANCE - The disclosure is related to managing, at an application server, a quality of service (QoS) provided for an application executing on a client device. An aspect receives, from the client device, an identifier of a first network servicing the client device, determines a QoS of a supplemental link established by a second network for the application, determines whether or not the QoS of the supplemental link meets requirements of the application, and determines whether or not the first network is able to support an alternative acceptable QoS when the QoS of the supplemental link does not meet the requirements of the application. | 03-06-2014 |
20140068065 | FILTERING RECORDED INTERACTIONS BY AGE - Systems and methods for the forming of user device groups are presented. In one example, a message including location information indicating a geographic location of a first user device is received from the first user device. Values representing logical connection strengths between the first user device and other user devices are calculated using the location information. A first device group is determined for the first user device based on the calculating of the values representing the logical connection strengths, the first device group including a plurality of the other user devices. | 03-06-2014 |
20140068066 | Method and System for Reporting Location Information of Mobile Terminal - The disclosure discloses a method and a system for reporting location information of mobile terminal. The method includes that: a service server sends page information to a connected mobile terminal, wherein the page information contains a label indicating reporting of location information is required; and after parsing out from the received page information the label indicating reporting of location information is required, the mobile terminal acquires the location information of the mobile terminal, and reports the obtained location information to the service server. With the present disclosure, reporting of the location information of a mobile terminal and the Location Based Service are implemented independent of the JavaScript. | 03-06-2014 |
20140068067 | PROPAGATING A DIAGNOSTIC SESSION FOR BUSINESS TRANSACTIONS ACROSS MULTIPLE SERVERS - The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. In an embodiment, a method for monitoring an application may begin with detecting a diagnostic event. A diagnostic identifier may be associated with the request in response to the diagnostic event. An outgoing call may be detected at a first server associated with processing the request. The outgoing call may be modified at the first server to include the diagnostic identifier, the outgoing call with the diagnostic identifier received by a remote computer. | 03-06-2014 |
20140068068 | PERFORMING CALL STACK SAMPLING - The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. A method for sampling an application thread to monitor a request may begin with detecting a diagnostic event with respect to the processing of a request. A thread call stack associated with the request may be sampled in response to detecting the diagnostic event. A state of the call stack may be stored with timing information based on the sampling. The call stack state and timing information may be transmitted to a remote server. | 03-06-2014 |
20140068069 | CONDUCTING A DIAGNOSTIC SESSION FOR MONITORED BUSINESS TRANSACTIONS - The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. A method for performing a diagnostic session for a request may begin with initiating collection of diagnostic data associated with a request. An application thread on each of two or more servers may be sampled. The application threads may be associated with the same business transaction and the business transaction may be associated with the request. The diagnostic data may be stored. | 03-06-2014 |
20140068070 | SCALABLE OFF-LOAD OF APPLICATIONS FROM SWITCH TO SERVER - Systems include a network element with a plurality of server blades, including a control server and one or more application servers. The control server communicates with each application server to acquire state information about each application server. A switch is in communication with each server blade. The switch is configured to communicate with the control server in order to obtain therefrom the state information acquired by the control server about each application server. | 03-06-2014 |
20140068071 | SERVER CONSOLIDATION - A method for server consolidation is provided. The method includes collecting performance data of a plurality of source servers in a desired environment, selecting a group of one or more source servers from the plurality of source servers for consolidation, marking each source server in the with one of multiple usability statuses with one of such statuses indicates the marked source server is to be replaced or reused as necessary in the server consolidation, selecting a target platform for a new server, and performing a first server consolidation analysis of the first group based at least on the collected performance data, the initial usability status of each source server in the first group, and the first selected target platform. | 03-06-2014 |
20140068072 | METHOD, DEVICE, AND SYSTEM FOR ACQUIRING COST BETWEEN NODES - Embodiments of the present invention disclose a method, a device, and a system for obtaining a cost between nodes. The method includes: receiving, by a first server, a first cost request message from a client, where the first cost request message includes a first source node list, a first candidate node list, and a cost type; and calculating a cost between each source node in the first source node list and each candidate node in the first candidate node list according to the cost type. Network traffic management and optimization are implemented by using the technical solutions provided in the embodiments of the present invention, in which a cost between nodes is acquired from servers hierarchically deployed by an Internet service provider ISP and used as a basis of node selection. | 03-06-2014 |
20140068073 | METHOD AND SYSTEM FOR EFFICIENT DEPLOYMENT OF WEB APPLICATIONS IN A MULTI-DATACENTER SYSTEM - A system for computing an optimal deployment of at least one web application in a multi-datacenter system comprising a collector for collecting performance measurements with regard to a web application executed in the multi-datacenter system and grouping the performance measurements according to locations of a plurality of clients accessing the web application; a data repository for maintaining at least a performance table including at least the performance measurements grouped according to the plurality of client locations and a service level agreement (SLA) guaranteed to clients in the plurality of client locations; and an analyzer for processing at least information stored in the performance table for generating a recommendation on an optimal deployment of the web application in at least one combination of datacenters in the multi-datacenter system by computing an expected SLA that can be guaranteed to the clients in each combination of datacenters. | 03-06-2014 |
20140075007 | Zero Copy Data Transfers without Modifying Host Side Protocol Stack Parameters - Mechanisms are provided for instigating the sending of an acknowledgement response from a host system. A buffer of a data processing system is monitored to determine if there is a data transfer pending in the buffer. In response to a determination that there are no data transfers pending in the buffer, a determination is made as to whether there is an outstanding data transfer, on a corresponding network connection with the host system, for which an acknowledgement response has not been received from the host system. In response to a determination that there is an outstanding data transfer for which an acknowledgement response has not been received, an acknowledgement instigation message is sent to the host system to instigate the host system sending an acknowledgement response for the outstanding data transfer. | 03-13-2014 |
20140075008 | Distributed Maintenance Mode Control - A distributed maintenance mode system and method includes receiving an indicator that a monitored system has entered maintenance mode. Trap data is received for the monitored system. It is determined whether the monitored system is in maintenance mode based on the indicator. The trap data is stored and a billable incident ticket is generated for the monitored system if it is determined that the monitored system is not in maintenance mode. The trap data is stored and no billable incident ticket is generated for the monitored system if it is determined that the monitored system is in maintenance mode. | 03-13-2014 |
20140075009 | DYNAMIC MANAGEMENT AND REDISTRIBUTION OF CONTACT CENTER MEDIA TRAFFIC - A system that supports multiple contact centers includes a communications network that is coupled between a private network (e.g. MPLS network) and a remote computing environment (e.g. cloud environment). A server system in the remote computing environment monitors health of different network segments (e.g. bandwidth of the connection between the communications network and the remote computing environment, bandwidth of a link used by a tenant to access the private network, etc.). When it is determined that quality of service for voice conversations for one or more contact centers is at risk due to a health status parameter of a network segment reaching a threshold, an appropriate system reaction is triggered. The system reaction may be to offload future calls to a peer remote computing environment to service future calls. The system reaction may also be to cancel outbound campaigns, provide pre-determined “sorry” messages, and the like. | 03-13-2014 |
20140075010 | DEVICE DISCOVERY USING BROADCAST TECHNOLOGY - Techniques described herein automatically discover the IP address of a first network device such as but not limited to a multifunction printer. Such techniques use a unique identifier of the first network device, such as for example a multifunction printer serial number. Such unique number is used in the configuration of a second network device, such as for example a Digital Front End/External Print Controller that may need the IP address of the first network device. The unique number may be entered once into the second network device or may be received from the first network device through a data interface by the second network device. Techniques then may use any available broadcast technology such as but not limited to Simple Network Management Protocol (SNMP) to determine from available network devices which network device therefrom has the same unique number, thereby obtaining the IP address of the first network device. | 03-13-2014 |
20140075011 | PROVIDING A MOBILE ACCESS POINT - Disclosed are methods and apparatus for providing an access point for connection to the Internet. The methods may be performed using one or more user devices (e.g. smartphones or other mobile communications devices) which may be part of a residential Local Area Network or “home” network. A user device may detect that a connection to the Internet via a first access point is unavailable. This connection may be via a residential gateway. In response to the detection that Internet connectivity via the first access point is unavailable, a user device (e.g. the same or different user device) may activate a second access point (e.g. a wireless or mobile access point) to the Internet for use by other user devices. Other user devices may then connect to the Internet using this second access point. The second access point may be de-activated if Internet connectivity via the first access point is re-established. | 03-13-2014 |
20140075012 | MANAGING A DATA RATE BASED ON AN AMOUNT OF AVAILABLE DATA FOR A PREDETERMINED TIME PERIOD - An apparatus for managing a data rate based on an amount of available data for a predetermined time period includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a target data rate for data communication over a network by a network device. The target data rate is based on an amount of available data for a predetermined time period and an amount of time remaining in the predetermined time period. The machine-readable code includes a data rate module maintaining the data rate at or below the target data rate in response to the determination module determining the target data rate. | 03-13-2014 |
20140075013 | METHOD FOR VIRTUAL MACHINE MONITORING IN CLOUD INFRASTRUCTURES - A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine. | 03-13-2014 |
20140075014 | PROGRESSIVE ACCOUNT STATES FOR AGGREGATE WEBSITE VISITORS - A method of analyzing an Internet-based communication session to use a group profile database and alter group profile states using an aggregated function of individual electronic transmissions may include receiving interactions between a visitor device and the web server as a part of a communication session, detecting that the communication session is associated with a characteristic, determining a group profile in a profile database that is associated with a plurality of communication sessions that are also associated with the characteristic, associating the communication session with the group profile, receiving information from the visitor device, determining that a group profile state associated with the group profile should be changed to a higher group profile state based on the information, receiving a request for gated content from the visitor device, and providing the content based on the higher group profile state. | 03-13-2014 |
20140075015 | METHODS AND SYSTEMS FOR MONITORING AND CONTROLLING ELECTRONIC DEVICES - Methods and systems for managing a device are described. A device agent may receive device information associated with a device, such as information concerning operation of the device. The device agent may be configured to maintain a device model or operating protocol associated with the operation of the device, such as various operational parameters, operating characteristics and/or programs. The device agent may monitor the device based on the device information streamed, for example, in substantially real time from the device. A central management system may be in communication with the device agent and may operate to verify and/or update the device model based on the device information. The device information may be presented to client devices, for instance, through a graphical user interface. The client devices may also be able to transmit control signals to the central management system for controlling various aspects of the device. | 03-13-2014 |
20140075016 | OVERAGE FRAMEWORK FOR CLOUD SERVICES - Provisioning, managing and tracking of services provided by a cloud infrastructure system are described. A subscription request from a customer for one or more services provided by the cloud infrastructure system is received. Resources for the requested services are then provisioned. Resource usage information for the resources is collected and an overuse of the resources provisioned to the services in the subscription request, by a customer is determined. The overage information is provided to the customer. | 03-13-2014 |
20140075017 | MECHANISM FOR FACILITATING A QUORUM-BASED COORDINATION OF BOOKER HEALTH FOR MANAGEMENT OF RESOURCES FOR APPLICATION SERVERS IN AN ON-DEMAND SERVICES ENVIROMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating a quorum-based coordination of broker health for management of resources for application servers in an on-demand services environment. In one embodiment and by way of example, a method includes monitoring, via health checkers, health of a cluster of brokers in a distributed environment having application servers in communication over a network, receiving an indication from at least one health checker that a broker is failing, wherein the broker is associated with a cluster of worker nodes, collecting health status reports relating to the broker from the health checkers, examining the health status reports based on a quorum-based voting policy, and classifying the broker as unhealthy if, based on the quorum-based voting policy, a percentage of the health status reports regards the broker as failed, wherein the percentage is greater than a first threshold percentage. | 03-13-2014 |
20140075018 | Systems and Methods of Audience Measurement - A particular method includes receiving, at a computing device including a processor, a first event signal that includes a first browser identifier and first information indicative of a first interaction with respect to a media property. The method also includes determining that the first browser identifier corresponds to a particular user and associating the first event signal with a user profile of the particular user. The method further includes receiving a second event signal that includes a second browser identifier that is different from the first browser identifier and second information indicative of a second interaction with respect to the media property. The method includes determining that the second browser identifier corresponds to the particular user and associating the second event signal with the user profile. | 03-13-2014 |
20140075019 | SYSTEM AND METHOD FOR PROVIDING A SERVICE MANAGEMENT ENGINE FOR USE WITH A CLOUD COMPUTING ENVIRONMENT - A system and method for providing a service management engine for use with a cloud computing environment. In accordance with an embodiment, enterprise software applications (e.g., Fusion Middleware applications) can be instantiated as services within a cloud platform, where they are then made accessible by other (e.g., customer) applications. In an embodiment, a service management engine (SME), in communication with an orchestration engine, can be used to provision services as one or more different service types, according to a service definition package (SDP). Service types can be instantiated according to the configuration of the cloud platform itself, and the contents of the SDP, including discovering, provisioning, and associating service types with system resources, to address different customer requirements. | 03-13-2014 |
20140075020 | SERVER DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - A storage unit of a server device stores first identification information on a power feeding device and stores a layout drawing. The layout drawing is a drawing in which a first image indicating the power feeding device is located at a first position that corresponds to the positional information in the real space. A receiving unit receives, from the power feeding device, first data that includes the first identification information on the power feeding device and second identification information on an information processing apparatus to which the power feeding device feeds the electric power. An update unit updates the layout drawing by locating a second image indicating the information processing apparatus identified by the received second identification information at a second position that is within a predetermined area of the first position of the power feeding device identified by the first identification information included in the first data. | 03-13-2014 |
20140075021 | SYSTEM AND METHOD FOR PROVIDING A CLOUD COMPUTING ENVIRONMENT - A system and method for enabling a cloud computing environment. In accordance with an embodiment, the system can include a variety of hardware and/or software components and features, which can be used in delivering an infrastructure, platform, and/or applications to support public and private clouds. | 03-13-2014 |
20140075022 | Probe Election In Failover Configuration - A first sensor transmits one or more probes to a host device identified on a network, each probe used to obtain information regarding the host and the plurality of probes are prioritized according to probe type. A set of replies to the plurality of probes are received and it is determined that a first of the plurality of probes is the highest priority probe for which a reply from the host device was received. A second probe transmitted by a second sensor is identified as the highest priority probe for which a reply from the host device was received by the second sensor, where the first sensor is designated as a primary sensor and the second sensor is designated as a secondary sensor. Respective priorities of the probe types of the first and second probes are compared to determine whether to perform a probe handover to the second sensor. | 03-13-2014 |
20140075023 | METHODS AND APPARATUSES FOR LAWFUL INTERCEPTION THROUGH A SUBSCRIPTION MANAGER - Methods, apparatuses, and computer program products are herein provided for lawful interception through a subscription manager. In some embodiments, methods, apparatuses, and computer program products provide user subscription data to an agency, operator, or service provider in response to receiving a lawful interception request. A method may include receiving an interception request comprising a user's name from at least one operator. The method may further include determining, by a processor, an operator specific access code associated with the user's name. The method may also include providing the operator specific access code to the operator. Corresponding apparatuses and computer program products are also provided. | 03-13-2014 |
20140082175 | Connection Distribution Within A Connectional Parallelism Architecture - Example embodiments provide various techniques for distributing connections within a connectional parallelism architecture. In one embodiment, a method is provided where resource utilizations of connection groups are measured. Here, each connection group is assigned to one of multiple processors. A probability distribution is accessed that maps probabilities assigned to relative resource utilizations. A relative resource utilization of one of the connection groups is determined based on a resource utilization of the one connection group relative to other resource utilizations of other connection groups. A probability from the probability distribution is identified based on the determined relative resource utilization, and based on the identified probability, a connection is assigned to this connection group for execution by one of the processors assigned to this connection group. | 03-20-2014 |
20140082176 | USING SPECIAL-CASE HARDWARE UNITS FOR FACILITATING ACCESS CONTROL LISTS ON A NETWORKING ELEMENT - Access control lists (ACLs) include one or more rules that each define a condition and one or more actions to be performed if the condition is satisfied. In one embodiment, the conditions are stored on a ternary content-addressable memory (TCAM), which receives a portion of network traffic, such as a frame header, and compares different portions of the header to entries in the TCAM. If the frame header satisfies the condition, the TCAM reports the match to other elements in the ACL. For certain conditions, the TCAM may divide the condition into a plurality of sub-conditions which are each stored in a row of the TCAM. To efficiently use the limited space in TCAM, the networking element may include one or more comparator units which check for special-case conditions. The comparator units may be used in lieu of the TCAM to determine whether the condition is satisfied. | 03-20-2014 |
20140082177 | ASYNCHRONOUS REPORTING SYSTEM - An asynchronous reporting mechanism for a remote device in a heating, ventilation and air conditioning environment. Using gateway information, such as a device address, report information may be sent to the user account, or using another approach, the information may be sent directly to the user. An asynchronous message may be sent without user intervention or request. | 03-20-2014 |
20140082178 | METHOD AND APPARATUS FOR PROVIDING DYNAMIC STREAM PROCESSING OF DATA BASED ON STATIC ANALYTICS - An approach is provided for integrating various data processing methods for more accurate and comprehensive results. A data processing mechanism determines at least one processing element of at least one dynamic processing mechanism. Further, the data processing mechanism causes a marshalling of the at least one processing element as at least one data object, wherein the at least one data object is processable by at least one static processing mechanism. | 03-20-2014 |
20140082179 | SCARCE RESOURCES MANAGEMENT - A contact center is described along with various methods and mechanisms for administering the same. In general, methods are disclosed that are configured to analyze work assignments to determine one or more scarce resources for further management. By analyzing the attributes, that are common to a number of work assignments made over a period of time, resources possessing those attributes may be classified as scarce. These scarce resources may be managed in accordance with their demand and business rules. To efficiently handle work items associated with valued customers, the scarce resources may be removed from traditional work assignments and held in reserve. The reserved scarce resources may be applied to the valued customers' work items. | 03-20-2014 |
20140082180 | INFORMATION PROCESSOR APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processor apparatus includes a memory which stores a program, and a processor, based on the program, configured to, detect a packet that is transmitted from a management device to a second node that is included in a second network, and that triggers a request packet transmitted from the second node to a first node that is included in a first network, by monitoring communication from the management device that manages the first node and the second node that obtains data from the first node through a third network, and execute a proxy request by transmitting the request packet to the first node when the packet is detected and a connection is made with the first network. | 03-20-2014 |
20140082181 | TRIGGERING ACTIONS BASED ON CHANGES IN A NETWORK CONNECTION - The described embodiments provide a system for performing an action based on a change in a status of a wired or wireless network connection for the system. During operation, the system detects the change in the status of the network connection. In response to detecting the change, the system determines a state of the system. The system then performs one or more actions using the determined state. | 03-20-2014 |
20140082182 | SPAM FLOOD DETECTION METHODOLOGIES - A computer-implemented method analyzes a website to determine whether the website represents a potential source of spam, and, in response to the analyzing, flags content of the website as spam content. The determination can be made by computing a total number of content items associated with the website, calculating a publication frequency of the content items, and determining whether the website in its entirety represents spam content based on the total number and the publication frequency. The determination could also be made by generating a signature of a webpage containing a content item, obtaining an occurrence count for the generated characterizing signature, and, when the obtained occurrence count is greater than a threshold count, identifying the content item as spam. | 03-20-2014 |
20140082183 | DETECTION AND HANDLING OF AGGREGATED ONLINE CONTENT USING CHARACTERIZING SIGNATURES OF CONTENT ITEMS - A computer-implemented method is disclosed herein. The method obtains a first content item from an online source, and selects only a portion of the words in the first content item, in accordance with a defined selection algorithm. The method continues by generating a characterizing signature of the first content item, wherein the characterizing signature is derived from the selected words. The method continues by finding a previously-saved instance of the characterizing signature, retrieving data associated with a second content item (which is linked to the saved characterizing signature), and comparing the data associated with the second content item against corresponding data associated with the first content item. The first content item or the second content item is identified as an original content item, based on the comparing. The other content item is flagged as an aggregated content item. | 03-20-2014 |
20140082184 | METHOD AND SYSTEM FOR MONITORING EXECUTION OF USER REQUEST IN DISTRIBUTED SYSTEM - Embodiments of the present application relate to a method, a system and a computer program product for monitoring execution of a user request on a distributed system. A method for monitoring execution of user requests on a distributed system is provided. The method includes sampling a user request received by a plurality of servers, generating an identifier corresponding to the user request sampled by the plurality of servers, injecting tracking interfaces in advance into processes executed by the plurality of servers, determining whether the current process contain the identifier corresponding to the user request, in the event that the current process contains the identifier corresponding to the user request when the process has executed the tracking interface, recording information corresponding to the identifier relating to the function indicated by the tracking interface and generating a log, and individually collecting the generated log according to the corresponding identifier. | 03-20-2014 |
20140082185 | SYSTEMS AND METHODS FOR TRANSMITTING AND RECEIVING DISCOVERY MESSAGES - Methods, devices, and computer program products for transmitting and receiving discovery messages in a wireless communication device are described herein. One aspect of the subject matter described in the disclosure provides a method of discovering devices in a wireless communication system. The method includes receiving a first discovery message from a first device of a device cluster comprising a plurality of devices during a first discovery interval. The first discovery message includes information associated with the device cluster. The method further includes transmitting a discovery trigger message in response to the first discovery message. The method further includes receiving a second discovery message from at least one device of device cluster during a second discovery interval. The second discovery message is configured to advertise a plurality of services provided by the at least one device of the device cluster in response to the discovery trigger message. | 03-20-2014 |
20140082186 | BUSINESS INTELLIGENCE-INFUSED SMART RETRANSMISSION PROCESSING - Business intelligence (BI) information that includes at least one application-level directive associated with a received application-level request is collected at a BI framework situated between a transport adapter layer and a network layer of a computing device. A determination is made as to whether to defer transmission of the received application-level request based upon an evaluation of the at least one application-level directive within the collected BI information relative to current network transmission conditions. The received application-level request is stored locally in response to determining to defer transmission of the received application-level request based upon the evaluation of the at least one application-level directive within the collected BI information relative to the current network transmission conditions. | 03-20-2014 |
20140082187 | Using eBook Reading Data to Generate Time-Based Information - Reading data from an eBook is used to generate time-based information. Timing reports are received from a plurality of clients. The timing reports describe reading time intervals for reading portions of an eBook on the clients. Timing reports from different clients describe reading time intervals for different overlapping portions of the eBook. The overlapping portions are analyzed to generate timing information. The timing information describes reading speeds for granular portions of the book that are smaller than the portions described in the reading time intervals. The timing information is stored. Timing information is provided to a client enabling the client to provide advanced features. The features include estimating a user's current reading position and providing an estimate of the time required by the user to finished reading a portion of the eBook. | 03-20-2014 |
20140082188 | GEOFILTERING FOR CONTENT BY LOCATION - In one embodiment, a method receives a first request from a user device for content. First geolocation information for the user device is determined. The method facilitates a determination whether the first geolocation information complies with a geographical restriction associated with the content. Then, the method receives second geolocation information provided by the user device from a media server that received a second request for the content from the user device and a token generated based on the first geolocation information complying with the geographical restriction. A determination whether the second geolocation information complies with the geographical restriction associated with the content is facilitated where the determination causes a message indicating whether to allow or deny the second request to be sent to the media server. | 03-20-2014 |
20140082189 | INTELLIGENT MANAGEMENT OF APPLICATION CONNECTIVITY - Network connectivity is selectively established by monitoring, on a client, communications activity incident to accessing a network, the communications activity including a request to access the network. An application associated with the communications activity is be identified. A communications configuration associated with the application is accessed, the communications configuration indicating how the application is configured to access the network. Network connectivity is selectively established based on the communications configuration, and the application may be enabled to access the network to support the communications activity. | 03-20-2014 |
20140082190 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR WIRELESS NETWORK DEPLOYMENT - Systems, methods, and computer-readable media for wireless network deployment are disclosed. The systems, methods, and computer-readable media receive data from one or more client devices regarding one or more data sessions, wherein the received data comprises one or more identifiers and one or more data session characteristics. The systems, methods, and computer-readable media determine one or more locations associated with the one or more data sessions based on the one or more identifiers, and determine one or more deployment values for each of the one or more locations associated with the one or more data sessions based on the one or more data session characteristics. In addition, systems, methods, and computer-readable media output data associated with one or more wireless network deployment candidate locations based on the one or more locations associated with the one or more data sessions and the one or more deployment values. | 03-20-2014 |
20140082191 | VERIFYING WORK PERFORMED BY UNTRUSTED COMPUTING NODES - Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes. | 03-20-2014 |
20140082192 | PROCESSING METHOD, DISTRIBUTION SERVER, CLIENT, AND SYSTEM FOR STREAMING MEDIA - Embodiments of the present invention disclose a processing method, distribution server, client and system for streaming media. The method comprises: receiving content segment request information sent by a client; acquiring resource information of a wireless network where the client is located; predicting a data transmission rate of the wireless network according to the resource information; selecting a content segment matching the data transmission rate; and sending the content segment to the client. In embodiments of the present invention, a distribution server predicts the data transmission rate of the wireless network where the client is located and further selects the content segment with a bitrate matching the data transmission rate for the client, thereby making the bitrate of the content segment sent to the client more appropriate, realizing overall regulation of the bandwidth condition of the cellular wireless network, stable reduction of network congestion, and solving the problem of network congestion. | 03-20-2014 |
20140082193 | TRACKING MAXIMUM THROUGHPUT AND SERVICE LEVEL AGREEMENT COMPLIANCE - A system and method for controlling maximum throughput for communications. A frame size of each packet communicated to a server is determined. A maximum throughput is determined by converting the determined frame size of each packed communicated to the server to an effective throughput rate. Frames per second are measured at the server. An amount of loss at the server is determined. A message indicating the maximum throughput, the amount of loss, and the frames per second is communicated in response to determining there is loss at the server. | 03-20-2014 |
20140089489 | CONFIDENCE BASED NETWORK MANAGEMENT - A method, apparatus, and machine readable storage medium is disclosed for managing a communication network wherein statistics are collected and next expected values for the statistics are calculated based on batch mean and confidence interval calculations and an alarm is raised if the next expected value exceeds a threshold. | 03-27-2014 |
20140089490 | SYSTEMS AND METHODS FOR EXTENDING ANY SERVICE TO EXISTING SYSTEMS BY USING AN ADAPTIVE COMMON INTERFACE - Aspects of the present disclosure extend to methods and systems for extending services to existing enterprise systems. In various aspects, one or more service clients may be implemented to provide various functionalities for invoking a specific service that may be protocol dependent. The service client defines a set of standard service properties to specify how to access the specific service. An asset of an enterprise system intending to consume the service may integrate with the service client of the specific service and provide the standard service properties to the service client for service invocation. | 03-27-2014 |
20140089491 | ADDRESS ASSIGNMENT - A network device is configured to receive a request, from a user device, for an IP address; assign the IP address to the user device; assign an amount of time that the IP address may be used by the user device; send the IP address to the user device; determine that the amount of time has expired; determine that the user device is idle; assign a new IP address to the user device after the amount of time has expired and when the user device is idle; send the new IP address to the user device; and assign a new amount of time that the new IP address may be used by the user device. | 03-27-2014 |
20140089492 | DATA COLLECTION AND CONTROL BY NETWORK DEVICES IN COMMUNICATION NETWORKS - Implementations provide network tasks in a communication network as performed by a network device. In some implementations, a method includes receiving instructions at a network device connected to the communication network, where the instructions define one or more conditions and define one or more associated network tasks to be performed upon occurrence of the one or more conditions. The one or more network tasks are related to activity on the communication network. The network device determines whether any of the one or more conditions have occurred. In response to any of the conditions occurring, the network device autonomously performs the one or more network tasks associated with the one or more occurring conditions as defined by the instructions. | 03-27-2014 |
20140089493 | MINIMALLY INTRUSIVE CLOUD PLATFORM PERFORMANCE MONITORING - Various exemplary embodiments relate to a method for determining performance compliance of a cloud computing service implementing an application, including: receiving an application service performance requirement; receiving a cloud computing service performance requirement; receiving non-intrusive application performance data; determining that application performance does not meet the application service performance requirement based upon the received application performance data; determining that the cloud computing service provider does not meet the cloud computing service performance requirement based upon the received application service performance data; and determining that the cloud computing system not meeting the cloud computing performance requirement substantially contributes to the application performance not meeting the application service performance requirement. | 03-27-2014 |
20140089494 | MANAGING COMPLIANCE ACROSS INFORMATION TECHNOLOGY COMPONENTS - Provided is a method of managing compliance across information technology components. A policy requiring compliance is identified, and information technology components required for determining compliance of the policy are identified from the policy. Data is obtained from the information technology components and analyzed for determining compliance of the policy. | 03-27-2014 |
20140089495 | PREDICTION-BASED PROVISIONING PLANNING FOR CLOUD ENVIRONMENTS - Various embodiments predict performance of a system including a plurality of server tiers. In one embodiment, a first set of performance information is collected for a base allocation of computing resources across multiple server tiers in the plurality of sever tiers for a set of workloads. A set of experimental allocations of the computing resources is generated on a tier-by-tier basis. Each of the set of experimental allocations varies the computing resources allocated by the base allocation for a single server tier of the multiple server tiers. A second set of performance information associated with the single server tier for each of the set of experimental allocations is collected for a plurality of workloads. At least one performance characteristic of at least one candidate allocation of computing resources across the multiple server tiers is predicted for a given workload based on the first and second sets of performance information. | 03-27-2014 |
20140089496 | APPARATUS AND METHOD FOR MONITORING WEB APPLICATION TELECOMMUNICATION DATA BY USER - Provided are an apparatus and method for monitoring web application telecommunication data by user. An information identification apparatus includes a collector collecting web application telecommunication data transmitted and received between a web server and a web client; a storage storing an identification information profile about a method of extracting user identification information by web server; and an extractor selecting user login-related web application telecommunication data among the web application telecommunication data with reference to the identification information profile, extracting a [web server address, login session identification information, and user identification information] list from the selected web application telecommunication data, extracting at least one piece of information of the web server address and the login session identification information from the web application telecommunication data after the user login, and determining whether the extracted information is matched with at least one piece of information in the list. | 03-27-2014 |
20140089497 | SYSTEM MANAGEMENT DEVICE, NETWORK SYSTEM, SYSTEM MANAGEMENT METHOD, AND PROGRAM - A first calculator calculates, for each combination of the physical machines, a network distance representing magnitude of load during communication between one of a plurality of physical machines and another physical machine. An acquisition unit acquires communication permission information representing that a newly operated virtual machine is permitted to communicate with which virtual machine among a plurality of virtual machine already operated in any one of the plurality of physical machines. A second calculator calculates, for each of the plurality of physical machines, a network cost representing magnitude of load of the network system during communication between the communication-permitted virtual machine and a new virtual machine, when one of the plurality of physical machines operates the new virtual machine on the basis of the network distance and the communication permission information. A determination unit determines which physical machine is to operate the new virtual machine, using the calculated network cost. | 03-27-2014 |
20140089498 | SYSTEM AND METHOD OF HIGH VOLUME RULE ENGINE - A rule engine configured with at least one hash table which summarizes the rules managed by the engine. The rule engine receives rules and automatically adjusts the hash table in order to relate to added rules and/or in order to remove cancelled rules. The adjustment may be performed while the rule engine is filtering packets, without stopping. The rules may be grouped into a plurality of rule types and for each rule type the rule engine performs one or more accesses to at least one hash table to determine whether any of the rules of that type match the packet. In some embodiments, the rule engine may automatically select the rule types responsive to a set of rules provided to the rule engine and adapt its operation to the specific rules it is currently handling, while not spending resources on checking rule types not currently used. | 03-27-2014 |
20140089499 | DETERMINING A UNIFORM USER IDENTIFIER FOR A VISITING USER - Determining a uniform user identifier for a visiting user is disclosed, including: generating a plurality of access sets based at least in part on the network address identifier associated with a plurality of access requests submitted by one or more visiting users, and a plurality of header field elements associated with the plurality of access requests, wherein each of the plurality of access requests includes a preliminary user identifier, the network address identifier, and the plurality of header field elements, and wherein an access set includes the network address identifier and at least some of the plurality of header field elements; determining information loss rates corresponding to respective ones of at least a subset of the plurality of access sets; and selecting an access set from the plurality of access sets based at least in part on the respective information loss rate to use to determine a uniform user identifier corresponding to a visiting user of the plurality of visiting users. | 03-27-2014 |
20140089500 | LOAD DISTRIBUTION IN DATA NETWORKS - Provided are methods and systems for load distribution in a data network. A method for load distribution in the data network may comprise retrieving network data associated with the data network and service node data associated with one or more service nodes. The method may further comprise analyzing the retrieved network data and service node data. Based on the analysis, a service policy may be generated. Upon receiving one or more service requests, the one or more service requests may be distributed among the service nodes according to the service policy. | 03-27-2014 |
20140089501 | Method for Locating a Field Device in an Automated Plant - A method for locating at least one field device in an automated plant, wherein the field device is connected via a network composed of a plurality of distributed field devices, and wherein a mobile terminal is applied for locating the field device. | 03-27-2014 |
20140089502 | SYSTEM AND METHOD FOR OBJECT ABSTRACTION AND LOGGING - A system and method of communicating with a plurality of different types of devices. A device driver is defined for each type of device. The device driver creates and maintains a set of channels for each device; each channel represents a property of the device. Newly acquired data received from one of the devices is received at the device driver and published to the channel associated with the data. Publishing the newly acquired data to the channel associated with the data includes storing the newly acquired data in a channel database with a time stamp corresponding to the time the data was received. Control information for one of the devices is received at the device driver and associated with one of the channels. The control information is passed to the device being controlled. | 03-27-2014 |
20140089503 | Automatic Connection Selection - The proposed Automatic Connection Selection (ACS) uses the domain name system (DNS) look up as the detection mechanism to indicate if the access connection is working or not. The DNS servers are centralized in the operator's network and reachability to these are a good indication of a working connection. | 03-27-2014 |
20140089504 | CORRELATION OF MEDIA PLANE AND SIGNALING PLANE OF MEDIA SERVICES IN A PACKET-SWITCHED NETWORK - This invention relates to methods for correlating media streams and signaling sessions of services, for example, in a passive monitoring system of a packet-switched network. Furthermore, the invention also relates to an implementation of these methods in hardware and software, and provides a signaling plane probe, a media plane probe and a correlation unit. Moreover, a passive monitoring system comprising one or more of these hardware devices is provided. To correlate media streams and signaling sessions of services, the invention proposes to independently generate correlation keys in a media plane probe for monitored media streams and correlation keys for signaling sessions that are monitored by a signaling plane probe in a fashion that matching correlation keys are generated for a respective service. By identifying reports on the media streams and reports on the signaling session that contain matching correlation keys respectively, the media streams and the signaling streams are correlated in a correlation unit. | 03-27-2014 |
20140095688 | SYSTEM AND METHOD FOR ENSURING HIGH AVAILABILITY IN AN ENTERPRISE IMS NETWORK - Embodiments of the present invention may enable applications that are deployed at the application layer of an IMS network to frequently carry out business critical functions via a highly available application server architecture. This may be achieved by using a session manager that manages the role of active and standby server(s) of the highly available application architecture. Further, the session manager may manage the roles of the active and standby server(s) by routing SIP messaging in either serial or parallel fashion to the application server architecture. Furthermore, the active and the standby servers are automatically kept in sync by their position in the signaling path determined by the session manager. The session manager makes sure that if the active server goes down, then the standby server must be able to take over the role of the active server in a seamless fashion. | 04-03-2014 |
20140095689 | DETERMINING INFLUENCE IN A NETWORK - An influence maximization process efficiently identifies an influential set of nodes with which to seed a diffusion process using the transposition of a graph representing the network. This approach offers an acceptable tradeoff between runtime complexity and accurate approximation. In addition, using an approximation condition, the influence maximization process may be further tuned to dramatically reduce the computational complexity even more in certain circumstances while allowing a fallback to the unturned influence maximization process if the approximation condition is not satisfied. | 04-03-2014 |
20140095690 | REAL TIME RULES ENGINE FOR POLICIES ORCHESTRATION IN A MOBILE TELECOMMUNICATIONS NETWORK - A method is provided for creating a configurable workflow in a mobile telecommunications network ecosystem including a plurality of diverse ecosystem components ( | 04-03-2014 |
20140095691 | Managing data center resources to achieve a quality of service - In accordance with some embodiments, a cloud service provider may operate a data center in a way that dynamically reallocates resources across nodes within the data center based on both utilization and service level agreements. In other words, the allocation of resources may be adjusted dynamically based on current conditions. The current conditions in the data center may be a function of the nature of all the current workloads. Instead of simply managing the workloads in a way to increase overall execution efficiency, the data center instead may manage the workload to achieve quality of service requirements for particular workloads according to service level agreements. | 04-03-2014 |
20140095692 | Tracking Usage of and Sharing Data Between Mobile Device Applications - Described herein are methods and systems for tracking usage of and sharing data between mobile device applications. A mobile device receives a first application to be installed on the mobile device. The first application includes a first notification module, a content developer identifier, and a first application identifier. The mobile device receives a second application to be installed on the mobile device, the second application including a second notification module, the content developer identifier, and a second application identifier. The mobile device stores a mobile device identifier in a keychain area of the mobile device. The mobile device provides access to the keychain area for applications which include the content developer identifier. The mobile device retrieves the mobile device identifier from the keychain area for use by the first application and the second application. | 04-03-2014 |
20140095693 | Automated Capacity Aware Provisioning - According to one general aspect, a method may include monitoring, via a communications network, an actual system resource usage of each of a plurality of target computing devices configured to execute one or more respective workload tasks. The method may also include receiving a request for a suggestion for an assigned target computing device to be assigned a new workload task. The method may further include providing the suggestion regarding the assigned target computing device to be assigned a new workload task, wherein the suggestion suggests one or more target computing device(s) that is included in the plurality of target computing devices. The method may also include adjusting a system resource usage profile of the assigned target computing device to include an estimated system resource usage for the new workload task and an actual system resource usage of the assigned target computing device that was previously monitored. | 04-03-2014 |
20140095694 | SYSTEMS AND METHODS FOR INSTALLING, MANAGING, AND PROVISIONING APPLICATIONS - Systems and methods are disclosed for provisioning resources for an application according to an application manifest. The resources may include database, network, and processing resources. The application manifest may be organized as a manifest tree with provisioned resources having their own application manifests for provisioning sub-resources. The application manifest may also define provisioning and de-provisioning of the application in response to loading of the application. Root cause analysis may be performed in accordance with the manifest tree. Also disclosed are systems and methods for rolling out an upgrade across a node cluster. Systems and methods are disclosed for routing traffic to different workflow paths in order to implement an overloaded path and evaluate performance of the overloaded path. | 04-03-2014 |
20140095695 | CLOUD AWARE COMPUTING DISTRIBUTION TO IMPROVE PERFORMANCE AND ENERGY FOR MOBILE DEVICES - An intelligent cloud aware computing distribution architecture for a device. A network conditions monitor is to observe and identify decision impact factors of tasks in a runtime environment. A dynamic profiler, coupled to the network conditions monitor, is to receive runtime information regarding the decision impact factors identified by the network conditions monitor and produce a profile based on the decision impact factors. Runtime offload decision making logic is to process the profile produced by the dynamic profiler based on the received decision impact factors according a predetermined policy and to determine final offloading decisions based on the predetermined policy and the processed decision impact factors. The runtime offload decision making logic is to provide the final offloading decisions to the applications on the device for executing the tasks locally or remotely based on the determined final offloading decision. | 04-03-2014 |
20140095696 | EVALUATING UTILIZATION OF ONE OR MORE COMPUTER SYSTEMS - A method of evaluating utilization of one or more computer systems includes monitoring utilization of a computer system for each of a plurality of time periods in a reporting period and, for each time period, assigning a numeric value based on the monitored utilization and a predefined scale of utilization ranges. The method also includes calculating an overall numeric value for the reporting period by combining the numeric values assigned to the plurality of time periods. The overall numeric value represents the utilization of the computer system during the reporting period. Additional methods and related computer systems are also disclosed. | 04-03-2014 |
20140095697 | HEURISTIC ANALYSIS OF RESPONSES TO USER REQUESTS - Systems and methods are provided for monitoring the performance of a network with respect to providing results for user requests. A user request can correspond to a search query, an entry of a uniform resource locator (URL) or other address for a document on a network, or another type of request. A plurality of user requests are aggregated, such as based on logs of search query or browsing activity. A representative group of user is selected and then submitted in order to evaluate the results provided. Based on a heuristic analysis of the results, an alert can be provided to indicate potential performance problems in the network environment. | 04-03-2014 |
20140095698 | MONITORING AND REPORTING RELEVANT ACTIVITIES - Computer program products, methods, systems, apparatus, and computing entities are provided for monitoring and reporting user activities. In one embodiment, a monitoring application executing on a monitoring computing entity can record information/data about a user's Internet activities or computing-related activities (e.g., including content accessed by the user). Then, a reporting application can generate reports of the user's Internet activities or computing-related activities (e.g., including content accessed by the user). | 04-03-2014 |
20140095699 | EVENT SUPPRESSION METHOD AND SYSTEM - A method and system for managing and dynamically suppressing event notification is provided. The method and system receives an indication of an event from a storage environment to be processed by a support system according to a set of default delivery parameters. Next, the method and system determines if one or more event specific delivery parameters have been associated with the event. If this is the case, then the method and system modifies the default delivery parameters for the information associated with the event according to the one or more event specific delivery parameters. These event specific delivery parameters are also used to determine when to transmit a notification of the event to the support system. The dynamic suppression of events combines events gathered into an event log together into a set of one or more recurring events. From these events, the method and system then identifies a high frequency subset as one or more recurring events considered to occur at a higher frequency compared with a low frequency subset having one or more recurring events that occur at a lower frequency. Based on this information gathered, the method and system then eliminates a portion of the events in the high frequency subset until the frequency of events in the high frequency subset approximates the frequency of events in the low frequency subset. | 04-03-2014 |
20140095700 | System and method for passive decoding of social network activity using replica database - Methods and systems for obtaining reconstructing activities of target users in social networks, such as for decoding and displaying social network sessions held by a target user, or identifying other users who are associated with the target user. This analysis is typically carried out based on passive monitoring of network traffic. A social network decoding system constructs and maintains a replica database, which mimics a portion of the user profile database maintained by the social network servers. The social network decoding system monitors network traffic between users and social network servers. Based on the monitored traffic, the system gradually constructs a replica database that attempts to replicate a portion of the social network user profile database, relating to one or more predefined target users. Using the replica database, the system is able to correlate loosely-coupled information objects, events and interactions between the target users and social network pages. | 04-03-2014 |
20140095701 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SYNCHRONIZING SLM STATUSES OF A PLURALITY OF APPLIANCES IN A CLUSTER - A method, system, and/or computer program product synchronizes Service Level Monitoring (SLM) statuses of a plurality of appliances in a cluster. A token, which comprises a global SLM data and loading distribution information, is received at a first appliance. The global SLM data and loading distribution information of the token is retrieved from the token. The token is updated with local statistics for the first appliance. The updated token is then passed to a next appliance. | 04-03-2014 |
20140095702 | METHODS AND APPARATUS TO DETERMINE MEDIA IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Examples to determine media impressions using distributed demographic information are disclosed. Some disclosed example methods involve sending a request to an impression monitor system in response to detecting a login event at a client device. The login event is associated with an Internet-based service of a first Internet domain different from a second internet domain of the impression monitor system. Such disclosed example methods also involve sending a login reporting message to a database proprietor that provides the Internet-based service. The login reporting message including first and second cookie identifiers. The first cookie identifier is associated with the first Internet domain of the Internet-based service, and the second cookie identifier is associated with the second Internet domain of the impression monitor system. | 04-03-2014 |
20140095703 | SYSTEM FOR MANAGING AND MONITORING CLOUD HOSTS AND METHOD THEREOF - A system for managing and monitoring cloud hosts and method thereof is disclosed. The monitoring system comprises a cloud host and a plurality of monitoring servers. Each monitoring server is respectively used for processing data of different categories. The cloud hosts detect each host status of their own for generating a plurality of status data. The plurality of status data respectively records the data of different categories. Next, the cloud hosts respectively transfer the status data of different categories to corresponding monitoring servers. The plurality of monitoring servers save the status data of the cloud hosts by the categories, and respectively execute the following processing steps. Thus, the burden of the single server is reduced because the status data processing is shared. | 04-03-2014 |
20140095704 | REDUNDANTLY OPERABLE INDUSTRIAL COMMUNICATION SYSTEM, COMMUNICATION DEVICE AND METHOD FOR REDUNDANTLY OPERATING AN INDUSTRIAL COMMUNICATION SYSTEM - A redundantly operable industrial communication system having a plurality of communication devices redundantly linked to an industrial communication network within a ring or tree topology, and a plurality of communication devices inter connected within a linear topology, wherein a communication device configured as a ring portion redundancy manager within the linear topology comprises a monitoring and control unit that detects an interruption within the linear topology using transmitted test messages and controls forwarding of messages containing useful data between two ports, associated with the linear topology, of the communication device configured as a ring portion redundancy manager when an interruption is detected, and first and second communication devices return test messages received within the linear topology to the communication device configured as a ring portion redundancy manager or send test messages to the communication device configured as the ring portion redundancy manager. | 04-03-2014 |
20140095705 | Customizing operating system based on detected carrier - Technology disclosed herein includes a method for loading a carrier specific OS onto a computing device depending on what network the computing device is connected to. The computing device detects an identity of a network to which a computing device is connected or is to be connected during a network identification process executed on the computing device. The network can be identified, e.g., by examining a subscriber identification module (SIM) card electronically connected to the computing device. The device then sends a request including the identity of the network to a remote registration service. In turn the device receives an instruction from the remote registration service identifying a distribution of an operating system (OS) specific for the network. After retrieving the OS distribution, the device loads the distribution of the operating system on the computing device. | 04-03-2014 |
20140095706 | Device-Assisted Services for Protecting Network Capacity - A system comprising a processor of a communications device configured to monitor a network service usage activity of the communications device in network communication, classify the network service usage activity for differential network access control for protecting network capacity, and associate the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity; and a memory coupled to the processor and configured to provide the processor with instructions. | 04-03-2014 |
20140095707 | ROUTE DECISION METHOD, CONTENT DELIVERY APPARATUS, AND CONTENT DELIVERY NETWORK INTERCONNECTION SYSTEM - Embodiments of the present invention relate to a route decision method, a content delivery apparatus, and a content delivery network interconnection system. A route decision method includes: receiving a notification message sent by a downstream CDN; determining a current service aggregate according to the notification message; and according to the current service aggregate and a total service quantity thresholdtotal quantity of services, performing route decision on a to-be-forwarded user request, where the total service quantity thresholdtotal quantity of services is an upper limit, set by the downstream CDN, of services capable of being provided by the downstream CDN for an upstream CDN. The embodiments of the present invention improve the accuracy of an upstream CDN in selecting a downstream CDN for a to-be-forwarded user request, and thereby improve the route decision efficiency. | 04-03-2014 |
20140095708 | RULE-BASED SYSTEM FOR CLIENT-SIDE QUALITY-OF-SERVICE TRACKING AND REPORTING - Server-side control of client-side quality-of-service tracking is provided. When a service is being provided to a client device, a server provides aggregation rules to a client device as part of the service. The client device executes instructions in the aggregation rules to collect QoS metrics regarding the service on the client device and to manipulate the QoS metrics to generate aggregated QoS data. The client device reports the aggregated QoS data to a server for storage and analysis. | 04-03-2014 |
20140095709 | CENTRALIZED SESSION MANAGEMENT IN AN AGGREGATED APPLICATION ENVIRONMENT - Embodiments of the invention provide a method, system and apparatus for centralized session management in an aggregated application environment. In one embodiment, a centralized session management method can include aggregating a set of applications in a host aggregation environment. Subsequently, each of the applications can be centrally kept alive so as to avoid a time out condition in any one of the applications so long as interactivity is detected within any one of the applications or within the host aggregation environment. In one aspect of the invention, the aggregating step can include aggregating a set of portlets in a portal environment. | 04-03-2014 |
20140095710 | ROAMING APPLICATION SETTINGS ACROSS MULTIPLE COMPUTING DEVICES - Application settings are roamed across multiple computing devices. Provider modules on the computing devices are run to retrieve application settings to be roamed and to roam those application settings across the multiple computing devices. Application setting changes initiated on a particular computing device are added to a history of application setting changes on the particular computing device, and also added to synchronization communication module for communication to one or more additional computing devices of the multiple computing devices. Application setting changes initiated by one of the one or more additional computing devices are received by the particular computing device and added to a history of application setting changes on the particular computing device, and are also incorporated into the application settings on the particular computing device. | 04-03-2014 |
20140095711 | SYSTEM, DEVICE AND METHOD FOR MANAGING NETWORK TRAFFIC BY USING MONITORING AND FILTERING POLICIES - Disclosed herein are a system for managing network traffic by using monitoring and filtering policies, including: a network traffic managing device to manage network traffic by (i) creating a monitoring policy and a filtering policy and (ii) transmitting the created monitoring policy and the created filtering policy to a user terminal device; and a traffic control device to detect packets generated in one or more applications of the user terminal device, according to the one or more applications or one or more destination addresses based on the monitoring policy received from the network traffic managing device, create and transmit traffic statistical information on the detected packets to the network traffic managing device, and filter the packets according to the filtering policy received from the network traffic managing device at a kernel area of the user terminal device. | 04-03-2014 |
20140101301 | System and Method for Dynamic Management of Network Device Data - A method and apparatus of a device that dynamically changes how management data is managed in response to events detected in a network system is described. In an exemplary embodiment, the device receives an event notification from an agent associated with a managed node. The device further determines if the received event notification triggers a change in how the management data is managed on that manage node. If the event notification does trigger a change, the device determines a command for that manage node that represents that change if how the management data is managed on the managed node. In addition, the device sends the command to the managed, where the agent applies the command to the managed node and the applied command implements the change in how the management data is managed on the managed node. | 04-10-2014 |
20140101302 | Techniques for Scalable and Foolproof Virtual Machine Move Handling with Virtual Port Channels - Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a physical server coupled to the first switch. A message is sent to other switches and it indicates that the VM is hosted by the physical server. When the first switch is paired with a second switch as a virtual port channel (vPC) pair, the message includes a switch identifier that identifies the second switch. A receiving switch receives the message from a source switch in the network comprising a route update associated with the VM. A routing table of the receiving switch is evaluated to determine whether the host route is associated with a server facing the physical port. The message is examined to determine it contains the switch identifier. | 04-10-2014 |
20140101303 | SYSTEM AND METHOD FOR THROTTLING DOWNLINK DATA NOTIFICATIONS IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes creating an initial sample set comprising a plurality of notification messages, where each of the notification messages is associated with one of a plurality of bearers each of which has a first parameter associated therewith. The method further comprises prioritizing the notification messages of the initial sample set according to a value of the first parameter of the associated bearer to create a prioritized sample set and optimizing the prioritized sample set to create an optimized sample set. The method further comprises applying a throttle factor to the optimized sample to remove a number of low priority notification messages from the prioritized sample set to create a final set of notification messages to be transmitted to a network element. | 04-10-2014 |
20140101304 | MULTIMEDIA AGGREGATION TECHNIQUE BASED ON RSS FEEDS - A technique to determine trending data based on the aggregation of RSS feeds received from a networking site or system is described. A computer-implemented method monitors a link path from a source for a request feed. The request feed is read and a determination is made as to which one or more of a plurality of web sites the request feed is associated with. The number of request feeds associated with particular ones of the plurality of web sites is aggregated. A determination is made, based on the number of aggregated request feeds what multimedia content is displayed. | 04-10-2014 |
20140101305 | System And Method For Real-Time Load Balancing Of Network Packets - Internet protocol packets are statelessly identified as associated with a particular session-instance by identifying a key, or session-instance identifier, within the data (or payload) portion of a user plane packet. This identifier is specific to the session-instance and remains constant throughout the session-instance. Using this stateless identification, transmitted user plane packets are automatically routed at the transmission speed of the transmission link using a method that automatically balances the analysis processing load between network probes. The load is balanced by routing the user plane packet to a network probe that is either already analyzing the session-instance or by routing the user plane packet to a system that has processing capacity to analyze a new session-instance. The network probe then analyzes the user plane packet and the session-instance to measure the quality of the user experience of the session-instance and performance of the network. | 04-10-2014 |
20140101306 | SYSTEMS AND METHODS FOR DYNAMIC ADAPTATION OF NETWORK ACCELERATORS - Systems and methods of the present solution provide a more optimal solution by dynamically and automatically reacting to changing network workload. A system that starts slowly, either by just examining traffic passively or by doing sub-optimal acceleration can learn over time, how many peer WAN optimizers are being serviced by an appliance, how much traffic is coming from each peer WAN optimizers, and the type of traffic being seen. Knowledge from this learning can serve to provide a better or improved baseline for the configuration of an appliance. In some embodiments, based on resources (e.g., CPU, Memory, Disk), the system from this knowledge may determine how many WAN optimization instances should be used and of what size, and how the load should be distributed across the instances of the WAN optimizer. | 04-10-2014 |
20140101307 | DYNAMIC ADMINISTRATION OF EVENT POOLS FOR RELEVANT EVENT AND ALERT ANALYSIS DURING EVENT STORMS - Dynamic administration of event pools for relevant event and alert analysis during event storms including receiving, by an events analyzer from an events queue, a plurality of events from one or more components of the distributed processing system, each event including an occurred time and a logged time; creating, by the event analyzer, an events pool; determining whether an arrival rate of the events from the components of the distributed processing system is greater than a predetermined threshold; if the arrival rate is greater than the predetermined threshold, assigning, by the events analyzer, a plurality of events to the events pool in dependence upon their occurred time; and if the arrival rate is not greater than the predetermined threshold, assigning, by the events analyzer, a plurality of events to the events pool in dependence upon their logged time. | 04-10-2014 |
20140101308 | SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT OF NETWORK DEVICE DATA - A method and apparatus of a device that dynamically changes how management data is managed in response to events detected in a network system is described. In an exemplary embodiment, the device detects an event occurring in the network system. The device further determines if the event triggers a system change in how the management data is reported on one or more of the managed nodes. If the event notification does trigger the system change, for each of the one or more of the managed nodes, the device determines a command for that manage node that represents a specific change in how frequent the management data is reported to the network management system. In addition, the device sends the command to that managed node, where the agent applies the command to the managed node and the applied command implements the specific change in how frequent the management data is reported to the network management system. | 04-10-2014 |
20140101309 | DYNAMIC AND SELECTIVE MANAGEMENT OF INTEGRATION POINTS USING PERFORMANCE METRICS - In one embodiment, a computer-implemented method for dynamic management of integration points includes connecting a set of applications to a communication interconnect fabric to form a set of connections, wherein each application in the set of applications is interconnected and each individual connection has a set of integration paths defined including a default path. The set of connections is monitored to determine whether a performance metric for a specific application in the set of applications is within a predefined tolerance. Responsive to a determination that the performance metric for the specific application in the set of applications is not within a predefined tolerance, a change may be instructed in availability of an integration component. | 04-10-2014 |
20140101310 | SEAMLESS ACCESS, EDITING, AND CREATION OF FILES IN A WEB INTERFACE OR MOBILE INTERFACE TO A COLLABORATIVE CLOUD PLATFORM - Systems and methods for seamless access, editing, creating of files in a web or mobile interface to a collaborative cloud platform (e.g., cloud-based file sharing, collaboration and/or storage service) are disclosed herein. In one embodiment, a file accessed through the web or mobile interface is associated with an “Edit” button/action, or other similar feature. When selected, if an editor or other native application to edit or access the file is not installed, this action can automatically launch the installer and prompt the user to install the editor. If it is installed, this action can launch the native application on the user's computer. | 04-10-2014 |
20140101311 | Method of Determining an Attribute of a Server - A method of determining an operational attribute of a server executed on a first execution platform and providing a service, the method comprising: performing a measurement indicative of an operational attribute of the server, wherein the measurement is performed by a platform observer system executed on said first execution platform; communicating a result of said measurement to an external observer system; wherein the communicating comprises protecting secrecy of the communicated result; verifying, by the external observer system, that the received measurement result is indicative of a measurement performed on said server. | 04-10-2014 |
20140108638 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140108639 | TRANSPARENTLY ENFORCING POLICIES IN HADOOP-STYLE PROCESSING INFRASTRUCTURES - Method, system, and computer program product to facilitate selection of data nodes configured to satisfy a set of requirements for processing client data in a distributed computing environment by providing, for each data node of a plurality of data nodes in the distributed computing environment, nodal data describing the respective data node of the plurality of data nodes, receiving a request to process the client data, the client data being identified in the request, retrieving the set of requirements for processing the client data, and analyzing the retrieved data policy and the nodal data describing at least one of the data nodes, to select a first data node of the plurality of data nodes as a delegation target, the first data node selected based on having a higher suitability level for satisfying the set of requirements than a second data node of the plurality of data nodes. | 04-17-2014 |
20140108640 | Anomaly Detection in Network-Site Metrics Using Predictive Modeling - Methods and apparatus for anomaly detection in network-site metrics using predictive modeling are described. A method comprises obtaining time-series data for a given time range, wherein the time-series data comprises values for a network-site analytics metric for each of a plurality of sequential time steps across the given time range. The method includes generating a predictive model for the network-site analytics metric based on at least a segment of the time-series data. The method includes using the predictive model to predict an expected value range for the network-site analytics metric for a next time step after the segment and, based on the expected value range, determining whether an actual value for the network-site analytics metric for the next time step is an anomalous value. | 04-17-2014 |
20140108641 | TRANSACTION MIDDLEWARE BASED APPLICATION LEVEL TRANSACTION INSTANCE TRACKING ACROSS A COMPOSITE APPLICATION - Responsive to transactional middleware for a particular domain processing a particular transaction instance at a processing point specified in transaction telemetry standards as a tracking point along a flow of the particular transaction, a facility of the middleware accesses correlation data for the particular transaction instance in the particular domain and extracts application level context information about the particular transaction instance from the particular domain, wherein the transaction telemetry standards specify a same set of standards for application by each separate transactional middleware instance of a composite application. At least one facility of the transactional middleware creates a tracking event comprising the correlation data and the application level context information formatted into an event structure defined by the transaction tracking standards. At least one facility of the transactional middleware surfaces the tracking event in compliance with the transaction telemetry standards. | 04-17-2014 |
20140108642 | Efficient Reliable Distributed Flow-controlled Event Propagation - Improved utilization of connections that can be either available or blocked is provided by associating an atemporal connection state with each connection. If a connection is available, messages are transmitted on the connection normally. If a connection is blocked, the atemporal connection state is updated to reflect the changes that were made but not transmitted. In this manner, a record is kept that allows correct transmission of the information when the connection comes back up. More specifically, after a connection status changes from blocked to available, recovery messages are automatically generated from the atemporal connection state and transmitted on the connection. | 04-17-2014 |
20140108643 | MAINTAINING AND COMMUNICATING NODAL NEIGHBORING INFORMATION - In one embodiment, a nodal device receives information from each of its neighboring nodes in a network. The information identifies a link quality between the nodal device and each of its neighboring nodes. The link quality information is stored in one or more bloom filters in the nodal device such that a table having a compressed format is provided in the bloom filter. The table includes probabilistic identifiers to identify link quality between the nodal device and each of its neighboring nodes. | 04-17-2014 |
20140108644 | METHODS AND SYSTEMS FOR TRACKING TIME IN A WEB-BASED ENVIRONMENT - Methods and systems for tracking time in a web-based environment are described. In some embodiments, a web-based application to track time associated with a plurality of records is provided. A record in an active state is identified. A session associated with the record is generated, which includes activating a timer. An indication is received indicating that the record is in an inactive state. In response to receiving the indication, the session is ended, which includes deactivating the timer. A duration of the session is recorded. | 04-17-2014 |
20140108645 | SYSTEM AND METHOD FOR SUPPORTING A SELECTION SERVICE IN A SERVER ENVIRONMENT - A system and method can support socket programming in a server environment, such as a distributed data grid. The server environment can include a selection service that operates to register a plurality of sockets, wherein each said socket is associated with a handler in a plurality of handlers. Furthermore, the selection service can listen for one or more incoming connection requests on the plurality of sockets, and invoke a pluggable callback provided by a said handler associated with a registered socket in the plurality of sockets, when said registered socket receives an incoming connection request. | 04-17-2014 |
20140108646 | TRANSACTION MIDDLEWARE BASED APPLICATION LEVEL TRANSACTION INSTANCE TRACKING ACROSS A COMPOSITE APPLICATION - Responsive to transactional middleware for a particular domain processing a particular transaction instance at a processing point specified in transaction telemetry standards as a tracking point along a flow of the particular transaction, a facility of the middleware accesses correlation data for the particular transaction instance in the particular domain and extracts application level context information about the particular transaction instance from the particular domain, wherein the transaction telemetry standards specify a same set of standards for application by each separate transactional middleware instance of a composite application. At least one facility of the transactional middleware creates a tracking event comprising the correlation data and the application level context information formatted into an event structure defined by the transaction tracking standards. At least one facility of the transactional middleware surfaces the tracking event in compliance with the transaction telemetry standards. | 04-17-2014 |
20140108647 | User Feedback in Network and Server Monitoring Environments - A system according to the preferred embodiments of the present invention utilizes performance monitoring tools on the network infrastructure and servers of a VDI environment to provide a performance indication to each user, based on his network path and his servers. The user may also provide feedback, such as a rating from one to five, of the performance of each of his applications. Ratings of other users may be provided to each user to provide additional performance indications. The ratings of the users may also be used by IT staff in conjunction with the network and server metrics to troubleshoot problem areas and to assist in planning future environments. The user feedback or rating can be used in other areas as well to allow improvement of the delivery of services. | 04-17-2014 |
20140108648 | TRANSPARENTLY ENFORCING POLICIES IN HADOOP-STYLE PROCESSING INFRASTRUCTURES - Method, system, and computer program product to facilitate selection of data nodes configured to satisfy a set of requirements for processing client data in a distributed computing environment by providing, for each data node of a plurality of data nodes in the distributed computing environment, nodal data describing the respective data node of the plurality of data nodes, receiving a request to process the client data, the client data being identified in the request, retrieving the set of requirements for processing the client data, and analyzing the retrieved data policy and the nodal data describing at least one of the data nodes, to select a first data node of the plurality of data nodes as a delegation target, the first data node selected based on having a higher suitability level for satisfying the set of requirements than a second data node of the plurality of data nodes. | 04-17-2014 |
20140108649 | CONFIGURING AND PROVIDING PROFILES THAT MANAGE EXECUTION OF MOBILE APPLICATIONS - Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein. | 04-17-2014 |
20140108650 | IDENTIFICATION OF SERVERS BY COMMON WIDE AREA NETWORK ADDRESSES - Systems, devices and methods are described to identify server nodes operating on a data network that are available to a client node. A registry server receives registration messages from each of the of server nodes and maintains a listing server nodes and their associated server addresses. When a request is received from a client, the registry server identifies server nodes having the same network address as the client, thereby indicating that the client and server nodes are likely to reside behind a common router or on a common local area network. A list of identified server nodes can then be forwarded to the client so that the client can establish connections as desired. These techniques may be used, for example, to establish video placeshifting connections between a placeshifting server device and a phone, tablet or other media client. | 04-17-2014 |
20140108651 | IDENTIFYING AND CONTROLLING NETWORK SESSIONS VIA AN ACCESS CONCENTRATION POINT - The present invention facilitates identification and control of peer-to-peer sessions via an access concentration point (ACP). The ACP will monitor packets routed therethrough and detect access messages intended for known peer-to-peer access services. The access messages sent from a communication client to the peer-to-peer access service, which will respond by sending an access reply message back to the communication client. The ACP will monitor the packets being routed to identify the access reply message, which will include routing addresses that may be associated with potential remote communication clients. With these addresses, the ACP can monitor packets to identify when an attempt to initiate a peer-to-peer communication session is being made to or through an entity associated with one or more of these addresses. Upon detecting a session initiation message to or through an identified address, the ACP may take any number of actions, depending on how the ACP is configured. | 04-17-2014 |
20140108652 | METHOD AND SYSTEM FOR IDENTIFYING VIRTUALIZED OPERATING SYSTEM THREATS IN A CLOUD COMPUTING ENVIRONMENT - Systems for monitoring a virtual machine in a cloud computing environment are disclosed. The systems include a baseline module configured to retrieve baseline information from the virtual machine and create a plurality of baseline files. The systems also include a benchmark module configured to comparatively analyze at least two of the plurality of baseline files to determine differences between the at least two baseline files and generate a plurality of benchmark reports based on the determined differences. The systems also include a trends module configured to comparatively analyze the plurality of benchmark reports and generate at least one trends report based on the comparative analysis of benchmark reports. | 04-17-2014 |
20140108653 | Man-Machine Interaction Data Processing Method and Apparatus - Embodiments of the present invention provide a man-machine interaction data processing method and apparatus. The man-machine interaction data processing method according to the present invention includes: receiving data collection information sent by a user terminal, where the data collection information includes identification information, sensor data, and data collection time information of the user terminal; obtaining application service content information corresponding to the identification information and the data collection time information, and extracting a user activity behavior feature from the application service content information; and annotating the sensor data according to the user activity behavior feature of the user terminal. In the embodiments of the present invention, because the method according to the embodiments may be used to collect sensor data of each user, a large amount of sensor data is ensured, so that subsequent processing is more convenient and accurate. | 04-17-2014 |
20140108654 | METHOD, MEDIA TYPE SERVER AND TERMINAL DEVICE FOR IDENTIFYING SERVICE REQUEST TYPE - A method, media server, and terminal device identifying a service request type. If a service request carries a Cookie with a content identification value and the content identification value of the Cookie with the content identification value is consistent with a media content value corresponding to the service request, the service request is determined as an existing service request; otherwise, the service request is determined as a newly initiated service request, so that the media server can identify which service request is an existing service request, and which service request is a newly initiated service request, and therefore can provide differentiated services for terminal devices. | 04-17-2014 |
20140115144 | ONLINE GAME SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM - Certain embodiments herein are directed to an online game system, computer-readable medium, and a method comprising: providing a network system comprising a central device and a plurality of remote devices, each said remote device being connected to the central device; providing a plurality of data objects in the network system; and, for running an online game session in the network system, implementing a mode of operation, comprising: assigning each of said data objects to at least one of the remote devices, thereby, giving the at least one remote device control over the assigned data object, and excluding the central device from control over each of said data objects; and, for the plurality of remote devices, limiting data object related game data exchange to a direct data exchange with the central device only. | 04-24-2014 |
20140115145 | METHOD AND APPARATUS FOR DYNAMICALLY SCALING APPLICATION PERFOMANCE ANALYSIS COMPLETENESS BASED ON AVAILABLE SYSTEM RESOURCES - A method and apparatus is disclosed herein for dynamically scaling application performance analysis completeness based on available system resources. In one embodiment, the method comprises monitoring incoming network traffic and a rate at which the traffic is being analyzed and dynamically adjusting application performance analysis completeness, the analysis being performed on the observed network traffic. | 04-24-2014 |
20140115146 | Predicting the Future State of a Mobile Device User - In one embodiment, a method includes accessing data associated with the mobile-computing-device usage of a user; accessing data associated with past user-states of the user, where the past user-states represent previous activities or actions associated with the user's mobile-computing-device usage; predicting a future user-state of the user based, at least in part, on the accessed data; and adapting the operation of the mobile computing device of the user at the future time based on the predicted future user-state. | 04-24-2014 |
20140115147 | ADJUSTING QUALITY OF SERVICE IN A CLOUD ENVIRONMENT BASED ON APPLICATION USAGE - Providing a cloud-based service to an endpoint device includes providing the cloud-based service to the endpoint device in accordance with a default Quality of Service, learning an importance of the cloud-based service to a user of the endpoint device, and automatically adjusting the providing of the cloud-based service to the endpoint device in response to the importance, wherein the adjusting results in the cloud-based service being provided to the endpoint device in accordance with a Quality of Service other than the default Quality of Service for at least a temporary period of time. The importance may be inferred from how quickly the user of the endpoint device consumes data provided by the cloud-based service. Alternatively, the importance may be a relative importance of the cloud-based service to the user, as compared to other users of the cloud-based service. | 04-24-2014 |
20140115148 | Decommission of a Server in Wireless Environment - An embodiment of the invention provides a device for monitoring activity of a computing device wirelessly connected to a network, wherein the device includes a first interface for connecting the device to the computing device. A second interface wirelessly connects the device to the network. A sensor connected to the second interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. Another embodiment of the invention provides a computing device having an interface for wirelessly connecting to a network. A sensor connected to the interface measures wireless network traffic to the computing device and/or wireless network traffic from the computing device. A processor connected to the sensor compares the network traffic to the computing device and/or the network traffic from the computing device to one or more thresholds to determine whether the computing device should be decommissioned. | 04-24-2014 |
20140115149 | APPARATUS AND METHODS FOR HYBRID SERVICE DISCOVERY - Apparatus and methods for, among other things, a hybrid service discovery protocol are discussed. In an example, a method for hybrid service discovery can include transmitting a first one or more reactive publishing beacons for a first group of stations, counting a quantity of service requests during query windows following the reactive group beacon transmissions, and publishing a first proactive publishing beacon for the first group of stations if the quantity of service requests meet or exceed a proactive service discovery threshold. | 04-24-2014 |
20140115150 | System and Method for Controlling Connection Timeout in a Communication Network - A client device configured to access a remote device via a communication network. The client device is configured to: a) detect a termination of a network connection to the remote device and b) in response to detecting the termination of the network connection, record an idle time duration associated with the network. The client device repeats a) and b) until a plurality of idle time durations have been recorded. The client device then determines from the plurality of idle time durations a timeout value associated with the network and sets a transmission period of a keep-alive signal transmitted from the client device to the remote device based on the determined timeout value. The client device transmits the determined timeout value and information identifying the network to a timeout value server that may be accessed by other client devices. | 04-24-2014 |
20140115151 | ERROR-CAPTURING SERVICE REPLACEMENT IN DATACENTER ENVIRONMENT FOR SIMPLIFIED APPLICATION RESTRUCTURING - Technologies are presented for addressing dependency interruptions due to inactivation of a service module in a modular datacenter environment through a diagnostic module. In some examples, the diagnostic module may substitute for one or more inactive service modules in a datacenter architecture. Messages and/or items that are directed to the inactive service module(s) may be intercepted by or rerouted to the diagnostic module and used to generate error reports and/or repair activity triggers. | 04-24-2014 |
20140115152 | MAINTAINING INFORMATION INTEGRITY WHILE MINIMIZING NETWORK UTILIZATION OF ACCUMULATED DATA IN A DISTRIBUTED NETWORK - A method and systems for gathering information regarding usage of a resource from at least one of a plurality of measuring nodes operatively coupled to a controller, wherein the measuring node includes at least one sensor and a node processor operatively coupled to the sensor, and the controller includes a controller processor. The method includes predicting an estimated resource usage value associated with the at least one sensor with the node processor and separately with the controller each using a predictor algorithm and dataset. The method further includes measuring resource usage to which the estimated resource usage value applies with the sensor and calculating a difference between the estimated resource usage value and the measured resource usage with the node processor. If the difference falls outside of a bound the measured resource usage is communicated to the controller. | 04-24-2014 |
20140115153 | APPARATUS FOR MONITORING DATA DISTRIBUTION SERVICE (DDS) AND METHOD THEREOF - An apparatus for monitoring a data distribution service (DDS), and a method thereof are disclosed. A DDS monitoring apparatus monitoring a data distribution service (DDS) includes: a monitoring participant configured to receive a monitoring topic from a DDS node, wherein the monitoring topic is status information of the DDS node; a monitoring data collector configured to collect the monitoring topic, and to determine whether or not the monitoring topic is urgent; and a monitoring data analyzer configured to analyze the monitoring topic according to whether or not the monitoring topic is urgent to determine whether to create DDS status information corresponding to the status of the DDS node. Accordingly, it is possible to monitor a DDS in real time. | 04-24-2014 |
20140115154 | Linked Identifiers for Multiple Domains - A method for providing a link identifier (LID), wherein the method comprises obtaining a first identifier block (IDB) that identifies an external interface within a first domain using a first identifying scheme, obtaining a second IDB that identifies a second external interface within a second domain using a second identifying scheme, creating the LID that comprises the first IDB and the second IDB, and advertising the LID to one or more external entities. | 04-24-2014 |
20140115155 | NETWORK GRAPH EVOLUTION RULE GENERATION - A network's evolution is characterized by graph evolution rules. A graph, formed by merging multiple graphs representing the multiple snapshots of the network, that represents an evolutionary network is mined to identify evolutional patterns of the network. A pattern is selected from the identified patterns. Graph evolution rules are generated using identified evolutional patterns. The generated graph evolution rules represent the evolutional patterns of the network, the rules indicating that any occurrence of a child pattern of the selected pattern implies a corresponding occurrence of the selected pattern. | 04-24-2014 |
20140115156 | Data Transmission Between Devices Based on Bandwidth Availability - In one embodiment, in response to data to be transmitted to or from an electronic device, the electronic device determines whether the electronic device currently has a first network connection with a sufficiently high bandwidth. If the electronic device currently does not have a first network connection with a sufficiently high bandwidth, then the electronic device estimates a future time when the electronic device is likely to have a second network connection with a sufficiently high bandwidth, and schedules transmission of the data at the future time. | 04-24-2014 |
20140122688 | MOBILE DEVICE DIAGNOSIS: APPARATUS AND METHOD - The present invention relates to diagnosis of issues of individual mobile electronic devices (e.g., cell phones, portable media players, or tablet or other computers). The issues are addressed by logic and data on the device and/or in a mobile device diagnosis center, possibly in collaboration. The center may contain information relating to such devices generally, as well as particular information relating to a device being diagnosed. The general information might include information about product specifications; statistical information based on data gathered about actual usage of such devices; information about service providers and service plans; and information about possible solutions for various kinds of issues. The device-specific information might include a history of the usage, repairs, and other activities and issues pertaining to the particular device. Diagnosis by the center may result in a recommendation to the device, which may automatically take action, possibly after backing itself up to the center. | 05-01-2014 |
20140122689 | DYNAMIC ADJUSTMENT OF AN INTERRUPT LATENCY THRESHOLD AND A RESOURCE SUPPORTING A PROCESSOR IN A PORTABLE COMPUTING DEVICE - A portable computing device includes a modem and an application processor communicatively coupled by a data bus. The modem communicates a target data throughput in accordance with an identified data call. In response, the application processor determines whether an adjustment of an interrupt latency threshold is warranted to support the target data throughput identified by the modem. Otherwise, the application processor executes no such adjustment. In addition, the modem requests a desired performance of an application processor resource. In response, the application processor adjusts a control input of the application processor controlled resource. A change in a present data transfer session triggers the modem to communicate a revised target data throughput and/or a revised request for a desired performance of an application processor resource. | 05-01-2014 |
20140122690 | Using a Router Based Web Meter in a Mixed Mode Configuration - A method for associating a web event with a member of a group of users is implemented at a first computing device, the method including: receiving a data access request from a second computing device; examining the data access request to determine whether the second computing device provides a user login service; if the second computing device provides the user login service: causing the second computing device to collect personal information and authorization from the user of the second computing device using the user login service; receiving the user's personal information and authorization from the second computing device; and associating the data access request with the user's personal information in accordance with the user's authorization; and otherwise, associating the data access request with an identifier of the second computing device. | 05-01-2014 |
20140122691 | DETERMINING ROOT CAUSES OF NETWORK ISSUES - Determining root causes of network issues includes identifying a previous network issue, comparing a first behavior of network components during the previous network issue with a second behavior of the network components during a current issue of a network, and obtaining a previous user input about a previous root cause of the previous network issue collected while diagnosing the previous issue. | 05-01-2014 |
20140122692 | DIAGNOSTICS INFORMATION EXTRACTION FROM THE DB SIGNALS WITH MEASURELESS PARAMETERS - In general the invention relates to a method for processing signals from a data server. The method includes obtaining, by a monitoring facility, a measured signal from the data server, wherein the monitoring facility comprises a central processing unit, generating a first probing characteristic from the measured signal, and determining that the first probing characteristic is measureless. The method further includes decomposing, by the central processing unit in response to the determination, the first probing characteristic into a plurality of component parts, constructing a reconstructed signal using a first one of the plurality of component parts, generating a second probing characteristic using the reconstructed signal, wherein the second probing characteristic is not measureless, and processing the reconstructed signal by the monitoring facility. | 05-01-2014 |
20140122693 | Web Navigation Tracing - A navigation to a plurality of visited web sites is traced and a navigation map is generated comprised of a node for each visited web site. Each node in the navigation map is connected by an edge to at least one other node in the navigation map, and the edge is associated with the link from the given visited web site to the next web site. For each visited web site, the corresponding node stores an address for the given web site, a time stamp of the visit to the given visited web site, a link from the given visited web site to a next web site and optionally a title of the web site. A keyword search of the nodes can be processed to identify a given web site in the navigation map. A signature portion of the given web site can be used to identify a new location of the given web site. A navigation map can be designated as a searchable public navigation map. | 05-01-2014 |
20140122694 | SYSTEMS AND METHODS FOR DETERMINING DESKTOP READINESS USING INTERACTIVE MEASURES - Systems and methods described herein facilitate determining desktop readiness using interactive measures. A host is in communication with a server and the host includes a virtual desktop and a virtual desktop agent. The virtual desktop agent is configured to perform one or more injecting events via one or more monitoring agents, wherein each of the injecting events is a simulated input device event. The desktop agent is further configured to receive, via a display module, a response to the injecting event(s), wherein the response is a display update causing pixel color values for the display module to alter. The desktop agent is also configured to identify, via the monitoring agent(s), whether the response to the injecting event(s) is an expected response. The desktop agent is also configured to determine, via the monitoring agent(s), a readiness of the virtual desktop based on the expected response. | 05-01-2014 |
20140122695 | DYNAMIC RESOURCE ALLOCATION FOR NETWORK CONTENT DELIVERY - Providing for dynamic allocation of network resources for delivery of network content is described herein. By way of example, network resources can be correlated with real-time network conditions, and monitoring of the network conditions can be employed to track availability of subsets of network resources. Where a subset of network resources allocated to support a particular application is available, the subset of resources can be allocated to one or more client devices, on demand. Where insufficient resource availability exists, resources can be freed up from other subsets of network resources to bolster availability of requested resources to support an application, or a demand for resources can be rejected. Billing for network resources can be in part or in total based on resources consumed, among other dynamic factors, in addition to or in lieu of static factors. | 05-01-2014 |
20140122696 | Method for Monitoring and Displaying High Speed Bus Performance - A method for operating a data processing system to display data related to a plurality of packets that traverse a communication link is disclosed. A copy of the packets that traverse the link is provided including a timestamp corresponding to each packet that defines a time at which the packet traversed the link. A display is generated having first and second regions. The first region includes an X-Y chart in which each packet is represented by a multi-value glyph denoting a first property related to that packet, the first property having more than two values. The second region includes a first annotation glyph for one of the packets, the first annotation glyph being located at the X-location corresponding to the timestamp for the packet. The first annotation glyph is present if that data packet has a second property. | 05-01-2014 |
20140122697 | PROVIDING CONTENT TO LINKED DEVICES ASSOCIATED WITH A USER - Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method for selecting content. The method comprises identifying historical data including a log of entries, each entry including a user identifier associated with a given user that accessed a service, a service identifier associated with the service, and a device identifier associated with a device used by the user for accessing the service. The method further comprises evaluating log entries including identifying pairs of log entries that include a same user identifier and a same service identifier but different device identifiers. The method further comprises linking plural devices to a user associated with the same user identifier based on the evaluating when a given device is determined to be likely to be personal to the user, and using historical information associated with the linked devices to select content for delivery to the user. | 05-01-2014 |
20140122698 | CDN TRAFFIC MANAGEMENT IN THE CLOUD - Embodiments include determining attributes of a property using an incubation pool. An incubation period is identified based on estimated attributes for the property, and based on rules that define a minimum and a maximum incubation time. The property is added to the incubation pool, and load and patterns for the property are analyzed. A load size and/or a traffic type for the property is identified based on the incubation. Embodiments also include offloading traffic within a CDN. A load balancer agent determines that traffic at an edge data center should be offloaded to the other edge data centers. The load balancer agent sends a request, including a determined priority level. The load balancer agent receives one or more replies indicating that resources are available for use. The load balancer agent sorts the replies and offloads traffic to at least one edge data center. | 05-01-2014 |
20140122699 | AUTO-UPDATE OF UPDATES AND APPLICATIONS IN A DISTRIBUTED M2M SYSTEM - The embodiments herein relate to Machine to Machine (M2M) based systems and, more particularly, to updating of applications and services in M2M based systems. The embodiments herein disclose a system and method for automatically updating applications and services in a distributed wireless M2M system and the transport mechanism for implementing the updates. Embodiments disclosed herein enable performing updates in Sensors, while accounting for the absence of any one good link to the Sensor, despite spotty coverage, low bandwidth, and frequent retransmissions. Embodiments herein provides for much less cumbersome and time-consuming manual intervention by the user to maintain updated application software. Embodiments herein also reduces the chance of errors leading to a device being made non-functional in the system. Embodiments herein also leads to greater availability of the network itself, as less time is consumed updating sensors and concentrator hubs and also leads to quickest rollout and usage of new functionality. | 05-01-2014 |
20140122700 | METHODS AND SYSTEMS FOR MANAGING DATA - Computationally implemented methods and systems include receiving data regarding one or more properties of a device, said data not particularly identifying the device, identifying one or more services configured to be provided to a user of the device, said one or more services requiring access to particular data controlled by the device, wherein access to the particular data controlled by the device is managed by the device, and requesting access to the particular data controlled by the device, in exchange for providing one or more of the identified one or more services. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 05-01-2014 |
20140122701 | Web Navigation Tracing - A navigation to a plurality of visited web sites is traced and a navigation map is generated comprised of a node for each visited web site. Each node in the navigation map is connected by an edge to at least one other node in the navigation map, and the edge is associated with the link from the given visited web site to the next web site. For each visited web site, the corresponding node stores an address for the given web site, a time stamp of the visit to the given visited web site, a link from the given visited web site to a next web site and optionally a title of the web site. A keyword search of the nodes can be processed to identify a given web site in the navigation map. A signature portion of the given web site can be used to identify a new location of the given web site. A navigation map can be designated as a searchable public navigation map. | 05-01-2014 |
20140122702 | METHODS AND SYSTEMS FOR MONITORING AND/OR MANAGING DEVICE DATA - Computationally implemented methods and systems include monitoring one or more properties of a device configured to carry out one or more services, determining one or more services that require access to a particular portion of the device, said determining at least partly based on the monitored one or more properties of the device, and facilitating presentation, to the device, of the determined one or more services that require access to the particular portion of the device, and are configured to be carried out by the device, wherein the one or more services are presented along with a request for access to the particular portion of the device. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 05-01-2014 |
20140122703 | COMBINING MEASUREMENTS BASED ON BEACON DATA - Usage data representing resource accesses on a network by client devices in a plurality of households is accessed. Based on the accessed usage data, a set of the households that the usage data indicates are associated with a specified number and type of client devices is determined. A subset of the usage data is extracted, where the subset corresponds to resource accesses by client devices associated with the subset of households. Usage information is determined for the specified number and type of client devices based on the extracted subset of the usage data. | 05-01-2014 |
20140122704 | REMOTE PORT MIRRORING - According to an example, remote port mirroring includes storing correspondence information describing a correspondence between a mirroring source port and a mirroring destination port. The correspondence information includes a VLAN ID of a mirror VLAN. The mirroring source port and the mirroring destination port are assigned to the mirror VLAN. A message received on the mirroring source port is copied, and a mirroring message is generated based on the correspondence information and sent to the remote network switch. | 05-01-2014 |
20140122705 | CROSS-SITE DATA ANALYSIS - A method for cross-site data analysis includes identifying, by a processing device, based on actions of at least one user in an initial user group in a first side and a second site, at least one action association feature of the first site and the second site, users in the initial user group being members of the first site and the second site; and determining whether a first user name registered in the first site and a second user name registered in the second site belong to a same user based on the at least one action association feature. | 05-01-2014 |
20140122706 | Method for determining system topology graph changes in a distributed computing system - A distributed computing system provides at least one service, and the service is provided by resources of the distributed computing system. Resources are represented by a topology graph including storage, application and database server nodes joined by edges indicative of relationships between nodes. Predefined parameters are monitored that are indicative of operating characteristics of the distributed computing system when providing the service. Values of the predefined parameters are compared with respective predetermined performance threshold values. The performance threshold values are determined based on a service level agreement (SLA). The SLA includes a service level objective (SLO). The performance threshold values are indicative of the respective operating characteristics prior to an event. Rules are provided for selecting a combination of application, storage and database server nodes to meet the SLO for each parameter of the parameter. Data associated with the set of rules are stored in the computing system. | 05-01-2014 |
20140122707 | ADJUSTING QUALITY OF SERVICE IN A CLOUD ENVIRONMENT BASED ON APPLICATION USAGE - A system for providing a cloud-based service to an endpoint device includes a resources that provide the service to the device in accordance with a default Quality of Service (QoS) and a processor that monitors usage of the service on the device and automatically adjusts the service on the device in response to the usage, so that the service is provided to the device in accordance with a QoS other than the default QoS at least temporarily. A system for providing a cloud-based service includes an endpoint device that monitors usage of the service on the device and a server that provides the service to the device in accordance with a default QoS and automatically adjusts the service on the device in response to the usage so that the service is provided to the device in accordance with a QoS other than the default QoS at least temporarily. | 05-01-2014 |
20140122708 | System and Method for Monitoring Network Connection Quality by Executing Computer-Executable Instructions Stored On a Non-Transitory Computer-Readable Medium - A system and method for monitoring network connection quality utilizes software installed on a user computer to monitor a first network connection to a target server used for a desired activity and a second network connection to a benchmark server. Various network quality metrics are recorded and compared for each of the connections and displayed on a visual display so that the user may easily and accurately judge the health of the connection to the target server. | 05-01-2014 |
20140122709 | Determining Overall Network Health and Stability - A network health analyzer that analyzes health of a computer network may be implemented in accordance with an embodiment of the present invention. A network profile comprising an issue profile and one or more benchmarks appropriate for the network is determined. A set of numeric measures that is common to all issues in the issue profile is established. The network health analyzer collects data points pertaining to the operation of the network. Based on the data points, numeric values corresponding to the numeric measures may be calculated. In turn, health indexes for all issues in the issue profile may be determined. Based on these health indexes for the issues, an overall health rating may be determined. | 05-01-2014 |
20140122710 | METHOD FOR SENDING HEARTBEAT MESSAGE AND HEARTBEAT PROXY SERVER - Embodiments of the present invention provide a method for sending a heartbeat message and a heartbeat proxy server, where the method for sending a heartbeat message includes: obtaining, by a heartbeat proxy server, a status of a terminal device; and deputizing, by the heartbeat proxy server, for the terminal device to send a heartbeat message to a server, or for the terminal device to respond to a heartbeat message sent from a server to the terminal device, when the terminal device is in an activated status. In the embodiments of the present invention, consumption of a resource of a network by the heartbeat message may be reduced, and an impact on the network may be reduced. | 05-01-2014 |
20140122711 | Systems and Methods for Performing Localized Server-Side Monitoring in a Content Delivery Network - Some embodiments provide systems and methods for performing localized and real-time server-side network performance monitoring. These systems and methods leverage the distributed architecture of a content delivery network (CDN) so as to perform distributed monitoring with each Point-of-Presence of the CDN responsible for monitoring performance to a localized set of end users. These systems and methods also leverage existing traffic flows from a server to a particular end user in order to perform real-time server-side network performance monitoring without the injection of specialized monitoring packets and without active involvement of the end user in deriving the performance measurements. The performance measurements are then used to optimize delivery of existing and future traffic flows to the end user. | 05-01-2014 |
20140122712 | WEB TRANSACTION ANALYSIS - Individual network activities are correlated to interactions with a target web page to facilitate an analysis of the performance of the web page. This correlation is preferably performed using a combination of heuristics and rules developed to filter network activities into those activities that are likely to have been caused by the particular transaction, and those that are unlikely to be associated with that transaction. The activities that are identified as being associated with the transaction are subsequently organized to identify a time-flow of these activities within the transaction, from which performance statistics can be determined and presented to a user. Because the individual activities within the transaction are identified and time-ordered, an analysis of the effects of each activity on the overall performance of the web page can be performed to identify potential problem areas, or to diagnose reported problems. | 05-01-2014 |
20140122713 | PAGE PHASE TIME - A method of measuring load time for a web page includes video recording a duration of the web page load including capturing N frames in a series of frames | 05-01-2014 |
20140129694 | EVALUATING INFORMATION RETRIEVAL SYSTEMS IN REAL-TIME ACROSS DYNAMIC CLUSTERS OF EVIDENCE - A method is disclosed for evaluating an information retrieval system. A performance metric is associated with a message received at the information retrieval system. A geometric point is determined that corresponds to the message based on one or more clustering techniques. The message is assigned to a cluster based on a judgment of a distance between the geometric point and an additional geometric point, the additional geometric point corresponding to an additional message, the additional message being assigned to the cluster. The performance metric is aggregated with an additional performance metric, the additional performance metric corresponding to the additional message. A value is assigned to the cluster, the value representing a ranking of the cluster in comparison to an additional cluster with respect to the performance metric and the additional performance metric. | 05-08-2014 |
20140129695 | CONNECTED DEVICES - A server for connecting devices is disclosed, comprising: a network interface to enable connections of a plurality of devices with the server and one or more execution environments, each execution environment representing one of the plurality of devices, each execution environment running an operating system of the respective device and exposing an interface specifying capabilities of the device, wherein the one or more execution environments are persistently maintained by the server. Furthermore, a terminal device and a method for connecting devices via an online service are described. | 05-08-2014 |
20140129696 | RECONSILIATION OF ASYMETRIC TOPOLOGY IN A CLUSTERED ENVIRONMENT - Provided are techniques for the orderly shutdown of a node within a cluster in the event of asymmetric topology maps, comprising receiving, at a first node, a plurality of heartbeats, each heartbeat corresponding to a particular, corresponding other node in the cluster and comprising information on a topological map corresponding to each particular other node's view of the cluster generating, by the first node, a topological map of the cluster based upon the information comprising the heartbeats; comparing the topological map of the cluster and the topological maps corresponding to each node; in response to a determination that the topological maps of the duster and each node are not in agreement, determining the connectivity of the first node with respect to the cluster and in respond to a determination that the first node has the lowest connectivity within the cluster, shutting down the first node. | 05-08-2014 |
20140129697 | EVALUATION OF PAGE LOAD PERFORMANCE OF WEB BROWSER - A new method and computer program for evaluating page load performance of a web browser is presented. The evaluation method comprises obtaining a first browser timestamp from the web browser when the web browser starts a page process in order to load a page from the server. Further, the method comprises obtaining at least one intermediate timestamp associated with an intermediate stage during the page load. The intermediate timestamp can be for example a second browser timestamp, a first server timestamp or a second server timestamp. After that, a third browser timestamp is obtained from the web browser when the web browser completes the page load. The obtained timestamps are used for calculating a first and second page load performance parameters relating respectively to a first and second technical aspect of the page load performance. | 05-08-2014 |
20140129698 | METHOD AND SYSTEM FOR EVENT NOTIFICATION - A server computer detects an event relating to a plurality of objects in a cloud. The server computer logs event data based on the event in a data store. The server computer examines subscription data to identify applications subscribing to the detected event, wherein the applications are executing in the cloud, and provides event data to the identified applications in the cloud. | 05-08-2014 |
20140129699 | SYSTEM AND METHOD FOR MAINTAINING DOMAIN NAME SERVICE - A method and system are provided for maintaining domain name service for a domain name. The domain name is associated with current resource record data and a name server delegation. The method and system involves providing at least two name server groups, which includes an active name server group and at least one spare name server group that is available to replace the active name server group; associating the active name server group to the name server delegation; receiving name server operation data corresponding to each of the at least two name server groups; and determining an operation condition indicating degraded performance within the at least two name server groups. The operation condition is determined based on the received name server operation data. | 05-08-2014 |
20140129700 | CREATING SEARCHABLE AND GLOBAL DATABASE OF USER VISIBLE PROCESS TRACES - In one example, a controller device includes one or more network interfaces communicatively coupled to one or more devices of a virtual network, and a processor configured to determine, for the virtual network, a set of two or more related processes executed by respective devices in the virtual network, receive via the network interfaces data for the set of two or more related processes, and aggregate the data for the set of two or more related processes to form aggregated data for the set of two or more related processes. | 05-08-2014 |
20140129701 | APPARATUS FOR MANAGING SHIP NETWORK - An apparatus for stably controlling and managing a ship network, which is capable of analyzing traffic characteristics of various marine devices having different properties in the ship network covering the various marine devices and switch equipments, allocating suitably network resources to the marine devices depending on the analyzed traffic characteristics, and managing exceptional situations by monitoring the generation of the situations. | 05-08-2014 |
20140129702 | PHYSIOLOGICAL TEST CREDIT METHOD - A physiological test credit method determines if test credits are available to the monitor and checks if a Wi-Fi connection is available. If test credits are less than a test credit threshold, the monitor connects to a test credit server, processes server commands so as to download test credits and disconnects from the server. In various embodiments, the monitor is challenged to break a server code, the server is challenged to break a monitor code. The server validates monitor serial codes, and saves monitor configuration parameters. | 05-08-2014 |
20140129703 | ASSET CURATION FOR CLOUD SOLUTIONS - Aspects of the disclosure relate to curation of cloud services that can be included a cloud solution tailored to an organization or an environment thereof. In one aspect, the cloud services can include software applications, professional services, managed network services, and/or infrastructure services. In one aspect, curation of a cloud service can be based on fitness of the cloud service for the organization or the environment thereof. In another aspect, the curation of certain cloud services can be refined based on feedback associated with such services. | 05-08-2014 |
20140129704 | Intelligent Work Load Manager - An apparatus comprising a processor configured to monitor at a recurring interval a plurality of message queues and a plurality of server sessions that access the message queues, determine, at each occurrence of the interval, an appropriate number of server sessions per queue that achieves acceptable load balance, and redistribute the server sessions among the message queues to match the appropriate number of server session per queue upon determining the appropriate number of server sessions and prior to a subsequent occurrence of the interval. | 05-08-2014 |
20140129705 | SECURITY NETWORK PROCESSOR SYSTEM AND METHOD - A system, method and computer program product are provided for scanning data received from a computer network. Included is a central processing unit for processing data. Coupled between the central processing unit and a network is a network processor. Such network processor is capable of scanning data received from the network based on an update. Such network processor is further capable of receiving the update via the network. | 05-08-2014 |
20140129706 | IDENTIFYING COMPATIBLE WEB SERVICE POLICIES - Methods, systems, and devices are described for identifying compatible web service policies between a web service and a web service client. A first and second set of one or more identifiers linked to web service policies supported by the web service and web service client may be calculated, respectively. The sets of identifiers may be compared. Using the comparison, a number of common identifiers present in the first set of one or more identifiers linked to the web service policies supported by the web service and the second set of one or more identifiers linked to the web service policies supported by the web service client may be identified. Using the number of common identifiers, a web service policy of the web service compatible with a web service policy of the web service client may be identified. | 05-08-2014 |
20140129707 | SERVICE PROVIDER OPTIMIZATION OF CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of service providers with respect to specific resource requests are also provided. | 05-08-2014 |
20140129708 | METHOD AND SYSTEM TO IDENTIFY A NETWORK DEVICE ASSOCIATED WITH POOR QoS - A method and apparatus to analyze real-time data transmissions across a network is described. The method may comprise transmitting a sample data stream between source and destination endpoints across a test data path which includes network devices. The method may then compare a measured quality of the received sample data stream with pre-defined quality criteria associated with the network. If the measured quality fails to meet the pre-defined quality criteria, the network devices in the test data path may be identified, device performance data may be obtained, and a network report may be generated based on the device performance data. The device performance data may comprise processor utilization, memory utilization, bandwidth over subscription, buffer over run, and/or a number of non-error packets that are discarded at the network device. | 05-08-2014 |
20140129709 | System and Method for Identifying Real Users Behind Application Servers - A monitoring device and method for identifying the identity of users requesting database accesses. The data request from application servers to an application server are monitored and parsed. The SQL statements associated with the data request from the application server are also monitored and parsed, so are the SQL responses from the database server. The SQL responses are sent back to the user as data responses. The data responses are also monitored and parsed. The monitoring device matches the parsed data request with the parsed SQL statements, the parsed SQL responses, and the parsed data responses. By matching the string portion of these parsed data, the monitoring device can then identity the identity of the user making such data base request. | 05-08-2014 |
20140129710 | DYNAMICALLY MODIFYING QUIALITY OF SERVICE LEVELS FOR RESOURCES RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically modifying Quality of Service (QoS) levels for resources (e.g., applications, processes, services, etc.) running in a networked computing environment. Specifically, embodiments of the present invention dynamically adjust transport level networking QoS parameters based on associated service level agreements (SLA) term. In a typical embodiment, a set of service level requirements associated with a resource running in the networked computing environment will first be identified (e.g., in a computer data structure). Then, the set of service level requirements will be mapped to a set of QoS parameters associated with a transport layer of the networked computing environment. A current performance of the resource within the transport layer will then be determined. Once the current performance has been determined, it will be further determined whether the current performance meets the set of service level requirements. Based on this determination/comparison, the set of QoS parameters can be adjusted accordingly. | 05-08-2014 |
20140136679 | EFFICIENT NETWORK BANDWIDTH UTILIZATION IN A DISTRIBUTED PROCESSING SYSTEM - Methods, apparatuses, and computer program product for of efficient network bandwidth utilization in a distributed processing system are provided. Embodiments include monitoring, by a network monitor, network usage of a distributed processing system containing a plurality of endpoint devices; creating, by the network monitor, a historical network usage pattern based on the monitoring of the network usage; based on the historical network usage pattern, identifying, by the network monitor, a first set of future time periods predicted to correspond with low network usage; and selecting from the first set of future time periods, by the network monitor, a particular time period to perform a network administrative task on an endpoint device in the distributed processing system. | 05-15-2014 |
20140136680 | SYSTEMS AND METHODS FOR APPFLOW FOR DATASTREAM - The present disclosure is directed towards systems and methods for monitoring application level flow for database applications served by a cluster of servers. An application flow monitor may receive and distribute write requests of a client to at least one master server and read requests of the client to one or more slave servers, based on load balancing or similar policies. The application flow monitor may receive responses from the recipient server and may aggregate the requests and responses into Internet Protocol Flow Information Export (IPFIX) messages that may describe the entire communication flow for the application. Accordingly, application flow statistics may be monitored, regardless of which server was involved in any particular request/response exchange, allowing scalability without impairment of administrative processes. | 05-15-2014 |
20140136681 | Enterprise Application Session Control and Monitoring in a Large Distributed Environment - Mechanisms are provided for performing centralized monitoring of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an application session monitoring operation to monitor at least one of input or output streams of application sessions associated with a specified user account identifier is received. A plurality of application instances upon which to perform the requested application session monitoring operation are identified. An application session monitoring request is transmitted to a plurality of session control clients associated with the application instances on a plurality of application servers of the distributed computing environment. The application session monitoring request causes each session control client to monitor at least one of an input or an output stream of application sessions of application instances that are associated with the specified user account identifier, and report results of the monitoring back to the data processing system. | 05-15-2014 |
20140136682 | AUTOMATICALLY ADDRESSING PERFORMANCE ISSUES IN A DISTRIBUTED DATABASE - A database performance monitor monitors performance of a distributed database, identifies a database performance issue for the distributed database, determines from a distributed virtual network mechanism which physical networks are related to the database performance issue, determines a potential solution to the database performance issue that changes configuration of the distributed database, and applies the potential solution by automatically changing configuration of the distributed database without intervention of a user to address the database performance issue. | 05-15-2014 |
20140136683 | INTER-PACKET INTERVAL PREDICTION OPERATING ALGORITHM - An appliance receives packets that are part of a flow pair, each packet sharing an application protocol. The appliance determines an estimated application protocol of the packets without performing deep packet inspection on any packets. The estimated application protocol may be determined by using an application protocol estimation table. The appliance then predicts the inter-packet interval between a packet previously received by the appliance and a next packet not yet received by the appliance. The inter-packet interval may be determined by using an inter-packet interval prediction table. The appliance then preloads packet flow data in a cache before the next packet is predicted to arrive at the appliance. Upon receiving the next packet, the packet flow data is preloaded in the cache. This reduces packet processing time by removing waiting periods previously required to cache packet flow data from an external memory after receiving the next packet. | 05-15-2014 |
20140136684 | CHARACTERIZING SERVICE LEVELS ON AN ELECTRONIC NETWORK - The described implementations relate to processing of electronic data. One implementation is manifest as a system that that can include an event analysis component and one or more processing devices configured to execute the event analysis component. The event analysis component can be configured to obtain events from event logs, the events reflecting failures by one or more network devices in one or more data centers and characterize a service level of an application or a network device based on the events. For example, the event analysis component can be configured to characterize the availability of an application based on one or more network stamps of the application. | 05-15-2014 |
20140136685 | ADAPTIVE UNIFIED PERFORMANCE MANAGEMENT (AUPM) OF NETWORK ELEMENTS - Systems and methods which provide an adaptive unified performance management (AUPM) framework for interacting with disparate network elements using techniques adaptive to operational conditions to provide network performance adaptive root cause analysis (ARCA) are shown. An AUPM framework of embodiments of the invention implements a proxy based architecture in which a plurality of proxies are utilized to connect to and perform data communication with the disparate network elements. Centralized performance management is in communication with the proxies to obtain and unify network element data for performance monitoring, alarm reporting, and/or root cause analysis. The performance monitoring, alarm reporting, and root cause analysis provided by centralized performance management of embodiments herein implements adaptive cluster-based analysis to provide robust operation adapted to accommodate various operational scenarios, such as may include time varying conditions and learning based configuration. | 05-15-2014 |
20140136686 | DYNAMIC RESOLUTION REGULATING SYSTEM AND DYNAMIC RESOLUTION REGULATING METHOD - Disclosed herein is a dynamic resolution regulating system for uses in a server that is connected to a client device via a network. The dynamic resolution regulating system includes a network monitoring unit and an image-processing unit. The network-monitoring unit is operable to monitor and analyze network transmission quality for the server and client device, and the image-processing unit is operable to adjust the resolutions of a region-of-interest (ROI) and a region-of-non-interest (non-ROI) in an image based on the network transmission quality, such that the client device can receive the image via the network. Also disclosed herein is a method for dynamic solution regulating method. | 05-15-2014 |
20140136687 | EFFICIENT NETWORK BANDWIDTH UTILIZATION IN A DISTRIBUTED PROCESSING SYSTEM - Methods, apparatuses, and computer program product for of efficient network bandwidth utilization in a distributed processing system are provided. Embodiments include monitoring, by a network monitor, network usage of a distributed processing system containing a plurality of endpoint devices; creating, by the network monitor, a historical network usage pattern based on the monitoring of the network usage; based on the historical network usage pattern, identifying, by the network monitor, a first set of future time periods predicted to correspond with low network usage; and selecting from the first set of future time periods, by the network monitor, a particular time period to perform a network administrative task on an endpoint device in the distributed processing system. | 05-15-2014 |
20140136688 | OPTIMIZING PARTITION PLACEMENT IN VIRTUALIZED ENVIRONMENTS - Application performance in cloud-based virtualized environments may be improved by migrating partitions executing within the cloud between servers. When an application spans multiple related partitions spread out on different servers within the cloud, related partitions may be migrated to the same server or nearby servers to reduce input/output (I/O) delay in communications between the related partitions. A method for improving performance may include analyzing a network traffic log to identify related partitions. Then, communications costs may be calculated for the related partitions and a partition selected for migration to a new location in the cloud. | 05-15-2014 |
20140136689 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information. | 05-15-2014 |
20140136690 | Evaluating Electronic Network Devices In View of Cost and Service Level Considerations - The described implementations relate to processing of electronic data. One implementation is manifest as one or more computer-readable storage devices comprising instructions which, when executed by one or more processing devices, cause the one or more processing devices to perform acts. The acts can include determining service levels provided by multiple network configurations, determining costs associated with the multiple network configurations, and evaluating the multiple network configurations based on both the costs and the service levels. The multiple network configurations can include redundantly-deployed devices. Furthermore, some implementations may determine cost/service level metrics that can be used to compare devices based on expected costs to provide a particular service level. | 05-15-2014 |
20140136691 | APPLICATION MONITORING OF RELATED ACTIVITIES ACROSS MULTIPLE THREADS - Embodiments provide systems, methods, and computer program products for monitoring application performance in multithreaded environments. Monitoring data may be inserted into data structures that propagate and persist between threads involved in a processing event. Data related to specific methods executing on each thread may be output to a trace file. The trace file may be analyzed for application performance by associating the threads that contain the same tracking data from the propagated data structure. | 05-15-2014 |
20140136692 | DIAGNOSING DISTRIBUTED APPLICATIONS USING APPLICATION LOGS AND REQUEST PROCESSING PATHS - A system for supporting a distributed application includes a plurality of servers, where each of the plurality of servers includes a thread that processes a request received by the distributed application and a monitoring agent that constructs a transaction path for the request and annotates the transaction path in accordance with a writing action to a log of the distributed application to produce an annotated transaction path. In another embodiment, a system for monitoring a distributed application for errors includes a processor and a computer readable storage medium that stores instructions which, when executed, cause the processor to perform operations including constructing a transaction path for each request received by the distributed application, detecting a writing action to a log of the distributed application, and annotating the transaction path in accordance with the writing action to produce an annotated transaction path. | 05-15-2014 |
20140136693 | METHOD AND SYSTEM FOR BROWSER BASED, NON-INTRUSIVE MEASURING OF END-USER PERCEIVED PERFORMANCE OF INDIVIDUAL THIRD PARTY RESOURCE REQUESTS - A performance management system is provided that measures end user performance in a distributed computing environment. The system detects DOM updates caused by browser side activities, and identifies resource load requests introduced by a DOM update that request resource from third party sources. For such resource load requests, resource sensors are installed which detect the point in time when loading the resource was finished. This allows to measure load time for individual resource load requests requesting third party resources, and to assign the tracing and performance monitoring data describing those resource load requests to the tracing and performance monitoring data describing the browser side transaction execution that caused the third party resource loads. | 05-15-2014 |
20140136694 | NETWORK ABNORMALITY DETECTION SYSTEM, MEASUREMENT APPARATUS, AND ANALYSIS APPARATUS - In a communication system in which a plurality of communication apparatuses perform communication via a communication network, a network abnormality detection system dynamically creates a monitoring rule during operation without defining information (monitoring rule) regarding communication to be monitored in advance and perform a collection process and an abnormality determination process quickly even when an amount of information to be monitored is vast. The network abnormality detection system copies packets transmitted at predetermined measurement positions in the communication network, calculates communication statistics information at each measurement position from the copied packets, analyzes one or more pieces of communication statistics information, and detects occurrence of communication abnormality. | 05-15-2014 |
20140136695 | DETECTION METHOD IN NETWORK SYSTEM AND RELATED APPARATUS - A detection method, used in a network system, for detecting an online state of a server, includes a host generating a discover packet according to a media access control address of a network interface card of the server and transmitting the discover packet to the network system; and the host capturing the server internet protocol address in at least one offer packet when receiving the at least one offer packet corresponding to the discover packet, and storing the server internet protocol address in a detection result file. | 05-15-2014 |
20140136696 | Context Extraction - There is disclosed a method comprising receiving identifier data relating to a communication network; examining a set of identifier data to identify number of different identifier data in the set of location data; on the basis of the examining determining a status of an apparatus; and if the examining indicates that the status of the apparatus is a first state, examining context data relating to the first state to determine the current context of the apparatus. There is also disclosed a computer program comprising computer-executable program code portions stored therein, comprising program code instructions for performing the method. There is further disclosed an apparatus comprising a processor and a memory including computer program code, the memory and the computer program code configured to, with the processor, cause the apparatus to performing the method. | 05-15-2014 |
20140136697 | Communication Network System, Communication Method and Information Processing Apparatus - A communication network system is provided and it includes: a device administration unit that is connected to at least one device in a communicable fashion; a device information storage unit that receives device information about the device from the device administration unit through a network and stores the device information; an application delivery unit that delivers an application, which issues an instruction for operating the device, to the device administration unit through the network on the basis of a request from the device administration unit; and an instruction transceiver unit that receives the instruction for operating the device from a communication unit through the network, and transmits the instruction to the device administration unit. The instruction transmission reception unit determines the vice administration unit transmitting the instruction for operating the device, on the basis of the device information acquired from the device information storage unit, and information about the device administration unit that is a delivery destination of the application acquired from the application delivery unit. | 05-15-2014 |
20140136698 | STATISTICAL PROFILING OF CLUSTER TASKS - A variety of complex multiphase tasks may execute within a cluster network environment. It may be advantageous to track and analyze the processing of such multiphase tasks. Accordingly, one or more techniques and/or systems are disclosed for tracking the processing of a multiphase task within a cluster network environment. In particular, runtime support for recording task processing annotations may be embedded into a multiphase task using an analysis model. The analysis model may specify task processing annotations that are to be recorded during one or more phases of processing the multiphase task. During execution, task processing annotations may be recorded and associated with corresponding phases of the multiphase task. Task processing annotations may be aggregated into aggregated statistical task data. The aggregated statistical task data may be used to generate views of statistical data, which may provide insight into the cluster network environment (e.g., problematic nodes, bottlenecks, etc.). | 05-15-2014 |
20140136699 | METHOD AND APPARATUS OF ESTABLISHING COMPUTER NETWORK MONITORING CRITERIA - A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of automatically configuring a set of monitoring requirements may include creating initial monitor counter values at a computing device and monitoring at least one computer based on the initial monitor counter values. Additional operations may include calculating override monitor counter values based on the monitoring of the at least one computer, and monitoring the at least one computer based on the override monitor counter values. The override values may be better suited for the device(s) being monitored and may replace the previously used monitoring settings. | 05-15-2014 |
20140136700 | METHOD AND SYSTEM FOR RESOURCE-AWARE DYNAMIC BANDWIDTH CONTROL - Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead. | 05-15-2014 |
20140143404 | SYSTEM AND METHOD FOR COMMUNICATING WITH MULTIPLE DEVICES - Certain aspects of a method and system for communicating with multiple devices may include a network that is capable of communicatively coupling a plurality of peripheral devices to a server. The server may be operable to receive a first set of instructions from a first of the plurality of peripheral devices and transcode the received first set of instructions to a second set of instructions. The transcoded second set of instructions may be communicated to at least one other of the plurality of peripheral devices. The first set of instructions may be based on a first communication protocol and the second set of instructions may be based on a second communication protocol. | 05-22-2014 |
20140143405 | System And Method For Analyzing Social Media Trends - Disclosed are methods for identifying topical experts from a seed set of experts by identifying “second tier” influencers for the topic. New concepts detected among a pool of experts and second tier influencers are monitored among the general population and their significance evaluated. Reports may be generated for these detected trends. Trends in social media for a concept represented in a taxonomy may be detected by monitoring content for descendent nodes for the concept. Correlations between social media activity with respect to the concept and sales of products corresponding to the concept may be made and sales predicted for the same or different products that correspond to descendants of the concept in the taxonomy. | 05-22-2014 |
20140143406 | Dynamically Scalable Real-Time System Monitoring - Methods, computer readable media, and apparatuses for dynamically scalable real-time system monitoring are presented. For example, according to one aspect, multiple performance metrics are received from multiple performance metric collection agents. At least some of the performance metrics are identified based on an association with a common entity. The identified performance metrics are utilized to evaluate whether performance conditions specified by rules associated with the common entity have been satisfied. Responsive to evaluating that a performance condition has been satisfied, an alert is generated and communicated to one or more subscriber devices associated with the common entity. | 05-22-2014 |
20140143407 | MULTI-OBJECTIVE SERVER PLACEMENT DETERMINATION - Methods and apparatus for determining recommended geographic server locations for online social networks by attempting to minimize user-server latency and inter-user communications latency. In an embodiment, geographic and relationship information for a plurality of users is acquired. The plurality of users may belong to one or more networks. The acquired information is transformed into a graph. A first plurality of clusters is generated with a first clustering algorithm. A second plurality of clusters is generated by iteratively examining pairs of the first plurality clusters, and swapping nodes between the examined clusters if it will reduce a total cut weight of the graph and locate each pair of nodes within a defined maximum distance from the centroid of the target cluster. In an embodiment, a method uses a joint analysis approach based upon characteristics of a plurality of existing networks. | 05-22-2014 |
20140143408 | WIRELESS NETWORK POLLING AND DATA WAREHOUSING - Methods and systems are provided to collect and update data on client devices connected to WiFi access points is provided. An inventory of WiFi cable modems and WiFi access points coupled to the WiFi cabled modems within a specific network is periodically collected. Internet Protocol (IP) addresses of WiFi cable modems and WiFi access points coupled to the WiFi cabled modems are periodically updated. Traps are periodically received from the WiFi access points. The traps are parsed to collect an inventory of client devices wirelessly connected to the WiFi access points and a time at which a client device connected to the WiFi access point. The WiFi access points are periodically polled to collect data on client devices, the data including a period of time that a client device has been connected to a WiFi access point and a physical location of the client device. | 05-22-2014 |
20140143409 | Bandwidth On-Demand Services in Multiple Layer Networks - Bandwidth usage for an existing communication tunnel between a first device and second device is monitored. A determination is made that additional bandwidth is required for communication between the first network device and the second network device. A determination is made that for the addition of the additional bandwidth would exceed available bandwidth for the existing tunnel. Additional bandwidth is established between the first network device and the second network device. | 05-22-2014 |
20140143410 | MONITORING A PERFORMANCE OF A COMPUTING DEVICE - Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource. | 05-22-2014 |
20140143411 | NETWORK DEVICE AND METHOD OF PROCESSING DYING GASP - A network device is provided, which is connected to a receiver. The network device includes a signal processing unit and a transceiver unit. Prior to occurrence of a hardware interrupt event, the signal processing unit detects the connection configuration between the network device and the receiver and outputs a temporary signal corresponding to the configuration of connection. The transceiver unit, which is connected to the signal processing unit and the receiver, receives and stores the temporary signal so that, when a hardware interrupt event occurs, the transceiver unit generates a dying gasp corresponding to the temporary signal and transmits the dying gasp to the receiver. | 05-22-2014 |
20140143412 | METHOD, SYSTEM AND DEVICES FOR MANAGING USER PROVISIONING OF A SERVICE IN AN IMS NETWORK - Present invention refers to a method, system and devices for managing user provisioning of a service in an IP Multimedia Subsystem (IMS) network. The proposed solution optimizes the dimensioning of Home subscriber server (HSS) according to active users. | 05-22-2014 |
20140143413 | METHOD, LOCAL GATEWAY, AND SYSTEM FOR LOCAL VOICE SURVIVABILITY - Embodiments of the present invention relate to the communications field and disclose a method, a local gateway, and a system for local voice survivability, to implement local voice survivability without configuring a DNS proxy function on a local gateway or configuring a server on a user terminal. A specific solution is: detecting, according to a preset detection period, an activity state of a server recorded in a server monitoring list, where the server monitoring list records a voice server on an Internet protocol IP multimedia subsystem IMS network in advance; intercepting, when it is detected that all servers in the server monitoring list are in an unavailable state, a service data stream sent by a user terminal to the server; and providing a corresponding service response for the user terminal according to content of the intercepted service data stream. The present invention applies to a process of voice survivability. | 05-22-2014 |
20140143414 | Method for sending information and gateway - Embodiments of the disclosure disclose a method for sending information and a gateway. The method includes that: a gateway acquires user online information; the gateway monitors a Domain Name System (DNS) domain name inquiring message, forges a DNS server returning domain name parsing response, and sends the forged response to a core network element or a user terminal browser; the gateway receives a user HyperText Transfer Protocol (HTTP) request returned by the core network element or the user terminal browser; and the gateway inquires the user online information according to the user HTTP request, adds the user online information in the user HTTP request by taking the user online information as HTTP header information, and sends the user HTTP request including the HTTP header information to an internet content and service provider. With the technical solution of an embodiment of the disclosure, the problem that the internet content and service provider fails to acquire user online information of a mobile terminal user is solved. | 05-22-2014 |
20140143415 | Optimized Content Distribution Based on Metrics Derived from the End User - Some embodiments provide systems and methods for determining a server of a distributed hosting system to optimally distribute content to an end user. The method includes identifying an IP address of the end user. Based on the IP address, a set of servers send packets to the end user to derive performance metrics. The performance metrics are used to determine a server from the set of servers that optimally distributes content to the end user. The method modifies a configuration for resolving end user requests such that the optimal server is identified to the end user when the end user requests content from the hosting system. Some embodiments determine the optimal server by providing downloadable content that is embedded with a monitoring tool. The monitoring tool causes the end user to derive performance metrics for the hosting system when downloading a particular object from a set of servers. | 05-22-2014 |
20140143416 | GENERIC DISCOVERY FOR COMPUTER NETWORKS - A generic discovery methodology collects data pertaining to components of a computer network using various discovery technologies. From the collected data, the methodology identifies, filters and analyzes information related to inter-component communications. Using the communication and application information, the methodology determines reliable relationships for those components having sufficient information available. To qualify more components, the methodology implements a decision service to generate hypothetical relationships between components that are known and components that are unqualified or unknown. The hypothetical relationships are presented to a user for selection, and each hypothetical relationship is preferably associated with an indication of its reliability. | 05-22-2014 |
20140143417 | SYSTEMS AND METHODS FOR MANAGING APPLICATIONS - A method for notifying a first device of a status of an application includes transmitting an application state transition notification message from a second device to the first device when a state transition of the application has occurred, wherein the application state transition notification message comprises information regarding at least a current state of the application and a reason of the state transition; and transmitting an application state transition response message from the first device to the second device in response to the application state transition notification message. | 05-22-2014 |
20140143418 | MANAGEMENT COMPUTER, STORAGE SYSTEM MANAGEMENT METHOD, AND STORAGE SYSTEM - It is provided a management computer coupled to a plurality of storage apparatuses and a plurality of physical computers, which comprises a memory, a processor and a network interface. The management computer collects performance information on each of at least one resource included in a path based on monitoring priority assigned to the each of the at least one resource; identifies a first path including a first resource based on configuration information in a case where a first event has occurred on the first resource; identifies a second resource included in the first path; determines whether a third resource for which the monitoring priority needs to be changed is included in the second resource based on the first event and the monitoring priority information; and changes the monitoring priority of the third resource in a case where the third resource is determined to be included in the second resource. | 05-22-2014 |
20140143419 | CONTROL OF NETWORKS - The invention provides a network of devices and a set of processors which control and/or monitor these devices by executing code defining a data-model for the network. This data-model incorporates a set of logical-nodes encapsulating network function and/or network devices, and are arranged in a hierarchy for centralised control and/or monitoring. Each logical-node includes a service-module having a set of connections for service-events and can store and/or update service-data objects, with service-events and service-data objects conforming to types defined by a network standard. Each logical-node also includes an intelligence-module having connections to exchange intelligence-events with other intelligence-modules and being operable to participate in intelligence-operations distributed across multiple intelligence-modules, and may generate service-intelligence-data defining service-events for one or more service-modules. | 05-22-2014 |
20140149568 | MONITORING ALERTS IN A COMPUTER LANDSCAPE ENVIRONMENT - In a landscape environment, embodiments disclosed herein aggregate alerts into a root alert to reduce the overall alerts being analyzed. A dependency matrix can be used to determine alerts that are redundant due to being derived from a same root problem. In some embodiments, a first alert of a potential problem can be received from a first application or first resource. As a result, a dependency matrix can be checked to determine if a related alert has occurred that is associated with the first alert. If a related alert has already occurred, the first alert can be suppressed. Otherwise, the first alert can be transmitted for further evaluation, such as to a help desk. By suppressing alerts that are dependent on other alerts, a root alert can be generated and forwarded for further evaluation. | 05-29-2014 |
20140149569 | CORRELATIVE MONITORING, ANALYSIS, AND CONTROL OF MULTI-SERVICE, MULTI-NETWORK SYSTEMS - Methods and devices for correlative monitoring, analysis, and control of multi-service, multi-network systems are provided herein. Exemplary methods may include generating a network topology graph of a metanetwork using traffic records obtained from the metanetwork, generating a causal digraph of the metanetwork using the traffic records and the network topology graph, and transmitting one or more of the network topology graph and the causal digraph to a computing system. | 05-29-2014 |
20140149570 | PROVISIONING IP TERMINALS - A method for identifying and remotely provisioning IP terminals like video conference endpoints connected to a common LAN. A provisioning server sends email with a provisioning URL to user being asked to activate the URL; the computer receiving the email is connected to the LAN. Activation establishes an http session between the computer and a provisioning server, the server delivering a Java applet to the computer. When the Java applet is executed, it extracts the IP address of the computer. The Java applet then scans the LAN for video communication endpoints by sending out signaling protocol request like SIP or H.323 requests addressed with IP addresses belonging to the same IP address segment as the computer's IP address. The computer then provision the IP units responding to the signaling protocol requests by inserting XML files into the endpoints adjusted to the certain systems units identified via the endpoints' API. | 05-29-2014 |
20140149571 | Trust-Based Self-Organizing Wireless Network - A trust-based network has a plurality of nodes, each of which has a node device. Each node device includes a processor, a memory coupled to the processor, and a transceiver coupled to the processor. The transceiver is capable of transmitting signals to, and receiving signals from a second node device in the network. Trust for the transmission of information between nodes is determined using the proximity of one node to another, as well as other factors. | 05-29-2014 |
20140149572 | MONITORING AND DIAGNOSTICS IN COMPUTER NETWORKS - Various techniques of network monitoring and diagnostics in computer networks are disclosed herein. In one embodiment, a method includes configuring a network session between a first client device and a second client device interconnected to each other by the computer network. The configured network session having one or more encrypted attributes. The method also includes transmitting one or more of the encrypted attributes of the configured network session to a network management system for collecting information from one or more network elements connecting the first client device to the second client device during the network session. | 05-29-2014 |
20140149573 | Collecting And Using Quality Of Experience Information - Concepts and technologies are disclosed herein for collecting and using quality of experience information. A server computer executing a quality of experience management service can receive a request for quality of experience display data. The server computer can obtain location data defining a geographic location of a user device and analyze quality of experience information defining a quality of experience of an application program associated with the user device. The server computer can generate the quality of experience display data based upon the quality of experience information, and provide the quality of experience display data to the user device. | 05-29-2014 |
20140149574 | GENERATING A GENERALIZED UNIFORM RESOURCE IDENTIFIER - Examples disclosed herein relate to generating a generalized uniform resource identifier (URI). Examples include generating a generalized URI for a given URI. In examples disclosed herein, the generalized URI may include a generic value. Also, in examples disclosed herein, the generalized URI may include the generic value in a segment position corresponding to a variable segment position of the given URI. | 05-29-2014 |
20140149575 | ROUTING OF PERFORMANCE DATA TO DEPENDENT CALCULATORS - A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it. | 05-29-2014 |
20140149576 | Managing Application Log Levels in Cloud Environment - Applications and their application components run on a cloud platform and an underlying cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely change log levels of logger objects defined in application components. The application logs are generated and stored for the application components on the cloud runtime infrastructure of the cloud platform. Log levels affect the content stored in the application logs. The exposed interface is instantiated to process remote requests for managing application logs and log levels for a specified application component. The application component is deployed on the cloud platform. The requested change in the log levels is performed based on the implementation of the interface. The change in the log levels is performed in the configuration data on the cloud runtime infrastructure provided by the cloud platform. | 05-29-2014 |
20140149577 | METHODS AND APPARATUS TO MONITOR ONLINE ACTIVITY - An example method to monitor online activity involves comparing first uniform resource locators collected from a first client device of a known panelist with second uniform resource locators collected from second client devices associated with different users; and determining which of the second uniform resource locators correspond to online activity of the known panelist based on ones of the first uniform resource locators matching at least portions of ones of the second uniform resource locators | 05-29-2014 |
20140149578 | Method For Testing Methods of Accelerating Content Delivery - An exemplary method for testing and communicating a report of a loading of a website capable of having at least some content delivered through a content delivery network. The report provides information about loading of the webpage with geographically-accelerated content delivery relative to loading of the website without accelerated content delivery. | 05-29-2014 |
20140149579 | CENTRALIZED DISPATCHING OF APPLICATION ANALYTICS - A method may include, in a computing device comprising at least one processor and a memory, generating at least one information beacon from each of a plurality of applications installed on the computing device. Each information beacon may include application analytics data associated with a corresponding application while the corresponding application is running on the computing device. The at least one information beacon from each of the plurality of applications may be stored in a common location in the computing device. The stored at least one information beacon may be dispatched from each of the plurality of applications to a network device communicatively coupled to the computing device. The generating may be triggered by beacon generation code implemented in each of the plurality of applications installed on the computing device. | 05-29-2014 |
20140149580 | TECHNIQUES FOR ACCOUNTING FOR MULTIPLE TRANSACTIONS IN A TRANSPORT CONTROL PROTOCOL (TCP) PAYLOAD - Techniques for separately accounting for multiple transactions in the same data packets communicated over a network using Transport Control Protocol (TCP) include receiving an Internet Protocol (IP) data packet that includes Transport Control Protocol (TCP) payload data. The TCP payload is parsed to determine boundary data that indicates a byte location on a boundary between a first transaction and a second transaction. A byte count that indicates a number of bytes in the TCP payload associated with the first transaction is determined based on the boundary data. Accounting data for the first transaction is determined based at least in part on the byte count. These techniques allow a service gateway to bill separately for different requests and responses carried in TCP data packets, such as those for Hypertext Transfer Protocol (HTTP) and Real Time Streaming Protocol (RTSP). | 05-29-2014 |
20140149581 | QUALITY OF SERVICE MONITORING DEVICE AND METHOD OF MONITORING QUALITY OF SERVICE - The invention provides a quality of service monitoring device ( | 05-29-2014 |
20140149582 | METHODS FOR AUTOMATICALLY MANAGING INSTALLED APPLICATIONS AND DETERMINING APPLICATION RECOMMENDATION RESULT BASED ON AUXILIARY INFORMATION AND RELATED COMPUTER READABLE MEDIA - An application management method includes at least the following steps: receiving auxiliary information associated with a plurality of applications installed on a user device; analyzing the auxiliary information based on a plurality of predetermined rules, and generating at least one analysis result for each of the applications; and automatically performing application management upon the applications installed on the user device according to analysis results of the applications. | 05-29-2014 |
20140149583 | SOCIAL NETWORK FORENSIC APPARATUS AND METHOD FOR ANALYZING SNS DATA USING THE APPARATUS - Disclosed are an apparatus and a method that determine a human relationship having an online relationship with a specific user by using user information and a friend relationship that exist on a social network service, transmitted and received data, and the like, determine communication information based on the human relationship, and enable additional analysis such as a time based status progress analysis, or the like. In particular, a more comprehensive and accurate analysis result is presented by simultaneously information on two or more social network services for one person. | 05-29-2014 |
20140149584 | METHOD AND APPARATUS TO MANAGE SERVICE LEVEL AGREEMENT - A method of managing a service level agreement (SLA) with respect to devices on a network by using a server includes selecting at least one SLA item to quantitatively measure service levels provided by the devices, setting a service management automatic option with respect to the selected SLA item, monitoring the service levels provided by the devices with respect to the selected SLA item, and executing a predetermined event to control the devices according to a result of the monitoring and a setting of the service management automatic option. | 05-29-2014 |
20140149585 | SOFTWARE ASSET MANAGEMENT USING A BROWSER PLUG-IN - A software asset management method comprising storing URL data for each of a first plurality of software entities, obtaining, by means of a first browser plug-in, first data indicative of a URL from which a browser has obtained content, comparing, for at least one of the first plurality of software entities, the URL data of the respective software entity with the first data, and communicating the first data to a first computer other than a computer hosting the browser subject to a first condition that, for each of the first plurality of software entities, the comparing reveals that the first data does not match the URL data of the respective software entity. | 05-29-2014 |
20140149586 | INTERNET PANEL FOR CAPTURING ACTIVE AND INTENTIONAL ONLINE ACTIVITY - A method, apparatus, system, and computer program product provide the ability to capture online activity. A group of Internet users that is representative of a portion of all Internet users is determined. A browser extension is installed onto an Internet browser of each of the Internet users in the group. Data for active and intentional webpage visits is identified, captured, and collected, via the browser extension, from each of the Internet users. The data is then utilized. | 05-29-2014 |
20140149587 | TECHNIQUES FOR MEASURING PEER-TO-PEER (P2P) NETWORKS - Techniques for measuring Peer-To-Peer (P2P) networks are provided. P2P are initially seeded with links to feigned content. As a P2P participant accesses a link, metrics are recorded about the P2P network being used by the participant. The metrics are used to form measurements to compare different P2P networks relative to one another. | 05-29-2014 |
20140149588 | INTERNET USE MONITORING SYSTEM AND METHOD - A system for monitoring Internet use of a selected computer user includes a remote server and a computer having a monitoring program voluntarily installed thereon by the user communicatively connected to the remote server. The monitoring program is configured to monitor various Internet access activity of the computer user and record the Internet access activity on the remote server. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats, and electronic mail activity. A method of using a monitoring system includes the steps of a computer user voluntarily installing a monitoring program on a selected computer, recording the Internet access activity, and providing the recorded information to a third party recipient. A report may be provided that includes a variety of information and may include a plurality of portions. | 05-29-2014 |
20140156826 | Parallel Top-K Simple Shortest Paths Discovery - A method for searching the top-K simple shortest paths between a specified source node and a specified target node in a graph, with graph data partitioned and distributed across a plurality of computing servers, the method including a parallel path search initialized from either one or both of the source and target nodes and traversing the graph by building likely path sequences for a match. Each computing server determines and forwards a path sequence as discovery progresses until the top-K paths are discovered. | 06-05-2014 |
20140156827 | Method and System for Capturing Expertise of a Knowledge Worker in an Integrated Breadcrumb Trail of Data Transactions and User Interactions - A system and method is provided for creating a trail of events. A plurality of data exchange events and a plurality of user interaction events are captured. A frame is generated based on the captured plurality of user interaction events. A cut is generated based on the captured plurality of data exchange events and the frame. The cut represents a historical trail of the plurality of user interaction events associated with the back-end data receive event and the back-end data send event | 06-05-2014 |
20140156828 | METHOD AND SYSTEM FOR ABSTRACTING RESTFUL WEB SERVICE HTTP BETWEEN A CLIENT AND A SERVER - A computer system identifies metadata components that are associated with uniform resource identifiers (URIs) in service description language metadata for a RESTful (Representational State Transfer) web service The computer system identifies a programming language for a template pertaining to a method of a software development kit (SDK) client. The computer system creates the template. The template includes programming code placeholders for the metadata components based on the identified programming language. | 06-05-2014 |
20140156829 | Methods, Systems, and Products for Personalized Monitoring of Data - Methods, systems, and products provide a personalized monitoring service. Data is collected and compared to user-defined rules and ranges of data. User-defined labels may be applied to the data and to the ranges. Notification messages may be sent to any recipient to notify of the data. The labels explain the data and any abnormal condition. | 06-05-2014 |
20140156830 | CORRELATING COMPUTING NETWORK EVENTS - According to one aspect of the present disclosure, a method and technique for correlating computing network events is disclosed. The method includes: receiving a plurality of events at an event manager residing on a host computing system; identifying a first resource associated with a first event; identifying a second resource associated with a second event; determining whether the first resource is associated with a deployment pattern; determining whether the second resource is associated with a deployment pattern; and responsive to determining that the first and second resources are each associated with a deployment pattern, correlating the first and second events responsive to the first and second resources being associated with a common deployment pattern. | 06-05-2014 |
20140156831 | APPARATUS AND METHOD FOR MONITORING SIGNALS TRANSMITTED IN BUS - A signal monitor includes a signal collecting unit, a register, a processing unit, and a Reduced Media Independent Interface (RMII). The signal collecting unit collects real-time signals from a bus, converts the real-time signals into accessible data, and stores the accessible data in the register. The processing unit retrieves the accessible data from the register and determines status of the real-time signals by examining the accessible data. The RMII converts the status of the real-time signals into Ethernet frame packets and transmits the Ethernet frame packets to a control terminal via an Ethernet interface. A method for monitoring signals transmitted in a bus is also provided. | 06-05-2014 |
20140156832 | MONITORING THE HEALTH OF DISTRIBUTED SYSTEMS - The present invention extends to methods, systems, and computer program products for monitoring the health of distributed systems. Embodiments of the invention provide distributed, self-maintained, continuous health monitoring. Using XML and pluggable infrastructure, a logical view of an appliance can be provided. The logical view abstracts physical implementation details of the appliance. Monitoring agents can correlate different distributed system failures and events and reason over collected health information. | 06-05-2014 |
20140156833 | SYSTEM AND METHOD FOR AUTOMATICALLY TRIGGERED SYNCHRONOUS AND ASYNCHRONOUS VIDEO AND AUDIO COMMUNICATIONS BETWEEN USERS AT DIFFERENT ENDPOINTS - A method for audio and/or video communication between at least two endpoints in a networked environment comprises receiving a plurality of data (data points) via a plurality of notifications/sensors/probes in the networked environment, said plurality of notifications/sensors/probes monitoring the data points; analyzing the data points to determine a state of each endpoint and correlating the state of each endpoint with at least one pre-identified state, comparing state of endpoint to at least one pre-identified state to recognize if an activation event is triggered, wherein if the activation event is triggered, an action related to the pre-identified state is taken, wherein at least one of the steps is carried out by a computer device. | 06-05-2014 |
20140156834 | BACKGROUND TASK EXECUTION OVER A NETWORK - Network activity of a client device that is coupled to a data network is monitored, to detect network activity idle time. Based upon detecting the idle time, an application running in the client device is automatically signaled that its background task be executed over the data network. Other embodiments a e also described and claimed. | 06-05-2014 |
20140156835 | METHODS AND SYSTEMS FOR DYNAMICALLY MANAGING REQUESTS FOR COMPUTING CAPACITY - Embodiments of systems and methods are described for dynamically managing requests for computing capacity from a provider of computing resources. Illustratively, the computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. The systems or methods automatically allocate computing resources for execution of one or more programs associated with the user. The systems and methods may enable the user to make changes to the allocated resources after execution of the one or more programs has started. | 06-05-2014 |
20140156836 | COOPERATIVE PROXY AUTO-DISCOVERY AND CONNECTION INTERCEPTION - In a network supporting transactions between clients and servers and proxies that are interposable in a network path, a pair of proxies can modify a packet stream such that packet data from client to server is transformed at a client-side proxy of the pair and untransformed at a server-side of the pair and packet data from server to client is transformed at the server-side proxy and untransformed at the client-side proxy. A discovering proxy transparently discovers its position in a proxy pair by using proxy signals. A discovering proxy might determine that it is a client-side proxy by receipt of a packet from client without a proxy signal, or that it is a server-side proxy by receipt of a packet from server without a return proxy signal. Once a proxy pair is discovered, it might transform traffic from server to client or vice versa, transforming and untransforming the traffic. | 06-05-2014 |
20140156837 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 06-05-2014 |
20140156838 | SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES - A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module configured to detect the launch or request to access a network by an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more policies or categories to associate with the application by referencing an application inventory database. Once the application server module has the category or policy, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the application to control network access by the application. | 06-05-2014 |
20140156839 | METHOD FOR DETERMINING METRICS OF A CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK - A method for determining metrics of a content delivery and global traffic management network provides service metric probes that determine the service availability and metric measurements of types of services provided by a content delivery machine. Latency probes are also provided for determining the latency of various servers within a network. Service metric probes consult a configuration file containing each DNS name in its area and the set of services. Each server in the network has a metric test associated with each service supported by the server which the service metric probes periodically performs metric tests on and records the metric test results which are periodically sent to all of the DNS servers in the network. DNS servers use the test result updates to determine the best server to return for a given DNS name. The latency probe calculates the latency from its location to a client's location using the round trip time for sending a packet to the client to obtain the latency value for that client. The latency probe updates the DNS servers with the clients' latency data. The DNS server uses the latency test data updates to determine the closest server to a client. | 06-05-2014 |
20140156840 | Session Layer For Monitoring Utility Application Traffic - Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information. | 06-05-2014 |
20140156841 | CLIENT-INDEPENDENT NETWORK SUPERVISION APPLICATION - A network monitoring and control application suitable for use by teachers and other users is implemented using wireless access points and does not require specific software to be installed on client network devices. The application uses student and class information to organize network client information. Upon receiving a monitoring request, one or more classes assigned to the teacher are identified by accessing class data. Class data is accessed to identify students assigned to the class and the client network devices used by these students. One wireless access point providing wireless network connections to at least a portion of the students' devices is selected to collect network activity information from the students' devices and presents this information to the teacher. The teacher may also use the selected wireless access point to disable students' network access or to redirect students' devices to a network resource. | 06-05-2014 |
20140156842 | METHOD AND APPARATUS FOR ASSEMBLING ELEMENTS OF DATA TRANSACTIONS - A computerized method for organizing representations of transactions in a multi-node system, comprising randomly selecting by each computer of a plurality of computers a message in a repository of messages of transactions accessible to the plurality of computers, and selecting in the repository by each computer of the plurality of computers further messages belonging to the transaction the randomly selected message belongs to, and assembling the selected messages to a representation of the transaction the randomly selected message belongs to, and an apparatus for the same. | 06-05-2014 |
20140164591 | Synchronization Of A Virtual Machine Across Mobile Devices - A mobile device including a memory including computer-executable instructions for synchronizing a virtual machine and a processor executing the computer-executable instructions, the computer-executable instructions, when executed by the processor, cause the processor to perform operations including executing a virtual machine using a memory; executing a hypervisor providing a synchronization daemon, the synchronization daemon monitoring the memory, the synchronization daemon generating a checkpoint indicating a change in the memory; the hypervisor initiating transmission of the change in the memory over a wireless network for delivery to a standby mobile device to synchronize the virtual machine on the standby mobile device. | 06-12-2014 |
20140164592 | DETERMINING A SYSTEM CONFIGURATION FOR PERFORMING A COLLECTIVE OPERATION ON A PARALLEL COMPUTER - Determining a system configuration for performing a collective operation on a parallel computer that includes a plurality of compute nodes, the compute nodes coupled for data communications over a data communications network, including: selecting a system configuration on the parallel computer for executing the collective operation; executing the collective operation on the selected system configuration on the parallel computer; determining performance metrics associated with executing the collective operation on the selected system configuration on the parallel computer; selecting, using a simulated annealing algorithm, a plurality of test system configurations on the parallel computer for executing the collective operation, wherein the simulated annealing algorithm specifies a similarity threshold between a plurality of system configurations; executing, the collective operation on each of the test system configurations; and determining performance metrics associated with executing the collective operation on each of the test system configurations. | 06-12-2014 |
20140164593 | Analyzing Reading Metrics - Data reports are received from a plurality of clients including action reports and timing reports. Action reports describe actions performed by users of the clients at location within an eBook. Timing reports describe reading speeds of users of the clients. The data reports are analyzed to identify an action that is performed by the users of the clients at a location within the eBook frequently relative to other actions. Action information is generated for automatically performing the identified action at the location within the eBook. The action information is transmitted to a client. The client is configured to automatically perform the action at the location within the eBook. The reading location of a user of the client is determined based on the timing reports. | 06-12-2014 |
20140164594 | INTELLIGENT PLACEMENT OF VIRTUAL SERVERS WITHIN A VIRTUALIZED COMPUTING ENVIRONMENT - A method for recommending placement of virtual servers within a virtualized environment. The method includes collecting information relating to a plurality of virtual servers and to a plurality of host computing systems, wherein one or more of the plurality of host computing systems hosts at least one of the plurality of virtual servers. The method includes measuring efficiency of at least one of the plurality of virtual servers on a current host computing system within the virtualized environment. The method includes determining the efficiency of the at least one virtual server will be improved with the at least one virtual server on a second host computing system and, in response to determining the efficiency will be improved, recommending placement of the at least one virtual server on the second host computing system. | 06-12-2014 |
20140164595 | FIREWALL EVENT REDUCTION FOR RULE USE COUNTING - An illustrative embodiment of a method for firewall rule use counting receives log messages comprising one or more log data sets from each firewall rule in a particular network whose counts are to be tracked in a log collector, generates a network trie for each reference database in a set of databases and a device source trie and a device destination trie for each firewall device in a plurality of devices of the particular network, a source port and protocol list and a destination port and protocol list for each respective device, a unique object for each log data set received; a mapping database comprising an entry for each log data set received associated with the unique object; and feeds each entry in the mapping database through a topology model to also generate a reference to a unique firewall rule on a respective device in the plurality of devices. A count associated with the unique firewall rule is incremented using a count of logs stored associated with the respective unique object and a report is generated. | 06-12-2014 |
20140164596 | SYSTEMS AND METHODS FOR COMMUNICATING ULTRASOUND DATA - Systems and methods for communicating ultrasound data are provided. One method includes monitoring over time estimates of bandwidth of a channel communicatively coupling an imaging location with another location remote from the imaging location and communicating the estimates to a system at the imaging location. The method also includes identifying at least one of a region-of-interest (ROI) mask or one or more transmission parameters for the channel and adjusting at least one of the ROI mask or the one or more transmission parameters based on the monitored estimates of the bandwidth for communicating the medical images. | 06-12-2014 |
20140164597 | METHOD AND APPARATUS FOR DETECTING USER ID CHANGES - In many speech-enabled applications, adaptation of speech recognition and language understanding tools for different users are employed. With such adaptation, identifying the particular user precedes applying the speech recognition and language understanding tools. According to at least one example embodiment, a method and corresponding apparatus of identifying a user includes comparing personal information data received from a user network device against personal information accessible by the server; and identifying a speech profile specific to the user based on the results of comparing the personal information data retrieved from the first user network device against the personal information accessible by the server. The identified speech profile is used in processing a speech of the user. Through use of the method or corresponding apparatus, a user can proceed directly to the use of the speech recognition or other applications and bypassing a login sequence. | 06-12-2014 |
20140164598 | WORKLOAD DEPLOYMENT WITH INFRASTRUCTURE MANAGEMENT AGENT PROVISIONING - A computer-implemented method for managing a workload in connection with a networked computing infrastructure having a plurality of host computer systems includes obtaining first data indicative of an environment type of the networked computing infrastructure, obtaining second data indicative of an operating system type of the workload, deploying, with a processor, an image of the workload in a virtual machine on a target host computer system of the plurality of host computer systems, incorporating a management agent of the networked computing infrastructure into the virtual machine to provision the virtual machine for operation within the networked computing infrastructure, the management agent being configured in accordance with the first data, and modifying launch instructions of the virtual machine in accordance with the second data such that the management agent is invoked during the operation of the virtual machine. | 06-12-2014 |
20140164599 | WORKLOAD DISPATCH DEVICE AND WORKLOAD DISPATCH METHOD THEREOF - A workload dispatch device and a workload dispatch method thereof are provided. The workload dispatch device comprises a monitor, a processor and a dispatcher. The monitor is configured to monitor operating conditions of a plurality of servers. The processor is electrically connected to the monitor and configured to execute the following operations: creating an average performance index table for a plurality of algorithms according to the operating conditions of the servers; normalizing the average performance index table; calculating a benchmark for each of the algorithms according to the normalized performance index table and a corresponding weighting table; and choosing a candidate algorithm from the algorithms according to the benchmarks. The dispatcher is electrically connected to the processor and configured to dispatch a workload to the plurality of servers according to the candidate algorithm. | 06-12-2014 |
20140164600 | DETERMINING A SYSTEM CONFIGURATION FOR PERFORMING A COLLECTIVE OPERATION ON A PARALLEL COMPUTER - Determining a system configuration for performing a collective operation on a parallel computer that includes a plurality of compute nodes, the compute nodes coupled for data communications over a data communications network, including: selecting a system configuration on the parallel computer for executing the collective operation; executing the collective operation on the selected system configuration on the parallel computer; determining performance metrics associated with executing the collective operation on the selected system configuration on the parallel computer; selecting, using a simulated annealing algorithm, a plurality of test system configurations on the parallel computer for executing the collective operation, wherein the simulated annealing algorithm specifies a similarity threshold between a plurality of system configurations; executing, the collective operation on each of the test system configurations; and determining performance metrics associated with executing the collective operation on each of the test system configurations. | 06-12-2014 |
20140164601 | MANAGEMENT OF STREAM OPERATORS WITH DYNAMIC CONNECTIONS - One embodiment is directed to a method for processing a stream of tuples in a stream-based application. A stream operator may receive a stream of tuples. A stream manager may determine whether a dynamic connection exists at a first stream operator. The dynamic connection may connect the first stream operator to a second stream operator. The stream manager may poll the first stream operator and the second stream operator for a presence of the dynamic connection. The stream manager may modify processing of one or more upstream stream operators in response to a change in use of the dynamic connection. | 06-12-2014 |
20140164602 | OAM NAME STATE EVENT TRIGGER - The disclosed embodiments include a method, apparatus, and computer program product for improving network monitoring. For example, in one embodiment, current inaccuracies due to the imperfect counter frame injection error between ingress counters and egress counters is eliminated, by monitoring, using an ingress counter, for a time period that is slightly greater than the time it takes for a packet/frame to pass from one end to the other, for “no packets/frames”. In one embodiment, once this no packet time occurs, a signaling event is triggered. A notification is sent from the start of the path counter to the end of the path counter to start counting. A “stop counting/restart counting” signal is then sent from the start of the path counter to the end of the path counter the next time that no packets/frames are observed for the same period. | 06-12-2014 |
20140164603 | COMPUTER SYSTEM AND METHOD FOR MAINTENANCE MANAGEMENT INCLUDING COLLABORATION ACROSS CLIENTS - A computer system is provided that is connected to the Internet and enables a plurality of network connected devices to access a novel and innovative resource management platform. The computer system includes an Internet enabled computer platform that implements a multi-tenant architecture that enables multiple platform clients to populate the platform with various information regarding their resource management requirements. The computer system includes one or more tools that (i) track activities of users in connection with the management of resources, (ii) extracts insights from such activities, and/or (iii) enables users to upload information or documents related to resource management to the computer system, such tools enabling the automated suggestion of maintenance actions and/or product or service requirements of platform clients. A range of different intelligent features are provided. The computer system may include a CMMS with intelligent features. A number of related computer implemented methods for managing resources in an intelligent way, and based on collective information and knowledge is also provided. | 06-12-2014 |
20140164604 | NETWORK DEVICE AND NETWORK DEVICE RECOGNITION METHOD - A network device and network device recognition method are provided. The method includes: receiving a Continuity Check Message (CCM) by a local Maintenance Association End Point (MEP); determining whether the CCM is transmitted from an unknown remote MEP; setting the unknown remote MEP to a dynamic MEP if the CCM is transmitted from the unknown remote MEP; and recording the dynamic MEP and the receiving count of the CCM corresponding to the dynamic MEP in a storage unit. | 06-12-2014 |
20140164605 | METHOD AND SYSTEM FOR VISUALIZING AN ADAPTIVE SCREEN ACCORDING TO A TERMINAL - The present invention relates to a user terminal, cloud device and virtualization method in which a user terminal transmits a system profile to a cloud apparatus for generating a list of candidate screen visualization techniques from system profile information transmitted from the terminal, checks an apparatus loading amount and processing possibility for each technique, and determines an optimal screen visualization technique candidate on the basis of an available resource of an apparatus and a system profile of a terminal according to web service possibility and video streaming processing possibility. The system profile information includes web browser performance, video streaming replay function, RDP and VNC client driving possibility, network status, resolution and requesting service. The cloud apparatus receives the system profile information from the user terminal, generates a list of candidate screen visualization techniques, checks an apparatus loading amount and processing possibility to determine a screen visualization technique. | 06-12-2014 |
20140164606 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 06-12-2014 |
20140164607 | DEPENDENCY MAPPING AMONG A SYSTEM OF SERVERS, ANALYTICS AND VISUALIZATION THEREOF - Analytics and visualization for logical dependency mapping of computer servers may be provided. Data collected from computer servers is received and analyzed to discover logical dependencies among the computer servers, for example, to discover communications between one or more of operating systems, middleware and applications associated with the computer servers. The computer servers may be grouped into one or more dependency groups based at least on a user-defined grouping criterion. The one or more dependency groups and their logical dependencies may be output. | 06-12-2014 |
20140164608 | CONTENT TRANSMISSION SYSTEM - In order to easily prevent traffic of a content data server, which provides an arbitrary content, from being overloaded, the content transmission system according to an exemplary embodiment includes a content data server which provides an arbitrary content to a plurality of terminals when a request signal for the arbitrary content is input from the plurality of terminals, a data control server which when the arbitrary content is provided, monitors whether the traffic of the content data server is overloaded and if the traffic is overloaded as a result of monitoring, generates a traffic distribution request signal, and a node control server which when the traffic distribution request signal is input from the data control server, controls to provide the arbitrary content to an arbitrary distribution node, which satisfies a setting standard among a plurality of distribution nodes, to be provided to an arbitrary terminal among the plurality of terminals. | 06-12-2014 |
20140164609 | Apparatus, System, and Method for Enhanced Monitoring and Searching of Devices Distributed Over a Network - A system for network monitoring and network traffic analysis includes a plurality of network devices and a management station. Each of the plurality of network devices is associated with corresponding ones of a plurality of ports. Each of the plurality of network devices is configured to determine network traffic analysis data associated with a characteristic of network data traversing each of the plurality of ports. The management station is configured to determine a ranking of the plurality of ports based on the network traffic analysis data in response to a search request implicating the characteristic, and is configured to display the plurality of ports based on the ranking. | 06-12-2014 |
20140164610 | SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network. | 06-12-2014 |
20140164611 | TRACKING USER PHYSICAL ACTIVITY WITH MULTIPLE DEVICES - Methods, devices, and computer programs are presented for creating a unified data stream from multiple data streams acquired from multiple devices. One method includes an operation for receiving activity data streams from the devices, each activity data stream being associated with physical activity data of a user. Further, the method includes an operation for assembling the unified activity data stream for a period of time. The unified activity data stream includes data segments from the data streams of at least two devices, and the data segments are organized time-wise over the period of time. | 06-12-2014 |
20140164612 | System and Method for Determining and Visualizing Efficiencies and Risks in Computing Environments - A system and method are provided for determining and visualizing efficiencies and risks in computing environments. The method comprises obtaining resource utilization data and resource capacity data for a plurality of entities in a computing environment; obtaining at least one operational policy defining at appropriate level of at least one resource used by the computing environment according to at least one factor; and computing at least one score quantifying efficiencies and risks associated with the computing environment based on the resource utilization data, resource capacity data, and at least one operational policy. | 06-12-2014 |
20140164613 | TRACKING WEB SERVER - A web server is disclosed that is configured to track requests for web pages on a third party web server. The tracking web server traps a web page request, such as a PURL (Personalised URL) for a personalised web page, before it attempts to serve the web page requested. The URL of the web page request is analysed to determine the location of the requested page on a third party server, and details of the contact with which the personalised web page is associated. Receipt of the web page request is then recorded in a memory associated with the server, and the web page request is forwarded to the third party server for processing. The redirection to the third party web server may be seamless, such that the contact requesting the page does not know of the redirection. In this way, a tracking web server is provided which can supply a personalised tracking and forwarding function. | 06-12-2014 |
20140164614 | Method and Apparatus for Submitting Data - Various examples provide a method and an apparatus for submitting data. The method includes: a user terminal sends a webpage visiting request to a server, scans received webpage information returned by the server in response to the webpage visiting request, adds a mark pointing to a statistic server into the webpage information; parses the webpage information, and sends user visiting data to the statistic server by using the mark. | 06-12-2014 |
20140173085 | DYNAMIC FLOW MANAGEMENT AT A FIREWALL BASED ON ERROR MESSAGES - A method and system are provided for blocking data packets that are not desired or capable of being received. One or more data packets are received from a data server. The data packets that are addressed to a wireless device are transmitted via a gateway server. The error messages generated by either the wireless device or the gateway server are forwarded to the data server and their number also counted. When the number of error messages meets a predetermined criterion, additional data packets from the data server that are addressed to the wireless device are blocked, for example, preventing tolling the user account of the wireless device for data packets sent by the data server when the device is not available or the user no longer wants to receive the data. | 06-19-2014 |
20140173086 | METHOD AND APPARATUS FOR DETERMINING DIGITAL MEDIA VISIBILITY - A method of determining whether media displayed on a web page in a web browser is visible comprising: determining whether the web page comprises at least one frame; and if the web page comprises at least one frame, using information relating to the activity of the media player to determine whether the media is visible. | 06-19-2014 |
20140173087 | Framework Supporting Content Delivery With Adaptation Services - A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services. | 06-19-2014 |
20140173088 | Devices And Methods Supporting Content Delivery With Adaptation Services - A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services. | 06-19-2014 |
20140173089 | CLOUD DATA STORAGE LOCATION MONITORING - Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed. | 06-19-2014 |
20140173090 | METHOD AND SYSTEM FOR DETECTING NETWORK TOPOLOGY CHANGE - A method for detecting a topology change in a communication network. The method includes measuring a minimum latency value of a communication between two devices in the communication network for each of a plurality of time cycles, identifying an increase in the minimum latency values among the plurality of time cycles, and detecting a topology change in response to a determination that the increase in minimum latency values is maintained for more than a predetermined number of time cycles. | 06-19-2014 |
20140173091 | Devices And Methods Supporting Content Delivery With Adaptation Services With Feedback From Health Service - A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services with feedback from health services. | 06-19-2014 |
20140173092 | EXCHANGE OF SERVER HEALTH AND CLIENT INFORMATION THROUGH HEADERS FOR REQUEST MANAGEMENT - Server health and client information are exchanged through headers for request management. Headers in standardized or proprietary protocol communication between servers and a request management module and/or clients and the request management module may be used to exchange server health and client information. The exchanged server health and/or client information may be employed in throttling, routing, and/or load balancing the incoming requests. Rules specified by the client through the header exchange may also be used for throttling, routing, and/or load balancing decisions. | 06-19-2014 |
20140173093 | System and Method to use Common Addresses on a Management Controller without Conflict - A management controller includes a first data communication interface for communicating with a first network interface, a second data communication interface for communicating with a second network interface, and a processor. The first network interface provides a first network interface mode that permits a processing system to access a network, an operating system-to-management controller (OS-to-MC) pass-through mode that permits the management controller to access the processing system, and a network-to-management controller (Net-to-MC) pass-through mode that permits the management controller to access the network. The second network interface permits the management controller to access a management station. The management controller provides a common Media Access Control address and a common Internet Protocol address to the first data communication interface and to the second data communication interface without causing conflict on the network. | 06-19-2014 |
20140173094 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR CLASSIFYING APPLICATION TRAFFIC RECEIVED AT A NETWORK TRAFFIC EMULATION DEVICE THAT EMULATES MULTIPLE APPLICATION SERVERS - Methods, systems, and computer readable media for classifying application traffic at a network traffic emulation device that emulates multiple application servers are disclosed. The method may include, at a network traffic emulation device, providing a plurality of different application flows for monitoring mixed application traffic received from different client applications via a device under test on the same transport layer port. For each of the different application flows that monitor the same transport layer port, parsing a payload of received packets associated with the same session in the mixed application traffic and identifying non-matching application flows based on whether a portion of each payload matches a signature associated with the application flow. The method further includes eliminating, as identification candidates, non-matching application flows from the application flows that monitor packets received on the same transport layer port until an application flow that identifies an application for the received packets associated with the same session remains. | 06-19-2014 |
20140173095 | TRIGGERING A HIGH AVAILABILITY FEATURE IN RESPONSE TO DETECTING IMPAIRMENT OF CLIENT EXPERIENCE - Examples disclosed herein relate to triggering a high availability feature in response to detecting impairment of client experience. Examples include detecting, based on content of interactions between at least one application component and a client, a threshold impairment of an experience of the client in relation to the at least one application component. Examples also include triggering a high availability feature for the at least one application component in response to detecting the threshold impairment. | 06-19-2014 |
20140173096 | PROCESS FOR DELIVERING REDUNDANT, DUPLICATE INTERACTION RECORDINGS - The requirement to record interactions by organizations is growing, driven by the need to improve the quality of customer interactions in combination with regulatory and fraud protection requirements. The necessity to provide resiliency as well as flexibility to have multiple copies of a recorded interaction is leading many organizations to investigate mechanisms to create multiple recordings of interactions from a single source. The purpose of this invention is to enable this capability on a standards compliant interaction recording source. | 06-19-2014 |
20140173097 | SYSTEMS, METHODS, AND DEVICES FOR GRADUAL INVALIDATION OF RESOURCES - A computer-implemented method includes receiving, at a service, invalidation information relating to at least one resource. Based on the invalidation information, a staleness trigger of the at least one resource is set as a function of an invalidation period. The at least one resource is considered to be not useable based on the function of the invalidation period and the staleness trigger. | 06-19-2014 |
20140173098 | PRIORITIZING DATA PACKETS ASSOCIATED WITH APPLICATIONS RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - The present invention provides an approach for prioritizing a set of data packets associated with an application running in a networked computing environment. An SLA associated with a particular application and at least one other SLA associated with at least one other application are accessed. A proposed modification to a priority of a set of data packets associated with the particular application is then determined based on a comparison of a current performance of the set of data packets versus a specified performance of the set of data packets as set forth in the SLA. An effect of the proposed modification on a capability of the particular application to meet a set of terms of the SLA, and of the at least one other application to meet terms of the at least one other SLA will be evaluated. It will then be determined whether to implement the proposed modification. | 06-19-2014 |
20140173099 | METHOD AND APPARATUS FOR DETERMINING DIGITAL MEDIA VISIBILITY - A method of determining whether media displayed on a web page in a web browser is visible comprising: determining whether the web page comprises at least one frame; and if the web page comprises at least one frame, using information relating to the activity of the media player to determine whether the media is visible. | 06-19-2014 |
20140173100 | METHOD FOR MANAGING TRANSMISSION ORDER IN NETWORK - A method for managing a transmission order in a network includes the steps of: providing an upstream host and a plurality of downstream hosts; performing a order of a plurality of data transmission events between the upstream host and the plurality of the downstream hosts; performing a first data transmission event by the upstream host to receive first data from a first downstream host; monitoring whether the upstream host receives any priority instructions from any other downstream hosts; and if a first priority instruction is received from a second downstream host during the first data transmission event, stopping the first data transmission event and performing a second data transmission event by the upstream host to receive second data from the second downstream host. | 06-19-2014 |
20140173101 | CALCULATOR, COMMUNICATION CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A calculator includes communication devices, a detection unit, and a communication control unit. The detection unit performs communication among the plurality of communication devices connected to the same segment in a network, to thereby detect division of a network connected to each communication device. In the case division of the network is detected by the detection unit, the communication control unit generates information about a correspondence relationship between each communication appliance and an appliance in a reachable network. The communication control unit performs communication between a communication device and an appliance in a network based on the information about a correspondence relationship. | 06-19-2014 |
20140173102 | Apparatus, System, and Method for Enhanced Reporting and Processing of Network Data - An apparatus includes microcode controlled state machines, data reduction logic, and push logic. At least one of the microcode controlled state machines is configured to generate first statistical data measured over time intervals of a first time granularity based on network data included in each of multiple data flows traversing the at least one of the microcode controlled state machines. The data reduction logic is configured to receive the first statistical data, and to obtain second statistical data having a volume reduced from a volume of the first statistical data based on performance of a mathematical operation on the first statistical data. The second statistical data is associated with time intervals of a second time granularity. The first time granularity is finer than the second time granularity. The push logic is configured to push the second statistical data across a network independent of a real-time request from the network. | 06-19-2014 |
20140173103 | SECURED MANAGEMENT OF TRACES IN A MAIL PROCESSING DEVICE - Method for activation and storing traces generated by a mail processing device, comprising the following steps:
| 06-19-2014 |
20140173104 | METHOD AND DEVICE FOR SPREADING DEEP PACKET INSPECTION RESULT - The present invention discloses a method for spreading a deep packet inspection result. The method includes: receiving, by an identification function network element, a data packet in IP network traffic; identifying the data packet; if the identification succeeds, save a first identification result obtained through identification in a local flow table of the identification function network element, and insert the first identification result in an extension field of the header of the data packet; if the identification fails, insert a second identification result in the header extension field of the data packet; send the data packet carrying the first identification result or the second identification result to a first downstream device. By means of the present invention, DPI service identification does not need to be performed on all network elements, thereby reducing a delay in executing a DPI service in an entire network and lowering a maintenance cost. | 06-19-2014 |
20140173105 | MANAGEMENT OF INFORMATION-TECHNOLOGY SERVICES - A system includes a collection module configured to collect data characterizing usage of a plurality of software applications hosted on a network by users of a set of client devices, a data-storing module configured to store the collected data, and a processing module configured to determine, based on the stored data, at least one usage metric for each of the plurality of software applications. | 06-19-2014 |
20140173106 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING FILTERED SERVICES AND CONTENT BASED ON USER CONTENT - An apparatus may include a processor configured to receive a request for a service or content from a first device. The processor may be further configured to receive a user's context information from a second device. The processor may additionally be configured to filter the requested service or content based at least in part upon the user's context information. The processor may be further configured to provide the filtered service or content to the first device. Corresponding methods and computer program products are also provided. | 06-19-2014 |
20140173107 | QUALITY OF SERVICE (QoS) BASED PLANNING IN WEB SERVICES AGGREGATION - Embodiment of the present invention include a method, system and computer program product for a data processing system for QoS based planning in a Web services aggregation. The system can include Web service aggregation and coordination logic configured to identify accessible Web services in a registry and to arrange an aggregation of the Web services for invocation responsive to requests received from communicatively coupled clients over a computer communications network. The system further can include QoS planning logic coupled to the Web service aggregation and coordination logic. The QoS planning logic can be enabled to measure both the individual performance of the Web services in an aggregation of Web services and also the cumulative performance of the aggregation of Web services. Finally, the QoS planning logic can be enabled to modify the aggregation of Web services responsive to measuring both of the individual performance of Web services in the aggregation of Web services and also of the cumulative performance of the aggregation of Web services. | 06-19-2014 |
20140173108 | METHOD FOR DEVICE DISCOVERY AND METHOD FOR DOWNLOADING CONTENT - Disclosed are a method for device discovery and a method for downloading content. The method for device discovery enables a first device to store a recently-connected-device list comprising information about devices which were recently connected to a network, to unicast, when connected to a network, a first device discovery request to a second device on the basis of the recently-connected-device list, to receive from the second device a first device discovery response to the first unicast device discovery request, and to update the recently-connected-device list on the basis of the received first device discovery response. Accordingly, rapid and effective device discovery can be implemented. | 06-19-2014 |
20140173109 | Network Management System - A network management system comprises a server connected to a plurality of probes, each probe connected to one or more managed devices. A method of operating the system comprises the steps of receiving fault events for the managed devices at the probes, detecting that the rate of received fault events has reached or is approaching an overload level for the server, identifying a managed device contributing to the reached or approached overload level, switching the probe for the identified managed device to a flood prevention mode, and operating the switched probe in the flood prevention mode thereby combining multiple fault events for the identified managed device into a single fault event for transmission to the server. | 06-19-2014 |
20140181290 | Network Session Management Based on Contextual Information - An access control module in an enterprise computing network receives contextual information of a first active network session at a first network endpoint and contextual information of a second active network session at a second network endpoint. The access control module is configured to evaluate the contextual information of one or more of the first or second network sessions based on one or more network policies to determine a policy action for enforcement on at least one of the first or second network endpoints. | 06-26-2014 |
20140181291 | CROSS-NETWORK LISTENING AGENT FOR NETWORK ENTITY MONITORING - Various embodiments herein include at least one of systems, methods, and software of a cross-network listening agent for network entity monitoring. In some such embodiments, the cross-network listening agent is an element of software or a hardware device connected to a network and listens for metric data broadcast by other entities of the network. The cross-network listening agent receives the broadcast metric data and transmits the metric data to a network and system management system resident on another network. The network entities are generally any device that reports status with regard to metrics the network entity monitors with regard to its own state. In some embodiments, the network entities report their status in Simple Network Management Protocol (SNMP) messages that are broadcast on the network, but are unable to reach the network and system management system resident on the other network. | 06-26-2014 |
20140181292 | SYSTEMS AND METHODS FOR TOPOLOGY DISCOVERY AND APPLICATION IN A BORDER GATEWAY PROTOCOL BASED DATA CENTER - An information handling system is provided. The information handling system includes a network orchestration service running on a computer processor. The network orchestration service provides a Border Gateway Protocol (BGP) listener module and a topology builder module. The BGP listener module is configured to receive information from a plurality of spine devices configured as an autonomous system and the topology builder module is configured to use the information received by the BGP listener module to create a topology of a data center that includes the plurality of spine devices. Additionally, the network orchestration service is in communication with a memory that is used to store information received by the BGP listener module and the topology of the data center. Applications of the information handling system for better operating the data center are also provided. | 06-26-2014 |
20140181293 | METHODS AND APPARATUS FOR DETERMINING A MAXIMUM AMOUNT OF UNACCOUNTED-FOR DATA TO BE TRANSMITTED BY A DEVICE - A method includes determining a maximum amount of unaccounted-for data to be transmitted by a particular client device associated with an access point. The maximum amount of unaccounted-for data may be based on characteristics associated with data received at an access point from one or more client devices. The maximum amount of unaccounted-for data may be based on a total number of client devices associated with an access point. The maximum amount of unaccounted-for data may be based on resources available at the access point. | 06-26-2014 |
20140181294 | ARCHIVING VIRTUAL MACHINES IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can manage the archiving of virtual machines to (and restoring of virtual machines from) secondary storage. The system can determine whether to archive virtual machines based on usage data or information. The usage information may include storage usage, CPU usage, memory usage, network usage, events defined by a virtual machine software or application, etc. The system may archive virtual machines that are determined to have a low level of utilization. For example, a virtual machine can be archived when its usage level falls below a threshold level. The system may create a virtual machine placeholder for an archived virtual machine, which may be a “light” or minimal version of the virtual machine that acts as if it is the actual virtual machine. By using a virtual machine placeholder, a virtual machine may appear to be active and selectable by the user. | 06-26-2014 |
20140181295 | Creation and Maintenance of Self-Organizing Communication Orbits in Distributed Networks - In one aspect, machines in a managed network implements a set of rules that cause individual machines to directly interact with only a small number of machines in the network (i.e., a local neighborhood within the network), while the independent local actions of the individual machines collectively cause the individual machines to be self-organized into one or more communication orbits without any global control or coordination by a server or an administrator. The communication orbits are used for supporting network, security and system management communications in the managed network. | 06-26-2014 |
20140181296 | VIRTUAL MACHINE SEQUENCE SYSTEM AND METHOD - A remote computer monitors virtual machines in cloud servers of a data center. The remote computer obtains parameters of each virtual machine authorized to a user by a monitoring program when a user logs in a login interface in a client computer. The remote computer calculates a resource coefficient of each virtual machine according to the parameters of the virtual machine authorized to the user. The remote computer displays an icon corresponding to each virtual machine in the login interface according to the resource coefficient of each virtual machine. | 06-26-2014 |
20140181297 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM - An information processing device includes a memory configured to store information related to data accesses by executions of a plurality of applications, and a network configuration of a network system including a plurality of communication devices and a plurality of processing devices each of which executes any one of the plurality of applications, and a processor configured to calculate traffic amounts, when each of the plurality of communication devices is assumed as a data storage location to store data to be accessed by the executions, to be generated in the network system by the executions, based on the information and the network configuration, and determine a communication device to store the data to be accessed by the executions based on the calculated traffic amounts, among the plurality of communication devices. | 06-26-2014 |
20140181298 | METHOD AND APPARATUS FOR MANAGING A PLURALITY OF SESSIONS IN A MULTI-PATH ROUTING BASED NETWORK - According to one embodiment, a method for managing a plurality of sessions is disclosed. The method includes advertising, by a node establishing the plurality of sessions, a session limit capability to peer nodes of the plurality, of sessions, determining priorities of the plurality of sessions, and selecting an optimal session from the plurality of sessions based on a session limit parameter and the determined priorities of the plurality of sessions, wherein the session limit parameter indicates the number of acceptable sessions for the node establishing the plurality of sessions. Additionally, a corresponding apparatus is also disclosed according to another embodiment. | 06-26-2014 |
20140181299 | METHOD AND SYSTEM FOR MONITORING DOMAIN NAME REGISTRATIONS - Improved approaches to domain name monitoring. The monitoring of domain names, e.g., registrations therefor, is beneficial to holders of similar domain names, trademark owners, and competitors. Such monitoring can be automatically performed. | 06-26-2014 |
20140181300 | Systems and Methods for Monitoring Data and Bandwidth Usage - Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access). | 06-26-2014 |
20140189091 | NETWORK ADAPTIVE LATENCY REDUCTION THROUGH FRAME RATE CONTROL - Novel solutions are provided for consistent Quality of Service in cloud gaming system that adaptively and dynamically compensate for poor network conditions by moderating rendered frame rates using frame rate capping to optimize for network latency savings (or surplus). In further embodiments, the encoding/sent frame rate to the client can also be managed in addition, or as an alternative to capping the rendered frame rates. The claimed embodiments not only maintain a constant Quality of Service (QoS) for the user, but may also be employed to leverage higher-performing networks to reduce operational costs. | 07-03-2014 |
20140189092 | System and Method for Intelligent Data Center Positioning Mechanism in Cloud Computing - An intelligent data center (DC) positioning mechanism is supported for a cloud computing environment. The intelligent DC positioning mechanism automatically selects an optimal DC from a set of candidate DCs to serve a user. A service request is received from a user at a service portal. The service request is then sent and processed by a DC positioning engine in the cloud computing environment. To select the optimal DC, a plurality of DCs are queried for price-tier and capability information to service the request. A list of candidate DCs is then established in accordance with the price-tier and capability information. A plurality of attributes including internal DC attributes is also obtained. The candidate DCs in the list are then ranked in accordance with the attributes including the internal DC attributes and a highest ranked DC in the list is selected to serve the service request. | 07-03-2014 |
20140189093 | EFFICIENT INTERCEPT OF CONNECTION-BASED TRANSPORT LAYER CONNECTIONS - A TCP connection is established between a client and a server, such that packets communicated across the TCP connection pass through a proxy. Based at least in part on a result of monitoring packets flowing across the TCP connection, the proxy determines whether to split the TCP control loop into two TCP control loops so that packets can be inspected more thoroughly. If the TCP control loop is split, then a first TCP control loop manages flow between the client the proxy and a second TCP control loop manages flow between the proxy and the server. Due to the two control loops, packets can be held on the proxy long enough to be analyzed. In some circumstances, a decision is then made to stop inspecting. The two TCP control loops are merged into a single TCP control loop, and thereafter the proxy passes packets of the TCP connection through unmodified. | 07-03-2014 |
20140189094 | RESILIENT DUPLICATE LINK AGGREGATION EMULATION - A cluster compute server comprises a set of one or more compute nodes, each compute node instantiating at least one virtual network interface controller representing a network interface controller of a primary network node remote to the compute node and appearing as a local network interface controller to the compute node. A first network node comprising a network interface controller coupleable to an external network operates as the primary network node for the set. The first network node emulates link aggregation partners for virtual network interfaces of the set based on first link state information maintained at the first network node. A second network node comprising a network interface controller coupleable to the external operates as a secondary network node for the set. The second network node maintains second link state information that mirrors the first link state information maintained at the first network node. | 07-03-2014 |
20140189095 | Apparatus, System and Methods for Portable Device Tracking Using Temporary Privileged Access - A computer-implemented system, apparatus and method for accessing a portable device to execute monitoring capabilities. The monitoring capabilities include packet detection, which in turn may be processed to produce media exposure data. The monitoring capabilities are installed using privileged access in order to obtain data from a kernel layer of the portable device, and the device is returned to an original state following installation, in order to comply with operating system requirements. Audio media exposure data may further be integrated with the packet-detected media exposure data. | 07-03-2014 |
20140189096 | DETECTING RELATIVE CROWD DENSITY VIA CLIENT DEVICES - Detecting crowds is provided. A location is selected in a set of locations a user of a client device wants to go to based on data within a profile associated with the user. A set of data inputs is monitored to determine a number of people currently at the selected location. Then, in response to determining that the number of people currently at the selected location is not greater than a user-defined threshold level of people for the selected location, a mapped route to the selected location is sent to the client device of the user. | 07-03-2014 |
20140189097 | SYSTEMS AND METHODS FOR PROVIDING INFRASTRUCTURE METRICS - An infrastructure metrics measuring process provides relevant infrastructure metrics for components of a monitored system. The process retrieves and stores application user data for a plurality of applications running on a network system and operating system statistics for at least one operating system running at least one of the plurality of application running on a network system. The data is aggregated into at least one of a transactional data stream and a non-transactional data stream and correlated onto a common time scale. The correlated aggregated data stream is then graphically displayed to a user to further analysis by a user. | 07-03-2014 |
20140189098 | Systems and Methods for Network Risk Reduction - Reducing risks associated with network usage is provided. Variable information is extracted from network activity log data that includes a request from a user in an organization for content from a network content source. The variable information includes a number of times that the network content source has been requested, a volume of organization users that have made a request from the network content source, and a period of time for which traffic with respect to the network content source has been detected. The variable information is scored to generate a risk score. An access control level is determined for the network content source based on the risk score and a content access policy for the organization. Access of the user in the organization to the network content source is controlled according to the access control level. | 07-03-2014 |
20140189099 | SCHEDULING SEGMENT DATA DELIVERY IN AN ADAPTIVE MEDIA STREAM TO AVOID STALLING - Methods, systems and devices are described to improve the performance of adaptive media streaming sessions. A media player device proactively requests segment data representing a media stream over multiple simultaneous network connections. Delivery of the requested segment data on each of the plurality of simultaneous connections is monitored, and subsequent requests for segment data are adapted based upon the monitored delivery of the requested segments on each of the plurality of simultaneous connections. | 07-03-2014 |
20140189100 | COMPUTING DEVICE AND METHOD OF INSTALLING HARDWARE SPECIFICATION FILES IN HOSTS - A method creates a plurality of host hardware specification (HHS) files for hosts with different hardware specifications, and stores the HHS files in a storage device. The method further monitors a dynamic host configuration protocol (DHCP) server and checks if the DHCP server has allocated an IP address to any new created host. If the DHCP server has allocated an IP address to a host, the method accesses the new created host based on the newly allocated IP address, and obtains a hardware specification of the host. Furthermore, the method determines an HHS file for the new created host according to the hardware specification of the host, and remotely controls the installment of the HHS file in the new created host. | 07-03-2014 |
20140189101 | AUTO-CONFIGURATION SERVER AND MANAGEMENT METHOD OF CUSTOMER PREMISES EQUIPMENTS - An auto-configuration server (ACS) and a management method of customer premises equipments (CPEs) thereof are provided, and the ACS includes a sub server communication module and a group management module. When an online message is received from a new CPE, the management method includes performing an extension procedure including the following steps. A health value of the ACS is calculated. When the health value of the ACS is less than or equal to a health threshold, a new group and a sub server corresponding to the new group are added and the new CPE is managed by the sub server corresponding to the new group. | 07-03-2014 |
20140189102 | Methods Circuits Apparatuses Systems and Associated Computer Executable Code for Metering Software Usage - Disclosed are methods, circuits, apparatuses, systems and associated computer executable code for metering software usage. The usage of a software application instance is detected by assessing a level of user interaction with the software application instance, in order to: classify users based on their usage patterns, determine the license type needed for a variety of user and application combinations, save on excess licensing, and/or facilitate the transition of users between on-premise applications and cloud based applications. | 07-03-2014 |
20140189103 | SYSTEM FOR MONITORING SERVERS AND METHOD THEREOF - A system and a method for monitoring servers are presented. The system is applied on a test apparatus and a number of servers. The test apparatus communicates with the number of servers. Once the system detects an abnormal operation condition of the server, the system directly sends an abnormal report as to the abnormal operation condition of the server to the test apparatus 10, and the test apparatus outputs the an abnormal report so that the administrator debugs the server, thereby ensuring the continued normal running of the server. | 07-03-2014 |
20140189104 | System And Method For Continuous Low-Overhead Monitoring Of Distributed Applications Running On A Cluster Of Data Processing Nodes - Embodiments of the present invention provide an improvement over known approaches for monitoring of and taking action on observations associated with distributed applications. Application event reporting and application resource monitoring is unified in a manner that significantly reduces storage and aggregation overhead. For example, embodiments of the present invention can employ hardware and/or software support that reduces storage and aggregation overhead. In addition to providing for fine-grained, continuous, decentralized monitoring of application activity and resource consumption, embodiments of the present invention can also provide for decentralized filtering, statistical analysis, and derived data streaming. Furthermore, embodiments of the present invention are securely implemented (e.g., for use solely under the control of an operator) and can use a separate security domain for network traffic. | 07-03-2014 |
20140189105 | COMMUNICATION METHOD, INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM - A communication method executed by an information processing apparatus capable of transmitting data of a plurality of sessions to another information processing apparatus, the method includes: acquiring from the another information processing apparatus processing time information according to a time taken for processing a first data received by the another information processing apparatus; calculating an upper limit value of an amount of data per unit time permitted to each of the plurality of sessions for transmission using the processing time information; and limiting the amount of data for each of the plurality of sessions based on the upper limit value calculated at the calculating upon transmitting a second data including data of one or more sessions to the another information processing apparatus. | 07-03-2014 |
20140189106 | Method for managing logical connections in a network of distributed stations, as well as a network station - The invention relates to the technical field of domestic networks. A domestic network based on the present UPnp-Standard allows AV connections to be set up between two network subscriber stations—Network connections such as these are set up and managed under the control of a network station which is in the form of a control point. In this case, the UPnP-Standard allows the network station which is the form of a control point to log off the network after setting up an AV connection, and thus to be inactive while the AV connection that has been set up is in existence. This results in the problem that an AV connection which has been set up unnecessarily remains in existence even after the desired AV data stream has been transmitted, so that further connection requests for such stations must be answered with a rejection. The invention solves this problem in that it provides additional monitoring means in the network subscriber stations which determine whether the connection has remained unused for a specific time. If yes, a signaling request is sent to all the network subscriber stations. If the connection partner station does not then respond, the connection which has been set up can likewise be added autonomously by the requesting station. | 07-03-2014 |
20140189107 | SYSTEM AND METHOD FOR SHARING ANONYMOUS USER PROFILES WITH A THIRD PARTY - The invention provides a system and method for sharing anonymous user profiles with a third party. In one aspect of the invention, the system shares user profiles with content servers on a mobile data network so that they may select content responsive to the user's profile. The system provides a store of user profiles for associating profile information with either a source IP address or mobile phone number, where the profile includes information on the user and the user's network usage. The system detects a user's transaction request and inspects it for either an IP address or phone number, which it uses to retrieve the appropriate profile. The system subsequently applies predetermined opt-out policies to determine how much of the user profile may be provided in response to the profile request. The system then returns the profile information such that the user's identity is masked. | 07-03-2014 |
20140189108 | SYSTEMS, METHODS, AND APPARATUS TO MONITOR MEDIA PRESENTATIONS - Systems, methods and apparatus to monitor media presentations are disclosed. An example method includes identifying a household of panelists based on a public Internet Protocol address identified in tagging data transmitted by a media presentation device. A panelist is identified within the household of panelists based on metering data. A media source is identified based on the tagging data. Identification of the media presented in association with the tagging data based on at least one of the tagging data and the metering data is attempted. The panelist is credited with exposure to the identified media from the media source at a media presentation location associated with the public IP address when the media is identified. The panelist is credited with exposure to media from the media source at the media presentation location when the media is not identified. | 07-03-2014 |
20140189109 | SYSTEM AND METHOD FOR DYNAMICALLY EXPANDING VIRTUAL CLUSTER AND RECORDING MEDIUM ON WHICH PROGRAM FOR EXECUTING THE METHOD IS RECORDED - Provided are a system and method for dynamically expanding a virtual cluster having one or more virtual machines (VMs), based on the resource availability of the virtual cluster and the type of the virtual cluster. The system for dynamically expanding a virtual cluster having one or more virtual machines (VMs), the system comprising a monitor unit which measures resource availability of a target virtual cluster and provides the resource availability to an expansion control unit, the expansion control unit which determines whether to expand the target virtual cluster based on the resource availability and determines a type and number of VM instances to be additionally allocated to the target virtual cluster by reflecting the resource availability and a type of the target virtual cluster and a virtual cluster configuration unit which modifies profile information of the target virtual cluster such that the determined number of VM instances of the determined type by the expansion control unit can be additionally allocated to the target virtual cluster. | 07-03-2014 |
20140189110 | AUTONOMIC OPTIMIZATION OF PRESENCE SERVER PERFORMANCE - A presence system comprises a presence server and a plurality of users in a distributed community of users that are associated with the presence server. The presence server selects a set of mediators, e.g., based upon a predetermined event, or other suitable factors, wherein each mediator is associated with a subset of the plurality of users. The presence server communicates presence information to the mediators where each mediator receives presence information regarding subscribed-to presence information for the users in their associated subset of users. Each mediator communicates the subscribed-to presence information to associated ones of the users in their associated subset of users. | 07-03-2014 |
20140189111 | METHOD AND APPARATUS FOR TIME ADAPTATION OF ONLINE SERVICES TO USER BEHAVIOR - An approach is provided for time adaption of online services. Timing information relating to usage by a user of one or more online services is retrieved. A pattern of consistent usage is determined from the timing information. Scheduling information is generated for transmission of a message based on the determined pattern. | 07-03-2014 |
20140189112 | User Plane Location Services Over Session Initiation Protocol (SIP) - A method and mechanism to allow a location server to initiate a user plane location service (e.g., SUPL defined by OMA) procedure to a user plane enabled device via Instant Messaging, or alternatively, via an existing SIP session if a multimedia session is already established. The location request is signaled to the user plane enabled device via a SIP INFO message. The location request uses SIP messaging to overcome firewall and other network security issues. Location using SUPL over SIP may be provided about a caller making an E911 emergency call. An Instant Message may be sent to the user plane enabled device, e.g., a VoIP wireless phone. | 07-03-2014 |
20140189113 | TAG LATENCY MONITORING AND CONTROL SYSTEM FOR ENHANCED WEB PAGE PERFORMANCE - Embodiments are directed towards employing a plurality of tag states to control tag suspension based on an asynchronous process that proactively monitors tag performance, response times, and latency. Tags may be in one of multiple states. Tags in a NORMAL state or a FLAGGED state may be enabled for deployment, and tags in a SUSPENSION_A state or a SUSPENSION_B state may be blocked from deployment. A tag's state may change based on monitoring the tag's latency to determine if latent events occur. Tag latency may be asynchronously monitored independent of web page requests. If latent events occur, then the tag's state may change from NORMAL to FLAGGED, from FLAGGED to SUSPENSION_A, or from SUSPENSION_B to SUSPENSION_A. If non-latent events occur, then the tag's state may change from SUSPENSION_B to FLAGGED or from FLAGGED to NORMAL, while a tag's state may change from SUSPENSION_A to SUSPENSION_B after a predetermined time period. | 07-03-2014 |
20140195667 | CUSTOMER EXPERIENCE MONITOR - A network monitoring system is provided that includes a plurality of tiers being arranged in a network having a plurality of hardware and software resources for executing a selective number of applications. The tiers include disparate technology stack formats. A platform resource receives monitoring information from the tiers in their respective disparate technology formats and stores the monitoring information where the monitoring information is normalized into a format that is universally recognized. An aggregation presentation module aggregates and analyzes the monitoring information from the platform resource to determine if there are any anomalies of the hardware and software resources, and formats the monitoring information to be presented as selected real-time performance analytics to a user. | 07-10-2014 |
20140195668 | MONITORING SYSTEM - A server is configured to receive information regarding a plurality of issues associated with a plurality of client devices. The server is configured further to analyze the plurality of issues. The server is configured further to generate a plurality of parameters based on analyzing the plurality of issues; and send the plurality of parameters to the plurality of client devices. | 07-10-2014 |
20140195669 | EMULATED COMMUNICATION BETWEEN MASTER MANAGEMENT INSTANCE AND ASSISTING MANAGEMENT INSTANCES ON BASEBOARD MANAGEMENT CONTROLLER - Certain aspects of the present disclosure are directed to a baseboard management controller (BMC). The BMC includes a processor, and a memory having firmware including a message interface, a master management instance, and first and second assisting management instances. The first and second assisting management instances monitor at least one health or performance related aspect of first and second computer nodes, respectively. The master management instance can receive an IPMI message from the message interface, the IPMI message containing first data for constructing an IPMB message, the first data including a first IPMB slave address. The master management instance can identify the first assisting management instance from the assisting management instances based on the first IPMB slave address. The master management instance can transfer the first data to the first assisting management instance. | 07-10-2014 |
20140195670 | AUTOMATED ALERT MANAGEMENT - Alerts may be received from an event monitoring system that monitors computing resources of a computer system. Based on an alert ruleset, an alert management module may determine whether to provide notification of the alert. If the alert management module decides to provide notification of the alert, then the alert management module may initiate the creation of an issue ticket corresponding to the alert in an issue tracking system. If the alert management module decides not to provide notification of the alert, then the alert management module may discard the alert. | 07-10-2014 |
20140195671 | METHOD AND APPARATUS PROVIDING DELAYED PATH CALCULATIONS BASED ON SERVICE TYPE - A method, apparatus and computer program product for providing delayed path calculations based on service type is presented. A first network device sends to at least one of a plurality of other network devices in a network, link state information directing receivers of the link state information, when computing routes transiting though the first network device, to refrain from using the first network device on at least one of the group consisting of per Network Layer Protocol Identifier (NLPID), per address family, and per service within an address family. | 07-10-2014 |
20140195672 | AUTOMATED FAILURE HANDLING THROUGH ISOLATION - Embodiments are directed to isolating a cloud computing node using network- or some other type of isolation. In one scenario, a computer system determines that a cloud computing node is no longer responding to monitoring requests. The computer system isolates the determined cloud computing node to ensure that software programs running on the determined cloud computing node are no longer effectual (either the programs no longer produce outputs, or those outputs are not allowed to be transmitted). The computer system also notifies various entities that the determined cloud computing node has been isolated. The node may be isolated by powering the node down, by preventing the node from transmitting and/or receiving data, and by manually isolating the node. In some cases, isolating the node by preventing the node from transmitting and/or receiving data includes deactivating network switch ports used by the determined cloud computing node for data communication. | 07-10-2014 |
20140195673 | DYNAMICALLY BALANCING EXECUTION RESOURCES TO MEET A BUDGET AND A QoS of PROJECTS - Systems, methods, and machine-readable and executable instructions are provided for dynamically balancing execution resources to meet a budget and/or a QoS of projects. An example method can include analyzing a submitted program for a project, where the program comprises data to execute the project and a specification for the project, determining a computing resource allocation based upon the submitted data and the specification, and deploying for execution the submitted data to the determined computing resource allocation. The method can include monitoring progress during the execution of the data to determine a probability of project completion satisfying the specification, and dynamically balancing the execution resources to meet the budget and/or the QoS of the project to satisfy the specification. | 07-10-2014 |
20140195674 | MEASUREMENTS BASED ON PANEL AND CENSUS DATA - A first set of usage data for a first set of resources on a network and a second set of usage data for a second set of resources on a network are accessed. The first set of resources were accessed by a first group of client systems and the first set of usage data is determined based on information received from the first group of client systems sent as a result of beacon instructions included with the first set of resources. The second set of usage data is determined based on information received from monitoring applications installed on a second group of client systems that accessed the second set of resources. Users of the second group of client systems are a sample of a larger group of users that use resources on the network. Initial usage measurement data for a third set of resources on the network is determined based on the first set of usage data. | 07-10-2014 |
20140195675 | Simultaneous Content Data Streaming And Interaction System - A computer implemented method and system simultaneously distributes content data streams (CDSs) of multiple content formats, for example, live cable television content, gaming content, social media content, user generated content, etc., to one or more computing devices. An interactive content distribution platform (ICDP) receives user selections of the CDSs and the content formats via a graphical user interface (GUI) and receives one or more CDSs in one or more content formats from multiple content sources based on the user selections. The ICDP synchronizes the CDSs by encoding the CDSs into a common data format and adjusting a transmission rate of the CDSs. The ICDP simultaneously transmits and displays the synchronized CDSs in one or more configurable windows on a display screen of each computing device at configurable time instances via the GUI. The ICDP facilitates interactions and initiates transactions between computing devices during the simultaneous display of the synchronized CDSs. | 07-10-2014 |
20140195676 | Network Adapter Based Zoning Enforcement - Embodiments of the present invention are directed to enforcing zoning at a network adapter of an end point device. Thus, a network adapter can monitor the communications that are sent and/or received by the adapter and discard communications that are prohibited based on the zoning rules applicable to the adapter. In some embodiments, zoning configuration information can be defined and stored at a central entity and sent to the various network adapters. Alternatively, or in addition, each network adapter can also check outgoing communications to ensure that they include a proper source address. More specifically, outgoing communications may be checked to ensure that their source address is the address (or one of the addresses) that are associated with the network adapter. This can be used to detect and/or prevent malfunctions and/or intentional tampering or hacking. | 07-10-2014 |
20140195677 | DETECTING PATTERNS OF EVENTS IN INFORMATION SYSTEMS - Event data pattern identification, storage, and sharing in a peer-to-peer network is disclosed. This includes peer-to-peer devices that store data events, review previously stored data events and identify patterns between the stored events and newly received events. Improvements can serve to reduce duplicative traffic and enhance network performance. | 07-10-2014 |
20140195678 | SYSTEM AND METHOD FOR ACCESS CONTROL AND USAGE MONITORING | 07-10-2014 |
20140195679 | Monitoring Apparatus, Monitoring Method, And Non-Transitory Storage Medium - There is provided a monitoring apparatus which acquires evaluation results of evaluation which is performed on each of a plurality of monitoring targets with first and second indications, and divides a region (plot region) including data plotted on a graph of which one axis is set as the first indication and the other axis is set as the second indication, into a plurality of subregions, and calculates the number of the monitoring targets which are positioned in each of the plurality of subregions when each of the plurality of monitoring targets is plotted in the plot region on the basis of the evaluation results. In addition, the monitoring apparatus displays the graph having X and Y axes, and identifiably displays at least one of the plurality of subregions on the plot region so as to display information, which indicates the number of the monitoring targets positioned in the subregion, on the identifiably displayed subregion. | 07-10-2014 |
20140201351 | Segment Generation Describing Usage Patterns - Segment generation describing usage patterns is described. In one or more implementations, user interaction with a browser is monitored to navigate through a plurality of web pages using a computing device. Data is extracted from web documents associated with the plurality of web pages automatically and without user intervention by one or more modules of the computing device, the data usable to describe a usage pattern involving the navigation through the plurality of web pages. A segment is generated which describes the usage pattern automatically and with user intervention, the segment configured to identify the usage pattern to target content. | 07-17-2014 |
20140201352 | SELECTIVE LOGGING OF NETWORK REQUESTS BASED ON SUBSETS OF THE PROGRAM THAT WERE EXECUTED - In an embodiment, in response to detecting a request by a program to access a network, if the request is the first time that the program requests to access the network, a subset of instructions is replaced in the program with supervisor call instructions. The supervisor call instructions cause respective interrupts of execution of the program. In response to each of the respective interrupts of execution of the program, the supervisor call instructions that caused the respective interrupts are replaced with the respective swapped instructions, and if a number of the respective interrupts of execution exceed a trap threshold, all remaining of the respective swapped instructions are stored to the program. | 07-17-2014 |
20140201353 | CONNECTIVITY NOTIFICATION - An example method includes presenting a first notification indicating a potential interruption in connectivity between a server and a remote terminal. If the potential interruption is resolved before the expiration of a restart time interval, the first notification is removed. If the potential interruption is not resolved before the expiration of the restart time interval, a second notification is presented, the second notification indicating a loss of connectivity between the server and the remote terminal. | 07-17-2014 |
20140201354 | NETWORK TRAFFIC DEBUGGER - Disclosed are various embodiments that relate to a network switch. The switch determines whether a network packet is associated with a packet processing context, the packet processing context specifying a condition of handling network packets processed in the switch. The switch determines debug metadata for the network packet in response to the network packet being associated with the packet processing context; and the debug metadata is stored in a capture buffer. | 07-17-2014 |
20140201355 | VARIABLE DURATION WINDOWS ON CONTINUOUS DATA STREAMS - Improved techniques are provided for processing streams of data. The duration of the time that an event is eligible for remaining in a time-based window can be variable for different events received via the same event stream. In certain embodiments, the duration of time that an input event spends in a time-based window is a function of one or more values of one or more attributes of the event. Since different events can have different one or more attribute values, the different events can spend different amounts of time in the time-based window for that event stream. The amount of time that an event spends in a time-based window can be controlled via the one or more attributes of the event. | 07-17-2014 |
20140201356 | MONITORING SYSTEM OF MANAGING CLOUD-BASED HOSTS AND MONITORING METHOD USING FOR THE SAME - A monitoring system includes a monitoring management server (MMS), a monitoring agent server, a database, and a plurality of hosts, wherein, the monitoring agent server is directly connected to the database. The monitoring agent server simultaneously serves several hosts, collects status information from the hosts, and the stores the status information into the database so that an administrator can monitor and inquire the status information. Therefore, the monitoring agent server is used to as a transmission interface between the hosts and the database. | 07-17-2014 |
20140201357 | FRAMEWORK AND METHOD FOR MONITORING PERFORMANCE OF VIRTUALIZED SYSTEMS BASED ON HARDWARE BASE TOOL - The disclosed invention involves a framework and method based on hardware base tool to monitor the performance of virtualized systems, wherein the said framework comprises at least one master host, and each of the said master host comprises user space components, guest space components, kernel space components and hardware. The said user space components comprise policy manager, workload mediator, monitor library, and host performance monitor. The said host performance monitor is connected to workload mediator, and host performance monitor comprises user space monitor and kernel space monitor. The disclosed invention applies PMU or the similar tools to monitor the performance of virtualized systems. The performance monitoring of the disclosed invention is to monitor CPU, memory, cache, IO, network, processes, etc. of the host of virtualized systems. Meanwhile, the method based on hardware to monitor performance in this disclosed invention resolves the problem to acquire performance data for virtualized systems. | 07-17-2014 |
20140201358 | System and Method for Asynchronous Event Reporting - Systems and methods for event reporting are provided. In a method for event reporting in a system that includes an event source and a plurality of event consumers, notifications from the event source are received at an event reporter. The notifications are received at a first rate. The event reporter receives a plurality of desired sampling rates from the plurality of event consumers, where each of the desired the sampling rates indicates a rate at which an event consumer desires reporting of notifications from the event reporter. The notifications are filtered based on the first rate and the plurality of desired sampling rates. The filtering selects one or more of the notifications to be reported to one or more event consumers of the plurality of event consumers. The selected one or more of the notifications are reported. | 07-17-2014 |
20140201359 | STITCHING TOGETHER PARTIAL NETWORK TOPOLOGIES - A method and system that takes advantage of processes that are efficient for determining the topology of small to medium size networks to determine individual network topologies for such networks, and then merges these individual topologies into a consolidated topology for the entire network. Each of the processes that determines the topology of the smaller networks provides the determined network topology, as well as a list of factors that may be relevant in the determination of how the given topology might be attached to any other given topology, such as the identification of a node that is not included in the given topology, or other indications of external connections. The merging process is configured to substantially restrict its analysis to these factors, thereby limiting the extent, and therefore the time consumed, by this stitching and merging process. | 07-17-2014 |
20140201360 | METHODS AND SYSTEMS FOR COMPUTER MONITORING - Methods and systems for deriving metrics for service and/or computer (e.g., server) utilization and stability from instrumentation of applications showing Poisson characteristics are disclosed. Such methods and systems may be further applied to automatically act upon the conditions indicated by the derived metrics, for example, to provision additional virtual server resource(s) in a cloud-based system. | 07-17-2014 |
20140201361 | SYSTEM AND METHOD FOR IP TARGET TRAFFIC ANALYSIS - Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers. | 07-17-2014 |
20140201362 | REAL-TIME DATA ANALYSIS FOR RESOURCE PROVISIONING AMONG SYSTEMS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for intelligent service resource provisioning among distinct systems in a networked computing environment (e.g., a cloud computing environment). Specifically, the embodiments of the present invention provide an intelligent provisioning engine (hereinafter engine) that accesses a service intelligence repository that comprises configuration information pertaining to a set of service resources available on a set of systems. The engine may also receive/identify a set of rules pertaining to any constraints on the set of service resources as well as a set of policies pertaining to provisioning the set of service resources. Still yet, the engine can collect real-time data pertaining to operational characteristics of the set of service resources. Based on the information/data collected, the engine may determine a plan for provisioning the set of service resources and integrate the plan with ancillary systems/engines (e.g., scaling, provisioning, monitoring, etc.) for implementation of the plan. | 07-17-2014 |
20140201363 | MONITORING OF REPLICATED DATA INSTANCES - Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can obtain a lease enabling the component to periodically communicate with, and monitor, one or more data instances in the data environment, where the data instance can be a replicated instance including a primary and a secondary replica. For a large number of instances, the data environment can be partitioned such that each monitoring component can be assigned a partition of the workload. In the event of a failure of a monitoring component, the instances can be repartitioned and the remaining monitoring components can be assigned to the new partitions to substantially evenly distribute the workload. | 07-17-2014 |
20140201364 | RESOURCE OPTIMIZATION METHOD, IP NETWORK SYSTEM AND RESOURCE OPTIMIZATION PROGRAM - There is provided a resource optimization method enabling a stable live migration. An amount of generated traffic that is anticipated to be generated is estimated based on the number of subscribers to be processed by a SIP server on a virtual machine (step S | 07-17-2014 |
20140207935 | SIMULATING REAL USER ISSUES IN SUPPORT ENVIRONMENTS - Methods, systems, and computer-readable and executable instructions are provided for simulating real user issues in support environments. Simulating real user issues in support environments can include providing stored data related to a real user issue associated with an application to a support device having the ability to modify the application, the stored data can include network traffic associated with a user device in a live environment and inputs provided via the user device. Simulating real user issues in support environments can include causing the support device to simulate the real user issue using the stored data. | 07-24-2014 |
20140207936 | SIGNAL OVERLOAD MANAGEMENT IN MAJOR EVENTS AND DISASTERS - A method, computer program product and system for managing an overload of signals on a network due to usage by a large number of users on the network during an event, comprising: detecting a cluster of communication on the network, determining a physical location of a centroid of the cluster of the communication on the network, associating the physical location of the centroid to be the approximate physical location of the event; reviewing information within cluster of communication being sent through the network regarding the event; categorizing the event based on a predetermined set of rules; determining bandwidth limitations of the network for users within a determined proximity to the physical location of the event; determining the resources necessary to respond to and resolve the event; and allocating bandwidth of the network based upon the resources and the proximity of users to the physical location of the event. | 07-24-2014 |
20140207937 | Determination of Internet Access - Internet access or connectivity is determined by sending a request to a third-party service to which connectivity is desired with an application on a client computing device and responsive to receiving a response, attempting to rule out a false positive response from an entity other than the third-party service. | 07-24-2014 |
20140207938 | SERVER RESTART MANAGEMENT VIA STABILITY TIME - The stability and availability status of a server is determined by monitoring the stability time specification of the server. The stability time is set for the server and defined as a time between a starting state of the server and a stability point of the server. The server activity is monitored by an availability manager to determine an availability status of the server. Responsive to the server activity progressing to the stability point within the stability time, an embodiment determines that the server is stable. Responsive to the server activity failing to progress to the stability point within the stability time, an embodiment determines that the server is unreliable. | 07-24-2014 |
20140207939 | SYSTEM AND METHOD FOR ENABLING THE CAPTURE AND SECURING OF DYNAMICALLY SELECTED DIGITAL INFORMATION - A system is disclosed for monitoring a channel passing information which includes an identifying designation. A channel monitor is coupled to the channel and configured to provide on an output all information passing on the channel. A manifest engine is coupled to the channel monitor to receive the information passing on the channel and to an operator console to receive an information manifest table. The information manifest table contains at least one identifying designation. The manifest engine compares the information received with the information in the information manifest table and only provides on the output that information having an identifying designation that matches an identifying designation included within the information manifest table. A storage server is coupled to the manifest engine and configured to receive and store the information provided from the manifest engine. | 07-24-2014 |
20140207940 | METHOD AND SYSTEM FOR USING A RECURSIVE EVENT LISTENER ON A NODE IN HIERARCHICAL DATA STRUCTURE - Disclosed is a method and system for registering a recursive watch on a node in hierarchical data structure. Embodiments of the disclosed technique may include (i) receiving a request to register an event listener on a source node, the source node being one of a plurality of nodes that are related to each other in a hierarchy; (ii) registering the event listener on the source node, the event listener configured to notify a client of an occurrence of a first event in the source node; and (iii) if the source node has a descendant node in the hierarchy, setting the event listener to notify the client of an occurrence of a second event in the descendant node without requiring registration of another event listener on the descendant node. Each of the nodes may represent, for example, a logical partition of a storage device. | 07-24-2014 |
20140207941 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING A DIAMETER ROUTING AGENT (DRA) TO OBTAIN MAPPINGS BETWEEN MOBILE SUBSCRIBER IDENTIFICATION INFORMATION AND DYNAMICALLY ASSIGNED INTERNET PROTOCOL (IP) ADDRESSES AND FOR MAKING THE MAPPINGS ACCESSIBLE TO APPLICATIONS - The subject matter described herein includes methods, systems and computer readable media for using a Diameter routing agent (DRA) to obtain mappings between mobile subscriber identification information and dynamically assigned Internet protocol (IP) addresses and for making the mappings accessible to applications. One exemplary method includes, at a DRA, receiving a Diameter message containing a dynamically assigned IP address and mobile subscriber identification information. The method further includes routing the received Diameter signaling message. The method further includes copying, by the DRA, the IP address and the mobile subscriber identifier from the message. The method further includes making a mapping between the dynamically assigned IP address and the subscriber identification information accessible to applications. | 07-24-2014 |
20140207942 | NETWORK ELEMENT DIAGNOSTIC EVALUATION - A process of diagnosing and debugging a network element remotely may employ sending of performance data to a third party evaluator for processing of the data. A mobile device may interface with the network element and request evaluation of the performance by the third party evaluator. Large memory loads may be sent to the third party evaluator where intensive processing may be performed. The results of the processing by the third party evaluator may be sent to the mobile device for viewing by a user. | 07-24-2014 |
20140207943 | METHOD AND SYSTEM FOR MANAGING A VPN CONNECTION - A method and computing device configured to send and receive traffic over a virtual private network (VPN) connection, the computing device having a processor; and a communications subsystem, where the method determines that a first trigger had been met; monitors whether data traffic exists over the VPN connection for a first time period; and if no data traffic exists over the VPN connection for the first time period, disconnects the VPN connection. | 07-24-2014 |
20140207944 | METHOD AND SYSTEM FOR MANAGING CLOUD COMPUTING ENVIRONMENT - A management server manages resources in a cloud system having one or more servers and one or more storage subsystems. The management server is operable to: assign a category of resources to a first application of a first type, the category of resources being associated with a first template of virtualized resources, the first template being associated with threshold values and having a first cost for using the first template; monitor performance of the first template to obtain performance values for the first template; compare a first performance value of the first template with a first threshold value associated with the first template; and generate a first resource migration plan for the first application of the first type based upon a result of the comparing step. The second template is associated with a second threshold value that is greater than the first performance value. The second template has a second cost for using the second template that is less than the first cost. | 07-24-2014 |
20140207945 | NETWORK DATA ANALYSIS - Apparatus for use in analyzing network data, the apparatus including an electronic processing device that determines network data representing a network having a number of nodes and links between the nodes, selects a model in accordance with a data type associated with the network data, the model being indicative of at least one trigger for a behaviour of interest, selected network metrics and a mathematical relationship relating network nodes to the at least one trigger using the selected network metrics and determines at least one trigger associated with the network data, determines the selected metrics for the network data and uses the mathematical relationship, the selected network metrics and the identified at least one trigger to determine predicted nodes, the predicted nodes being nodes predicted to exhibit behaviour of interest. | 07-24-2014 |
20140207946 | METHOD AND SYSTEM FOR MANAGING A VPN CONNECTION - A method and computing device configured to send and receive traffic over a virtual private network (VPN) connection, the computing device having a processor; and a communications subsystem, where the method determines that a first trigger had been met, wherein the first trigger is dynamically configured based on at least one factor at the computing device; monitors whether data traffic exists over the VPN connection for a first time period; and if no data traffic exists over the VPN connection for the first time period, disconnects the VPN connection. | 07-24-2014 |
20140207947 | METHODS AND SYSTEMS FOR ONLINE EVENTS - Provided are methods and systems for determining whether an online event has been completed by a user. A website or other interactive service maintains user activity data reflective of the activities of its users. A failure analysis component analyzes the user activity data to automatically detect likely failure events. An event filtering component intelligently accesses information from unrelated websites, interactive services, and/or offline services to determine whether an event was successfully completed by a user. One or more communications are sent to the user for select failure and successful events, preferably taking into consideration information about the event itself and information about the particular user. Such communications present the user with information about the same event or other possible events that are related to the original event that the user might be interested in completing. | 07-24-2014 |
20140207948 | NETWORK INTERFACE ON A CHIP WITH AN ADAPTIVE SYSTEM TO TRIGGER DATA FORWARDING - A network interface for a network on chip resource having a communication controller including recording means, and designed to transmit data to another network interface when a quantity of data present in the recording means reaches a predetermined threshold, and where the communication controller also includes means to force a transmission of data present in the said recording means when the quantity of this data is below the predetermined threshold. | 07-24-2014 |
20140207949 | Methods, Systems, and Computer Program Products for Monitoring Service Usage - Usage information is received that describes usage of communication services by a communications device. The usage information is compared to monitoring criteria. When the monitoring criteria are satisfied, an electronic notification message is sent to the communications device before an additional charge is incurred. | 07-24-2014 |
20140207950 | SCHEDULE AND LOCATION RESPONSIVE AGREEMENT COMPLIANCE CONTROLLED INFORMATION THROTTLE - Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events and/or based on schedule, location, time, or any combination thereof. An agreement includes condition(s) to satisfy the agreement, such as task(s) or activities to be performed by an agreement performer, for example based on a schedule and/or location, at a particular time, or time period, or, or events that may be detected, and actions performed to enforce or assert the agreement. Actions may include controlling the electronic device and/or at least partially enabling/disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. Embodiments may reduce or block information from particular sources during a scheduled school class to limit web surfing for information related to that class based on a schedule and/or location of the electronic device. | 07-24-2014 |
20140207951 | SYSTEM AND METHOD FOR PERFORMING CAPACITY PLANNING FOR ENTERPRISE APPLICATIONS - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data. | 07-24-2014 |
20140207952 | SYSTEM AND METHOD FOR DETERMINING WEBSITE POPULARITY BY LOCATION - Internet websites that are popular for users in a specific location are determined and displayed to a user of an electronic device. The popularity information may be of benefit to users in the location or to users of inherently portable devices, such as a mobile telephone or a laptop computer, that travel to the location. In one embodiment, position data relating to devices used to access websites is used to establish statistics regarding the most visited websites based on location. For instance, positioning data may be added to “webpage look-up/URL requests” that are made by the devices. This data may be transmitted to a server for deriving of the statistics. | 07-24-2014 |
20140215049 | METHOD AND SYSTEM FOR ROBUST CLOUD INSTANCE LAUNCHING - A method and system for receiving a request to deploy virtual machine instances on a first cloud and determining whether the deployment has been prepared for launch on cloud. Upon determining that the deployment has not been prepared for launch, aborting a launch of the deployment is initiated. Upon determining that the deployment has been prepared for launch, a launch of the deployment on the cloud is initiated. Upon determining that the launch of at least one of the virtual machine instances has failed to launch, a re-launch of the at least one instance that has failed to launch is initiated or a rollback of the deployment is initiated. | 07-31-2014 |
20140215050 | METHOD AND SYSTEM FOR WEB ANALYTICS USING A PROXY - A method for tracking visits to a web page using a proxy is disclosed, which includes receiving a request from a web browser on a proxy for a web page hosted on a web server; sending the request for the web page from the proxy to the web server; receiving the web page from the web server on the proxy; inserting one or more web page tags into the web page to generate a modified web page, wherein the one or more web page tags generate data about traffic to the web page; forwarding the modified web page to the web browser with the one or more web page tags embedded therein; executing the one or more web page tags within the modified web page; and sending data from the executed one or more web page tags a data collection system. | 07-31-2014 |
20140215051 | AGGREGATING STATUS TO BE USED FOR SELECTING A CONTENT DELIVERY NETWORK - A method is provided in one example embodiment and includes receiving a request for content from a source in a network; determining a geographic service region for the source; determining a status of a plurality of content delivery networks in the service region. The status is indicative of at least whether each of the plurality of content delivery networks is active or impaired. The method can also include selecting a particular one of the content delivery networks having a corresponding status as active to service the request for content. | 07-31-2014 |
20140215052 | SYSTEM AND METHOD FOR REPORTING PEER-TO-PEER TRANSFER EVENTS - In one embodiment, a method includes detecting a recordable transfer event on a source device. The recordable transfer event comprises a transfer of data between the source device and one or more destination devices in a peer-to-peer network. The method further includes generating, on the source device, a log of the recordable transfer event. In addition, the method includes, responsive to a determination that the source device lacks an infrastructure network connection, transmitting the log to at least one destination device so that the at least one destination device can report the log to a reporting node. | 07-31-2014 |
20140215053 | MANAGING AN ENTITY USING A STATE MACHINE ABSTRACT - In an implementation, a method for managing an entity may include establishing of a framework for characterization of the entity, in which the framework abstracts operation of the entity to a state machine. In addition, each state in the state machine may be characterized in terms of distributions of a performance metric associated with the entity. The method may also include implementing of the framework for characterization of the entity to manage the entity. | 07-31-2014 |
20140215054 | IDENTIFYING SUBSETS OF SIGNIFIERS TO ANALYZE - Identifying a subset of signifiers to analyze can include determining a set of distance metrics between a first signifier and each of a plurality of second signifiers, identifying a subset of the plurality of second signifiers to analyze based on the set of distance metrics using a computing device, and determining a relation between the subset of the plurality of second signifiers and the first signifier based a subset of the set of distance metrics. | 07-31-2014 |
20140215055 | MONITORING NETWORK ENTITIES VIA A CENTRAL MONITORING SYSTEM - Systems and method of the present invention provide for one or more server computers configured to receive a plurality of data published by a network entity and identify, within the data: the network entity that published the data, a sample of one or more metrics for the network entity and a sample type of each of the one or more samples. The one or more server computers may further be configured to calculate a network resource usage score, using the one or more metrics according to one or more rules for each of the sample types identified, for the sample. | 07-31-2014 |
20140215056 | METHODS AND SYSTEMS FOR ONLINE MONITORING USING A VARIABLE DATA SAMPLING RATE - A method for online monitoring of a physical environment using a variable data sampling rate is implemented by a computing device. The method includes sampling, at the computing device, at least one data set using at least one sampling rate. The method also includes processing the at least one data set with condition assessment rules. The method further includes determining whether the at least one data set indicates a change in state of the physical environment. The method additionally includes updating the at least one sampling rate. | 07-31-2014 |
20140215057 | Methods and Systems of Monitoring Failures in a Distributed Network System - In one embodiment, the methods and systems may include receiving an Application Program Interface (API) request, assigning a unique identifier to the API request, recording, in association with the unique identifier, receipt time corresponding to a time at which the API request is received, and associating one or more system state changes with the unique identifier. Advantageously, the present embodiments provide a more accurate failure monitoring and associated metrics. Additional benefits and advantages of the present embodiments will become evident in the following description. | 07-31-2014 |
20140215058 | METHODS AND SYSTEMS FOR ESTIMATING AND ANALYZING FLOW ACTIVITY AND PATH PERFORMANCE DATA IN CLOUD OR DISTRIBUTED SYSTEMS - Virtual resources associated with an execution of a user's applications in a cloud or distributed resource configuration including virtual or physical machines, network services and storage are identified. A source and destination virtual machine, utilized by the user's applications, are determined, and at least one source or destination virtual machine belongs to the identified virtual resources. Measurement software for a virtual machine is downloaded. The measurement software acquires data for connections established in a transport layer for communicating between the source and destination virtual machine. Data acquired from the measurement software is received at a first time, and the data includes measurements of variables for the data communications via the connections. Based upon the measurements, metrics that characterize the data communications at a first time are generated. Measurements made at an additional number of times are also received. Based upon the measurements, metrics are generated as a function of time. | 07-31-2014 |
20140215059 | METHOD AND A TRACKER FOR CONTENT DELIVERY THROUGH A CONTENT DELIVERY NETWORK - The method comprises using a tracker for coordinating entities forming the infrastructure of the CDN, said tracker comprising a CDN layer comprising interfaces for the CDN entities and a network layer for providing network and communication services to the CDN layer. | 07-31-2014 |
20140215060 | SOFTWARE MIGRATION METHOD AND APPARATUS IN MICRO-SERVER ENVIRONMENT - A software migration method and an apparatus for migration of software running at a source node to a destination node with a migration scheme selected optimally in consideration of micro-server communication environment are provided. The software migration apparatus includes an environment monitor which monitors communication environment between a source node and a destination node constituting a micro-server and a migration policy manager which analyzes communication environment information acquired from the environment monitor and determines a migration scheme for migrating a software running at the source node to the destination node based on the analysis result. | 07-31-2014 |
20140215061 | METHOD, SYSTEM AND COMPUTER STORAGE MEDIUM FOR BANDWIDTH OPTIMIZATION OF NETWORK APPLICATION - A method for bandwidth optimization of network application is disclosed. The method includes the steps of: classifying and identifying running network applications according to a set profile, and obtaining network applications of a first category; estimating the bandwidth of the running network applications, and obtaining an available bandwidth of network applications of the first category; obtaining bandwidth occupied by network applications of the first category, and determining whether the bandwidth occupied by network applications of the first category is higher than the available bandwidth; and if yes, then adjusting the bandwidth occupied by network applications of the first category. By the above method, system and computer-readable storage medium for bandwidth optimization, the possibility of network congestion is reduced, and the network fluency of the network applications of the system is improved. | 07-31-2014 |
20140215062 | MONITORING PERSISTENT CLIENT CONNECTION STATUS IN A DISTRIBUTED SERVER ENVIRONMENT - A system monitors the status of persistent connections between a set of servers and a set of clients, and identifies any clients not having at least one active connection with a server. The monitoring system, such as a visual voicemail system, includes a monitoring server, a bind agent, and probe services running on respective servers. Upon receiving a monitoring request from the monitoring server, the bind agent requests each probe service to identify the clients having active connections with the associated servers. The bind agent forms an aggregated list of all clients having active connections with one or more of the servers and based on the aggregated list, the agent identifies any clients not having at least one active connection with a server and notifies the monitoring server of the identified clients. | 07-31-2014 |
20140215063 | METHOD AND APPARATUS TO IDENTIFY OUTLIERS IN SOCIAL NETWORKS - A system that incorporates teachings of the present disclosure may include, for example, a process that obtains seed information including privacy profile settings of on-line social network users. The seed information is compared to a random population of on-line social network users and a sampling size of a total population is reduced according to the comparison. The reduced sampling is compared to one of a social graph, a generalized profile of an on-line user, or a combination thereof. The social graph is determined from a randomized-walk algorithm applied to an on-line social network of the users and an outlier is identified in the reduced sampling based on relationships between the on-line social network users. Additional embodiments are disclosed. | 07-31-2014 |
20140215064 | GRID EVENT DETECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting grid events. In one aspect, a method includes receiving signal characteristic data that specify signal characteristic values for signals that are received over each of a plurality of communications channels of a power line communications network. A determination is made that the signal characteristic values for the signals that are received over at least one of the communications channels are outside of a baseline signal value range. An endpoint that communicates over the at least one communications channel is identified, and a determination is made that a set of the signal characteristic values for the identified endpoint matches one of a plurality a grid event signatures for the identified endpoint. Data that identify the endpoint and a particular grid event that is represented by the matched grid event signature are provided. | 07-31-2014 |
20140215065 | MULTIPLE PROTOCOL COMMUNICATION SYSTEM FOR APPLIANCES - A communication apparatus is provided for facilitating communication between household appliances, such as kitchen and laundry appliances, and a network. A receiver device is configured to receive communication data from an appliance disposed at a site. A processor device is in communication with the receiver device and is configured to analyze the communication data to determine an appliance identification data element and an associated address of a destination in the network corresponding thereto. A transmitter device is in communication with the processor device and the network, and is configured to transmit the communication data to the destination address in the network determined by the processor device. An associated method is also provided. | 07-31-2014 |
20140222987 | NETWORK ADDRESS MANAGEMENT AND FUNCTIONAL OBJECT DISCOVERY SYSTEM - A network communication system includes a network address management and functional object discovery system. The network address management and functional object discovery system includes a network manager that manages network addresses for functional objects of electronic devices that communicate with each other over a network. The network manager may maintain a database that maps or associates unique IDs of the functional objects with associated network addresses. The network manager may provide non-conflicting instance IDs and network addresses to the electronic devices. The network manager may also provide instance IDs and/or network addresses for other electronic devices so that the electronic devices may communicate with each other over the network. | 08-07-2014 |
20140222988 | METHOD FOR ADAPTIVE CONTENT DISCOVERY FOR DISTRIBUTED SHARED CACHING SYSTEM - In a method for the dynamic content discovery in a distributed caching network the distribution of content popularity and its access frequency rate are used to determine the most appropriate mapping method(s) to use. | 08-07-2014 |
20140222989 | MANAGEMENT OF DEVICE MANAGEMENT UNITS - Systems, apparatuses and methods are provided for managing information technology devices in an information technology environment in which at least some of the devices are connected to a network and one or more management units are configured to manage such devices, wherein management of said one or more management units is facilitated by a core management unit. | 08-07-2014 |
20140222990 | ANALYSIS OF VARIANCE IN NETWORK PAGE ACCESS - Analyzing communication network data set access of a data set group constituted by multiple data sets. The method includes the following steps: (i) determining, for a first interval, a first low access count value corresponding to an amount of data sets in the data set group that have been accessed, in the first interval, an amount of times that is no greater than a low access threshold value; (ii) determining, for a second interval, a second low access count value corresponding to an amount of data sets in the data set group that have been accessed, in the second interval, an amount of times that is no greater than the low access threshold value; and (iii) determining a delta value based, at least in part, on a difference between the first low access count value and the second low access count value. | 08-07-2014 |
20140222991 | SENTRY FOR INFORMATION TECHNOLOGY SYSTEM BLUEPRINTS - Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 08-07-2014 |
20140222992 | STORAGE SYSTEM BASED HOST COMPUTER MONITORING - The present invention includes establishing, by a storage system coupled to a first host computer via a storage area network (SAN), metrics indicating a status of the first host computer, and storing the indicated metrics to the storage system. A second host computer, coupled to the storage system via the storage area network, determines an availability of the first host computer based on the metrics. | 08-07-2014 |
20140222993 | PROVIDING NETWORK-APPLICABLE CONTENT - The disclosure generally describes computer-implemented methods, software, and systems for providing appropriate content to a client based on the network capability associated with the client. One example method includes identifying a first set of content requested by the client, the first set of content associated with a default set of components for presentation; performing a network capability check associated with the client; determining, based on the capability check of the client, whether the default set of components associated with the first set of content is applicable for use with the client; providing the default set of components associated with the first set of content for presentation where the default set is determined to be applicable with the client; and responsive to determining that the default set is not applicable with the client, identifying at least one alternative component associated with the first set of content for presentation; and providing the least one alternative component associated with the first set of content for presentation. | 08-07-2014 |
20140222994 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - Methods and systems for enabling an application to track provenance information include analyzing an application binary to discover injection points for provenance tracking code; overwriting instructions in the application binary at the injection points to create an instrumented application, where the overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations; and deploying the instrumented application on a client device. | 08-07-2014 |
20140222995 | Methods and System for Monitoring Computer Users - A method and system are provided for monitoring an online activity to be performed by a user of a user computer. A trigger program runs on the user computer to detect possible violations by the user of predefined rules associated with the online activity. The trigger program is configured to analyze multiple streams of data collected by the user computer during the activity. The analyzed data is automatically annotated to assist in determine whether a violation of the predefined rules occurred. The analyzed data is stored for reviewed after the activity. Each trigger program can be activated in response to at least one of: video information about the activity, facial recognition information about the user, audio information about the activity, keystroke information relating to the user computer and the browsing history of the user computer during the activity. | 08-07-2014 |
20140222996 | DYNAMICALLY ADJUSTING A SET OF MONITORED NETWORK PROPERTIES USING DISTRIBUTED LEARNING MACHINE FEEBACK - In one embodiment, techniques are shown and described relating to dynamically adjusting a set of monitored network properties using distributed learning machine feedback. In particular, in one embodiment, a learning machine (or distributed learning machines) determines a plurality of monitored network properties in a computer network. From this, a subset of relevant network properties of the plurality of network properties may be determined, such that a corresponding subset of irrelevant network properties based on the subset of relevant network properties may also be determined. Accordingly, the computer network may be informed of the irrelevant network properties to reduce a rate of monitoring the irrelevant network properties. | 08-07-2014 |
20140222997 | HIDDEN MARKOV MODEL BASED ARCHITECTURE TO MONITOR NETWORK NODE ACTIVITIES AND PREDICT RELEVANT PERIODS - In one embodiment, techniques are shown and described relating to a Hidden Markov Model based architecture to monitor network node activities and predict relevant periods. In particular, in one embodiment, a device determines a statistical model for each of one or more singular-node traffic profiles (e.g., based on one or more Hidden Markov Models (HMMs) each corresponding to a respective one of the one or more traffic profiles). By analyzing respective traffic from individual nodes in a computer network, and matching the respective traffic against the statistical model for the one or more traffic profiles, the device may detecting a matching traffic profile for the individual nodes in a computer network. In addition, the device may predict relevant periods of traffic for the individual nodes by extrapolating a most-likely future sequence based on prior respective traffic of the individual nodes and the corresponding matching traffic profile. | 08-07-2014 |
20140222998 | LEARNING MACHINE BASED DETECTION OF ABNORMAL NETWORK PERFORMANCE - In one embodiment, techniques are shown and described relating to learning machine based detection of abnormal network performance. In particular, in one embodiment, a border router receives a set of network properties x | 08-07-2014 |
20140222999 | METHOD FOR THE TESTING OF SERVICE APPLICATIONS IN A VALUE ADDED SERVER OF A COMMUNICATION NETWORK - The invention relates to an application server and a method. The application server comprises a resolver which reserves a subscriber number prefix for test target applications. The resolver associates an address of an application server with the prefix in a memory and resolves subscriber numbers containing the prefix into the address using the memory. A network element simulator listens to a port, which has a port number which is also used in communicating with the network element being simulated. A test target application communicates with the simulator instead of the network element being simulated via a protocol stack in the application server. An application layer binding is used to route incoming messages to the test target application. | 08-07-2014 |
20140223000 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - Systems for enabling an application to track provenance include an application analysis module configured to analyze an application binary to discover injection points for provenance tracking code; and an instruction alteration module configured to overwrite instructions in the application binary at the injection points to create an instrumented application. The overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations. | 08-07-2014 |
20140223001 | SENTRY FOR INFORMATION TECHNOLOGY SYSTEM BLUEPRINTS - Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 08-07-2014 |
20140223002 | VERIFICATION AND AUDITING IN A CONTENT DELIVERY FRAMEWORK - A computer-implemented method, operable in a system comprising multiple services, the services running on a plurality of devices, includes tracking first information about requests sent from at least one first service in a first collection of services to at least one second service in a second collection of services, the first collection of services being distinct from the second collection of services; tracking second information from the second collection of services about requests supposedly processed by the second collection of services; and reconciling the first information with the second information. The reconciling may be used to verify or audit information reported by the second collection of services. | 08-07-2014 |
20140223003 | TRACKING INVALIDATION COMPLETION IN A CONTENT DELIVERY FRAMEWORK - A method in a content delivery framework includes, at a first service, receiving invalidation information relating to at least one resource; invalidating the at least one resource; and then, when the at least one resource has been invalidated at the first service, providing first information about the invalidating to a collector system. At a second service distinct from the first service, receiving the invalidation information relating to the at least one resource; invalidating the at least one resource at the second service; and then, when the at least one resource has been invalidated at the second service, providing second information about the invalidating at the second service to the collector system. | 08-07-2014 |
20140223004 | NETWORK SYSTEM AND INFORMATION REPORTING METHOD - A network system including one or more information processing devices includes plural information processing program executing units to execute different processes, and an execution control unit to cause, when receiving via a predefined interface, designation of one or more of the different processes and a reporting destination of a completion report indicating that the different processes have been executed from an application installed on an external device connected to the network system via a network, the information processing program executing units to execute the different processes based on the designation, and to transmit to the reporting destination, when the different processes executed by the information processing program executing units have been completed, a completion report indicating that the different processes have been completed. | 08-07-2014 |
20140223005 | METHOD AND SYSTEM FOR CONSTRUCTING A CUSTOMIZED WEB ANALYTICS APPLICATION - A method for constructing a customized web analytics application comprises providing a base analytics code, including a base data mining code and a plurality of tokens corresponding to unincorporated code snippets, and incorporating code snippets as selected to create the application where each code snippet is configured to track a different custom web analytic. The system displays a selection of at least one web analytic to track and receives user selection of at least one displayed web analytic to track over a wide area network. Once selected, an unincorporated code snippet corresponding to each selected displayed web analytic is retrieved from a library of such code snippets. The code snippet is then substituted in place of its corresponding token within the base analytics code to create a customized analytics code. The customized code is finalized by removing the remaining tokens and the finalized code transmitted to the user for incorporation into their web pages. | 08-07-2014 |
20140223006 | METHOD AND SYSTEM FOR MONITORING MESSAGES PASSED OVER A NETWORK - A method for performing a monitoring function for an application that passes messages between two or more endpoints, comprising: receiving a message including transaction data, the transaction data including data relating to transport of the transaction data; storing the message and transaction data in respective message data and transaction data buffers in a data store; storing status and semantic information associated with the message in the data store; receiving a signal selecting one or more module instances to define the monitoring function, each module instance for independently performing a respective aspect of the monitoring function, each module instance having related module instance data stored in a respective module instance data buffer in the data store, each module instance having a respective service access point for accessing the data store, each service access point having related service access point data stored in a respective service access point data buffer in the data store, each module instance independently accessing one or more of the message, transaction, module instance, and service access point data buffers to process data contained therein to perform its aspect of the monitoring function; and, initiating operation of the one or more module instances in accordance with a schedule defined by one or more routing rules, the one or more routing rules for routing a pointer to the message, as stored in the message data buffer, between the one or more module instances to thereby perform the monitoring function. | 08-07-2014 |
20140223007 | METHOD AND SYSTEM FOR MONITORING PERFORMANCE OF AN APPLICATION SYSTEM - A method for monitoring performance of an application system which is distributed across a plurality of network connected nodes, comprising: generating a hierarchical model for the application system, the hierarchical model having a plurality of levels, each level including components of a span specific to that level; mapping the application system onto the hierarchical model according to a network topology of the application system; monitoring network traffic between the plurality of network connected nodes of the application system to gather network traffic data; assembling the network traffic data into application messages; correlating the application messages into sets of one or more application messages that are causally associated in accordance with the hierarchical model, wherein the sets of causally associated application messages constitute transactions corresponding to a lowest level of the hierarchical model; and, generating records of individual transactions occurring within the application system for at least the transactions corresponding to the lowest level of the hierarchical model. | 08-07-2014 |
20140223008 | Method for Providing Node Information, Method for Acquiring Node Information, and Device - A method provides node information. A command for requesting node information associated with a target node is received. The command includes a Management Object Identifier (MOI) and node object information associated with the target node. The node information associated with the target node is sent according to the MOI and the node object information in the command. | 08-07-2014 |
20140237102 | Method and Apparatus for Determining an Activity Description - A method comprising receiving a sensor dependent information associated with an activity of a user, determining an activity description based, at least in part, on the sensor dependent information and a description terminology information, and causing communication of the activity description is disclosed. | 08-21-2014 |
20140237103 | Method and Apparatus for Determining an Activity Description - A method comprising receiving a sensor dependent information associated with an activity of a user, determining an activity description based, at least in part, on the sensor dependent information and a description terminology information, and causing communication of the activity description is disclosed. | 08-21-2014 |
20140237104 | Method and Apparatus for Determining an Activity Description - A method comprising receiving a sensor dependent information associated with an activity of a user, determining an activity description based, at least in part, on the sensor dependent information and a description terminology information, and causing communication of the activity description is disclosed. | 08-21-2014 |
20140237105 | ESTIMATION OF USER LOCATION BASED UPON ACCESS PATTERNS - Exemplary methods, apparatuses, and systems store an identifier for a user device when the user device is determined to be accessing a network service and store a time at which the user device is determined to be accessing the network service for each instance of the user device being determined to be accessing the network service. Periods of time during each day of the week in which the user device is likely to accessing to the network service are determined based upon the stored identifier and times. Whether the user is likely to access the network service while at work or at home is determined based upon the determined periods of time in which user devices are likely to be accessing the network service. | 08-21-2014 |
20140237106 | SYSTEMS AND METHODOLOGIES FOR MONITORING SHARED DATA ELEMENTS - A method for automatically ascertaining the presence of shared data elements stored on multiple storage resources in a network, the method including automatically ascertaining the presence of multiple storage resources on the network by continuously monitoring the network, for each of the multiple storage resources ascertained to be present in the network, automatically ascertaining the presence of shared data elements associated with data elements stored thereon, and for each of the shared data elements ascertained to be stored on the multiple storage resources in the network, automatically ascertaining at least one property of at least one share designator associated with each of the shared data elements. | 08-21-2014 |
20140237107 | NETWORK CONNECTIVITY MEASUREMENT SYSTEM AND METHOD - A system and method for detecting a transient outage of an Internet Protocol (IP) network. A probe sending device sends probe packets over the IP network. A probe packet includes a probe sequence number and a timestamp value issued by the probe sending device. A probe receiving device receives a current probe packet. The probe receiving device overwrites probe packet data obtained from a last received probe packet with the current probe packet when the current probe sequence number exceeds the sequence number of the last received probe packet by one. The probe receiving device stores the current probe packet data obtained from the current probe packet when the current probe sequence number exceeds the sequence number of the last received probe packet by more than one. | 08-21-2014 |
20140237108 | CLOUD PROCESS MANAGEMENT - In some examples, a method for managing service requests to a cloud computing system is described. The method may include receiving a service response from a cloud computing system in reply to a service request generated by a process executed on a computing device. The method may also include extracting processing capacity information of the cloud computing system from the service response. The method may also include determining an execution priority for the process based at least in part on the processing capacity information. | 08-21-2014 |
20140237109 | TECHNIQUES FOR DETERMINING A MOBILE APPLICATION DOWNLOAD ATTRIBUTION - A proxy server and a method for determining a mobile application download attribution are provided. The method includes identifying an application downloaded from an application repository to a mobile device; analyzing previously logged requests sent from the mobile device to identify a most recent request directed to the application repository from the mobile device; analyzing the identified most recent request to detect a source that causes the application download and at least one identifier of the application; determining the download attribution respective of the source that causes the application download; and generating an application metadata respective of the download attribution and the application identifiers. This is subject to a user's privacy, opt-in, or opt-out settings. | 08-21-2014 |
20140237110 | SERVER MONITORING - A monitoring device monitors operation states of servers. If information that indicates the operation states is requested from a supervisor terminal, the monitoring device generates display information that allows the supervisor terminal to graphically display the operation states and process commands for the servers and transmits the generated display information to the supervisor terminal. If process commands are transmitted from the supervisor terminal, the monitoring device causes the servers to execute processes based on the transmitted commands. | 08-21-2014 |
20140237111 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING A VIRTUALIZED DIAMETER NETWORK ARCHITECTURE AND FOR ROUTING TRAFFIC TO DYNAMICALLY INSTANTIATED DIAMETER RESOURCE INSTANCES - The subject matter described herein includes methods, systems, and computer readable media for providing virtualized Diameter network architecture and for routing traffic to dynamically instantiated Diameter resource instances. A system for providing virtualized Diameter resources and for routing traffic to dynamically instantiated Diameter resource instances includes a cloud virtualizer for virtualizing a hardware pool and for supporting dynamically instantiated Diameter resource instances. The system further includes a cloud orchestrator for monitoring network and hardware events and for instructing the cloud virtualizer to instantiate Diameter resource instances or to reallocate hardware from the hardware pool among instantiated Diameter resource instances in response to the network or hardware conditions. The system further includes a cloud flow manager for dynamically configuring at least one network element for routing traffic to the dynamically instantiated Diameter resource instances or the allocated hardware. | 08-21-2014 |
20140237112 | Method for Evaluating Streaming Media Transmission Quality and Obtaining Information, and Related Device and System - A method for evaluating streaming media transmission quality is provided. Initial playback delay information is obtained, and a subjective experience variation value of a user terminal is calculated according to the initial playback delay information, so as to evaluate streaming media transmission quality. The method includes: monitoring a Transmission Control Protocol (TCP) connection established with a user terminal; obtaining initial playback delay information if it is detected that the TCP connection established with the user terminal is a streaming media service connection; and calculating a subjective experience variation value of the user terminal according to the initial playback delay information. A device for evaluating streaming media transmission quality, a method for obtaining streaming media information, and a related device and system are also provided. | 08-21-2014 |
20140237113 | DECENTRALIZED INPUT/OUTPUT RESOURCE MANAGEMENT - A shared input/output (IO) resource is managed in a decentralized manner. Each of multiple hosts having IO access to the shared resource, computes an average latency value that is normalized with respect to average IO request sizes, and stores the computed normalized latency value for later use. The normalized latency values thus computed and stored may be used for a variety of different applications, including enforcing a quality of service (QoS) policy that is applied to the hosts, detecting a condition known as an anomaly where a host that is not bound by a QoS policy accesses the shared resource at a rate that impacts the level of service received by the plurality of hosts that are bound by the QoS policy, and migrating workloads between storage arrays to achieve load balancing across the storage arrays. | 08-21-2014 |
20140237114 | METHOD AND SYSTEM FOR MANAGING SERVERS - A method of managing servers includes at a central server having one or more processors and memory for storing one or more programs to be executed by the processors: obtaining configuration file for clustering servers; classifying each server into one layer of a hierarchical structure based on business logic associated with the server defined in the configuration file; receiving an operation command from an administrator; analyzing the operation command to identify a target server for executing the operation command; and forwarding the operation command to the target server through a path in the hierarchical structure defined in the operation command. | 08-21-2014 |
20140237115 | METHOD AND SYSTEM FOR SECURELY CAPTURING WORKLOADS AT A LIVE NETWORK FOR REPLAYING AT A TEST NETWORK - Methods and system for securely capturing workloads at a live network for replaying at a test network. The disclosed system captures file system states and workloads of a live server at the live network. In one embodiment the captured data is anonymized to protect confidentiality of the data. A file system of a test server at the test network is mirrored from a captured state of the live server. An anonymized version of the captured workloads is replayed as a request to the test server. A lost or incomplete command is recreated from the states of the live server. An order of the commands during replay can be based on an order in the captured workload, or based on a causal relationship. Performance characteristics of the live network are determined based on the response to the replayed command. | 08-21-2014 |
20140237116 | SYSTEMS AND METHODS OF DISCOVERING AND CONTROLLING DEVICES WITHOUT EXPLICIT ADDRESSING - A method of discovering a device in a communication network having multiple interconnected nodes includes continuously monitoring, by a device to be discovered, any IP packets sent by a discoverer. The method further includes transmitting, by the discoverer, an IP packet destined for a downstream device and receiving, by the device to be discovered, the IP packet. The method further includes determining, by the device to be discovered, whether the IP packet is intended for the device to be discovered. If the IP packet is not intended for the device to be discovered, retransmitting, by the device to be discovered, the IP packet to the downstream device via an egress port of the device to be discovered. | 08-21-2014 |
20140237117 | METHOD FOR DYNAMIC NETWORK PATTERN ANALYSIS OF MOBILE APPLICATION, SYSTEM AND RECORDING MEDIUM THEREOF - The present invention relates to a method for dynamic network pattern analysis of a mobile application, a system thereof, and a recording medium thereof. The system for dynamic network pattern analysis of a mobile application, comprising: a manage unit for managing a detecting application included in a wireless terminal device, the detecting application detecting network usage information of one or more analysis target applications; a reception unit for receiving the network usage information of the analysis target application included in the wireless terminal device through the detection application; a storage unit for accumulatively storing the network usage information received by the reception unit, in connection with information of the analysis target application, in a storage medium; and an analysis unit for obtaining network usage pattern information of the analysis target application by analyzing the network usage information accumulatively stored in the storage medium. | 08-21-2014 |
20140244827 | METHOD AND APPARATUS FOR MONITORING ACTIVITY OF AN ELECTRONIC DEVICE - An apparatus and method for monitoring activity of a device. The method includes associating one or more monitoring devices with an electronic device. Rules that have been established to define acceptable content that can be accessed by the electronic device are accessed. Requested content, which is requested by the electronic device, is identified. The requested content is compared to the established rules. An alert condition is generated when the requested content violates the established rules. An alert signal is provided to the one or more monitoring devices based on the alert condition | 08-28-2014 |
20140244828 | METHODS AND APPARATUS TO MEASURE EXPOSURE TO STREAMING MEDIA - Methods and apparatus to measure exposure to streaming media are disclosed. An example method includes inspecting a HyperText Transfer Protocol (HTTP) request directed to a service provider to determine whether the HTTP request includes a fragment identifier. Media-identifying metadata is extracted from the fragment identifier. The media-identifying metadata is transmitted to a central facility, the central facility at a location different from the service provider. | 08-28-2014 |
20140244829 | Determining Duration of Idleness or Abandonment of Resources and Property - The present disclosure provides methods and systems for determining the duration of time that has passed since temporarily idle or abandoned resources or property were last in use or possessed. The methods and systems provide for determining the point in time at which resources or property become idle or abandoned and for registering the cessation of use or abandonment event. Thereafter, the methods and systems provide for receiving and responding to queries concerning the temporarily idle or abandoned property and for detecting and registering resumption of use or reclamation events. | 08-28-2014 |
20140244830 | WEB APPLICATION MONITORING - Gathering analytic information for dynamic web applications. A method includes determining that statistic information should be gathered for a particular dynamic web application. The method further includes substituting native methods in the application with custom methods configured to gather statistic information when called. The method further includes providing any statistics information gathered to an analytics engine for analysis. | 08-28-2014 |
20140244831 | TRANSPORT SCRIPT GENERATION BASED ON A USER INTERFACE SCRIPT - Transport script generation based on a user interface script is disclosed herein. An example apparatus comprises a processor and a memory comprising machine-readable instructions. When executed by the processor, the machine-readable instructions cause the processor to determine if a first timestamp associated with a server is more recent than a second timestamp associated with a first transport script, the first timestamp representing a time when the server was last updated, the second timestamp representing a time when the transport script was generated. The processor is further to automatically generate a second transport script when the first timestamp is more recent than the second timestamp, the generation comprising: recording network requests while executing a user interface script, and modifying the second transport script based on the recorded network requests. The processor is further to test the server by executing the second transport script. | 08-28-2014 |
20140244832 | Active Service Bus - A method of responding to random service request messages received on an enterprise service bus of a computer network, each of said messages being a member of a group of related messages, in which the received messages are stored in a queue when detected by a listener for processing in a process flow having one or more nodes connected by respective edges between the listener and an emitter. In immediate mode, a message is accepted for processing only when a node is available and no other message in the same group is being processed. In batch mode, all of the messages in a group must be present in the queue before the messages in the group can be processed in predetermined order. | 08-28-2014 |
20140244833 | ADAPTIVE AND EXTENSIBLE UNIVERSAL SCHEMA FOR HETEROGENEOUS INTERNET OF THINGS (IOT) DEVICES - The disclosure is related to determining an association among Internet of Things (IoT) devices. A first IoT device receives an identifier of a second IoT device, obtains a schema of the second IoT device based on the identifier of the second IoT device, and determines whether or not there is an association between the first IoT device and the second IoT device based on a schema of the first IoT device and the schema of the second IoT device, where the schema of the first IoT device comprises schema elements and corresponding values of the first IoT device and the schema of the second IoT device comprises schema elements and corresponding values of the second IoT device. | 08-28-2014 |
20140244834 | METHODS TO DISCOVER, CONFIGURE, AND LEVERAGE RELATIONSHIPS IN INTERNET OF THINGS (IOT) NETWORKS - The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance). | 08-28-2014 |
20140244835 | SYSTEM AND METHOD TO TRIGGER CROSS-LAYER OPTIMIZATIONS IN A NETWORK - The system comprising an application CSO gateway coupled to an application layer that configures and monitors a plurality of Data Center Elements storing computing resources; a network CSO gateway coupled to a network layer that configures and monitors a plurality of Network Elements and to receive requests from said ACG to configure connections, wherein the system further includes a Client entity coupled in an already deployed Network Element or in a Data Center Element configured to monitor a segment of the network where said Client entity is found; an IT-Aware Network Controller coupled to said network layer configured to run operations in and from the network regarding information of said monitored network information and of said Data Center Elements; and interfaces coupling the different elements of the system allowing the interconnection and communication between them. | 08-28-2014 |
20140244836 | ANALYTICS ENGINES FOR IOT DEVICES - Methods and apparatuses for optimizing performance using data from an Internet of Things (IoT) device with analytics engines. The method receives, from a requesting Internet of Things (IoT) device, a request for trend data of physical resource consumption based at least in part on a portion of received data from at least one of a plurality of IoT devices. The method retrieves, from memory of an analytics engine, at least the portion of the received data. The method calculates, in a calculator of the analytics engine, the trend data based on at least the portion of the received data. The method transmits, to the requesting IoT device, the calculated trend data, wherein the requesting IoT device adjusts parameters in an IoT device using the calculated trend data. | 08-28-2014 |
20140244837 | DETERMINING A USER'S IDENTITY FROM AN INTERACTION WITH AN IDENTIFIABLE SERVICE - A method for determining a user's identifier on an identifiable service by: a) capturing a user action performed by the user on a first identifiable service where the user action causes user generated content to be added to a second identifiable service; b) monitoring the second identifiable service for events of user generated content being added to the second identifiable service by users of the second identifiable service, each such event of user generated content being associated with a user identifier, and recording the event and the respective user identifier; c) determining a probabilistic match between the captured user action and one of the one or more monitored events. Also provided is a computer readable storage medium containing program code for implementing the method. | 08-28-2014 |
20140244838 | DEVICE MANAGEMENT IN MACHINE TO MACHINE NETWORK - The present disclosure is related to device management in a machine to machine (M2M) network. Particularly, the present disclosure relates to performing an efficient device management based on correlations between M2M devices in the M2M network. | 08-28-2014 |
20140244839 | METHOD AND APPARATUS FOR MONITORING INTERNET CONNECTION STATUS IN WIRELESS COMMUNICATION SYSTEM - A method and mobile station in a wireless communication system is provided. The method includes determining whether there is a packet that is at least one of transmitted and received for each of time intervals, determining a traffic status of at least one of transmission and reception based on a result of the determining of whether there is the packet that is the at least one of transmitted and received for each of the time intervals, and determining the internet connection status based on the determined traffic status of the at least on transmission and reception. | 08-28-2014 |
20140250219 | SYNCHRONIZING TRANSLATED DIGITAL CONTENT - Aspects of the present disclosure relate to one or more configured computing systems identifying when content includes a base content and a translated content that can be synchronously presented. Once a content match is identified, a device to receive synchronization information can also be identified. The synchronization information can enable one or more devices to synchronously present translated content while consuming a base content. For example, an English language audio book may be output synchronously with a Spanish language eBook. | 09-04-2014 |
20140250220 | Optimizing Handling of Virtual Machine Mobility in Data Center Environments - Techniques are provided for sending address information of virtual machines to a physical switch. A migration of a virtual machine to a physical server is detected. The physical server obtains address information of the virtual machine, and upon obtaining the address information of the virtual machine, the physical server sends the address information to a first physical switch that is connected to the physical server. | 09-04-2014 |
20140250221 | Methods, Systems, and Computer Program Products for Detecting Communication Anomalies in a Network Based on Overlap Between Sets of Users Communicating with Entities in the Network - Anomalies are detected in a network by detecting communication between a plurality of entities and a set of users in the network, determining an overlap between subsets of the set of users that the entities comprising the plurality of entities communicated with, respectively, and determining whether the communication between the plurality of entities and the set of users is anomalous based on the overlap. | 09-04-2014 |
20140250222 | NETWORK MONITORING SERVICE - A system for monitoring a portable system external to an enterprise network is provided that includes a network monitoring system that monitors any changes to the network configuration of the portable system. If a change is detected the network monitoring system determines if the portable system is not currently connected to the enterprise network and has access to Internet so as to block access to the Internet until the portable system is properly connected to the enterprise network. An event logger receives notification from the network monitoring system and logs the status as to whether the portable system has Internet access. | 09-04-2014 |
20140250223 | METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Methods and apparatus to determine media impressions using distributed demographic information are disclosed. An method includes sending to a client computer, via a processor serving a first internet domain, a response to a first request, the first request sent to the first internet domain and indicative of access to media at the client computer, the response to instruct the client computer to send a second request to an intermediary serving a sub-domain of a second internet domain, the second request to be indicative of the access to the media at the client computer, wherein the intermediary is to transmit first data about the second request to a data collection server of an audience measurement entity and second data about the second request to an entity of the second internet domain and logging an impression of the media. | 09-04-2014 |
20140250224 | ADVERSE EVENT DATA CAPTURE AND ALERT SYSTEMS AND METHODS - Electronic capture of adverse event information includes selective input of adverse event information into a machine in response to prompt provided to the user based on a site visit. Such adverse event information is forwardable to a location over a communication link. The machine produces one or more alerts, if adverse event information has been input, after a prescribed period of time has transpired unless the machine is informed that the same information has already been forwarded to the location. In a preferred embodiment, the customer is a clinician. Optionally, received adverse event information can be parsed to audit whether any of the information, in fact, concerns an adverse event. Systems and software concerning related technological improvements are disclosed. | 09-04-2014 |
20140250225 | AGILE INFORMATION TECHNOLOGY INFRASTRUCTURE MANAGEMENT SYSTEM - The agile information technology infrastructure management system and related methods and processes provide a solution with the required flexibility to effectively and efficiently monitor and manage a wide-variety of disparate information technology and network infrastructure deployed in businesses and enterprises throughout a region or the world. | 09-04-2014 |
20140250226 | SYSTEM FOR MANAGING A REMOTE DATA PROCESSING SYSTEM - A method for managing, with a base data processing system of a primary business entity, a remote data processing system of a secondary business entity via a communications network is provided. The method includes steps of the base data processing system receiving a report message on at least one technical parameter from the remote data processing system via the communications network and interpreting the report message to determine a state of interoperability between the base data processing system and the remote data processing system. | 09-04-2014 |
20140250227 | COMPLEX INTERACTION RECORDING - A system for complex interaction recording, comprising a recording management server that operates on a network-connected computing device and records communications, a record server that operates on a network-connected computing device and presents records for review and interaction by a human user, and an interaction evaluation server that operates on a network-connected computing device and identifies interactions segments and groups them into complex interactions, and a method for recording complex interactions comprising the steps of loading an interaction, identifying segments within the interaction, grouping segments into a complex interaction, and sending the resulting complex interaction as output. | 09-04-2014 |
20140258499 | LOAD BALANCING WHEN REPLICATING ACCOUNT DATA - Embodiments of the present invention relate to invoking and managing load-balancing operation(s) applied to partitions within a distributed computing environment, where each partition represents a key range of data for a storage account. The partitions affected by the load-balancing operation(s) are source partitions hosted on a primary storage stamp and/or destination partitions hosted on a secondary storage stamp, where the primary and secondary storage stamps are located in geographically distinct areas and are equipped to replicate the storage account's data therebetween. The load-balancing operation(s) include splitting partitions into child partitions upon detecting an increased workload as a result of active replication, merging partitions to form parent partitions upon detecting a reduction in workload as a result of decreased processing-related resource consumption, or offloading partitions based on resource consumption. A service within a partition layer of the storage stamps is responsible for determining when to invoke these load-balancing operation(s). | 09-11-2014 |
20140258500 | DELEGATE ACCESS IN A DISTRIBUTED SCAN SYSTEM - Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD. | 09-11-2014 |
20140258501 | SYSTEM AND METHOD FOR AUTOMATED DISTRIBUTION OF SUPERVISORY FUNCTIONS IN A CONTACT CENTER - A system for automated distribution of supervisory functions in an enterprise is provided. The system includes a monitor module configured to monitor performance of resources in the enterprise. The system further includes a skill finder module configured to find at least one skilled resource for at least one type of work request. The system further includes an assignment module configured to assign the at least one skilled resource a subset of supervisory role for the at least one type of work request. | 09-11-2014 |
20140258502 | TRACKING CONTACTS ACROSS MULTIPLE COMMUNICATIONS SERVICES - A method for tracking at least recent contacts and favorite contacts across multiple communications services may include collecting, by a processor, information associated with a plurality of contact interactions of a user from each of a set of different communications services utilized by the user. The method may also include storing, by a storage device, the information associated with each of the plurality of contact interactions. The method may additionally include analyzing the information associated with each of the plurality of contact interactions. The method may further include determining at least one of a list of most recent contacts and a list of favorite contacts from analyzing the information associated with each of the plurality of contact interactions. | 09-11-2014 |
20140258503 | System and Method for Recommending Communication Groups and Modes of Communication - In one embodiments, a system includes an interface operable to monitor a first plurality of communications between a first user and a second user on a network. The system further includes one or more processors configured to determine one or more first particulars of the first plurality of communications, determine a recommended communication group composition and a recommended mode of communication based on the one or more first particulars and a set of rules, and generate a first alert to the first user indicating the recommended communication group composition and the recommended mode of communication. | 09-11-2014 |
20140258504 | SYSTEMS AND METHODS FOR NETWORK TESTING - A apparatus for network testing includes a network port adapted to receive data from the test network and one or more network interfaces of a wireless access point in operative communication with the network port. The one or more network interfaces generates a wireless local area network (WLAN) that communicates diagnostic information of the test network to a client device and causes the client device to display the diagnostic information. | 09-11-2014 |
20140258505 | NETWORK CONDITION PREDICTIONS FOR MULTIMEDIA STREAMING - Network condition prediction and multimedia streaming consumption prediction are provided. The prediction may be based on a device's prior location, behavior, and statistics thereof. By gathering location data from users anonymously and securely, a virtual location network with millions of nodes are provided. Each virtual location, at a given time, is stored with associated network metrics gathered from various devices in a database. The database may comprise a probabilistic model and a behavioral model tracking device metrics. | 09-11-2014 |
20140258506 | TRACKING APPLICATION USAGE IN A COMPUTING ENVIRONMENT - Disclosed are various embodiments for reporting as well as tracking usage and/or installation of an application in a machine instance in a computing environment. A machine instance can execute an application and can be associated with a storage volume on which the application is installed. The application, or an installer utility associated with the application, can report installation and/or usage of the application to an application usage service. | 09-11-2014 |
20140258507 | SYSTEM AND METHODS FOR REMOTE ACCESS TO IMS DATABASES - Systems and methods are provided that allow client programs using IMS database access interfaces to access IMS database data available from IMS systems on remote logical partitions and remote zSeries mainframes rather than from a local IMS system. For example, a method may include intercepting an IMS request having a documented IMS request format from a client program executing on a source mainframe system. The method may also include selecting a destination mainframe system and sending a buffer including information from the request from the source mainframe system to the destination mainframe system and establishing, at the destination mainframe system, an IMS DRA connection with the IMS system from the request. The method may further include receiving a response from the IMS system, sending a buffer having information from the response from the destination mainframe system to the source mainframe system, and providing the information to the client program. | 09-11-2014 |
20140258508 | TRACKING CONTACTS ACROSS MULTIPLE COMMUNICATIONS SERVICES - A method for tracking at least recent contacts and favorite contacts across multiple communications services may include collecting, by a processor, information associated with a plurality of contact interactions of a user from each of a set of different communications services utilized by the user. The method may also include storing, by a storage device, the information associated with each of the plurality of contact interactions. The method may additionally include analyzing the information associated with each of the plurality of contact interactions. The method may further include determining at least one of a list of most recent contacts and a list of favorite contacts from analyzing the information associated with each of the plurality of contact interactions. | 09-11-2014 |
20140258509 | SYSTEMS AND METHODS FOR CONTEXT-BASED NETWORK DATA ANALYSIS AND MONITORING - Particular network usage information representing network activity of a particular device on a network is received. The particular network usage information is associated with a network context, the network context representing circumstances of the network activity of the particular device. The network context is associated with a particular network perspective, the network particular perspective representing a network activity of a group of devices on the network. The particular network perspective is rendered into an object, the object being configured to present the particular network perspective in a graphical user interface. | 09-11-2014 |
20140258510 | CLOUD DEVICE AND METHOD FOR NETWORK DEVICE DISCOVERING - A network device discovery method receives registration information from the network devices which are registered to the cloud device, and generates a management list for recording the registration information and a management status of each of the registered network devices. When a request of searching for specified network devices of a specified network manager from a specified client device is received, the discovery method retrieves specified network devices managed by the specified network manager from the management list. The discovery method further searches for target network devices which have the same public Internet Protocol (IP) addresses with the specified network devices, and presents one or more target network devices which have not been managed by any network manager to the specified client device for the specified network manager. | 09-11-2014 |
20140258511 | Methods and Apparatus for Reestablishing Secure Network Communications - A computer-implemented, method for monitoring and establishing a secure communication session to a client computing system by a secure communication server system programmed to perform the method including monitoring in the secure communication server system, a network traffic level between the client computing system and the secure communication server system, determining in the secure communication server system, whether the network traffic level drops below a set network traffic level, and wherein when the network traffic level is determined by the secure communication server system to drop below the set network traffic level, the method includes sending with the secure communication server system, a management communication to the client computing system to reestablish a secure communication session with the secure communication server system. A subsequent secure communication session between the client computing system and the secure communication server system may or may not be established. | 09-11-2014 |
20140258512 | SCHEDULE AND LOCATION RESPONSIVE AGREEMENT COMPLIANCE CONTROLLED INFORMATION THROTTLE - Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events and/or based on schedule, location, time, or any combination thereof. An agreement includes condition(s) to satisfy the agreement, such as task(s) or activities to be performed by an agreement performer, for example based on a schedule and/or location, at a particular time, or time period, or, or events that may be detected, and actions performed to enforce or assert the agreement. Actions may include controlling the electronic device and/or at least partially enabling/disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. Embodiments may reduce or block information from particular sources during a scheduled school class to limit web surfing for information related to that class based on a schedule and/or location of the electronic device. | 09-11-2014 |
20140258513 | Monitoring Federation for Cloud Based Services and Applications - Technologies are described herein for cloud monitoring federations that can include cloud monitoring services (CMS) that collect monitoring information from point of presence (POP) agents. The cloud monitoring POPs may be located in the cloud, on client machines, embedded within cloud applications, or wherever they can obtain visibility into managed entities associated with the cloud. Management systems, acting as cloud monitoring clients (CMC), may interface with the CMS to obtain a complete view of services and application used by their enterprise including those that operate outside of the enterprise premises as part of a cloud or outside network. The publishing by POPs and consumption by CMCs of management information across components within the enterprise and out in the cloud may be supported by managing roles, responsibilities, scopes, security boundaries, authenticity of information, service level agreements, and other aspects of cloud monitoring operations. | 09-11-2014 |
20140258514 | MEDIA DELIVERY SYSTEM AND METHOD FOR TRANSPORTING MEDIA TO DESIRED TARGET DEVICES - A media delivery system and technique are described to enable a media stream to be received at one end on a user's computer, and then re-streamed to a target device in a form that is suitable for that target. As an example of an implementation of such an embodiment, a streaming video and/or audio feed may be received on a user's media center, then re-streamed to a user's designated target device. The target device may correspond to, for example, another computer, a cell phone, or some other media output device. | 09-11-2014 |
20140258515 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND DEVICE MANAGEMENT METHOD - A device management apparatus connected to a plurality of devices via a network includes a collecting unit that receives usage data indicating a status of use of each of the devices from each of the devices and that stores the received usage data in a storage device, and a common data acquiring unit that acquires common data that is common to the devices from the usage data of each of the devices stored in the storage device. | 09-11-2014 |
20140258516 | WEB PAGE PERFORMANCE SCORING - A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors. | 09-11-2014 |
20140258517 | Network User Usage Profiling - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 09-11-2014 |
20140258518 | METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC - A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server. | 09-11-2014 |
20140258519 | Methods For Measuring Physical Cpu Utilization In A Cloud Computing Infrastructure - Novel techniques are provided to determine concurrent hardware resource usage as expressed in activity performed by hardware processors. A cloud computing consumer can verify the level of the quality of service provided by the physical infrastructure of a cloud, thereby allowing the consumer the ability to request a transfer of the hosting physical infrastructure to a less burdened physical machine. | 09-11-2014 |
20140258520 | SYSTEMS AND METHODS FOR CATEGORIZING NETWORK TRAFFIC CONTENT - A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability of accuracy associated with the first characterization, and categorizing the network traffic content based at least in part on the first characterization and the first probability of accuracy. A method for use in a process to categorize network traffic content includes obtaining a plurality of data, each of the plurality of data representing a probability of accuracy of a characterization of network traffic content, and associating each of the plurality of data with a technique for characterizing network traffic content. A method for categorizing network traffic content includes determining a characterization of the network traffic content, determining a weight value associated with the characterization, and categorizing network traffic content based at least in part on the characterization of the network traffic content and the weight value. | 09-11-2014 |
20140258521 | Load Balancing Web Service by Rejecting Connections - A load balancer allocates requests to a pool of web servers configured to have low queue capacities. If the queue capacity of a web server is reached, the web server responds to an additional request with a rejection notification to the load balancer, which enables the load balancer to quickly send the rejected request to another web server. Each web server self-monitors its rejection rate. If the rejection rate exceeds a threshold, the number of processes concurrently running on the web server is increased. If the rejection rate falls below a threshold, the number of processes concurrently running on the web server is decreased. | 09-11-2014 |
20140258522 | Methods and Systems for Monitoring Computer Systems Using Wireless Devices - Methods and systems for providing information regarding monitored computer systems to wireless devices are provided. Information may be requested by a wireless device and displayed on the wireless device in a browser. The web server application may detect the wireless device, and may also then specially format the response, including the requested information formatted for optimized delivery and/or display on a wireless device. The web server application may also send a message to a wireless device about events associated with the monitored computer systems. | 09-11-2014 |
20140258523 | End-to-End Monitoring and Optimization of a Content Delivery Network using Anycast Routing - Some embodiments implement systems and methods to monitor CDN performance from the end user's perspective. To achieve full end-to-end monitoring, the systems and methods monitor the performance of Anycast routing for routing an end user to the optimal PoP of the CDN and monitor the performance of different routes that deliver content from the optimally selected PoP back to the end user. Systems and methods are also provided to leverage the monitored performance in order to automatically optimize the performance of the CDN by optimizing or modifying Anycast routing and by performing route grooming as needed to ensure that the optimal route is selected to deliver content to different sets of end users that request content from a particular PoP. | 09-11-2014 |
20140258524 | Detection of Load Balancing Across Network Paths in a Communication Network - The present disclosure relates to methods, a system and an apparatus for detection of load balancing in a packet-switched communication network ( | 09-11-2014 |
20140258525 | Computer Network Management Tools - A network device for computer network operation includes a processor and a memory. A set of object identifiers (OID) and a set of device management identifiers are stored in the memory, wherein each object identifier is mapped to a corresponding device management parameter to facilitate management of the network device. The set of device management identifiers collective represents the set of object identifiers. The network device is to make available the device management identifiers and values corresponding to the device management parameters to facilitate network management. | 09-11-2014 |
20140258526 | SYSTEMS AND METHODS OF REMOTE COMMUNICATION - According to at least one embodiment, a system for monitoring cloud-enabled automatic control devices is provided. The system includes at least one automatic control device. The at least one cloud-enabled automatic control device includes an output configured to provide control information to controlled equipment, a data storage, a network interface, and a controller coupled to the output, the data storage and the network interface. The controller is configured to provide, according to a one-way communication protocol, transmitted information to a cloud service via the network interface, the transmitted information including an identifier of the at least one automatic control device and being descriptive of performance of the at least one automatic control device. | 09-11-2014 |
20140258527 | NETWORK SYSTEM, NODE DEVICE GROUP, COMPUTER APPARATUS, AND METHOD FOR TRANSMITTING AND RECEIVING SENSOR DATA - A computer apparatus makes an information acquisition request to any of multiple node devices. Each node device has a sensor data search section for searching a sensor data storage sections of the multiple node devices for a sensor data according to the information acquisition request and acquiring the sensor data and an information transmission section for transmitting the sensor data acquired by the sensor data search section or calculation result data acquired on the basis of the sensor data to the computer apparatus. | 09-11-2014 |
20140280860 | METHOD AND SYSTEM FOR SIGNAL CATEGORIZATION FOR MONITORING AND DETECTING HEALTH CHANGES IN A DATABASE SYSTEM - A method for generating instructions for a monitoring facility. The method includes obtaining a signal from a data server, where the data server is monitored by the monitoring facility using a task, identifying a signal characteristic of the signal, and determining a first category for the signal based on the signal characteristic. The method further includes identifying a first signal processing tool for the signal based on the task and the first category and instructing the monitoring facility to perform the task by applying the first signal processing tool to the signal. | 09-18-2014 |
20140280861 | DYNAMICALLY LAUNCHING INTER-DEPENDENT APPLICATIONS BASED ON USER BEHAVIOR - A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage. | 09-18-2014 |
20140280862 | LONG TERM METRICS APPLIED TO MULTIVARIATE TESTING - Embodiments provide techniques for testing a plurality of variations of a user experience on a subscription-based online site, where each of the plurality of variations is distinct from other variations in the plurality of variations. Each of a plurality of users is assigned to one of the plurality of variations. For each of a plurality of user requests received during a predetermined window of time, embodiments determine one of the plurality of variations for use in processing the user request, based on a user associated with the user request, and process the respective user request using the determined variation. Long-term user metric information relating to subscription services for the subscription-based online site is determined, with respect to the plurality of users. Embodiments then rate at least one of the plurality of variations, based on the determined long-term user metric information. | 09-18-2014 |
20140280863 | Consumer Device Intelligent Connect - A method and system provides a Consumer Device Intelligent Connect (CDIC) to create awareness of presence of multiple devices with the user under-one-roof or on-the-move is disclosed. The method disclosed enables the user to pre-register the devices on a user database of a CDIC server. The CDIC server identifies active devices in the communication network along with their geographical locations, from the list of pre-registered devices. The CDIC server then intelligently processes the stored information and provides this information to the media server. The information provided by CDIC server enables media servers to develop user interactivity, deploy monetization services such as advertizing, user feedback and so on using the ubiquitous multiple devices of the user. | 09-18-2014 |
20140280864 | Methods of Representing Software Defined Networking-Based Multiple Layer Network Topology Views - A method for network control, comprising receiving a request for a network view from an application at a Software Defined Network (SDN) controller, creating a network view from a network map, wherein the network map comprises a representation of a plurality of network devices and network paths in a SDN-based multiple layer network, and wherein the network view comprises at least a portion of the devices or paths in the network map, and sharing the network view with the application. | 09-18-2014 |
20140280865 | NETWORK-PROXIMITY-BASED EVENTING - In one embodiment, a network device detects a proximity state change of a mobile device in relation to the detecting network device, and compares the state change and mobile device to a set of configured policies. Based on one or more particular policies matching the state change and the mobile device, the network device may then perform one or more configured actions. | 09-18-2014 |
20140280866 | SCALABLE LOAD BALANCING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, by a load balancer, a plurality of metric values from a plurality of servers; calculating an average metric value based on the plurality of metric values; calculating a first error value based on the average metric value and a first metric value of the plurality of metric values; generating a first integral value by incorporating the first error value into a first previous integral value; and generating a first preference value for a first server of the plurality of servers based on the first integral value. | 09-18-2014 |
20140280867 | ANALYTIC INJECTION - Techniques for inserting analytic logic into network requests are presented. In an embodiment, instructions are dynamically inserted into web pages as the pages are requested. The instructions enable analytics to be captured and/or tracked when the web pages are processed. In another embodiment, web requests are intercepted and processed to include analytic instructions. | 09-18-2014 |
20140280868 | RATE REDUCTION FOR AN APPLICATION CONTROLLER - Rate reduction for an application controller is provided. Computing resources used by an application controller receiving an amount of traffic from a network device can be determined. A determination whether the computing resources used by the application controller are approaching a computing capacity of the application controller can be made. A message can be sent to the network device to reduce the amount of traffic sent to the application controller in response to a determination that the application controller is approaching the computing capacity. A reduced amount of traffic can be received from the network device. Incrementally increasing amounts of traffic can be received from the network device after receiving the reduced amount of traffic from the network device. | 09-18-2014 |
20140280869 | Management of Delivery of Multimedia Components - Systems, methods, apparatuses, and computer readable media may be configured for establishing at least one session for delivery of multimedia. In an aspect, a first transmission of data fragments of a first component and a second transmission of data fragments of a second component may be transmitted and synchronized for presentation. If an inactivity event is detected the session may be maintained while reducing bandwidth consumption. | 09-18-2014 |
20140280870 | PROTECTION OF SENSITIVE DATA OF A USER FROM BEING UTILIZED BY WEB SERVICES - Systems and methods for preventing web services from using sensitive data in customizing web pages for a user. In one embodiment, a protection system is implemented between the user and the web service. The protection system identifies past interactions of the user with the web service, identifies text in the past interactions between the user and the web service, and identifies subjects discussed in the text. The protection system then communicates with the user to determine which of the subjects are sensitive to the user, and deletes a history stored by the web service for the user that relates to the sensitive subjects. | 09-18-2014 |
20140280871 | CORRELATION OF ACTIVITIES ACROSS A DISTRIBUTED SYSTEM - A method and system for tracking activities relating to a common transaction executed across multiple services of a distributed computing environment. An aggregator receives intra-service activity information from collectors associated with a first service and a second service of the distributed computing environment. The aggregator identifies a first inter-service communication correlation linking the intra-service activity information of the first service to a first inter-service message. The aggregator further identifies a second inter-service communication correlation linking the intra-service activity information of the second service to the second inter-service message. The aggregator identifies an inter-service communication correlation linking the first inter-service message with the second inter-service message and associates the intra-service activity of the first service with the intra-service activity of the second service using the inter-service communication correlation. | 09-18-2014 |
20140280872 | INVENTORY SERVICE FOR DISTRIBUTED INFRASTRUCTURE - Disclosed are various embodiments for an inventory application. Machine instances execute a monitoring service to determine the process names of applications executed in the machine instance. An inventory application identifies the applications executed on the machine instances as a function of data obtained from the monitoring services. Analytics reports can be generated from data embodying the identified applications. | 09-18-2014 |
20140280873 | INFERRING APPLICATION INVENTORY - Disclosed are various embodiments for an application inventory application. Computing resource usage data and configuration data is obtained for machine instances executed in a cloud computing architecture. The usage data and configuration data are used as factors to identify applications executed in the machine instance. Reports embodying the application identifications are generated. | 09-18-2014 |
20140280874 | METHODS AND APPARATUS TO MONITOR MEDIA PRESENTATIONS - Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes collecting demographic information from a user. The demographic information is transmitted to a central facility. A panelist identifier identifying the user is generated. The panelist identifier is stored in a shared memory of the media device, the panelist identifier to be retrieved by a monitoring enabled application, the monitoring enabled application to collect monitoring information if the panelist identifier is in the shared memory and to disable collection of the media monitoring information if the panelist identifier is not in the shared memory. | 09-18-2014 |
20140280875 | SYSTEM AND METHOD FOR NETWORK ELEMENT MANAGEMENT - A system and method for network element management includes a management window, a scroll buffer configured to store commands and responses, a console pane displayed in the management window and displaying a portion of the scroll buffer, and data structures. The system connects to a network element associated with network objects using a network, accept commands in the console pane, parse the commands, send the commands to the network element, receive and parse responses from the network element, update the data structures based on the commands and responses, create hot spots in the scroll buffer based on the commands and responses, spawn a GUI dialog based on a first network object associated with a first hot spot when the first hot spot is activated, and provide copies of first data structures selected from the data structures to the GUI dialog. The first data structures are associated with the first network object. | 09-18-2014 |
20140280876 | Custom Content Insertion For User Groups - Methods and systems for providing content to communication session participants are disclosed. In exemplary methods, at least one source can be monitored. Content relevant to a communication session having one or more participants can be identified from the at least one source. Additionally, the content can be provided as a part of the communication session in a format compatible with the communication session. | 09-18-2014 |
20140280877 | Providing Actionable Content to a Computing Device Based on User Actions - Methods and apparatus related to identifying content accessed on a computing device that is likely actionable on another computing device. Some implementations are directed to methods and apparatus for identifying a computing device of a user, identifying content accessed on another computing device by the user, determining content that is actionable on the computing device, determining a confidence level that the actionable content is of interest to the user, and providing the actionable content for use on the computing device if the confidence level satisfies a threshold. The confidence level may be based on an indication of time passage between the user accessing the content on the other computing device and the identified use of the computing device. | 09-18-2014 |
20140280878 | APPARATUS AND METHODS FOR MANAGING SERVICE DELIVERY TELEMETRY - Apparatus and methods for managing service delivery quality levels and telemetry. In one embodiment, an entity (such as a Session Resource Manager or SRM) receives network layout data from the network. The SRM uses the layout data to generate a mapping of the network. The SRM also receives performance data related to the interconnections of the network. The performance data is then applied to the mapping such that, in one variant, an visual overlay showing network flow and/or performance analytics is created. Based on this mapping showing layout and corresponding performance, the SRM generates rules for delivery of services. The rules may detail preferred routes and service level information. The rules are the distributed to nodes along the delivery route and delivery is executed in compliance with the rules. | 09-18-2014 |
20140280879 | Detecting User Interest in Presented Media Items by Observing Volume Change Events - In accordance with some implementations, a method for estimating user interest in media content is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a volume change event from a client system. The server system determines identification of a presented media content item currently being presented at the client system. The server system analyzes the received volume change event to determine a level of user interest in the determined media content item. | 09-18-2014 |
20140280880 | Fast OLAP for Real User Measurement of Website Performance - A method for real-time capture and analysis of website performance metrics includes receiving, in each of a plurality of result servers, data values transmitted from a plurality of client devices, each data value representing a measurement of a performance metric associated with an experience of a user on a web page or using a web application, the measurement being made and the data value produced being transmitted in real-time while the user is on the web page or using the web application. For each data value received, a count in one of a set of N data buckets defined in a memory is incremented. All of the counts in each of the corresponding data buckets is aggregated to produce a histogram of the performance metric is rendered on an analytic dashboard. | 09-18-2014 |
20140280881 | USING LATENCY AND ROUTE INFORMATION TO ESTIMATE LOCATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining geographical locations of devices. One of the methods includes obtaining a first network address of a first device; obtaining first route information associated with at least one data transmission between the first source network address and a first network address; obtaining a second network address associated with a second device; obtaining second route information associated with at least one data transmission between a second source network address and the second network address; obtaining an estimate for geographical location of the second device; determining a first latency distance between the first network address and the second network address based on the first and second route information; and estimating a geographical location of the first device based on the estimate for geographical location of the second device and the first latency distance. | 09-18-2014 |
20140280882 | SYNCHRONIZATION AND ROUTING OF COMPONENTS AND DATA - A change associated with a component or entry in a data store is identified. A subscription registry is polled to determine which of a plurality of entities have subscriptions associated with the identified change. Using connection information, a synchronization operation at each of the determined entities is initiated to reflect the identified change. The change may include one or more of: a change to a server connected to a network, a change to a medical device connected to a network, a change to a software component residing on one or more medical devices, and/or a change to a data store subscribed to by at least one of one or more servers and one or more medical devices. The plurality of entities may include one or more of an infusion pump, a vital signs monitor, and a ventilator. Related apparatus, systems, techniques, articles, and computer readable media are also described. | 09-18-2014 |
20140280883 | Secure URL update for HTTP redirects - A technique to update URLs is provided in an HTTP-based client upon receipt of an HTTP redirect in response to a request-URI. One or more references to the request-URI are saved in or in association with the client. Upon receipt of an HTTP 301 (permanent) redirect, the client automatically re-links the one or more stored references to the request-URI to one or more new references returned by the server (as identified in the HTTP redirect) when the redirect can be verified to originate from the application to which the client is attempting to connect. Preferably, the automatic re-linking is accomplished using a link editing capability for permanent (e.g., HTTP 301) redirects. | 09-18-2014 |
20140280884 | NETWORK TRAFFIC MAPPING AND PERFORMANCE ANALYSIS - An overlay network analysis method obtains data including but not limited to client packet traffic data on an overlay network, and performs one or more analyses based on the obtained data to generate and output topological and/or performance information for the overlay network and/or the network substrate on which the overlay network is implemented. Client traffic data collected for specific client resource instances may be analyzed to generate performance metrics for the overlay network between the instances. Aggregated client traffic data for specific clients may also be analyzed to generate mappings of the clients' private network implementations on the overlay network, as well as performance metrics for the clients' private networks on the overlay network. In addition, client traffic data from multiple clients may be aggregated and analyzed to generate mappings and performance metrics for the overlay network as a whole. | 09-18-2014 |
20140280885 | FLOW CONTROL TRANSMISSION - An example of flow control transmission can comprise receiving a transmission instruction at a transmitter. Data can be sent from the transmitter at a rate of transmission based on the transmission instruction. A rate of transmission can be monitored over a time interval to determine a difference between a minimum rate of transmission and the monitored rate of transmission over the time interval. The transmission instruction can be overridden and data released to maintain the minimum rate of transmission based on the monitored difference. | 09-18-2014 |
20140280886 | CONSOLIDATED PERFORMANCE METRIC ANALYSIS - Performance metrics may be received from multiple data processing elements associated with a performance metric domain and a consolidated performance metric may be determined. Grouping the performance metrics into performance metric groups may be performed based on their respective associations with different aspects of the data processing elements. | 09-18-2014 |
20140280887 | A DEVICE AND RELATED METHOD FOR DYNAMIC TRAFFIC MIRRORING POLICY - A function is provided in a network system for policy-based dynamic mirroring for network traffic. The function monitors events, topology and status of the network and installs, enables, selects or changes traffic mirrors associated with the operation of one or more devices of the network. The mirror policies are established based on network polices and/or rules. The mirror policies and the enablement, installation, selection or changing of them are based on multiple criteria. The function provides for the selection of traffic to mirror, how much of it to mirror, where to mirror it and when to stop the mirroring. The function may be established in network entry devices as well as core switching devices of the network. The function can select portals for the mirroring activity and can secure the mirroring. | 09-18-2014 |
20140280888 | Methods, Apparatus and Articles of Manufacture to Monitor Media Devices - Methods, apparatus, systems and articles of manufacture to monitor media devices are disclosed. An example method includes causing a removable storage device to store an identifier associated with a panelist, the removable storage device having a part to be removably coupled to a data port of a media device; providing the removable storage device to the panelist; and providing an application to be executed by the media device with a first instruction to, in response to the application detecting an event associated with the application, retrieve the identifier from the data port of the media device executing the application. | 09-18-2014 |
20140280889 | SYSTEM AND RELATED METHOD FOR NETWORK MONITORING AND CONTROL BASED ON APPLICATIONS - A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control. | 09-18-2014 |
20140280890 | METHOD AND SYSTEM FOR MEASURING USER ENGAGEMENT USING SCROLL DWELL TIME - Method, system, and programs for measuring user engagement. In one example, a type of user activities with respect to a plurality pieces of content is detected. Information associated with the type of user activities is recorded. A time measure associated with at least one of the plurality pieces of content is obtained based on the recorded information. A user engagement score with respect to the at least one piece of content is calculated based on the time measure. | 09-18-2014 |
20140280891 | DETERMINING AUDIENCE REACH FOR INTERNET MEDIA - A disclosed example involves accessing an initial average unique web browser reach corresponding to a first duration, an initial average internet media impressions-per-user frequency corresponding to the first duration, an initial average unique web browser reach corresponding to a second duration, and an initial average internet media impressions-per-user frequency corresponding to the second duration. A probability model is used to determine an adjusted internet media audience reach corresponding to the first duration based on the initial average unique web browser reach corresponding to the first duration, the initial average internet media impressions-per-user frequency corresponding to the first duration, the initial average unique web browser reach corresponding to the second duration, and the initial average impressions-per-user frequency corresponding to the second duration. The adjusted internet media audience reach corresponding to the first duration has less audience duplication than the initial average unique web browser reach corresponding to the first duration. | 09-18-2014 |
20140280892 | Methods and Computer Program Products for Transaction Analysis of Network Traffic in a Network Device - Provided are methods and computer program products for analyzing and tracing the contents of network traffic in a network device and to help identify network performance issues. Methods for analyzing traffic include identifying thread identifiers associated with transactions, determining related events, and associating similar transactions and events into an aggregated list of transactions. Methods of tracing transactions include identifying thread identifiers associated with transactions and related events and serializing events into a serialized list of events to facilitate tracing single transactions. | 09-18-2014 |
20140280893 | SUPPORTING PROGRAMMABILITY FOR ARBITRARY EVENTS IN A SOFTWARE DEFINED NETWORKING ENVIRONMNET - Techniques are disclosed for using arbitrary criteria to define events occurring within a network infrastructure, as well and techniques for detecting and responding to the occurrence of such custom events. Doing so allows a collection of networking elements (switches, routers, etc.) to perform a variety of distributed functions from within the network itself to respond to custom events. Further, because custom events are published across the network, multiple network elements can communicate and respond to the same event. Thus, unlike currently available event management systems, custom events (and responding applications) can be used to create and coordinate software defined networking within a common network infrastructure. | 09-18-2014 |
20140280894 | Methods and Computer Program Products for Transaction Relationships Between Application Servers - Provided are methods and computer program products for analyzing transactions across a network and to help identify network performance issues. Methods for analyzing traffic include identifying an outbound transaction and a related transaction type, and identifying candidate inbound transactions that have the same transaction type as the transaction type of the outbound transaction. One or more transaction data parameters may be selected that correspond to the outbound or inbound transactions. Candidate transactions may be determined to be related to the outbound transaction based on one or more transaction data parameters. | 09-18-2014 |
20140280895 | EVALUATING A STREAM-BASED COMPUTING APPLICATION - A method for evaluating a stream-based computing application includes specifying a simulation condition. In addition, a stream of test tuples may be input to the stream-based computing application. The stream-based computing application may operate on one or more compute nodes. Each compute node may have one or more computer processors and a memory to store one or more processing elements. The method may also include simulating processing of the stream of test tuples by the processing elements using the simulation condition. Further, the method may include monitoring to determine one or more performance metrics for an inter-stream operator communication path. | 09-18-2014 |
20140280896 | METHODS AND APPARATUS TO CREDIT USAGE OF MOBILE DEVICES - Methods, apparatus, systems and articles of manufacture to monitor mobile internet usage are disclosed. An example method includes identifying a first application associated with a first request, determining that the first application is operating in a background mode, and crediting the first application as a background application based on determining that the first application is operating in the background mode. | 09-18-2014 |
20140280897 | SESSION-BASED SERVER TRANSACTION STORM CONTROLS - A transaction storm detection engine is configured to receive a series of transactions in a data stream for an authenticated network session. The detection engine determines whether the transactions form a transaction storm. In response to determining that the transactions are a transaction storm, metrics associated with the transaction storm are presented. One or more actions may be specified to be applied in a subsequently detected transaction storm. | 09-18-2014 |
20140280898 | ALLOCATING COMPUTING RESOURCES BASED UPON GEOGRAPHIC MOVEMENT - Embodiments described herein use APIs on network devices in a SDN enabled network to monitor the network traffic flowing through the network devices and determine an identity of the client initiating the network traffic. Specifically, the APIs provide a user application with user credentials, IP addresses, MAC addresses, and other identifying information mined from the network flows. Once the identity is found, the application may identify the client's current geographic location. The network devices may continue to monitor the network devices to identify any movement events associated with the client. In response to a movement event, the application may reallocate resources proximate to the new geographic location of the client. | 09-18-2014 |
20140280899 | METHODS AND APPARATUS FOR SCORING THE CONDITION OF NODES IN A COMMUNICATION NETWORK AND TAKING ACTION BASED ON NODE HEALTH SCORES - Methods and apparatus for monitoring a network and generating overall health scores for communications nodes in the network are described. A monitoring system receives information from a variety of system elements and/or devices which provide information relating to communications service. The information received by the network monitoring system includes information indicating the number of outstanding work orders issued in regard to a trouble report, signal power level variance information, signal alarm information, uncorrectable error information, correctable error information, offline device information, etc. A set of scores for a node are generated based on the different types of received information. The scores are combined using a weighted sum to generate an overall node health score. Nodes are ranked based on overall node health scores and maintenance personal can view the scores as well as the underlying information corresponding to a node to facilitate identification of possible faults. | 09-18-2014 |
20140280900 | REPRESENTING SOFTWARE DEFINED NETWORKS USING A PROGRAMMABLE GRAPH MODEL - System, method, and computer program product to represent a network using a programmable graph model, by generating a directed graph to represent a topology of the network, wherein each of a plurality of network elements in the network are represented, in the directed graph, by one of the plurality of nodes, identifying, through the directed graph, a subset of network elements, of the plurality of network elements, upon which to apply a requested operation, and applying the requested operation to the subset of network elements in a distributed manner through the directed graph. | 09-18-2014 |
20140280901 | AUTOMATICALLY DIAGNOSING AND RESOLVING WIRELESS NETWORK CONNECTIVITY ISSUES IN ELECTRONIC DEVICES - The disclosed embodiments relate to approaches for diagnosing and resolving wireless network connectivity issues on an electronic device. The system includes a tool for automatically diagnosing and resolving wireless network connectivity issues on the electronic device. The tool may monitor and manage the wireless network connection on the electronic device. If a lack of wireless network connectivity is detected on the electronic device, the tool may run a series of test cases associated with wireless network connectivity issues on the electronic device. The tool may then notify the user of the results of the test cases, provide recommendations associated with the results to the user, and/or log data associated with the test cases. | 09-18-2014 |
20140280902 | IP Allocation Pools - Systems, methods, and computer program products involve identifying a first IP block having a first set of IP addresses and a second IP block having a second set of IP addresses, the first set of IP addresses different from the second set of IP addresses. A first expected number of IP reassignments for the first IP block can be determined. A first number of IP reassignments between the first IP block and the second IP block can be identified. The first number of IP reassignments can be compared against the first expected number of IP reassignments. The first IP block and the second IP block can be merged into an IP allocation pool based, at least in part, on the comparison. | 09-18-2014 |
20140280903 | EVALUATION OF PATHS THROUGH GRAPH-BASED DATA REPRESENTATION - Embodiments of the invention generally provide a method, a computing system, and a computer-readable medium configured to respond to requests for payload data and provide unique cache keys for caching the payload data. The computer-implemented method includes accepting a first request for translation that specifies a first path configured to identify first payload data associated with a graph object. The computer-implemented method further includes determining that the graph object includes a first translation node associated with a first portion of the first path. The computer-implemented method also includes obtaining, from the graph object, a second path that is associated with the first translation node. The computer-implemented method further includes replacing the first portion of the first path with the second path to generate a first translated path. The computer-implemented method also includes obtaining, from the graph object, the first payload data, based on the first translated path. | 09-18-2014 |
20140280904 | SESSION INITIATION PROTOCOL TESTING CONTROL - A system and method for performing session initiation protocol testing. A trigger is received to initiate a test between an initiating measurement agent and a target measurement agent. A determination is made whether the initiating measurement agent is configured to perform the test. A determination is made whether the target measurement agent is configured to perform the test. The testing is performed between the initiating measurement agent and the target measurement agent in response to determining the initiating measurement agent and the target measurement agent are configured to perform the test. | 09-18-2014 |
20140280905 | SYSTEM AND METHOD FOR SERVICE PROVISION IN A MULTI-TENANT ENVIRONMENT - Provided is a service provision in a multi-tenant environment which includes determining, by an outsourcing service augmentation platform, that an event has occurred within a tenant instance. Authorization credentials needed to access the tenant instance are provided to the platform. Further steps can include identifying a type of the event and processing the event. The processing includes determining that data corresponding to the event is needed from the tenant instance, requesting the data from an application programming interface (API) corresponding to the tenant instance, receiving the data from the tenant instance, and executing actions within the platform based on the data, the type of event, and a configuration of services defined for the tenant instance. | 09-18-2014 |
20140280906 | DYNAMICALLY OPTIMIZING CONTENT DELIVERY USING MANIFEST CHUNKING - Implementations described and claimed herein provide a system and methods for dynamic re-localization and manifest chunking in a content delivery network. In one implementation, one or more stimuli corresponding to a connection to deliver content from a content source over a network to a user device along a network path are detected. The one or more stimuli indicate a connection issue. An optimized network path through which to deliver the content to the user device is determined based on current network conditions. The optimized network path responds to the connection issue. The user device is dynamically rerouted to the optimized path while providing a substantially continuous delivery of content to the user device. | 09-18-2014 |
20140280907 | AUTOMATED PASSIVE DISCOVERY OF APPLICATIONS - Embodiments are directed to monitoring communication over a network using a network monitoring device (NMD) to discover devices, roles, applications, and application dependencies present on the monitored networks. A NMD may monitor network packets that may be flowing on monitored networks. Using OSI L2-to-L3 data the NMD may determine the devices that may be on the monitored networks. Also, the NMD may determine the network protocols that may be in use on the monitored networks. Further, the NMD may reassemble monitored network packets into transactions based on knowledge regarding the network protocols are in use on the monitored networks. The NMD may perform various tests to determine the applications that may be running on the discovered devices. Some of the tests used by the NMD may examine OSI L4-L7 data that may be included in the transactions. | 09-18-2014 |
20140280908 | DE-DUPLICATING OF PACKETS IN FLOWS AT LAYER 3 - Embodiments are directed towards receiving packets communicated over at least one network, determining layer 3 header information for the received packets, normalizing the determined layer 3 header information for each received packet, employing a determined value based on the normalized layer 3 header information to detect each received packet that is a duplicate, disregarding duplicate packets, and enabling monitoring and analysis of at least selected flows that include packets that are determined to be non-duplicated. Also, if the determined layer 3 header information indicates that the received packet is fragmented, that packet is de-fragmented at least in accordance with a fragment offset. Additionally, normalization may include at least one of masking at least one value in the layer 3 header information, or rolling back changes in the layer 3 header information. | 09-18-2014 |
20140280909 | MULTI-DOMAIN SITUATIONAL AWARENESS FOR INFRASTRUCTURE MONITORING - Apparatus and methods are disclosed for a monitoring system that integrates multi-domain data from weather, power, cyber, and/or social media sources to greatly increase situation awareness and drive more accurate assessments of reliability, sustainability, and efficiency in infrastructure environments, such as power grids. In one example of the disclosed technology, a method includes receiving real-time data from two or more different domains relevant to an infrastructure system, aggregating the real-time data into a unified representation relevant to the infrastructure system, and providing the unified representation to one or more customizable graphical user interfaces. | 09-18-2014 |
20140280910 | HIERARCHICAL RULE-BASED ROUTING SYSTEM - The local network connection system (LNCS) is configured to balance the subscriber network traffic. Load balancing of subscriber traffic can be accomplished by logically assigning each subscriber to one of the available Internet Service Provider (ISP) links. The assignment of subscribers can be based on a rule set that determines which ISP to assign to a subscriber. The rule set can be used to balance the load on the network interfaces, the ISPs, and provide failover options for the LNCS. The system can perform network interface monitoring operations in order to determine if one or more of the network interfaces have ISP connections and are available to transport network traffic over a network, such as the Internet. | 09-18-2014 |
20140280911 | Firewall for a Virtual Network and Related Techniques - A system for filtering traffic in virtual networks includes a first virtual machine executed by a first physical server connected to a physical network and a second virtual machine executed by a second physical server connected to the physical network. The first and second virtual machines are connected to a same virtual network. A first firewall module is executed by the first physical server and a second firewall module is executed by the second physical server. The firewall modules are configured to filter network traffic received by the physical servers and addressed to the virtual servers. | 09-18-2014 |
20140280912 | SYSTEM AND METHOD FOR DETERMINATION AND VISUALIZATION OF CLOUD PROCESSES AND NETWORK RELATIONSHIPS - A network monitoring system is provided that includes a process identification module, for instance DTrace, identifying internal service operations including processes, code paths, sockets, communications, connection establishments and/or storage operations. The network monitoring system also includes a visualization renderer of the socket-to-socket network elements providing a zoomable and filterable representation of a cloud operation. | 09-18-2014 |
20140280913 | DEVICE AND SETTINGS MANAGEMENT PLATFORM - A purposed-device management platform monitors a network of mobile devices dedicated to a single purpose. The single purpose may be to function as a point-of-sale terminal at a retail shop or a plurality of retail shops. Other networks may be directed to other purposes, such as customer service, digital signage security, resource management, testing and an educational function. Each device is monitored by the management platform, which may include a variety of functions and applications to accomplish the goals of the single purpose. Monitoring functions may include device and application performance statistics and may alert the platform or the local user when a malfunction occurs. Geolocation monitoring may determine whether the device has been moved in an unauthorized manner. The platform may cause the device to cease functioning, lock up, or revert to factory/default settings when the device is moved or when another restriction is violated. | 09-18-2014 |
20140280914 | SYSTEM AND METHOD FOR CREATING, DEPLOYING, AND ADMINISTERING DISTINCT VIRTUAL COMPUTER NETWORKS - Embodiments of the invention relate to a centralized managing system and method for creating, deploying, administering, and managing a plurality of separate and distinct virtual computer networks on a virtualization platform for offering cloud computing services (SaaS). Embodiments of the invention relate to a computer system for a centralized management of separate and distinct virtual computer networks, which has a security grid which has at least one grid processor and a memory device that stores a managing application. The managing application has a virtualization platform, a grid access layer, a virtual computer network template system, a plurality of resource distribution tools and a plurality of monitoring and metering tools. The grid processor is adapted by the managing application so that it can create, deploy, administer, and manage the plurality of separate and distinct computer networks. | 09-18-2014 |
20140280915 | SYSTEMS, METHODS AND APPARATUS FOR MONITORING ONLINE ACTIVITY AND STORING AND DISPLAYING INFORMATION CONCERNING THE ONLINE ACTIVITY - Online activity conducted via a user device is monitored. Usage information is recorded based on access by the user device to a first website via a network. Interaction information relating to an interaction that occurs via a social networking website different from the first website is recorded, based on access by the user device to the social networking website via the network. A summary of the online activity is generated based on the usage information and the interaction information. The summary is displayed on a display of the user device. | 09-18-2014 |
20140280916 | RECONCILING INTERNET DNS ZONE FILE CHANGES WITH ORIGIN CHANGE REQUESTS - Techniques for monitoring zone file changes are presented. The techniques may include obtaining at least one zone change request and parsing the at least one zone change request to obtain at least one change request unit. The techniques may include obtaining a last published zone file, obtaining a new zone file, and comparing the last published zone file to the new zone file to obtain at least one difference object. The techniques may include matching the at least one difference object to the at least one change request unit to identify at least one unmatched difference object. The techniques may include providing a human readable report comprising an indication of the at least one unmatched difference object. | 09-18-2014 |
20140280917 | DEEP PATH ANALYSIS OF APPLICATION DELIVERY OVER A NETWORK - Techniques for deep path analysis of application delivery over a network are disclosed. In some embodiments, deep path analysis of application delivery over a network includes monitoring a network path between an agent and a destination; determining the network path between the agent and the destination; and generating a graphical visualization of the network path. | 09-18-2014 |
20140280918 | IMPLEMENTING CLOUD SERVICE RESOURCE ANALYTICS FUNCTIONALITY - A non-transitory computer-readable storage medium has tangibly embodied thereon and accessible therefrom instructions interpretable by at least one data processing device. The instructions are configured for causing the at least one data processing device to perform a method of enabling a user to determine cloud service resource requirements of a modeled cloud service solution, deploy an actual cloud service solution having cloud service resources defined by the cloud service resource requirements of the modeled cloud service solution, and, after deploying the actual cloud service solution, access information characterizing utilization of the cloud service resources of the actual cloud service solution with respect to available capacity thereof. | 09-18-2014 |
20140280919 | REDIRECTION SERVICE RESOURCE LOCATOR MECHANISM - A system can include circuitry that processes a URL for information; circuitry that transmits at least a portion of the information via a network interface; circuitry that receives metadata via the network interface responsive to the transmission of at least a portion of the information; circuitry that associates at least a portion of the metadata with a short URL; and circuitry that transmits the short URL. Various other apparatuses, systems, methods, etc., are also disclosed. | 09-18-2014 |
20140280920 | METHOD AND SYSTEM FOR REMOTELY MONITORING DEVICE STATUS AND INTERNET CONNECTIVITY ON A COMPUTER NETWORK - A method and system are disclosed for remotely monitoring devices and Internet connectivity on a computer network. The method uses and the system includes at least two units, i.e., a monitoring station, which is a client device local to the network being monitored, and a centralized server which receives status updates and configuration requests from the monitoring station. | 09-18-2014 |
20140280921 | DEVICE AND METHOD FOR DETECTING AND VISUALIZING NETWORK HEALTH - Device and method for detecting and visualizing a wireless network health and/or health of network devices connected to the wireless network. The wireless network health is detected based on one or more link quality indication (LQI) to indicate the strength of the communication link between the network devices. The wireless network health is displayed in a visualization on a computer display in real time or near real time so that the quality of the wireless network communication and health of the network devices can be quickly and easily understood by a user. | 09-18-2014 |
20140280922 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR REMOTELY DETERMINING THE CONFIGURATION OF A MULTI-MEDIA CONTENT USER - A method for remotely determining the configuration of a computer of a multimedia content user includes sending player detection code the user's computer and receiving configuration information regarding the user's computer. A method of determining a connection speed of a computer includes determining a size of a timing block based on an estimated bandwidth and retrieving the timing block. The connection speed is determined based on the timing block size and the times at which transfer begins and ends. | 09-18-2014 |
20140280923 | SYSTEMS FOR AND METHODS OF USER DEMOGRAPHIC REPORTING USABLE FOR IDENTIFYING USERS AND COLLECTING USAGE DATA - Several ways of identifying users and collecting demographic information and market information are disclosed, including branding a browser with a unique identification in each user request, identifying a user by his key strokes or mouse clicks, gathering demographic information using multiple data sets and by monitoring network traffic. Additionally, user requested content is distinguished from other, non-user content, and the performance of a server can be monitor and analyzed from a client a client perspective. Further, an Internet user's Internet data is routed to a known domain on the Internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's data requests to the domain, and database servers, which filter and build a database of the user's Internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures. | 09-18-2014 |
20140280924 | Method for Parsing Network Message and Communication Device - A method for parsing a network message and a communication device are provided. The method includes: receiving a network message, where the network message includes one or more sections; identifying that an application protocol type of the network message is a first application protocol; acquiring, from a current section that is in the network message and that is described by a piece of section description information in a configuration file corresponding to the first application protocol, interesting data indicated by interesting data indication information in the section description information; and executing a decision method in the section description information by using all or a part of the acquired interesting data as a decision condition, thereby obtaining a corresponding decision result, when the current section is a last section of the network message, the decision result includes a processing method of a next message of the network message. | 09-18-2014 |
20140280925 | Method And System For Client-Side Scaling Of Web Server Farm Architectures In A Cloud Data Center - A novel web server farm architecture is provided that combines various cloud components and innovatively maximizes their strengths to achieve a scalable, adaptable, load balanced computing architecture. In one embodiment, this architecture includes a storage host for static content hosting, a cluster of virtual machines (operating as web servers) for dynamic content hosting, and a dedicated application engine for monitoring the load of the virtual machines. A browser or end-application user of a web application is first routed to a static anchor page hosted on the storage host. The browser is subsequently presented with a list of virtual machines and data corresponding to their respective current loads. To access dynamic content, the browser is able to select from the virtual machines based in large part on the reported current loads of the virtual machines. Once a virtual machine is selected, the browser may communicate directly with the selected web server. | 09-18-2014 |
20140280926 | System and Method for Improved Processing Performance - The invention is directed to a computer-implemented method and system for improving processing performance for a group of computing resources, the method implemented on at least one computer having a processor and accessing at least one data storage area. The method comprises implementing the processor for calculating a benchmark for each computing resource in the group of computing resources and normalizing the benchmark across the group of computing resources to determine a number of performance units for each computing resource. The method additionally includes providing a graphical user interface for facilitating visual comparison for comparing processing performance indicators for multiple computing resources in the group of computing resources and reconfiguring at least some of the computing resources represented on the graphical user interface based on the comparison. | 09-18-2014 |
20140280927 | Metering Software Infrastructure In A Cloud Computing Environment - A system and method include determining, by a processing device, a first duration of usage of a hardware resource on which a virtual machine is instantiated in a cloud, determining, by the processing device from the virtual machine on the cloud, a second duration of usage of a software resource that is utilized by a user on the virtual machine, the software resource comprising at least part of an operating system, and calculating, by the processing device, a usage of the cloud by the user in view of the first duration and the second duration. | 09-18-2014 |
20140280928 | IN-VEHICLE SERVICES THROUGH ATTENDANT DEVICES, USER-PROVIDED DEVICES, AND/OR AN IN-VEHICLE COMPUTER SYSTEM - An approach to facilitating in-vehicle services through attendant devices, user-provided devices, and/or an in-vehicle computer system is provided. In one implementation, one or more communication sessions with the in-vehicle computer system may be facilitated by an attendant device. Passenger information relating to one or more passengers of a vehicle and service information relating to one or more services to be provided to the one or more passengers may be obtained by the attendant device from the in-vehicle computer system via the one or more communication sessions. The passenger information and the service information may be provided by the attendant device. An indication that at least one service is in progress or is complete is received by the attendant device. | 09-18-2014 |
20140280929 | MULTI-TIER MESSAGE CORRELATION - A system and method determines correlations within multi-tier communications based on repeated iterations/episodes of executions of a target application. Content-based correlations are determined by encoding the content using a finite alphabet, then searching for similar sequences among the multiple traces. By encoding the content to a finite alphabet, common pattern matching techniques may be used, including, for example, DNA alignment algorithms. To facilitate alignment of the traces, structural and/or semantic breakpoints are defined, and the encoding in each trace is synchronized to these breakpoints. To facilitate efficient processing, a hierarchy of causality among tier-pairs is identified, and messages at lower levels are ranked and temporally filtered, based on activity intervals at higher levels of the hierarchy. | 09-18-2014 |
20140289389 | Systems And Methods For Analysis of Content Items - A content analyzer retrieves content items from one or more content sources. The content items have a corresponding date and time assigned representing when the content item was published. The content analyzer is further configured to determine a frequency count for each of a plurality of terms within the plurality of content items for a specified time period. In some embodiments, the content analyzer identifies a change in the frequency count for each of the plurality of terms relative to a respective baseline frequency count for the respective one of the plurality of terms. In some embodiments, a report representing the change in the frequency count for each of the plurality of terms is generated. | 09-25-2014 |
20140289390 | SYSTEMS AND METHODS FOR SCALABLE NETWORK MONITORING - A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The metadata may be refined on the network security device. The refined metadata may be provided for display on a terminal. The refined metadata may include a subset of the larger connection metadata, which may reduce the overhead required to display and/or transmit monitoring information to the terminal device. The refined metadata may comprise connection groups, which may be formed based on aggregation criteria, such as connection source, destination, application, security policy, protocol, port, and/or the like. The connection groups may be ranked in accordance with ranking criteria. | 09-25-2014 |
20140289391 | FRAMEWORK FOR FACILITATING IMPLEMENTATION OF MULTI-TENANT SAAS ARCHITECTURE - A framework for implementing multitenant architecture is provided. The framework comprises a framework services module which is configured to provide framework services that facilitate abstraction of Software-as-a-Service (SaaS) services and crosscutting services for a Greenfield application and a non SaaS based web application. Further the abstraction results in a SaaS based multitenant web application. The framework further comprises a runtime module configured to automatically integrate and consume the framework services and APIs to facilitate monitoring and controlling of features associated with the SaaS based multitenant web application. The framework further comprises a metadata services module configured to provide a plurality of metadata services to facilitate abstraction of storage structure of metadata associated with the framework and act as APIs for managing the metadata. The framework further comprises a role based administration module that facilitates management of the metadata through a tenant administrator and a product administrator. | 09-25-2014 |
20140289392 | INSTANCE MONITOR - Methods to facilitate monitoring the execution of a first instance and a second instance, such as multiple instantiations of a program, are generally described. The methods may include generating a first instance and a second instance, appending first monitoring instructions to the first instance to produce a first modified instance and appending second monitoring instructions to the second instance to produce a second modified instance. The first and second monitoring instructions may relate to monitoring an execution of the first instance and the second instance. The processor may further send the first modified instance to a first computing device and send the second modified instance to a second computing device different from the first computing device. The computing devices may provide different computational functionality and/or may split a load in processing the program. | 09-25-2014 |
20140289393 | NETWORK APPARATUS AND CONNECTION DETECTING METHOD THEREOF - A network apparatus and a connection detecting method thereof are disclosed. The network apparatus receives a network connection request which determines a wireless network connection between a USB network controller and a wireless network access point. The network apparatus determines a network connection frequency band of the wireless network connection according to the network connection request, and switches a data transmission mode of the USB network controller from a first USB operation mode to a second USB operation mode after determining that an operation frequency of the first USB operation mode conflicts with the network connection frequency band. | 09-25-2014 |
20140289394 | METHOD OF AND SYSTEM FOR COLLECTING NETWORK DATA - The invention discloses a method of collecting network data. This method is applicable to collection of data of network documents, published on a website, related respectively to M subjects, wherein M is a positive integer, the method including: configuring webpage link addresses, of network data to be collected, into queues of corresponding types according to types corresponding to the webpage link addresses of the network data to be collected, wherein the webpage link addresses of the network data to be collected are link addresses of webpages where the data of the network documents related respectively to the M subjects are located; obtaining webpage source codes corresponding to the webpage link addresses, of the network data to be collected, in the queues of the corresponding types; and extracting the data of the network documents corresponding to URLs corresponding to the webpage source codes according to the URL information and collection depth values of the URLs. | 09-25-2014 |
20140289395 | NETWORK COMMENT COLLECTION METHOD AND SYSTEM - Disclosed are a network comment collection method and system. The method comprises: obtaining a web page entry link address; determining whether a web page corresponding to the web page entry link address has N network comments, N being a positive integer; when there are N network comments, determining whether M network comments among the N network comments satisfy a collection condition, M being a positive integer less than or equal to N; when there are M network comments satisfying the collection condition, collecting the M network comments. | 09-25-2014 |
20140289396 | Detecting Device Presence for a Layer 3 Connection Using Layer 2 Discovery Information - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 09-25-2014 |
20140289397 | TRANSMISSION DEVICE, CONTROL CARD, AND TRANSMISSION METHOD - A transmission device includes: a calculation unit to detect abnormal traffic based on a traffic volume collected for the route and to calculate a traffic increase/decrease time and a traffic increase/decrease volume of the abnormal traffic; a normal prediction graph generation unit to generate a normal prediction graph based on the traffic volume in normal time in which the abnormal traffic is not detected; a prediction graph generation unit to generate an abnormal prediction graph based on the traffic increase/decrease time and the traffic increase/decrease volume of the abnormal traffic in detection of the abnormal traffic; an order determination unit to determine a line order that is a priority order of line allocation for the route based on the normal prediction graph or the abnormal prediction graph; and an optimization unit to determine lines that are to be allocated to the route based on the line order. | 09-25-2014 |
20140289398 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND FAILURE PROCESSING METHOD - An information processing system including a plurality of information processing apparatuses, wherein each of the information processing apparatuses includes an abnormality detection unit that detects the occurrence of abnormality, a log information collection unit that collects log information of the information processing apparatus from which the abnormality is detected, an abnormal apparatus information creation unit that creates abnormal apparatus information indicating the information processing apparatus from which the abnormality is detected, prior to the collection of the log information by the log information collection unit, and an abnormal apparatus information notifying unit that notifies the abnormal apparatus information created by the abnormal apparatus information creation unit to each of the plurality of information processing apparatuses, prior to the collection of the log information by the log information collection unit. | 09-25-2014 |
20140289399 | APPARATUS AND METHOD OF DETECTING MIGRATION COMPLETION OF VIRTUAL MACHINE - A computer detects, by a physical machine serving as a migration destination of a virtual machine of a migration target, a signal transmitted from the virtual machine of the migration target in response to a migration completion of the virtual machine of the migration target to the physical machine according to a setting by a management machine; and notifies the management machine of the migration completion of the virtual machine of the migration target in response to the detection. | 09-25-2014 |
20140289400 | MONITORING SYSTEM, MONITORING APPARATUS, MONITORING-TARGET APPARATUS, MONITORING METHOD AND COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN MONITORING PROGRAM - A monitoring system includes a monitoring apparatus and a monitoring-target apparatus connected therewith via a network. The monitoring apparatus includes an inquirer that inquires as to whether or not the monitoring-target apparatus is capable of obtaining a status thereof. The monitoring-target apparatus includes a responder that transmits, when the monitoring-target apparatus is in a first status in which the status is obtainable, a response to the inquiry. The monitoring apparatus further includes a receiver that receives the response to the inquiry, and a requester that requests, when the receiver receives the response, the monitoring-target apparatus transmitted the received response to obtain the status of the monitoring-target apparatus. The monitoring-target apparatus further includes a communication controller that does not respond to the inquiry and the monitoring-target apparatus is in a second status in which the status is not obtainable, and that maintains the local monitoring-target apparatus in the second status. | 09-25-2014 |
20140289401 | SYSTEMS AND METHODS FOR EXTRACTING MEDIA FROM NETWORK TRAFFIC HAVING UNKNOWN PROTOCOLS - Methods and systems for analyzing network traffic. An analysis system receives network traffic, which complies with a certain protocol. The received network traffic carries a data item, which may be of value to an analyst. In order to access the data item in question, the analysis system automatically identifies the media type of the data item, by processing the network traffic irrespective of the protocol. The analysis system identifies the media type irrespective of the protocol in order to avoid the computational complexity involved in decoding the protocol. | 09-25-2014 |
20140289402 | COMPUTING RESOURCE INVENTORY SYSTEM - Systems and methods of managing computing resources of a computing system are described. A computing resource list and computing resource information may be stored at a data store. The computing resource list may identify a set of computing resources of a computing system, and the computing resource information may respectively describe the computing resources. The computing resource list may be updated in response to a new computing resource being added to the computing system or in response to an existing computing resource being removed from the computing system. Evaluation tasks for the computing resources may be performed, and a resource evaluation report may be generated during performance of at least one of the evaluation reports. | 09-25-2014 |
20140289403 | Method and Apparatus for Learning Online State of Terminal - A method and an apparatus for learning an online state of a terminal are provided. In the embodiments of the present invention, when an online state of a terminal needs to be reported to a network side, the terminal sends a first message to a core network management entity, where the first message includes first indication information, so that the core network management entity sends the first indication information to a proxy server, and thereby the proxy server learns an online state of an application on the terminal, so as to avoid that an online state, of the application on the terminal, saved in the proxy server is incorrect. | 09-25-2014 |
20140289404 | CONFIGURATION MANAGEMENT METHOD OF LOGICAL TOPOLOGY IN VIRTUAL NETWORK AND MANAGEMENT SERVER - (1) A configuration management in a management server is carried out such that setting patterns regarding creation of plural types of virtual resources and setting patterns regarding connection between the plural types of virtual resources are extracted from setting information of network devices configuring a virtual network by using plural types of virtualization technologies, (2) an ID required for creating a virtual resource and a connection relation between virtual resources are extracted from the extracted setting pattern, (3) an element corresponding to a virtual resource or a connection between a pair of virtual resources is created by using information including the extracted ID, and (4) the elements created from setting information of individual devices are aggregated to thereby create logical topology information representing a topology of the virtual network. | 09-25-2014 |
20140289405 | AUTONOMOUS PERFORMANCE PROBING - A method, device, and computer-readable medium are disclosed for automatically activating a probe configured to generate test network traffic in response to evaluating a policy that accounts for aggregated information that describes traffic that was processed by a network device. The method includes storing a policy, and evaluating the policy based at least in part on an item of received aggregated information that describes a set of packets that were processed by the network device and sent or received on a network. The probe is activated at least partially in response to evaluating the policy. The probe generates test packets to emulate one or more applications, services, or devices communicating on the network. | 09-25-2014 |
20140289406 | SYSTEM AND METHOD FOR DETECTING ACTIVE STREAMS USING A HEARTBEAT AND SECURE STOP MECHANISM - One embodiment of the present invention sets forth a technique for identifying active streaming connections associated with a particular user account. Each active streaming connection transmits heartbeat packets periodically to a server that tracks the receipt of the heartbeat packets. If, for a particular streaming connection, the server stops receiving heartbeat packets, then the server is able to infer that the streaming connection has been terminated. | 09-25-2014 |
20140297831 | CONTINUOUS IMPROVEMENT OF GLOBAL SERVICE DELIVERY AUGMENTED WITH SOCIAL NETWORK ANALYSIS - Improving global service delivery by augmenting with social network analysis, may comprise identifying social network metrics and key performance indicator metrics; collecting data associated with the social network metrics and the key performance indicator metrics, from on-going work performed in the global service delivery and a social network of practitioners; transforming the data into measurable metric data; determining whether a deviation exists in the measurable metric data; and generating an actionable recommendation in response to determining that the deviation exists. | 10-02-2014 |
20140297832 | METHOD AND APPARATUS FOR BUNDLING MULTIPLE LOGGER EVENTS - A system, method, apparatus and mechanisms for detecting traps triggered by Label Switch Path (LSP) interface events, determining the corresponding event characteristics, associating the detected traps with a bitmap marker indicative of their respective event characteristics, and bundling together bitmaps having common markers to provide thereby respective bundles of common logger events adapted for bulk transmission to a management system. | 10-02-2014 |
20140297833 | Systems And Methods For Self-Adaptive Distributed Systems - Systems and methods for run-time monitoring, tuning and optimization of distributed systems are provided. In various aspects, a system or method may include measuring run-time values for one or more performance metrics of the distributed system, such as, for example, task-latencies, process-throughputs, and the degree of utilization of various physical resources of the system. The system or method may further include comparing the measured run-time values with one or more target values assigned to the performance metrics, and, based on the comparison, adjusting one or more tunable run-time control variables of the distributed system, such as the number of the tasks, processes, and nodes executing in the distributed system. | 10-02-2014 |
20140297834 | MANAGEMENT OF A PLURALITY OF SYSTEM CONTROL NETWORKS - A multiple storage control network management system includes a plurality of controllers, each coupled to a respective system control network to provide a respective controller environment. A controller manager is coupled to each of the plurality of controllers. The controller manager is operable to monitor the respective controller environment provided by each of the plurality of controllers. The controller manager is also operable to move personas between respective controller environments. The controller manager is also operable to start and stop personas across a plurality of the respective controller environments. The controller manager is also operable to receive a first change object from a first controller of the plurality of controllers, compare the first change object to a previously received change object from the first controller, determine the changes between object elements in the first change object and the previously received change object, and store the determined changes. | 10-02-2014 |
20140297835 | VISUALIZATION OF RESOURCES IN A DATA CENTER - A system and method are disclosed for monitoring usage of resources (e.g., hosts, instances, applications, etc.) in a datacenter. Customers, developers and system administrators can collect and track metrics, gain insight, and react to keep applications and businesses running smoothly by providing system-wide visibility into resource utilization, application performance, and operational health. Users can programmatically retrieve monitoring data and view heat maps to assist in troubleshooting, spotting trends, and taking automated action based on the state of a cloud environment. Users can further monitor resources in real-time, so that metrics such as CPU utilization, latency, memory usage, transaction volumes, error rates, etc. can be visualized. | 10-02-2014 |
20140297836 | TRACKING USAGE METRICS FOR A MOBILE APPLICATION - The disclosed embodiments relate to a system for obtaining usage metrics for a mobile application that operates on a mobile computing device. During operation, the system outputs page-specific tracking information when the mobile application loads a page containing user interface elements for the application, wherein loading the page causes the page to be presented to a user of the mobile device. This system also outputs action-specific tracking information when the user performs an action that causes the mobile application to load a page. In some embodiments, outputting the tracking information involves sending the tracking information from the mobile device to a server associated with the mobile application. This enables the server to aggregate the tracking information received from the mobile device along with tracking information received from other mobile devices. | 10-02-2014 |
20140297837 | CONTINUOUS IMPROVEMENT OF GLOBAL SERVICE DELIVERY AUGMENTED WITH SOCIAL NETWORK ANALYSIS - Improving global service delivery by augmenting with social network analysis, may comprise identifying social network metrics and key performance indicator metrics; collecting data associated with the social network metrics and the key performance indicator metrics, from on-going work performed in the global service delivery and a social network of practitioners; transforming the data into measurable metric data; determining whether a deviation exists in the measurable metric data; and generating an actionable recommendation in response to determining that the deviation exists. | 10-02-2014 |
20140297838 | PROVIDING MOBILE DEVICE MANAGEMENT FUNCTIONALITIES - Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information. | 10-02-2014 |
20140297839 | PROVIDING MOBILE DEVICE MANAGEMENT FUNCTIONALITIES - Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information. | 10-02-2014 |
20140297840 | PROVIDING MOBILE DEVICE MANAGEMENT FUNCTIONALITIES - Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information. | 10-02-2014 |
20140297841 | MONITORING SOLUTIONS FOR A COMPUTING-BASED INFRASTRUCTURE - Systems and methods for generating and implementing monitoring solutions for a computing-based infrastructure are described. In one implementation, at least one monitoring objective is obtained, wherein the monitoring objectives are based on service related requirements associated with one or more computing systems within the computing-based infrastructure. Once the monitoring objectives are obtained, a plurality of monitoring elements are received, wherein the monitoring elements include attributes associated with the one or more systems. Based on the monitoring objectives and the monitoring elements, a monitoring solution is generated. | 10-02-2014 |
20140297842 | SYSTEM, METHOD, AND RECORDING MEDIUM - A system that compares first information corresponding to an amount of a first type of resource used when a first virtual machine is executed in an idle state with second information corresponding to an amount of the first type of resource used when a second virtual machine is executed, and determines whether the second virtual machine is in the idle state based on the comparison. | 10-02-2014 |
20140297843 | APPARATUS AND METHOD FOR MANAGING PRESENCE INFORMATION - An apparatus provides presence information indicating a state of users for devices associated with the users. The apparatus collects, from the devices, pieces of first information indicating which of a plurality of networks is accessible from each of the devices, and identifies combination of a plurality of pieces of the first information collected from a plurality of devices associated with a user by using second information indicating correspondence between the user and the plurality of devices. The apparatus generates presence information including information indicating a location of the user, based on the combination. | 10-02-2014 |
20140297844 | Application Traffic Prioritization - Techniques for implementing application traffic prioritization in a network device are provided. In one embodiment, the network device can determine a packet buffer threshold for a received data packet. The network device can further compare the packet buffer threshold with a current usage of a packet buffer memory that stores data for data packets to be forwarded to a processing core of the network device. If the current usage of the packet buffer memory exceeds the packet buffer threshold, the network device can perform an action on the received data packet. | 10-02-2014 |
20140297845 | INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN CONTROL PROGRAM FOR INFORMATION PROCESSING DEVICE, AND CONTROL METHOD OF INFORMATION PROCESSING SYSTEM - An information processing system includes a plurality of information processing apparatuses connected to each other, and communication is performed between the plurality of information processing apparatuses. Each of the plurality of information processing apparatuses includes a processor. The processor included in one of the plurality of information processing devices serving as a first information processing device receives, from each of second information processing devices other than the first information processing device, state information regarding each state of the plurality of information processing devices determined by the second information processing devices, determines each state of the plurality of information processing devices, based on the state information received from each of the second information processing devices, and transmits state information for transmission regarding the determined state of each of the plurality of information processing devices to each of the second information processing devices. | 10-02-2014 |
20140297846 | System And Method For Combining Server Side and Network Side Transaction Tracing And Measurement Data At The Granularity Level Of Individual Transactions - A performance monitoring and management system is provided for monitoring both server side and network side performance parameters of individual distributed transactions. The system uses correlation data which is transferred over a computer network to identify corresponding sender/receiver parts of a distributed transaction. Both server side tracing data and correlation data is transferred to an external correlation and monitoring server that creates per transaction end-to-end tracing data. Network probes are installed in the network infrastructures which monitor network conditions, like e.g. data transferred. Those network probes are configured in a way to identify and extract the correlation data used by the monitoring system and to tag created network measurements with this correlation data. Those tagged network measurements are then used to augment the per transaction end-to-end tracing data with corresponding network measurements. | 10-02-2014 |
20140297847 | System and Method for Tracking Application Resource Usage - A system and method for tracking application resource usage. Network performance information of a communications network is gathered using performance information packet data packets. The network performance information is communicated to an application. Instructions in the application are executed in response to receiving the network performance information. | 10-02-2014 |
20140297848 | ENSURING THE QUALITY OF A SERVICE IN A DISTRIBUTED COMPUTING ENVIRONMENT - A method and system for determining a service provider to perform a service. An indication of willingness by each service provider of at least two service providers to perform the service in conformity with at least two quality of service requirements is received. Both an indication of previous performance of the service by each service provider and statistical data indicative of an extent to which the previous performance of the service by each service provider matches each quality of service requirement are received. A preferred service provider of the at least two service providers is ascertained, by analyzing the statistical data and concluding that the performance of the service by the preferred service provider is a closer match to the at least two quality of service requirements than is a match of the performance of the service by each other service provider to the at least two service requirements. | 10-02-2014 |
20140297849 | System and Method for Service Assurance in IP Networks - A system and method for providing service assurance in a data network is provided. Resource control points are positioned throughout a data network, such as an IP data network. The resource control points obtain network topology information and correlates that information with information associated with a particular service session. The resource control points utilize the correlated information to generate quality service records and to provide status information regarding the network topology and particular sessions. The resource control points may further retrieve link and utilization information to control sessions during periods of congestion. | 10-02-2014 |
20140297850 | SYSTEM AND METHOD FOR INFERRING TRAFFIC LEGITIMACY THROUGH SELECTIVE IMPAIRMENT - Described is a system and method for determining a classification of an application that includes initiating a stress test on the application, the stress test including a predetermined number of stress events, wherein the stress events are based on a network impairment. A response by the application to each stress event is identified and the application is classified as a function of the response into one of a first classification and a second classification, the first classification indicative of a normal application and the second classification indicative of an undesired application. If, the application is in the second classification, a network response procedure is executed. | 10-02-2014 |
20140297851 | MANAGING PERFORMANCE WITHIN AN ENTERPRISE OBJECT STORE FILE SYSTEM - A file system is disclosed that includes an application wide name space instantiated in a global index (Gindex) that is used for accessing objects related to an application. Summary workload statistics are monitored and calculated via a calibrated hierarchical service level agreement (SLA) in a method of operation that includes: establishing a tenant wide name space used for accessing objects of an application stored in physical file systems across one or more appliances, each defining a storage cluster, in association with a tenant logically spanning across the appliances; and monitoring a performance statistic for the application across the tenant. | 10-02-2014 |
20140297852 | INFORMATION PROCESSING APPARATUS AND METHOD THEREFOR - A first memory unit stores requester event information pieces each including time information indicating an occurrence time of an event associated with a process executed by a first server. A second memory unit stores request-destination event information pieces each including time information indicating an occurrence time of an event associated with a process executed by a second server in response to a request from the first server. A determining unit determines, for each request-destination event information piece, a correction allowable range of the time information by comparing the time information of the request-destination event information pieces with that of the requester event information pieces. A generating unit generates an information set by extracting, from the request-destination event information pieces arranged in chronological order according to the time information, chronologically consecutive request-destination event information pieces whose correction allowable ranges include a common value. | 10-02-2014 |
20140297853 | Intelligent Discovery Of Network Information From Multiple Information Gathering Agents - A system, method and computer program product for intelligent discovery of network information from multiple information gathering agents adapted to discover information concerning the network. The discovery agents each have an associated discovery capability. Based on consideration of the agent discovery capabilities, discovery assignments are computed and network discovery is performed according to the assignments so as to reduce discovery poll overhead. | 10-02-2014 |
20140297854 | METHOD AND APPARATUS FOR ADAPTIVE NETWORK HEARTBEAT MESSAGE FOR TCP CHANNEL - A method and apparatus for a client to continue to receive updates from a server when a channel has been disconnected before the expiration of a heartbeat timer is disclosed. The method includes sending a heartbeat message from the client to the server wherein the heartbeat message is sent at the expiration of a timer having a first time interval that is less than the first timeout duration period of the server. The method includes detecting that the channel is disconnected before the expiration of the first time interval and then determining a second timeout duration period from detecting the channel is disconnected. After determining the second time out duration, the method includes resetting the first time interval to a second time interval for the sending of the heartbeat message wherein the second time interval being less than the second timeout duration period. | 10-02-2014 |
20140297855 | Determining Rack Position of Device - A device has a chassis to mount at a respective rack position of a multi-position rack. The device has data handling components fixed to the chassis. The data-handling components include a reader to read a rack-position identity of the rack position from the rack when the chassis is mounted in the rack at the rack position. The data-handling components store device-identity data. The data-handling components are configured to transmit over a network an association relating the rack-position identity to the device-identity data. | 10-02-2014 |
20140297856 | DIAGNOSIS FOR GOOSE COMMUNICATION - Diagnosis for GOOSE communication is provided. The embodiments of the present invention provide a method, an apparatus, a system and a computer program product of diagnosis for logic of a distributed application implemented based on Generic Object Oriented Substation Event (GOOSE). The method comprises: creating at least one logic diagnosis module based on a data model for the distributed application; obtaining GOOSE signal information; and executing the at least one logic diagnosis module based on the GOOSE signal information. According to the embodiments of the present invention, a feasible way is provided for diagnosing and/or analyzing the logic of GOOSE-based application online or offline. | 10-02-2014 |
20140297857 | TRAFFIC MANAGEMENT DEVICE, SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - A traffic management device according to an exemplary embodiment includes an arrival rate computation unit that computes a traffic volume of upload content be uploaded to each service and converts the traffic volume into an arrival rate in a queue, a processing amount computation unit that collects information on an upload traffic volume which can be processed by each service and converts the upload traffic volume into a processing amount in the queue, a queue management unit that computes a queuing time of the upload content to be uploaded on the basis of both conversation results, and a scheduling computation unit that compares the computed queuing time with a predetermined threshold value and, if the queuing time exceeds the threshold value, regulates the traffic volume of allowable inflow upload content such that the queuing time of the upload content becomes less than the threshold value. | 10-02-2014 |
20140297858 | METHODS FOR MONITORING QUANTITIES OF COMPUTER DEVICES, ASSOCIATED COMPUTER PROGRAM AND DEVICE - A method for monitoring a quantity of a computer device, including measuring values adopted by the quantity over time,—determining a measured value, or extremum value, meeting at least one transmission criterion, in which the extremum value is a local extremum, and—transmitting the extremum value. | 10-02-2014 |
20140304389 | Identifying Selected Dynamic Content Regions - Selected regions in dynamic content may be identified. Analytics data may be received that may include a region identifier corresponding to a region from which a selectable element was selected from the content. It may be determined that the analytics data corresponds to a current region of a current version of the network content. Analytics data, which may include a region identifier, may be generated in response to a selection of a selectable element of content located within a region of network content. | 10-09-2014 |
20140304390 | Predictive Analysis of Network Analytics - Methods and apparatus for ascertaining trends in network activity data are disclosed. A plurality of trend indicators is calculated for a plurality of values of a metric associated with network activity for a network content provider. The trend indicators include one or more moving averages of the plurality of values of the metric, and one or more standard deviation values of the plurality of values of the metric. A time-series graphical overlay representation of the plurality of values of the metric and the plurality of trend indicators demonstrating a relationship between the metric values and the trend indicators is displayed. | 10-09-2014 |
20140304391 | GEOGRAPHIC SEGMENTATION SYSTEMS AND METHODS - Methods and systems for segmenting traffic based on geography include assigning coordinate location data received with respect to members of a plurality of computing devices to analytics data associated with a plurality of requests for content received from respective ones of the plurality of computing devices. A geographical location of interest is defined. The defining the geographical location of interest includes designating a plurality of points defining boundaries of the geographical location of interest. Respective ones of a plurality of traffic segments are assigned to the plurality of requests for content based in part upon a comparison of the geographical location of interest to coordinate location data assigned to respective ones of the plurality of requests for content. Network traffic metrics are generated for ones of the plurality of traffic segments. The request traffic metrics describe request behavior associated with particular segments of the plurality of traffic segments. | 10-09-2014 |
20140304392 | PREDICTING THE PERFORMANCE OF A MULTI-STAGE COMMUNICATIONS NETWORK UNDER LOAD FROM MULTIPLE COMMUNICATING SERVERS - A capability is provided for predicting the performance of a communications network, such as a multi-stage communications network. The predicted performance includes, in one aspect, predicting the amount of bandwidth that a server of the communications network could deliver with a full load on the network. In one aspect, the predictive capability includes determining an aggregate load for each server of the network being analyzed; performing normalization on the loads of the links used by the servers to obtain updated link and/or server bandwidths; and determining for each server, a minimum bandwidth over the links in the server's route. | 10-09-2014 |
20140304393 | SYSTEMS AND METHODS FOR EXPORTING APPLICATION DETAILS USING APPFLOW - The present disclosure is directed towards systems and methods for lightweight identification of flow information by application. A flow monitor executed by a processor of a device may maintain a counter. The flow monitor may associate an application with the value of the counter and transmit, to a data collector executed by a second device, the counter value and a name of the application. The flow monitor may monitor a data flow associated with the application to generate a data record. The flow monitor may transmit the data record to the data collector, the data record including an identification of the application consisting of the counter value and not including the name of the application. The data collector may then re-associate the data record with the application name based on the previously received counter value. | 10-09-2014 |
20140304394 | TIMEOUT FOR IDENTIFYING NETWORK DEVICE PRESENCE - Systems and techniques relating to identifying the presence of a network device are described. A described technique includes receiving, from the cache engine, a traffic flow and a series of notification signals, each indicating a presence of the cache engine, calculating a timeout value based on at least a time difference of two consecutive notification signals of the series of notification signals, updating, based on the calculated timeout value, a predetermined timeout period to an updated timeout period, and determining an absence of the cache engine when the updated timeout period that immediately succeeds the receiving of the series of notification signals elapsed without receiving an additional notification signal from the cache engine. | 10-09-2014 |
20140304395 | Cognitive Data Delivery Optimizing System - Network performance data is gathered and analyzed to produce network patterns and data delivery strategies. Client devices and other network components report network performance data to a central management system. Data delivery strategies are applied to a portion of a network to deliver content appropriate for network patterns that are associated with the portion of the network. | 10-09-2014 |
20140304396 | IT SYSTEM INFRASTRUCTURE PREDICTION BASED ON EPIDEMIOLOGIC ALGORITHM - A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. The computer-implemented method further comprises computing at least one server computing system of each of a class I server computing system, a class S server computing system, and a class R server computing system of the plurality of the server computing systems based on a deployment rate, an undeployment rate, and a removing rate of the each of the class I server computing system, the class S server computing system, and the class R server computing system. | 10-09-2014 |
20140304397 | INTERNET CONNECTED HOUSEHOLD IDENTIFICATION FOR ONLINE MEASUREMENT & DYNAMIC CONTENT DELIVERY - A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol (IP) address is received at an Internet entity. Determinations are made regarding whether device activity from the IP address does not exceed a defined activity threshold and whether an IP assignment age for the IP address is greater than a defined threshold age. Based on the determinations, the IP address can be identified as belonging to an ICH or not. | 10-09-2014 |
20140304398 | Orchestration Service for a Distributed Computing System - In one embodiment, a method provides a first orchestration service instance for managing a set of containers operating on a controller node where the controller node controls a set of physical nodes. The method also provides a set of second orchestration service instances for managing a set of first services operating in the set of containers where a second orchestration service instance in a container manages a respective first service in the container. The set of physical nodes include a set of third orchestration service instances for managing a set of second services operating on the set of physical nodes. The first orchestration instance, the set of second orchestration service instances, and the set of third orchestration service instances communicate through a shared communication service that maintains a global state of the controller node, the set of containers, and the set of physical nodes. | 10-09-2014 |
20140304399 | SYSTEMS AND METHODS FOR PROVIDING MONITORING IN A CLUSTER SYSTEM - The present application is directed towards systems and methods for providing monitoring in a cluster system. The systems and methods distribute the monitors for a service and the ownership of a service across a cluster system comprising a plurality of nodes. The nodes in the cluster can be configured to have different sets of virtual servers (sometimes referred to as “vservers”) and services. The ownership and monitoring of the services can be distributed among all the nodes in the cluster. The system can identify a service in a cluster system and identify a master node that has ownership of the service. The master node can transmit a service status update to other nodes in the cluster system. | 10-09-2014 |
20140304400 | SYSTEM AND METHOD FOR GENERIC CONFIGURATION MANAGEMENT SYSTEM APPLICATION PROGRAMMING INTERFACE - The technology disclosed can query configuration management system data and includes cross table selection criteria and joined data return. | 10-09-2014 |
20140304401 | SYSTEMS AND METHODS TO COLLECT LOGS FROM MULTIPLE NODES IN A CLUSTER OF LOAD BALANCERS - The systems and methods of the present solution are directed to collecting log information from multiple nodes in a multi-nodal cluster. Generally, a logging process runs to collect log information from multiple nodes in a multi-nodal cluster, e.g., a cluster of appliances. The logging process collects the log information and merges the collected log information to create a coherent unified log. The logging process may run on a node designated for the purpose. The designated node may be internal or external to the cluster. The logging process determines a topology for the cluster, establishes a communication channel with each active intermediary device identified in the topology, collects log entries from each active intermediary device, each log entry comprising information on network traffic traversing the respective intermediary device, and merges the collected log entries into a unified cluster log comprising information on network traffic traversing the cluster. | 10-09-2014 |
20140304402 | SYSTEMS AND METHODS FOR CLUSTER STATISTICS AGGREGATION - For multiple multi-core nodes in a cluster, the filtered statistics clients contacts the aggregator on a master node of the cluster, referred to as the cluster configuration owner (“CCO”) or cluster coordinator and expects the stats aggregated from all the cluster nodes. The aggregator on the CCO nodes relay the client request to packet engines on the CCO node and to an aggregator on each of the other nodes in the cluster. Then the CCO node aggregator gets responses from other cores on the node and responses from all other cluster node aggregators. The CCO node aggregator aggregates the responses and sends back the aggregated response to the clients. Communication between nodes is via a static authenticated communication channel. | 10-09-2014 |
20140304403 | VALIDATION OF A COMMUNICATION NETWORK OF AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM - A unit is disclosed for validating a communication network of an industrial automation and control system. The validation unit can include a planner module configured to store plan data defining a designed communication network of an industrial automation and control system, and a collector module configured to collect effective data defining a deployed communication network of the industrial automation and control system. A difference detector can detect differences between the designed communication network and the deployed communication network using the plan data and the effective data such that faults or errors in a deployed communication network of the industrial automation and control system can be efficiently detected. | 10-09-2014 |
20140304404 | SCALING A VIRTUAL MACHINE INSTANCE - Techniques are described for scaling of computing resources. A scaling service is utilized that allocates additional computing resources (e.g., processors, memory, etc.) to a virtual machine instance (or other compute instance) and/or de-allocates computing resources from a virtual machine instance according requests and/or thresholds. In addition to the foregoing, other aspects are described in the description, figures, and claims. | 10-09-2014 |
20140304405 | SELECTABLE MODE BASED SOCIAL NETWORKING INTERACTION SYSTEMS AND METHODS - An exemplary method includes at least one computing device maintaining data representative of a user profile associated with a first user of a first mobile device, detecting that the first mobile device and a second mobile device associated with a second user are located in a geographic vicinity, determining, in response to the detecting that the first mobile device and the second mobile are located in the geographic vicinity, that the second user matches at least one criterion defined within the user profile associated with the first user, and automatically storing, in response to the determining, contact information corresponding to the second user. | 10-09-2014 |
20140304406 | OPTIMIZING CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a CDN service provider for alternatively hosting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative CDN service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of CDN service providers with respect to specific resource requests are also provided. | 10-09-2014 |
20140304407 | Visualizing Ephemeral Traffic - An example system may include one or more processors and one or more collectors executable by the one or more processors to receive a plurality of data streams that include operational data for a plurality of application nodes. The plurality of data streams may be captured and provided by a plurality of meters deployed on at least one cloud computing platform to respectively meter the plurality application nodes. The system may further include an analyzer executable by the one or more processors to process the plurality of data streams to determine frequencies of ports used to exchange data between the plurality of application nodes. The analyzer may further be configured to determine the ports to be server ports or client ports based on the frequencies of the ports used to exchange the data. | 10-09-2014 |
20140304408 | METHOD, APPARATUS, AND SYSTEM FOR OPTIMIZING PERFORMANCE OF A COMMUNICATION UNIT BY A REMOTE SERVER - Described herein are apparatus, system, and method for optimizing performance of one or more communication units by a remote server. The method comprises: collecting data from the one or more communication units; generating a policy, for each of the one or more communication units, based on the collected data; and sending the policy to each of the one or more communication units, wherein the policy comprises conditions for operation of the one or more communication units, wherein the one or more communication units implement the policy according to time-varying data. The system comprises: one or more communication units; and a server operable to communicate with the one or more communication units, wherein the server comprises: a memory; and a processor, coupled to the memory, and operable to perform the method discussed above. | 10-09-2014 |
20140310394 | Apparatus and Method for Utilizing Fourier Transforms to Characterize Network Traffic - A non-transitory computer readable storage medium, comprising executable instructions to collect network traffic data, produce a Fourier signature from the network traffic data, associate the Fourier signature with a known pattern, collect new network traffic data, produce a new Fourier signature from the new network traffic data, compare the new Fourier signature with the Fourier signature to selectively identify a match and associate the new network traffic data with the known pattern upon a match. | 10-16-2014 |
20140310395 | User-Influenced Page Loading of Web Content - Methods and systems may provide for identifying a usage pattern for web content having a plurality of components and receiving a web response from a server, wherein the web response includes the web content. Additionally, a client-side override of the load order of the plurality of components may be conducted based on the usage pattern. In one example, a cookie is generated based on the usage pattern, wherein the cookie is used to conduct the client-side override. | 10-16-2014 |
20140310396 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-16-2014 |
20140310397 | NETWORK SYSTEM CAPABLE OF IMPLEMENTING STUN WITH THE ASSISTANCE OF TWO NETWORK DEVICES AND METHOD THEREOF - The present invention is to provide a network system, which comprises a coordinator server located in a public network; first and second NATs (Network Address Translators) located in first and second private networks and configured as a full-cone NAT, respectively; first and second network devices located in the first and second private networks and connected to the public network through the first and second NATs, respectively, wherein each of the first and second network devices has registered two mapped addresses with the coordinator server, respectively; a third NAT located in a third private network; and a third network device located in the third private network and connected to the public network through the third NAT, wherein the third network device can obtain the mapped addresses from the coordinator server and, based on the mapped addresses, conduct NAT behavior tests on the third NAT through the first and second network devices. | 10-16-2014 |
20140310398 | CLASSIFYING CLIENT DEVICES IN A NETWORK - One or more devices may receive attribute information identifying multiple attributes associated with a client device; classify the client device based on the attribute information; and provide, based on classifying the client device, classification information to a network device to cause the network device to associate a particular policy set, of multiple policy sets, with the client device. The classification information may identify a classification of the client device. The particular policy set may be based on the classification of the client device and may include an instruction used to process a data flow provided to or provided from the client device. | 10-16-2014 |
20140310399 | SYSTEMS AND METHODS FOR ACCESSING TELESCOPES - A user obtains, views and stores image data of a selected celestial object from a network of available telescopes using a computer-generated user interface. Based on the selected object, information is accessed regarding each telescope from data sources such as databases and/or live data feeds to automatically select telescopes that are suitable for imaging the object, e.g., according to factors such as telescope type, power and configuration, location, weather conditions, visibility, and altitude. The user may select a particular telescope and imaging time from a schedule of available telescopes and imaging times. At the scheduled time, an image is recorded of the celestial object and communicated to a central data store for access by the user, e.g., via a web site. | 10-16-2014 |
20140310400 | Communication Assets Survey and Mapping Tool - A method for determining communications interoperability comprising the following steps: (a) collecting communication asset data that describes communication equipment used by emergency and first responders from local, state and federal entities in a geographical region; (b) determining the communications interoperability between the entities based on the collected communication asset data, wherein the communications interoperability describes the ability of the communication equipment used by emergency and first responders of a given entity to be interoperable or not interoperable with the communication equipment used by emergency and first responders in the other entities in the geographic region; and (c) displaying the communications asset data and the communications interoperability of the entities in a geo-spatial referenced map to geographically-disparate users via an internet. | 10-16-2014 |
20140310401 | METHOD OF AND SYSTEM FOR MANAGING COMPUTING RESOURCES - According to one example of the present invention there is provided a method of managing a set of computing resources accessible to a client via a network. The method comprises monitoring computing resources of the set of computing resources and managing the computing resources in accordance with a set of computing resource guidelines. The method further comprises generating, based on the steps of monitoring and managing, a computer resource configuration change request, the request identifying a computing resource, identifying, from the identified computing resource, a client associated with the resource, determining whether the requested configuration change request is compatible with a client service level agreement, SLA, associated with the identified client; and, where it is so determined, authorizing the requested configuration change request to be made. | 10-16-2014 |
20140310402 | APPLICATION TRAFFIC PAIRING - Systems, devices, and methods for reporting information in real time about traffic generated by each application for a device are described. In one aspect, the network can configure a list of applications user equipment (UE) devices need to report traffic information for and then when one of these applications starts a communication, the UE may send traffic descriptor(s) describing the traffic generated by the application. In this way the network can accurately identify the traffic and take actions based on UE report and local policy or subscription. | 10-16-2014 |
20140310403 | SYSTEM AND METHOD FOR ENABLING USER DEVICE CONTROL - A system and method for controlling device use is provided. A computing system stores a first state corresponding to a status of one or more functional components of a user device. A user device stores a second state corresponding to the first state and corresponding to the status of the one or more functional components of the user device. An instruction to modify the status of the one or more functional components of the user device is received, and the computing system modifies the first state and the status of the one or more functional components at a network level responsive to the instruction. The user device modifies the second state and the status of the one or more functional components at a device level responsive to the instruction. | 10-16-2014 |
20140310404 | SHARED STATE AMONG MULTIPLE DEVICES - Devices of an individual's device-sphere cooperate with a device-sphere manager to improve continuity of the user's experience using any of the devices. When a device's state changes, the device reports the change to the device-sphere manager. The device-sphere manager modifies the device image for the reporting device and informs other devices of the device-sphere that corresponding changes should be made in the other devices as well. Each device image includes application records representing applications installed in the subject device. The device image for each device also includes partition images of each of one or more partitions of persistent storage of the device. A data image for the device-sphere represents data shared among the constituent devices of the device-sphere. | 10-16-2014 |
20140310405 | TCP PROCESSING FOR DEVICES - A data processing system is provided. A host processing device supports a host transport engine operable to establish a first transport stream over a network with a remote peer. Device hardware comprises a device transport engine. The device transport engine is configured to monitor the first transport stream to determine a state of the first transport stream and in response to an indication from the host processing device perform transport processing of the first transport stream. | 10-16-2014 |
20140310406 | METHOD FOR TRANSFERRING STATE INFORMATION PERTAINING TO A PLURALITY OF SIP CONVERSATIONS - A method for transferring state information pertaining to a plurality of SIP conversations from a first SIP server to a second SIP server, said first SIP server and said second SIP server being operatively connected to one or more SIP gateways, the method comprising at a controlling node: monitoring said first SIP server until ongoing transactions are terminated; after termination of said ongoing transactions, obtaining dialog state information pertaining to conversations managed by said first SIP server from said first SIP server; and storing said obtained dialog state information at said second SIP server. | 10-16-2014 |
20140310407 | TERMINAL DEVICE - The present invention provide a terminal device, including: at least one sensor, a data processing unit, a memory, a CPU, and a storage, where the sensor is configured to sense a corresponding measured object and generate corresponding sensing data; and the data processing unit is configured to collect the sensing data jointly with the CPU in a mutually complementary manner, store the collected sensing data in the memory, perform feature extraction on the sensing data stored in the memory, and store extracted feature data in the storage, where the mutually complementary manner refers to that, when one of the data processing unit and the CPU is in a working state, the other is in a dormant state. The terminal device provided by the embodiments of the present invention can improve a utilization rate of the CPU. | 10-16-2014 |
20140310408 | HANDLING CHANGES IN A DISTRIBUTED NETWORK MANAGEMENT SYSTEM THAT USES A LOGICAL MULTI-DIMENSIONAL LABEL-BASED POLICY MODEL - A change to a state of a particular managed server within an administrative domain is processed. The administrative domain includes a plurality of managed servers that use management instructions to configure management modules so that the configured management modules implement an administrative domain-wide management policy that comprises a set of one or more rules. A first description of the particular managed server is modified to indicate the particular managed server's changed state, thereby specifying a second description of the particular managed server. The unmodified first description is compared to the second description, thereby specifying a description change. A determination is made, based on the description change, regarding whether to update management instructions previously sent to the particular managed server. | 10-16-2014 |
20140310409 | COMPUTER PRODUCT, MONITORING METHOD, AND MONITORING APPARATUS - A non-transitory, computer-readable recording medium stores a monitoring program that causes a computer to execute a process that includes acquiring from a server among a group of servers that are migration candidates for a monitored virtual machine, identification information of a virtual machine operating on the server; identifying classification of the virtual machine that corresponds to the acquired identification information, by referring to a storage unit that correlates and stores identification information of the monitored virtual machine and classification of the monitored virtual machine; and correlating and outputting the identified classification of the virtual machine, the identification information of the virtual machine, and identification information of the server. | 10-16-2014 |
20140310410 | INTER-NODE COMMUNICATION SCHEME FOR NODE STATUS SHARING - A gossiping scheme for sharing node status in a cluster of nodes provides a robust mechanism for determining node status within the cluster. Nodes transmit gossip messages to each other nodes, the gossip messages listing other nodes in the cluster that are operational. When a node does not receive a gossip message from a particular node within a predetermined time period, then the node transmits messages to the other nodes indicating that the particular node is down. However, if another node has received a packet from the particular node within the predetermined time period and receives the node down message, then the other node responds with a node alive message. | 10-16-2014 |
20140310411 | SYSTEM AND METHOD FOR MODELING INTERPENDENCIES IN A NETWORK DATACENTER - The system and method described herein may include a discovery engine that scans a network datacenter to inventory resources in the datacenter and populate a configuration management database with the resource inventory. One or more destination listeners created from the resource inventory may then selectively sample monitored flows in the datacenter to model interdependencies between the inventoried resources. For example, any monitored flows originating outside the datacenter or failing to correlate with the inventoried resources may be dropped, whereby the interdependencies may be modeled from a deliberately reduced sample of the monitored flows that have information relevant to modeling relationships between resources within the datacenter. Furthermore, directionalities for the monitored flows may be determined, wherein the directionalities provide further information relevant to modeling the relationships between the resources within the datacenter. | 10-16-2014 |
20140310412 | MANAGEMENT SERVER FOR REMOTE MONITORING SYSTEM - The management server causes an output section to output a startup date and time, shutdown date and time, minimum, maximum, and average values, and an occurrence count and durations of a predetermined event, for each of the operation time periods from the startup to shutdown in a unit of the remote monitoring terminal device, and causes the output section to output the startup date and time, shutdown date and time, and a movement locus of the mobile work vehicle or vessel based on the location information, for each of the operation time periods from the startup to shutdown in the unit of the remote monitoring terminal device. | 10-16-2014 |
20140310413 | METHOD FOR MANAGING A USER TERMINAL THROUGH A NETWORK ON THE BASIS OF OPERATING SPEED INFORMATION ON THE USER TERMINAL, AND WEB SERVER USED FOR SAME - The present invention relates to a method for managing a user terminal through a network, and to a web server used for same. The present invention is implemented by a web server which: receives from each user terminal speed information including the speed of the hardware installed in the users terminal, the speed of the software installed in the user terminal, or the Internet speed for the user terminal; sets a reference speed value for each user terminal on the basis of the speed information; and determines whether maintenance of the user terminal is necessary on the basis of the received current speed information on the user terminal and the reference speed value. According to the present invention, optimal management is enabled in consideration of the performance properties of each user terminal by remotely managing the user terminal in a state where the reference speed value is individually set according to the performance of a plurality of user terminals. | 10-16-2014 |
20140317263 | IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration. | 10-23-2014 |
20140317264 | SYSTEM AND METHOD FOR DETERMINING WHETHER A COMPUTER DEVICE IS COMPATIBLE WITH A COMPUTER NETWORK - A system and method are provided for allowing an administrator to automatically determine whether networked computer devices are configured to use governance software that allocates resource in, or controls or restricts the access of other network devices, to certain portions of the networked storage based upon IT governance protocols, network efficiency and economics. To do this, a company server having governance software stored thereon polls a range of device addresses (e.g., IP addresses) specified by the network administrator or stored on a DNS server with a message formatted using protocols such as WebDAV, SMB/CIFS, FTP, etc., and specific to the governance software. If the device responds to the message, the address of the device, along with an indicia that the device is compatible with the governance software is stored in memory. | 10-23-2014 |
20140317265 | HARDWARE LEVEL GENERATED INTERRUPTS INDICATING LOAD BALANCING STATUS FOR A NODE IN A VIRTUALIZED COMPUTING ENVIRONMENT - A computing node includes at least one hardware layer comprising a plurality of hardware resources and at least one virtualization layer operative to manage at one virtual machine defined by at least one resource from among the plurality of hardware resources. The computing node includes load balancing interrupt logic configured in the hardware layer of the node. The load balancing interrupt logic is operative to compare at least one resource utilization level of the plurality of hardware resources by the at least one virtual machine with at least one threshold. The load balancing interrupt logic is operative to generate at least one load balancing interrupt indicating at least one load balancing status of the computing node based on the comparison of the at least one resource utilization level with the at least one threshold. | 10-23-2014 |
20140317266 | Identification of Consumers Based on a Unique Device ID - Machines, systems and methods for identification of a consumer are provided. The method comprises capturing a unique identifier (ID) associated with a computing device, wherein the computing device is configured to access content stored on one or more content servers; and associating the unique ID with tracking data associated with the computing device, wherein when the computing device submits a request to a content server to access content, wherein in response to retrieving at least one of the unique ID or the tracking data of the computing device, the computing device is identified and content pages accessed by the computing device are tracked by a machine that is aware of the association between the unique ID and the tracking data for the computing device. | 10-23-2014 |
20140317267 | High-Density Server Management Controller - The described embodiments include a system management controller for managing servers on a plurality of sled devices. The system management controller includes a processing mechanism and a plurality of internal interfaces coupled to the processing mechanism. Each internal interface in the system management controller is coupled to at least one embedded management controller on each of the sled devices, the at least one embedded management controller on each sled device facilitating communications between the processing mechanism in the system management controller and a corresponding server on the sled device. In these embodiments, the processing mechanism in the system management controller is configured to manage one or more operations of the servers on the plurality of sled devices. | 10-23-2014 |
20140317268 | Automatic detection of optimal devices in a wireless personal network - The proposed embodiment provides a method and system for automatically detecting an optimal device over a network. The method includes receiving parameters associated with devices in the network, prioritizing the received parameters based on one or more rule, and detecting an optimized device based on the assigned priorities of the parameters associated with the devices. | 10-23-2014 |
20140317269 | Installation and Enforcement of Dynamic and Static PCC Rules in Tunneling Scenarios - A Policy and Charging Enforcement Function (PCEF) device of a network having a Policy and Charging Rules Function (PCRF) device. The PCEF device includes a processing unit that detects a tunneled packet and the packet's Internet Protocol version type and determines whether activation of PCC rules in accordance with the IP version type of the tunneled packet is required from the PCRF device. The PCEF device includes a network interface unit in communication with the processing unit and the network that requests from the PCRF device required activation of PCC rules and identifies the IP version type of the tunneled packet to the PCRF device with the request and receives from the PCRF device the PCC rules activation. The processing unit enforces the PCC rules on the tunneled packet. Methods of handling and enforcing rules at a PCEF device of a network and at a PCRF device are also disclosed. | 10-23-2014 |
20140317270 | SYSTEMS, METHODS, AND APPARATUS TO IDENTIFY MEDIA DEVICES - Systems, methods, and apparatus to identify media devices are disclosed. An example method includes determining an internet protocol address of a requesting device of a received network communication. A first lookup is performed to identify a media access control address of the requesting device based on the internet protocol address. Data identifying the network communication is stored in association with the media access control address. | 10-23-2014 |
20140317271 | METHOD AND NODE APPARATUS FOR COLLECTING INFORMATION IN CONTENT NETWORK BASED ON INFORMATION-CENTRIC NETWORKING - In a content network over which a plurality of smart nodes is coupled, each smart node receives advertisement messages broadcasted by adjacent smart nodes. The advertisement message may be one of a link state advertisement (LSA) message including link state information indicative of a link that is a network interface, a server state advertisement (SSA) message including server state information indicative of a data storage state and a processing state of a processing unit of the smart node, and a content state advertisement (CSA) message including content state information indicative of content stored in the smart node. Each smart node updates its own database based on the information included in the received advertisement message. | 10-23-2014 |
20140317272 | METHOD OF COLLECTING INFORMATION, CONTENT NETWORK MANAGEMENT SYSTEM, AND NODE APPARATUS USING MANAGEMENT INTERFACE IN CONTENT NETWORK BASED ON INFORMATION-CENTRIC NETWORKING - In a content network over which a plurality of smart nodes is coupled, a content network management system receives information response messages including pieces of management interface base (MIB) information from smart nodes. Next, the content network management system classifies the pieces of MIB information included in the received response messages into server resource information, topology information, and network resource information, and stores and manages the pieces of information. | 10-23-2014 |
20140317273 | DATACENTER BORDER-ISSUED ANALYTICS FOR MONITORING FEDERATED SERVICES - Technologies are generally described for providing datacenter border-issued analytics for monitoring federated services. In some examples, a deployment manager, which manages placement of application deployment instances across a federation and thus already knows which datacenter each instance is in, may register a package trigger with a gateway at each datacenter when an application is placed in each datacenter. The datacenter gateway(s) may then search through data packets for registered package properties such as content of a packet header that indicates it is a monitoring packet, and inject additional data according to instructions from the deployment manager. For example, the deployment manager may instruct the gateway(s) to inject a datacenter identifier or a network location identifier to each monitoring data packet. The additional data may be customer-defined and the modified monitoring data including the additional data may be sent to a monitoring system to be analyzed. | 10-23-2014 |
20140317274 | MONITORING USER ACTIVITY ON A MOBILE DEVICE - Monitoring user activity on a mobile device is described. In one aspect, video content is received and played to a user of the mobile device. The monitoring activity detects an interruption of playback of the video content and determines an event associated with the interruption. The event is stored in the mobile device and communicated to a remote device. | 10-23-2014 |
20140317275 | CONTENT DISPLAY MONITOR - The invention can enable monitoring of the display of content by a computer system. Moreover, the invention can enable monitoring of the displayed content to produce monitoring information from which conclusions may be deduced regarding the observation of the displayed content by an observer. The invention can also enable monitoring of the display at a content display site of content that is provided by a content provider site over a network to the content display site. Additionally, the invention can enable the expeditious provision of updated and/or tailored content over a network from a content provider site to a content display site so that the content provider's current and appropriately tailored content is always displayed at the content display site. Aspects of the invention related to transfer of content over a network are generally applicable to any type of network. However, it is contemplated that the invention can be particularly useful with a computer network, including private computer networks (e.g., America Online™) and public computer networks (e.g., the Internet). In particular, the invention can be advantageously used with computer networks or portions of computer networks over which video and/or audio content are transferred from one network site to another network site for observation, such as the World Wide Web portion of the Internet. | 10-23-2014 |
20140317276 | APPLICATION BASED DATA TRAFFIC ROUTING USING NETWORK TUNNELING - Various implementations described herein relate to routing network data traffic using network tunnels. In some implementations, one or more tunnels are established between a remote gateway device and a central gateway device central gateway system. The remote gateway device can receive data traffic from one or more client devices and analyzed the data traffic. Based at least in part on the resulting analysis, the remote gateway device identified an application or an application type associated with the data traffic. The remote gateway device can select one or more select tunnels, from the one or more tunnels, based at least in part on the identification of the application or the application type associated with the data traffic. Eventually, the remote gateway device can route the data traffic to the central gateway system using the one or more select tunnels. | 10-23-2014 |
20140317277 | NETWORK INFRASTRUCTURE MANAGEMENT - In one embodiment, the present invention is a network infrastructure management system that allows monitoring and controlling network devices while dynamically discovering them on demand during the process. New management protocols can be dynamically added to the system or built on demand without refactoring the existing algorithms. | 10-23-2014 |
20140317278 | Traffic Analysis for HTTP User Agent Based Device Category Mapping - A traffic analysis system monitors data traffic in a communication network. In the data traffic, flows are detected which are based on the Hypertext Transfer Protocol (HTTP). For each of the flows, a data record is created. The data record comprises at least a User Agent identifier from a message header of a HTTP message of the flow and a device identifier of a user equipment transmitting the flow. The data records are analyzed to determine a mapping of at least one User Agent identifier in the data records to a corresponding device category. | 10-23-2014 |
20140317279 | IDENTIFICATION OF THE PATHS TAKEN THROUGH A NETWORK OF INTERCONNECTED DEVICES - The invention relates to a computer implemented method of identifying in a network of interconnected devices a path through the network from a source device to a final destination device, the path comprising a connected sequence of devices, the method comprising at a monitor computer connected to the network: identifying a first device connected to the source device; transmitting a first query to the first device, the query including a destination identifier and requesting identification of an egress port for messages addressed to the destination identified by the destination identifier when the query is received at the first device; receiving a result message identifying the egress port and identifying the second device connected to the first device based on a network topology accessible by the monitor computer; and addressing a next query to the second device and receiving a next result message identifying an egress port from the second device; and identifying from the network topology a third device connected to the second device, wherein the path is identified to include the first, second and third devices. | 10-23-2014 |
20140317280 | User Bandwidth Notification Model - A user bandwidth notification method is disclosed, where the method includes: detecting, by a network side, available bandwidth of a user and a bandwidth requirement of a service currently used by the user; comparing, by the network side, the available bandwidth of the user and the bandwidth requirement of the service currently used by the user; and notifying, by the network side, the user of a bandwidth condition according to a comparison result. By using the present invention, the user can explicitly know that current poor service experience is caused by a mismatch between a user bandwidth condition and a current service bandwidth requirement and may further take an appropriate measure for handling and solving the problem. | 10-23-2014 |
20140317281 | SYSTEM AND METHOD FOR THE APPLICATION OF PSYCHROMETRIC CHARTS TO DATA CENTERS - A system and method of displaying the temperature and relative humidity data of sensors on a psychrometric chart. The system and method operate to display an environmental envelope on the psychrometric chart in order to compare the data of the sensors to the environmental envelope of the psychrometric chart, in order to ensure safe operating conditions for data center equipment. | 10-23-2014 |
20140317282 | TECHNIQUES FOR MEASURING ABOVE-THE-FOLD PAGE RENDERING - Techniques for measuring above-the-fold (ATF) page rendering are provided. Visible objects for an ATF portion of a browser page are identified. A start and end time for each visible object is recorded. Furthermore, a total elapsed time to finish loading each of the visible objects to the ATF portion of a browser is determined. | 10-23-2014 |
20140317283 | FORECASTING CAPACITY AVAILABLE FOR PROCESSING WORKLOADS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for forecasting a capacity available for processing a workload in a networked computing environment (e.g., a cloud computing environment). Specifically, aspects of the present invention provide service availability for cloud subscribers by forecasting the capacity available for running or scheduled applications in a networked computing environment. In one embodiment, capacity data may be collected and analyzed in real-time from a set of cloud service providers and/or peer cloud-based systems. In order to further increase forecast accuracy, historical data and forecast output may be post-processed. Data may be post-processed in a substantially continuous manner so as to assess the accuracy of previous forecasts. By factoring in actual capacity data collected after a forecast, and taking into account applications requirements as well as other factors, substantially continuous calibration of the algorithm can occur so as to improve the accuracy of future forecasts and enable functioning in a self-learning (e.g., heuristic) mode. | 10-23-2014 |
20140317284 | MANAGING DATA USAGE OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to managing data usage of a computing device, in example embodiments, an executable component of a computing device is managed, wherein the executable component is to communicate data with a network interface of the computing device. | 10-23-2014 |
20140317285 | INFORMATION PROCESSING SYSTEM - A system that displays the content of games in accordance with the impact on each of the games resulting from network states including an execution unit that executes at least one application from among multiple applications, a sending unit that sends to a terminal the result of the execution, a communication information acquisition unit that acquires communication information representing the communication states between the sending unit and the terminal, a suitability information storage unit that stores suitability information representing the suitability of executing each of the applications in relation to application identification information identifying each of the applications and to the scope of the communication information, a suitability information acquisition unit that acquires the suitability information based on the acquired communication information, and a display that generates display information for displaying part or all of the content of the multiple applications in accordance with the acquired suitability information. | 10-23-2014 |
20140317286 | MONITORING COMPUTER AND METHOD - To achieve a balance between reduction of a disk capacity required to maintain measurement data and retention of necessary measurement data to analyze events. A monitoring computer stores measurement data about a monitoring target computer at a plurality of points in time in a storage device, specifies an event, which has occurred at the monitoring target computer, and event occurrence time based on the measurement data, and selects part of the measurement data at the plurality of points in time as a deletion target in consideration of the measurement data which should not be deleted, based on a capacity of the storage device or a predetermined retention period of the measurement data, and a deletion exception period calculated from the event occurrence time. | 10-23-2014 |
20140317287 | PROCESSING EVENT DATA STREAMS - A computer ( | 10-23-2014 |
20140317288 | DETERMINATION OF A QUALITY INDUCED TERMINATION RATE OF COMMUNICATION SESSIONS - This invention relates to methods and an apparatus for detecting quality induced terminations of media streams of real-time communication sessions within a packet-switched network. To enable the determination of the quality of live media streams passing by the tapping points in a network, and to use this information to determine media transmissions being aborted due to bad quality the invention evaluates quality data records of a terminated media stream to detect, whether the media stream was terminated due to bad quality or another reason. Advantageously, a threshold number of quality data records that were generated for the media stream just before termination thereof are considered in the evaluation. In case each of this threshold number of quality data records yields a bad quality of the media stream, the termination of the media stream may be judged or assumed to be induced due to bad quality. | 10-23-2014 |
20140325053 | PERFORMING DEVICE COMMUNICATIONS BASED ON RELATIVE POSITIONING - A method, system, and computer program product for initiating actions among devices are described. A relative position of at least one device to at least one other device is determined, and one or more rules specifying at least one action to initiate based at least in part on the relative position of the at least one device to the at least one other device are obtained. The one or more rules can differ based on the relative position of the devices. The at least one action is initiated using a processor of the at least one device. | 10-30-2014 |
20140325054 | Remote Display Performance Measurement Triggered By Application Display Upgrade - Methods, systems, and computer programs are provided for measuring the performance of display images received on a remote computer display. One method includes an operation for detecting calls from an application to an application programming interface (API), which is provided for rendering images on a display image, each call causing an update of the display image. Further, the method includes an operation for embedding data for measuring performance in display frames of the display image based on the detecting. The embedding results in modified displayed frames with respective data for measuring performance. The modified displayed frames are transmitted to a remote client, which results in received modified display frames having respective received data for measuring the performance. In addition, the method includes an operation for calculating the remote display quality for the given application based on the received modified display frames and the respective received data for measuring performance. | 10-30-2014 |
20140325055 | SYSTEM AND METHOD FOR AUTOMATIC SELECTION OF A CONTENT FORMAT - A system and method are provided for automatically selecting one of multiple formats in which to serve a content item. The system collects data regarding content items served and user activity and/or revenue regarding those served items. These data are used to calculate performance values or scores of each format for specified factors such as destination (e.g., a web domain, a URL, a content channel), visibility (e.g., above the fold), a period of time, a vertical or type of content, and so on. When a new content request is received, the format selected for serving in response to the request is chosen based on the competing formats' calculated performances, and a suitable content item is selected. The selected format may be the format likely to generate the most revenue, may be selected by statistical sampling, or may be selected by using the performance values/scores in some other way. | 10-30-2014 |
20140325056 | SCORING QUALITY OF TRAFFIC TO NETWORK SITES - A software and/or hardware facility for scoring the quality of traffic to a site accessible via the Internet or other network. The facility may evaluate traffic based on multiple agent actions in order to detect bogus agent actions. The agent actions may be generic agent actions that are applicable to substantially all network sites. The facility may characterize the quality of an agent's interaction with the network site based on whether one or more of the multiple agent actions occurred during the agent's interaction. The facility may generate non-binary generic and custom scores, classifying traffic as fraudulent if its custom score is substantially higher than its generic score. The facility may characterize the quality of traffic to a network site based on dual algorithms. A first algorithm may be applied to traffic that is statistically significant, while a second algorithm may be applied to traffic that is not statistically significant. | 10-30-2014 |
20140325057 | METHODS AND APPARATUS TO CREATE A PANEL OF MEDIA DEVICE USERS - Methods and apparatus to create a panel of media device users are disclosed. An example method includes identifying a master frame of media devices that have executed an instrumented application. A media device is selected from the master frame. A first instrumented application on the selected media device is instructed to display a recruitment interface to a user associated with the selected media device requesting the user to join the panel. | 10-30-2014 |
20140325058 | PROACTIVE MONITORING TREE WITH SEVERITY STATE SORTING - The disclosed embodiments relate to a system that displays performance data for a computing environment. During operation, the system first determines values for a performance metric for a plurality of entities that comprise the computing environment. Next, the system displays the computing environment as a tree comprising nodes representing the plurality of entities and edges representing parent-child relationships between the plurality of entities. While displaying the tree, the system displays the child nodes for each parent in sorted order based on values of the performance metric associated with the child nodes. | 10-30-2014 |
20140325059 | MONITORING DEVICE, COMPUTING DEVICE, CLIENT MONITORING METHOD, AND HOST MONITORING METHOD - A monitored scene is monitored between an electronic device and a computing device. The electronic device generates monitoring data of the monitored scene and sends the monitoring data of the monitored scene to the computing device. The computing device notifies a user of a selected user ID to check the monitoring data. | 10-30-2014 |
20140325060 | SYSTEM AND METHOD FOR DETECTING ACTIVE STREAMS USING A HEARTBEAT AND SECURE STOP MECHANISM - One embodiment of the present invention sets forth a technique for identifying active streaming connections associated with a particular user account. Each active streaming connection transmits heartbeat packets periodically to a server that tracks the receipt of the heartbeat packets. If, for a particular streaming connection, the server stops receiving heartbeat packets, then the server is able to infer that the streaming connection has been terminated. | 10-30-2014 |
20140325061 | DETECTING RESOURCE CONSUMPTION EVENTS OVER SLIDING INTERVALS IN CLOUD-BASED NETWORK - A processor accesses usage history data, which includes subscription events for a virtual machine, and generates translatable time periods to which the subscription events can be assigned. Each of the translatable time periods is temporally shifted and each of the subscription events is assigned to one or more translatable time periods. The processor generates translation outcomes for a user of the virtual machine for the translatable time periods in view of assigned subscription events. The translation outcomes include an identified change in subscription costs of the user over the translatable time periods. The processor identifies a translated base period from the translatable time periods for which the subscription parameters will be applied to the usage history data in view of applying selection criteria to the translation outcomes and tracks resource usage of the user in view of the identified translated base period to determine an alternate set of subscription costs. | 10-30-2014 |
20140325062 | DATA-DRIVEN PROFILING FOR DISTRIBUTED APPLICATIONS - An exemplary method includes providing an application that includes client-side code and server-side code, instrumenting the client-side code and the server-side code to generate timestamps, distributing the instrumented client-side code and the instrumented server-side code and monitoring timestamps generated during execution of the application. In such a method, where timestamps generated by the client-side code and timestamps generated by the server-side code occur along a common timeline, a developer can monitor performance of the distributed application. Other exemplary methods, systems, etc., are also disclosed. | 10-30-2014 |
20140325063 | MANAGEMENT SERVER FOR REMOTE MONITORING SYSTEM - There is provided a managing server for a remote monitoring system for communication with a remote monitoring terminal device which acquires a startup date and time via a GPS satellite system upon a startup. In response to a reception from the remote monitoring terminal device of an indication that the remote monitoring terminal device failed to acquire date and time information via the GPS satellite system upon a startup of the remote monitoring terminal device, the managing server transmits date and time information generated from a date and time of reception of the indication to the remote monitoring terminal device. | 10-30-2014 |
20140330955 | Monitoring the Health of a Home Area Network - Systems and methods are disclosed for monitoring the health of a home area network. An example system includes multiple devices communicatively coupled via a home area network and a gateway device communicatively coupled to the devices via the home area network. The home area network is configured for communicating information regarding a resource consumed at a geographical area serviced by the home area network. The gateway device includes a processor and a computer-readable medium. The processor can execute instructions embodied in the computer-readable medium to perform operations. The operations include monitoring communication metrics describing communications among the devices via the home area network. The operations also include monitoring application-level events generated by applications executed by the devices. The operations also include generating a status indicator for the home area network based on the communication metrics and the application-level events. The status indicator describes a health of the home area network. | 11-06-2014 |
20140330956 | METHOD AND SYSTEM FOR GENERATING DIRECTED GRAPHS - A method for generating a directed graph for a transaction in an application, comprising: receiving event information for events included in the transaction at a processor, each event having a link directed from a first endpoint to a second endpoint in the application; assigning an identification (“ID”) number to each event and including the ID number in the event information for each event; based on endpoint, correlating the event information to produce dyadic event information representative of dyadic events, each dyadic event including a first event and a second event associated with the endpoint, the dyadic event information for each dyadic event including a first ID number and a second ID number for the first event and the second event, respectively; based on ID number, combining the dyadic event information to produce correlation fragments associated with the ID number; and, combining the correlation fragments to produce the directed graph for the transaction. | 11-06-2014 |
20140330957 | WIDI CLOUD MODE - A method and system is provided for WiDi cloud mode. The method includes sending a command from a computing device to a cloud network. A connection between the cloud network and a remote adapter based on the command may be monitored. A data stream sent from the cloud network to the remote adapter via the connection may be controlled. | 11-06-2014 |
20140330958 | COMPUTING DEVICE PERFORMANCE MONITOR - Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value. | 11-06-2014 |
20140330959 | Method, device and system for monitoring internet- of-things device remotely - The disclosure discloses a method for monitoring an Internet-of-things device remotely. The method includes that: a User Equipment (UE) acquires an Internet Protocol (IP) address of a required Internet-of-things device from a remote router, and acquires device-detail information of the Internet-of-things device corresponding to the IP address according to the acquired IP address; draws a virtual control panel of the Internet-of-things device according to the acquired device-detail information, and maps keys of the virtual control panel and a control logic of the keys of the virtual control panel; and monitors the Internet-of-things device remotely by operating the virtual control panel. The disclosure further discloses a device and system for monitoring an Internet-of-things device remotely. With the disclosure, it is possible to implement visualized, remote, and smart monitoring of an Internet-of-things device, so that operation by a user at a UE is as simple, clear, and easy as operation of a real Internet-of-things device, thereby reducing difficult in operation greatly. | 11-06-2014 |
20140330960 | Systems and Methods for Identifying Applications in Mobile Networks - A method for identifying an application installed in a user device of a communication system is disclosed. Based on user device and network resources utilized by the user device and installation information about applications installed application, an identification of an application can be performed. An advantage with embodiments of this invention is that an application can be identified, without prior information how the application affects user device and network resources. Malicious and noxious applications can thereby be identified. Also, a resource consumption reporting service offered to the subscribers by the operator is enabled. | 11-06-2014 |
20140330961 | COMPREHENSIVE BOTTLENECK DETECTION IN A MULTI-TIER ENTERPRISE STORAGE SYSTEM - Embodiments of the present invention provide approaches (e.g., online methods) to analyze end-to-end performance issues in a multi-tier enterprise storage system (ESS), such as a storage cloud, where data may be distributed across multiple storage components. Specifically, performance and configuration data from different storage components (e.g., nodes) is collected and analyzed to identify nodes that are becoming (or may become) performance bottlenecks. In a typical embodiment, a set of components distributed among a set of tiers of an ESS is identified. For each component, a total capacity and a current load are determined. Based on these values, a utilization of each component is determined. Comparison of the utilization with a predetermined threshold and/or analysis of historical data allows one or more components causing a bottleneck to be identified. | 11-06-2014 |
20140330962 | UNIFIED TRACKING DATA MANAGEMENT - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 11-06-2014 |
20140330963 | METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - Example methods disclosed herein for monitoring web browsing include processing a video image obtained from a video signal of a device implementing a web browser to identify a first image region less than the entire video image, the first image region having a first shape corresponding to an address bar of the web browser. Disclosed example methods also include tagging first textual information identified in the first image region as corresponding to an address of a web page displayed by the web browser in response to determining that the first textual information includes a first string of text matching a reference string of text. Disclosed example methods further include reporting the tagged first textual information to determine usage of the web browser. | 11-06-2014 |
20140330964 | TECHNIQUE FOR OPTIMIZED ROUTING OF DATA STREAMS ON AN IP BACKBONE IN A COMPUTER NETWORK - A technique optimizes routing of application data streams on an Internet Protocol (IP) backbone in a computer network. According to the novel technique, a client router learns of server states (e.g., number of pending requests, etc.) of a plurality of application servers and also determines metrics of intermediate links between the application servers and the client router (intermediate link metrics), e.g., particularly link metrics in a direction from the application servers to the client router. Upon receiving an application request from an application client (“client request”), the client router determines to which of the application servers the client request is to be sent based on the server states and intermediate link metrics, and sends the client request accordingly. | 11-06-2014 |
20140330965 | SERVER CLUSTER MONITORING - A master monitor spawns a local monitor in each node of a server cluster. Each local monitor, responsive to a database event, determines a metric of a performance-related variable. A maximum period between measurements may be imposed to reduce irrelevant results, as may a minimum period. The metric may be stored in a measurement file on the respective node and/or may be reported to the master monitor. The master monitor may make any reported metrics available to a user via a front end. | 11-06-2014 |
20140330966 | SYSTEM, METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING STEP-AHEAD COMPUTING - A system for providing step-ahead computing may include a client and a server. The client may include a communication element, a user interface element and a processor. The communication element may be configured to receive a set of pre-computed actions. The set of pre-computed actions may be based on at least one possible future state of the client. The user interface element may be configured to receive a user input corresponding to a particular action. The processor may be in communication with the communication element and the user interface element. The processor may be configured to determine whether the set of pre-computed actions include an action corresponding to the particular action and to execute the action in response to a determination that the set of pre-computed actions include the action corresponding to the particular action. The server may include a processing element, a pre-computing element and a server side communication element. The processing element may be configured to receive an indication of a current state of the client. The pre-computing element may be in communication with the processing element and configured to determine the set of pre-computed actions based on the at least one possible future state of the client. The server side communication element may be in communication with the processing element and configured to communicate the pre-computed actions to the client. | 11-06-2014 |
20140330967 | COMMUNICATION DEVICE, CONTROL METHOD FOR COMMUNICATION DEVICE, AND PROGRAM - A communication device capable of handling, even in the case where requests for provision of a service are received from a plurality of devices, the requests appropriately, is provided. | 11-06-2014 |
20140330968 | METHOD AND TREND ANALYZER FOR ANALYZING DATA IN A COMMUNICATION NETWORK - A method and apparatus for performing analysis of client related data obtained from a communication network. A trend analyzer analyzes a trend of a client segment, which trend has been detected by a data stream analysis of the client related data. The trend reflects a change over time of at least one feature derived from the client related data. The trend analyzer then requests a batch based deep analysis when the trend fulfils a trigger condition, to find a cause for the trend. A result of the deep analysis is then provided to a result consumer. Thereby, the deep analysis may be performed only when a trend has been detected thus being more responsive to trends by the stream analysis and reguiring less resources, as compared to when data is always subjected to deep analysis regardless of whether a trend occurs or not. | 11-06-2014 |
20140337504 | DETECTING AND MANAGING SLEEPING COMPUTING DEVICES - A method, system, and one or more computer-readable storage media for detecting sleeping computing devices are provided herein. The method includes querying, via a computing device, a system neighbor table of the computing device to determine whether a target computing device is reachable and, if the target computing device is unreachable, sending a neighbor discovery packet to the target computing device. The method also includes re-querying the system neighbor table to determine whether the target computing device is reachable and, if the target computing device is unreachable, determining whether the target computing device has been determined to be unreachable at least a specified number of times in a row. The method further includes determining that the target computing device is manageable if the target computing device has been determined to be unreachable at least the specified number of times in a row. | 11-13-2014 |
20140337505 | METHOD FOR DATA TRANSMISSION AND CORRESPONDING ELECTRONIC DEVICE - A method for data transmission and a corresponding electronic device are provided. The method includes the following steps: transmitting a plurality of ping packets, calculating the amount of data received between received acknowledgements of the ping packets, calculating the RTT of the ping packets, and controlling a data transmission rate according to the amount and the RTT. | 11-13-2014 |
20140337506 | SYSTEM AND METHOD FOR SLOW LINK FLAP DETECTION - A method and apparatus of a device that monitors a link for a slow link flap event is described. In an exemplary embodiment, a device detects a link flap in a current time interval of a link that couples a pair of devices. In addition, the current time interval is one of a plurality of time intervals that are used to monitor the link for a slow link flap. Furthermore, a slow link flap event results from detecting a maximum number of link flap violations over the plurality of time intervals. The device additionally increments a number of detected link flaps for the current time interval. If the number of detected link flaps for the current time interval is greater than a maximum number of slow link flap violations, the device marks the current time interval as a possible slow link flap interval. In addition, if the total number of intervals among the current time interval and one or more preceding time intervals, which are marked as possible slow flap intervals, equals the maximum number of slow flap intervals, the device brings the link down. | 11-13-2014 |
20140337507 | Method and Apparatus for Providing Network Applications Monitoring - A method and apparatus for providing network performance monitoring is disclosed. At least one application is run on a network controller. The at least one application running on the network controller sends a request for performance data information to a performance database manager (PDM). A response to the request for performance data information is received from the PDM. | 11-13-2014 |
20140337508 | Method and Apparatus for Providing Network Applications Monitoring - A method and apparatus for providing network performance monitoring using a switch running a service monitoring (SERMON) client is disclosed. A request for SERMON metrics is received from a performance database manager (PDM). The request is sent to the SERMON server designated in the request. The SERMON server is running in a service host. A reply is received from the SERMON server. The reply is sent to the PDM. | 11-13-2014 |
20140337509 | Method and Apparatus for Providing Network Applications Monitoring - A method for providing network performance monitoring using a performance database manager (PDM) is disclosed. A PDM has a PDM state manager, a communications server (COM server), a communications client (COM client), and an application database (AppDB). The PDM is configured to communicate with a network controller and a switch running a service monitoring (SERMON) client. A list of one or more switches, one or more hosted services, and one or more applications is determined. A request for service monitoring (SERMON) data is received from one or more applications running on a network controller. The request is sent to a SERMON client. A response is received from the SERMON client. | 11-13-2014 |
20140337510 | MONITORING SYSTEM AND METHOD FOR MONITORING THE OPERATION OF DISTRIBUTED COMPUTING COMPONENTS - Certain example embodiments relate to a monitoring system for monitoring the operation of distributed computing components. The monitoring system includes a registry for storing descriptions of the computing components and at least one associated service-level agreement (SLA) specifying at least one performance requirement; a compiler for generating at least one first and second continuous query based on the information stored in the registry; and a complex event processing (CEP) engine for executing the at least one first continuous query on input events indicating actions performed by the computing components and corresponding performance information, and for producing at least one output event indicating a violation of at least one SLA. The CEP engine also executes the at least one second continuous query on input events indicating a violation of at least one SLA, and produces at least one output event indicating a relationship between at least two SLA violations. | 11-13-2014 |
20140337511 | CONTEXT AWARE BROWSER POLICY - Systems and methods for a web event framework include receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin, wherein executing the framework action includes modifying one or more settings for the web browser, wherein the modified settings are based on the framework policy and sending an instruction to the web browser to cause the web browser to reload at least one web page under the modified settings. | 11-13-2014 |
20140337512 | OBSTRUCTION DETERMINATION DEVICE - A obstruction determination process by a program stored in a recording medium comprises (i) in cases in which a connection data has been received from a plurality of transfer devices connected to a non-transmitting transfer device which is not transmitting the connection data, identifying a non-transmitting transfer device transfer path on which the non-transmitting transfer device is positioned; and (ii) determining for each of the identified transfer paths whether or not an obstruction has occurred on the identified transfer path, and in cases in which the identified transfer path is the non-transmitting transfer device transfer path identified, employing the transfer volume data that has been received from another transfer device positioned on the non-transmitting transfer device transfer path as the transfer volume data of the non-transmitting transfer device to determine whether or not an obstruction has occurred on the identified transfer path. | 11-13-2014 |
20140337513 | CROSS PLATFORM USER JOINING - Techniques for cross platform user joining are disclosed. In some embodiments, cross platform user joining includes associating a first user identification (UID) and a second UID with one or more Internet Protocol addresses (IPs); associating the first UID and the second UID with one or more monitored behaviors; and joining the first UID and the second UID based on the one or more IPs and the one or more monitored behaviors. | 11-13-2014 |
20140337514 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND DEVICE MANAGEMENT METHOD - A device management apparatus is connected to a plurality of devices and a plurality of information processing apparatuses using the devices, through a network. The device management apparatus includes: an obtaining unit that obtains usage amount information about usage amounts from the devices; a calculation unit that calculates unit usage amounts that are usage amounts of the respective devices per unit period, using the usage amount information about the respective devices; an analysis unit that analyzes use of the devices using the unit usage amounts of the respective devices; a change unit that changes allocation of the information processing apparatuses to the devices based on an analysis result in order to equalize use of the devices; and a notification unit that notifies the information processing apparatus for which an allocated device has been changed, of usage information required to use the device. | 11-13-2014 |
20140337515 | Method and Apparatus To Remotely Monitor Information Technology Infrastructure - Methods and apparatuses to remotely monitor information technology infrastructure are disclosed by sampling data center devices alerts, selecting an appropriate response for the event, monitoring the end node for repeat activity, and monitoring remotely. | 11-13-2014 |
20140337516 | Method and Apparatus To Enable Liquid Applications - Method and Apparatus to enable liquid applications are disclosed by discovery of workload and application components within data centers; assessment of type, capability, IP, TCP, bandwidth usage, threads, security, access lists, policies, virtualization configuration of the discovered application components; real time monitoring of the application components across data centers public or private; and capacity analysis and intelligence to adjust underlying infrastructure thus enabling liquid applications. | 11-13-2014 |
20140337517 | Method and Apparatus To Enable Liquid Applications Roll Outs Across Data Centers and Clouds - Method and Apparatus to enable liquid applications roll outs across data centers and clouds are disclosed by analysis of capacity of workload and application components across public and private data centers and clouds; assessment of available infrastructure components across the data centers and clouds; real time roll out and orchestration of application components across data centers public or private; and rapid configurations of all needed infrastructure components. | 11-13-2014 |
20140337518 | Server-Initiated Bandwidth Conservation Policies - In one embodiment, a social networking system maintains a moving average of the number of connection problems, including socket timeouts and failed uploads, per client in a geographic area to determine whether the wireless data network serving the geographic area is overloaded. In response to detecting a network overload, the social networking system may transmit an instruction to the clients in the particular geographic area to enter one of a plurality of traffic throttling modes. In particular embodiments, the social networking system maintains a historical log of network overload conditions, and uses the historical log to generate an estimate of the wireless network capacity serving a geographic area. Thus, the social networking system may preemptively transmit instructions to clients to enter a bandwidth-conservation mode when the estimated traffic demand exceeds the estimated capacity for a particular geographic region. | 11-13-2014 |
20140337519 | Techniques For Attribution Of Mobile Device Data Traffic To Initiating End-User Application - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20140337520 | Attribution Of Mobile Device Data Traffic To End-User Application Based On Socket Flows - A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic. | 11-13-2014 |
20140337521 | EVALUATION OF USE OF A SERVICE AND/OR FUNCTION PROVIDED OR CALLED BY A WEB SERVICE - A method for evaluating use of a service and/or function provided by an automation component. To implement an evaluation of a use of the service and/or functions of the automation component with little hardware complexity, a web service is called by a web service call, the web service call or a function call generated by the web service is recognized by means of a recognition module implemented in the automation component, service and/or function information that regards the called service and/or function and that is contained in the web service call or the function call is read out by means of the recognition module, the web service is executed after release, service- and/or function-specific data are detected by means of a detection module during the execution of the web service, and the service and/or function provided by the automation component is evaluated. | 11-13-2014 |
20140337522 | Method and Device for Filtering Network Traffic - The invention relates to a method for filtering network data in a network node, comprising the steps of producing filter markings in a grammatical structure of network data encoded by means of an encoding scheme on the basis of adjustable filter inquiries of at least one further network node, producing a filter mask on the basis of the filter markings, receiving a data flow encoded by means of the encoding scheme in the network node, filtering the data flow by means of the filter mask, and forwarding the filtered encoded data flow to the at least one further network node. | 11-13-2014 |
20140337523 | SESSION-BASED SERVER TRANSACTION STORM CONTROLS - Transaction storm detection includes receiving a series of transactions in a data stream for an authenticated network session. A detection engine determines whether the transactions form a transaction storm. In response to determining that the transactions are a transaction storm, metrics associated with the transaction storm are presented. One or more actions may be specified to be applied in a subsequently detected transaction storm. | 11-13-2014 |
20140337524 | DISTRIBUTED NETWORK COORDINATE SYSTEM - This document relates to a distributed network coordinate system. One implementation provides computer-readable storage media including instructions that may cause a processor to perform certain acts. For example, the acts may include storing an initial network location of a first device in a network. The network may include the first device and a second device. The acts may also include monitoring one or more network performance metrics related to existing application communications with the second device, and determining an updated network location of the first device, based on the initial network location and the network performance metrics. Aspects of network health can be derived from monitoring changes in the network locations of various devices within the coordinate system. | 11-13-2014 |
20140344439 | METHOD AND APPARATUS FOR PROVIDING NETWORK SERVICES ORCHESTRATION - A method and apparatus for providing network services orchestration is disclosed. A network services orchestration module runs on a network controller. Service data is specified for a network operator using a service management northbound application programming interface (API). Virtual machines (VMs) and specialized APIs are managed in response to operator requests from the service management northbound API using an instance management submodule. Statistics are monitored and service instances are affected using an autoscaling and power management submodule. Changes in deployed network services instance availability are pushed to a steering module using an instance location southbound API. | 11-20-2014 |
20140344440 | Managing Network Utility of Applications on Cloud Data Centers - Techniques, systems, and articles of manufacture for managing network utility of applications on cloud data centers. A method includes computing a network utility value for each of multiple applications in a data center network, determining a virtual machine placement and an application flow routing within the data center network for each of the multiple applications which have a computed network utility value below a pre-determined network utility threshold, and based on said determining, re-routing one or more of the multiple application flow routings and performing a virtual machine migration of one or more virtual machines associated with at least one of the multiple applications which have a computed network utility value below a pre-determined network utility threshold. | 11-20-2014 |
20140344441 | SYSTEM AND METHOD FOR GTP SESSION PERSISTENCE AND RECOVERY - A method for monitoring GPRS Tunneling Protocol (GTP) sessions in a mobile communication network having a monitoring module. The method includes the steps of monitoring, by the monitoring module, a plurality of subscriber GTP sessions, and storing recovery parameters related to the subscriber GTP sessions and subscribers associated therewith in records in a database in the monitoring module, wherein the recovery parameters are associated with initial session data for each subscriber GTP session. Upon an outage in monitoring, the method restarts the monitoring module to determine restart parameters associated with existing subscriber GTP sessions and subscribers associated therewith in the records in the database wherein the restart parameters are associated with subsequent session data for each subscriber GTP session. Before attempting to process any packets, the method associates the subsequent session data with the initial session data based upon comparing the recovery parameters with the restart parameters. | 11-20-2014 |
20140344442 | Adaptive Data Collection - A mechanism is provided for adaptive data collection. A set of data collection mechanisms operating within an information technology system is discovered. For each resource specific piece of data being collected by the set of data collection mechanisms, a determination is made as to whether more than one data collection mechanism is collecting the resource specific piece of data from a resource. Responsive to more than one data collection mechanism collecting the resource specific piece of data from the resource, a time interval to collect the resource specific piece of data from the resource is set to a smallest collection interval of the collection intervals utilized by the more than one data collection mechanism. Collection of the resource specific piece of data from the resource by the more than one data collection mechanism is suspended and the resource specific piece of data is collected without utilizing the more than one data collection mechanism. | 11-20-2014 |
20140344443 | ADAPTIVE BIT RATE (ABR) STREAMING WITH SERVER SIDE ADAPTATION - A device for providing adaptive bit rate streaming that includes a first transcoder configured to transcode a video stream based at least in part on an encoding characteristic to generate a first transcoded video stream, a network monitor configured to monitor network conditions including a network bandwidth of a network, an adjustment module configured to cause the transcoder to adjust the encoding characteristic in response to a change in the network conditions, an advertising module configured to advertise to a client device an ABR profile that corresponds to the first transcoded video stream, wherein the advertising module updates the advertised single ABR profile when the at least one encoding characteristic is adjusted, and a network interface configured to transmit segments of the first transcoded video stream to the client device via the network in response to requests therefor. | 11-20-2014 |
20140344444 | Recovery of Dynamic Host Configuration Protocol IP Addresses - Recovery of an Internet Protocol (IP) address allocated to a client using Dynamic Host Configuration Protocol (DHCP) is provided. Media Access Control (MAC) address and the IP address of the client are stored. When the client is determined as being offline, MAC address and IP address of the client are determined and a DHCP release message carrying the IP address of the client is sent to an address allocation server. The client is determined as being offline based on a shutdown status of a port to which the client is connected. The port may be on the relay device, or an access device that connects the client and the relay device. | 11-20-2014 |
20140344445 | APPARATUS AND METHOD FOR DATA ACQUISITION - A data acquisition apparatus is provided. The data acquisition apparatus includes a local data storage unit; a data acquisition unit acquiring data; and a control unit storing data acquired by the data acquisition unit in the local data storage unit, wherein when stored data exceeds a predetermined capacity, the control unit transmits data to a history server, and when it is confirmed by the history server that data transmission is successful, the control unit deletes corresponding data from the local data storage unit. | 11-20-2014 |
20140344446 | PROXIMITY AND CONTEXT AWARE MOBILE WORKSPACES IN ENTERPRISE SYSTEMS - Methods and systems for configuring computing devices using mobile workspace contexts based on proximity to locations are described herein. A mobile computing device determines that the device is proximate to a location, another device, or an individual associated with an enterprise system. The mobile computing device may then receive a mobile workspace context associated with the location, device, or individual, such as one or more specific wireless networks, enterprise applications, and/or documents, and may configure the device based on the received mobile workspace context. Additional methods and systems are described herein for transmitting and receiving sets of device capabilities between multiple devices, establishing communication sessions, and sharing various capabilities between devices. Still additional methods and systems are described for determining and accessing the capabilities of enterprise system resources using mobile computing devices in an enterprise system. | 11-20-2014 |
20140344447 | METHOD AND APPARATUS FOR EXECUTING APPLICATION - A method of executing an application in a terminal in a distributed fashion is provided. The method includes monitoring an execution environment of the application, selecting a module to be offloaded based on a result of the monitoring, transmitting information on the selected module to an offload server, and executing the application in a distributed fashion by cooperating with the offload server. | 11-20-2014 |
20140344448 | ELECTRONIC DEVICE FOR OPERATING APPLICATION - A method of operating an electronic device is provided. The method includes detecting an execution request of an application installed in the electronic device, determining, in response to the execution request, whether an external device connected to the electronic device has a replacement application, and transmitting an execution request of the replacement application to the external device if the external device is determined to have the replacement application. | 11-20-2014 |
20140344449 | IP ADDRESS ALLOCATION FOR WI-FI CLIENTS - Computerized systems and computerized methods are provided for internet protocol (IP) address allocation for Wi-Fi clients in a manner that avoids assigning a public IP address to a device if the device is not first activated to use services provided by the network. A private IP network address is allocated to a device, wherein the private IP network address is only valid for a predetermined period, and only allows the device to activate itself with the network instead of providing the device full access to the network. The device is monitored during the predetermined period so that if the device is activated to use the network during the predetermined period, the computing device assigns a public IP address to the device so that the device can access a full set of services provided by the network. | 11-20-2014 |
20140344450 | Method and Apparatus for Deterministic Cloud User Service Impact Reporting - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-20-2014 |
20140344451 | METHODS AND APPARATUS FOR MACHINE-TO-MACHINE BASED COMMUNICATION SERVICE CLASSES - Methods and apparatus enabling a wireless network to provide differentiated services to a machine-to-machine (M2M) client. In one embodiment, the wireless network comprises a UMTS network, and the Home Location Register (HLR) entity identifies subscriptions as machine-to-machine (M2M) enabled devices based on flags or other descriptors associated with each M2M device, and imposes one or more rule sets (e.g., service restrictions) based on this identification. The classification of M2M devices within the HLR may optionally include additional capability or profile data for the M2M device (e.g. static, low mobility, low data activity, etc.). Various other network entities may use the M2M identification to modify the delivered data service, so as to optimize network resources. Furthermore, monitoring of M2M client behavior can be used to detect and notify the network operator of abnormal, fraudulent, or malicious activity. Business methods utilizing the aforementioned methods and apparatus are also disclosed. | 11-20-2014 |
20140344452 | Invalidation Sequencing in a Content Delivery Framework - A computer-implemented method includes providing, at a first time and to a first group of CD services in a CDN, invalidation information relating to at least one resource; and providing the invalidation information, at a second time distinct from the first time and to a second group of CD services in the CDN, the second group of CD services being substantially distinct from the first group of CD services. | 11-20-2014 |
20140344453 | AUTOMATED LEARNING OF PEERING POLICIES FOR POPULARITY DRIVEN REPLICATION IN CONTENT DELIVERY FRAMEWORK - A computer-implemented method includes collecting information about at least one resource, the information having been determined based on (i) a set of features of the at least one resource and on (ii) information about previous requests for the at least one resource; determining a computable function of the set of features of the at least one resource, the computable function having been determined based on the information about the at least one resource, the function defining a peering policy for the at least one resource; and providing the function to at least one service endpoint in a cluster or supercluster. | 11-20-2014 |
20140344454 | INFORMATION MANAGEMENT DEVICE, NETWORK SYSTEM, INFORMATION MANAGEMENT PROGRAM, AND INFORMATION MANAGEMENT METHOD - When receiving a use request of information from an information use device ( | 11-20-2014 |
20140344455 | METHOD AND SYSTEM TO MEASURE USER ENGAGEMENT WITH CONTENT THROUGH EVENT TRACKING ON THE CLIENT SIDE - A method of tracking and analyzing user engagement with content includes receiving content to be displayed on a client device over a network from a publisher, and receiving one or more processing functions on the client device over the network. The processing functions are configured to cause the client device to track and to analyze user events on the client device. The method further includes executing the one or more processing functions on the client device to track and to analyze user events on the client device, and sending results of analyzing user events over the network from the client device to an analytics server. A system for measuring user engagement with content, including an analytics server and a client device configured to track and analyze user events on the client device, and to send the results of analyzing user events to the analytics server is described. | 11-20-2014 |
20140351408 | UTILIZING AUGMENTED REALITY FOR LOCATING COMPUTER HARDWARE ASSOCIATED TO A REPORTED INCIDENT - Program code on a client computer receives an image of computer hardware and a unique identifier of the computer hardware. The program code generates a request that includes the unique identifier, a location of a client computer, and profile information of an end-user logged into the client computer. The program code sends the request to a server computer, and forwards a version of the request to an incident management system that in response to receiving the request extracts information associated to the computer hardware. The program code receives the information extracted, and forwards the information to the client computer. The program code overlays at least some of the information forwarded, onto the image of the computer hardware. The program code generates a map that displays on the screen of the client computer the image of the computer hardware overlaid with at least some of the information forwarded. | 11-27-2014 |
20140351409 | MONITORING CLIENT INFORMATION IN A SHARED ENVIRONMENT - A method for monitoring client information within a shared environment. The method includes identifying a first physical location of a server computer, the server computer providing computing resources to a client within a shared environment, and collecting information associated with the client, the information including computing resources of the server computer provided to the client. The method includes creating a map showing the first physical location of the server computer and the collected information associated with the client. The method includes identifying a current physical location of the server computer and determining whether the current location is different than the first location. The method then, in response to determining the current location is different than the first location, includes updating the map with the identified current physical location of the server computer. | 11-27-2014 |
20140351410 | ENDPOINT MANAGEMENT BASED ON ENDPOINT TYPE - Techniques are disclosed to facilitate endpoint management based on endpoint type. Counts of endpoints currently managed by an application are provided for each endpoint type. Weights are provided that each represent a measure of resource consumption by the application in managing an endpoint of a respective endpoint type. A count of additional endpoints of a first endpoint type is determined based on a capacity of a set of available resources. The count is used to facilitate usage of the predefined capacity of the set of available resources. | 11-27-2014 |
20140351411 | SYSTEMS AND METHODS FOR TIME-BASED GEOFENCING - The present disclosure describes systems and methods for time-based geolocation queries, with designated planned arrival and/or departure times or event start/end times. The number of queries can be drastically reduced to reduce battery, bandwidth, and processing requirements; or the rate of queries can be increased within a specified time frame, providing much higher resolution of geolocation information. Geolocation information may be monitored via notifications from portable devices to identify demographics of users within identified regions and subregions, allowing real-time, dynamic comparison of demographic information between locations, such as restaurants, clubs, or events. | 11-27-2014 |
20140351412 | DETERMINING AND MONITORING PERFORMANCE CAPABILITIES OF A COMPUTER RESOURCE SERVICE - To determine and monitor the performance of a computer resource service in real time, a resource monitoring tool can initiate test virtual machines on the computer systems of the computer resource service. The resource monitoring tool can then monitor various metrics that indicated the performance of the test virtual machines over time, such as processor performance, memory performance, input/output (I/O) performance, and network performance. The resource monitoring tool can store the monitored metrics, provide select metrics to users, and use the metrics to manage the computer resource service. To accurately gauge the performance, the resource monitoring tool can select computer systems for testing that are representative of the computer resource service and the computer resources of the computer resource service. | 11-27-2014 |
20140351413 | SELECTING BETWEEN DOMAIN NAME SYSTEM SERVERS OF A PLURALITY OF NETWORKS - A method and computer for managing domain name system services for a plurality of networks is disclosed. A computer identifies information for the plurality of networks to which a client device is connected. The computer receives a request to identify an internet protocol address for a domain name or vice-versa. In response to the request, the computer selects a particular set of domain name system servers of a particular network in the plurality of networks based on the information for the plurality of networks and a set of rules for selecting the particular set of domain name system servers when identifying the internet protocol address for the domain name. The computer then sends the request to identify the internet protocol address for the domain name to a domain name system server in the particular set of domain name system servers. | 11-27-2014 |
20140351414 | Systems And Methods For Providing Prediction-Based Dynamic Monitoring - Dynamic monitoring of an element in a network is provided by predicting whether a resource threshold crossing, such as load-based level, is likely to be exceeded within a certain time period. If the level is likely to be exceeded shortly, the monitoring rate of the element for a given time period may be increased. Conversely, if the level is unlikely to be exceeded in the near term, the monitoring rate may be decreased. | 11-27-2014 |
20140351415 | SELECTIVE PACKET CAPTURE - Methods and systems for providing selective packet capture are described. One example method includes identifying a packet capture rule from a set of packet capture rules, the packet capture rule including a trigger condition and an action to perform when the trigger condition is detected; monitoring a network flow to detect whether the network flow satisfies the packet capture rule's trigger condition, wherein monitoring the network flow includes analyzing one or more packets included in the network flow to determine a set of protocol metadata associated with the network flow; and selectively performing the action associated with the packet capture rule on the network flow based on a result of the monitoring. | 11-27-2014 |
20140351416 | Characterizing Statistical Time-Bounded Incident Management Systems - Systems and articles of manufacture for characterizing statistical time-bounded incident management systems include generating an expected distribution of multiple work requests in an incident management system across multiple characterization classes based on a target service level agreement for each of the multiple work requests and one or more probability distribution values, analyzing the multiple work requests in the incident management system to determine an actual distribution of the multiple work requests across the multiple characterization classes, and comparing the expected distribution of the multiple work requests to the actual distribution of the multiple work requests for each of the multiple characterization classes to characterize performance of the incident management system. | 11-27-2014 |
20140351417 | SESSION TIMEOUT METHOD FOR DHTMLX INTERFACE CONTROL LIBRARY - A session timeout method for DHTMLX interface control libraries is provided. Each DHTMLX interface control library includes a plurality of DHTMLX components. The method includes: sending requests to a server; receiving data and page content from the server with a client; setting up a session timer on the client counting down time remained for a session established between the server and the client; creating a DHTMLX component; monitoring and resetting the session timer upon the DHTMLX component raising a first predetermined event or calling a first action; prompting messages and redirecting a user to a login page upon a second predetermined event or calling a second action; and catching a DHTMLX component error. | 11-27-2014 |
20140351418 | METHOD AND SERVER FOR MONITORING USERS DURING THEIR BROWSING WITHIN A COMMUNICATIONS NETWORK - A method for monitoring browsers (B) for a communications network (N), wherein a monitoring server contains a set of monitoring elements, and implements: —a step (E | 11-27-2014 |
20140351419 | AUTOMATIC DATA RING DISCOVERY AND CONFIGURATION - Computer-implemented methods and systems for automatic ring discovery and configuration are provided. An exemplary method may comprise connecting a data node to a network. When connected, the data node periodically sends an advertisement to the network and monitors the network for one or more further advertisements of further data nodes associated with one or more data rings. The monitoring is performed for a predetermined time period. If one or more further advertisements are received, the data node determines which data ring to join using predefined criteria. The predetermined criteria may include a number of data nodes in the data ring, free space in the data ring, allowable number of the data nodes, compatibility of software versions of the data node and the data ring. Alternatively, if no advertisements are received within the predetermined time period, the data node creates a new data ring. | 11-27-2014 |
20140351420 | METHOD FOR DETERMINISTIC SERVICE OFFERING FOR ENTERPRISE COMPUTING ENVIRONMENT - Method and system for elastic computing includes the steps of presenting an interface for user entry of a threshold upper limit for compute pool consumption, a threshold lower limit for compute pool consumption, and a threshold time for the out of range condition. The policy engine of the controller node monitors consumption and expands or shrinks the compute pool. | 11-27-2014 |
20140351421 | METHOD AND APPARATUS FOR DYNAMICALLY PREDICTING WORKLOAD GROWTH BASED ON HEURISTIC DATA - Method and system for elastic computing includes the steps of presenting an interface for user entry of a threshold upper limit for compute pool consumption, a threshold lower limit for compute pool consumption, and a threshold time for the out of range condition. The policy engine of the controller node monitors consumption and expands or shrinks the compute pool. | 11-27-2014 |
20140351422 | Method and Apparatus for Weight Based Performance Optimization for Cloud network - In one embodiment, a method can include: (i) performance optimization of cloud network. In one embodiment, an apparatus can include: (i) A software platform from which weight based elastic compute resize can be done in relation to network performance to optimize cloud network | 11-27-2014 |
20140351423 | Method and Apparatus for Dynamic Correlation of Large Cloud Firewall Fault Event Stream - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351424 | Method and Apparatus for Dynamic Network Connectivity Validation Based on Software Network Design Pattern - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351425 | Method and Apparatus for Dynamic Cloud Application Flow Performance Metering - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351426 | Method and Apparatus for Dynamic Workload Identification and Usage Footprinting - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351427 | Method and Apparatus for Elastic Tunnel Resize - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351428 | Method and Apparatus for Elastic Tunnel Resize - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351429 | Method and Apparatus to Elastically Modify Size of a Resource Pool - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351430 | Method and Apparatus for Capacity-Aware System to Recommend Capacity Management Suggestions - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351431 | NETWORK COMMUNICATION METHOD AND SYSTEM - A network communication method for use in a system kernel where a network data transceiver thread and a listening socket are created. The method includes steps of: associating the network data transceiver thread with the listening socket and adding the listening socket into an epoll queue; listening, by the listening socket, events in the epoll queue and performing, when sensing an event requiring to transmit/receive data, a specific operation corresponding to the event and sending a notification to the network data transceiver thread associated with the listening socket; and transmitting/receiving, by the network data transceiver thread, a network data according to the notification from the listening socket. A network communication system is also provided. | 11-27-2014 |
20140351432 | USING TRANSACTIONS TO MINIMIZE CHURN IN A DISTRIBUTED NETWORK CONTROL SYSTEM - A particular network controller receives a first set of inputs from the first controller and a second set of inputs from the second controller. The particular controller then starts to compute a set of outputs using the first set of inputs. After a failure of the first controller, the particular controller receives a third set of inputs from the second controller. The third set of inputs and the first or second set of inputs makes up a group of inputs for being processed together and separately from another group of inputs. The particular controller then receives an indicator from the second controller, which indicates that all inputs of the group of inputs have arrived at the particular controller. After receiving the indicator and after computing the set of outputs completely, the particular controller sends the set of outputs to a fourth controller or to a managed forwarding element. | 11-27-2014 |
20140359108 | XML BASED GENERIC UNIX DISCOVERY FRAMEWORK - Services that support recovery of a data center require collecting information concerning the service customer's physical and virtual infrastructure, and specifically the configuration of their operating systems such as UNIX operating systems. Here an automatic discovery tool executes within the context of a secure browser program. Once a user is authenticated, a JavaScript or HTML program seamlessly retrieves a file that is specific to the type and version of the UNIX operating system on the host; the file contains commands and parsing logic for the commands to retrieve configuration data. Once parsed, the program forwards that data to a database so that the replication service provider may then correctly provision recovery systems. | 12-04-2014 |
20140359109 | DEVICE MONITORING - Example embodiments relate to device monitoring. In one example implementation according to aspects of the present disclosure, a computing device may include one or more processors, a memory for storing machine readable instructions, and a data store. Additionally, the computing device may include a utility device monitoring module stored in the memory and executing on at least one of the one or more processors to passively monitor network information and power information from a utility device communicatively coupled to a network and a power source. | 12-04-2014 |
20140359110 | AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT - An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted. | 12-04-2014 |
20140359111 | Idle Worker-Process Page-Out - Systems and methods for handling idle websites on a Web server are disclosed. The duration between requests for a website application is monitored and compared to an idle time-out value. The idle time-out value may be a user-selected value that is the same for all website applications or an idle time-out value selected for a group of worker processes. When the idle time-out value is reached, all inactive memory allocations for the website application are paged-out. When a request for the website application is later received, memory for the website application is paged-in so that the request can be processed. | 12-04-2014 |
20140359112 | Burst Access to Memory in Optical Line Terminal - The Optical line terminal (OLT) tracks the number of data packets, bandwidth per user, and other data packet statistics. DDR (DRAM) is used to store the information tracked by the OLT. The DDR is accessed in a burst mode. In particular, the data is initially stored in an on-chip cache memory and then the data is sent periodically to the DDR in a burst mode. Leaky buckets can be used for each flow, and time stamps can be used to determine the last time the bucket was accessed. | 12-04-2014 |
20140359113 | APPLICATION LEVEL BASED RESOURCE MANAGEMENT IN MULTI-TENANT APPLICATIONS - A system includes multiple tenant queues, where each of the queues is associated with a single tenant is configured to queue one or more requests from its respective single tenant. One or more processing nodes have one or more shared resources for processing the requests queued in the multiple tenant queues. A first feedback loop is configured to determine a resource demand for each of the tenants. An admission controller is configured to calculate an actual utilization value of a shared resource for each of the tenants using the knowledge of resource demands for each of the tenants request from the first feedback loop and control processing of the requests from each of the tenant queues based on a reference value for each of the tenants and the actual utilization value of a shared resource for each of the tenants, where the reference value represents an allowed utilization for each of the tenants. | 12-04-2014 |
20140359114 | COMPUTER-READABLE RECORDING MEDIUM, USAGE MODE DATA GENERATION METHOD, AND USAGE MODE DATA GENERATION DEVICE - A computer-readable recording medium has stored therein a program for causing a computer to execute a usage mode data generation process. The process comprising (a) reading from a storage device association data associating each of a plurality of different expression formats of component data and a standardized expression format which can be converted to each of the plurality of different expression formats, and (b) based on the association data read at (a), generating according to the standardized expression format standardized usage mode data containing component data from first usage mode data that is usage mode data for a first virtual computer included in a plurality of virtual computers and that contains component data for the connector in a first relay device with the type of a first type expressed in a first expression format corresponding to the first relay device. | 12-04-2014 |
20140359115 | METHOD OF PROCESSING INFORMATION, AND INFORMATION PROCESSING APPARATUS - A method of processing information includes: identifying a time span in a period of viewing a content based on detection results of the behavioral viewing states of the user viewing the content, the time span being a period, during which a behavioral viewing state of the user is not determined to be a positive state or a negative state; extracting a time period during which an index indicating one of the positive state and the negative state of the user has an unordinary value with respect to values of the other time periods in the time span; and estimating a time period, during which the user has quite possible been in at least one of the positive state and the negative state, based on the time period extracted by the extracting. | 12-04-2014 |
20140359116 | ELECTRONIC DEVICE AND DATA TRACKING METHOD - An electronic device records operation log of an application when the application is operated by an account on the electronic device. The electronic device uploads the operation log of the application to a server connected to the electronic device. The electronic device displays the operation log of the application in a screen of the electronic device. | 12-04-2014 |
20140359117 | SHARED HEARTBEAT SERVICE FOR MANAGED DEVICES - Systems, methods, and apparatuses for facilitating communication between remote services and applications installed on a device are described. In accordance with embodiments, each of a plurality of remote services generates an application-specific message intended for processing by a corresponding application installed on a device and transmits the application-specific message to a device management system (DMS) server, where it is queued. A DMS client installed on the device sends heartbeat messages to the DMS server indicating that the device is available to receive messages. In response to receiving the heartbeat messages, the DMS server transmits the application-specific messages to the DMS client. The DMS client then publishes each application-specific message to the particular application that the application-specific message was intended for. | 12-04-2014 |
20140359118 | PROCESS AUTOMATION SYSTEM AND METHOD FOR OPERATION OF A PROCESS AUTOMATION SYSTEM - A process automation system includes at least one wireless-aware component for detection of the occurrence (e.g., start and end) of a wireless volume data transfer from at least one other component which might be a wireless-unaware component. Upon such detection, the at least one wireless-aware component requests for bandwidth on behalf of the wireless-unaware component to decrease the communication time and subsequently releases this bandwidth again. A method is provided for operation of the process automation system, in which an upload/download is generally detected by either explicit initiation of the upload/download in the wireless-aware component, or by automatic detection in the wireless-aware component. | 12-04-2014 |
20140359119 | DISTRIBUTED SYSTEM MANAGEMENT - A system for managing compositions of software components or applications is disclosed. In particular, systems in which the software components or applications communicate with one another using message-oriented middleware are considered. The system is fed by one or more data feeds, and produces a plurality of processed feeds for respective applications. The data items in the input data feeds are processed by the software components or applications which form a data feed processing graph, with each application having a processing path (or egress-rooted tree) which results in the processed feed for that application. Managing such systems is complex. This complexity is tackled by having each component processing a data feed item add an annotation to the data feed item, so that the cumulative annotation which is seen in the processed feed for an application provides a history of the processing carried out on the input data feed(s). At an egress of the processing system, this history can be compared ( | 12-04-2014 |
20140359120 | METHOD, SERVER, AND RECORDING MEDIUM FOR PROVIDING LAG OCCURRENCE ABUSING PREVENTION SERVICE USING RELAY SERVER - The method for providing lag occurrence abusing prevention service by using a relay server includes a first step for allowing a relay server to create a pattern of a network usage or a traffic by sensing a network condition of a client; a second step for allowing a game server to analyze the created pattern and, when it is resultantly analyzed that a lag for abusing is generated, to impose a penalty grade according to a corresponding lag generating frequency; and a third step for imposing a penalty on a user who manipulates the client when the penalty grade accesses a predetermined level. | 12-04-2014 |
20140359121 | Providing a Monitoring Service in a Cloud-Based Computing Environment - Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to the monitoring service. The monitor workflow may correspond to the monitoring service. A first call to a finder application is executed over a communications network to retrieve data points according to the monitor workflow. A second call to an analyzer application is executed over the communications network to identify a relevant data point in the data points. A third call to a notifier application is executed over the communications network to notify the user of the relevant data point. | 12-04-2014 |
20140359122 | SESSION TERMINAL APPARATUS AND NETWORK SESSION SYSTEM - A session terminal apparatus constitutes a network session system together with another session terminal apparatus. In the session terminal apparatus, a back performance instruction part instructs reproduction of back performance information. A back performance control part transmits the back performance information, when the reproduction thereof is instructed by the back performance instruction part, to another session terminal apparatus, and controls a performance reproduction part to start reproducing the back performance information when a monitor delay time corresponding to a communication delay time between the session terminal apparatus and another session terminal apparatus has elapsed after the reproduction of the back performance information was instructed. | 12-04-2014 |
20140359123 | Efficient Resource Usage For Location Sharing In Computer Networks - A location sharing system and related processes across computer networks are provided that efficiently utilize resources by adjusting location determination techniques at client devices. A rule-based architecture including user-based heuristics facilitates location determination that is accurate while optimizing resource consumption. Current interest in or other behavior associated with a target user or requesting user can be used in selecting a location determination protocol at the client device. An accurate portrayal of a user's location can be provided efficiently by correlating interest to utilize more accurate but larger resource-intensive components when interest is higher and to utilize less accurate but lower resource-intensive components when interest is lower. | 12-04-2014 |
20140365633 | Networked integrated communications - The invention presents an enhanced and/or new system, process, procedure, product, product-by-process, and/or service, comprising a hardware, service software, and/or software service, comprising a website and/or webpage, for performance displaying during communication (“PDDC”), of, (1) ‘moving picture’, transmitted with means comprising data packets, by means of an online and/or computer network; and/or (2) “image content” comprising of ‘moving picture’, image, and/or associated audio if any, transmitted with means comprising data packets, by means comprising a phone and/or hybrid network. | 12-11-2014 |
20140365634 | Programmable Network Analytics Processing via an Inspect/Apply-Action Applied to Physical and Virtual Entities - Techniques are provided to programming network analytics processing in virtual and physical network devices, useful for software-defined networking (SDN). A controller, e.g., a so-called SDN controller, is configured to identify a control-plane or data-plane flow originating, terminating or transiting a physical or virtual network element. The controller generates one or more network analytics processing actions to be performed by the physical or virtual network element based on inspection of traffic by the physical or virtual network element. The controller forms or generates an inspect/apply-action message containing information identifying the control-plane or data-plane flow for inspection and the one or more network analytics processing actions to be performed. The inspect/apply-action message is sent to the physical or virtual network element. | 12-11-2014 |
20140365635 | APPLICATION ROUTER - A process for registering applications is disclosed. The applications typically work in a Session Initiation Protocol (SIP) JSR 289 environment. A request to register a application to monitor a communication session is received. A first instruction that identifies a first event in the communication session is received from the application. An event may be the sending of a specific type of packet, such as a SIP INVITE. The first event in the communication session is detected. In response to detecting the first event in the communication session, the application is registered to monitor the communication session according to the first instruction. A notification is also sent to the application to monitor the communication session according to the first instruction. | 12-11-2014 |
20140365636 | WIRELESSLY SYNCING CONTENT OF AN APPLICATION WITHOUT REQUIRING DEVICE TO BE PLUGGED INTO POWER SOURCE - A method, system and computer program product for wirelessly syncing content. An analytics engine in a mobile computing device gathers and stores information regarding battery usage for data synchronizations. Upon receiving an indication for content of an application to be synced with the device, the analytics engine determines an estimated amount of content to be synced as well as an estimated amount of battery usage for syncing the estimated amount of content based on the stored information. The content will be wirelessly synced with the device if there is sufficient battery life for syncing the content. If there is not enough battery life for wirelessly syncing the entire content, then a portion of the content will be synced. In this manner, the device does not need to be plugged into a power source and will only sync the amount of content that the device has power to do so. | 12-11-2014 |
20140365637 | METHODS AND SYSTEMS FOR REDUCING METRICS USED TO MONITOR RESOURCES - Computational methods and systems for identifying a subset of a set of metrics that can be used to monitor a resource are described. The subset is representative of the information provided by the full set of metrics. Correlations are calculated for each pair of metrics and metrics with the highest correlations to other metrics in the set of metrics are deleted to obtain the representative subset of metrics. Deletion of metrics from the set of metrics may be optimized for accuracy or cost. The smaller representative subset of metrics can then be used to monitor the resource. | 12-11-2014 |
20140365638 | SYSTEMS AND METHODS FOR MONITORING SYSTEM PERFORMANCE AND AVAILABILITY. - A prognostics module includes a systems analysis module and a determination module. The systems analysis module is configured to obtain operational information corresponding to a system-wide operation of a multi-element system. The multi-element system includes multiple elements communicatively coupled by at least one common communication link. The determination module is configured to determine a future health of at least one of the multiple elements of the multi-element system using the operational information corresponding to the system-wide operation of the multi-element system. | 12-11-2014 |
20140365639 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR PERFORMANCE ANALYTICS FOR DETERMINING ROLE, FORMATION, AND PLAY DATA BASED ON REAL-TIME DATA FOR PROXIMITY AND MOVEMENT OF OBJECTS - Systems, methods, apparatuses, and computer readable media are disclosed for providing performance analytics for determining role, formation, and play data using real time data on movement and proximity of tagged objects. In one embodiment, a method is provided for generating formation data that at least includes receiving participant location data determined based on tag derived data and participant role data; receiving field data; comparing the participant location data to formation models based at least in part on the participant location data, the participant role data, and the field data; and determining formation data based on the comparing the participant location data to the formation models. | 12-11-2014 |
20140365640 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR PERFORMANCE ANALYTICS DETERMINING LOCATION BASED ON REAL-TIME DATA FOR PROXIMITY AND MOVEMENT OF OBJECTS - Systems, methods, apparatuses, and computer readable media are disclosed for providing analytics using real time data on movement and proximity of tagged objects for determining location based on participant dynamics/kinetics models. In one embodiment, a method is provided for monitoring a participant that at least includes correlating at least one tag to the participant; receiving blink data transmitted by the at least one tag; and determining tag location data based on the blink data. The method further includes receiving participant role data; comparing the tag location data to participant dynamics/kinetics models based at least in part on the participant role data; and determining participant location data based on the comparing the tag location data to the participant dynamics/kinetics models. | 12-11-2014 |
20140365641 | PROCESSOR MODULE, SERVER SYSTEM AND METHOD OF CONTROLLING PROCESSOR MODULE - A microserver includes a plurality of processor modules, a communicator configured to perform communication with an external managing server, and a module manager configured to collect apparatus information about at least one of the plurality of processor modules and to provide an Intelligent Platform Management Interface service with respect to the at least one of the plurality of processor modules for the external managing server. | 12-11-2014 |
20140365642 | Smart Management of Background Network Connections Based on Historical Data - In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators. | 12-11-2014 |
20140365643 | SERVER RESOURCE MANAGEMENT, ANALYSIS, AND INTRUSION NEGOTIATION - A console host and intrusion negation system (CHAINS) includes a host component and a console component. The host component monitors resources at a server. Resources that are becoming overloaded can be throttled back. Reports relating to resource usage may be transmitted to the console component. At the console component, resource reports from multiple host components may be viewed and managed. | 12-11-2014 |
20140365644 | INTERNET TRAFFIC ANALYTICS FOR NON-INTERNET TRAFFIC - A method for collecting and analyzing countable physical event data can be provided. A large number of countable physical events can be detected with one or more electronic sensors. In response to substantially all the detected physical events, electronic internet requests can be generated. The electronic internet requests can then be representative of the detected physical events. Then, processed data generated from the electronic internet requests can be received and said processed data can be representative of the detected physical events. For example, in some embodiments data regarding the electronic internet requests can be processed by internet traffic analytics software. | 12-11-2014 |
20140365645 | SYSTEMS AND METHODS FOR REAL-TIME SERVICE ASSURANCE - A system and methods for providing service assurance using real-time monitoring, management and maintenance capabilities to provide customers and vendors with information related to the state of the service. The service assurance domain implements end-to-end functionality with a level of granularity sufficient to diagnose issues to the device and call/session level. | 12-11-2014 |
20140365646 | NETWORK CONNECTION MANAGING DEVICE, SYSTEM AND METHOD - The present disclosure provides a device and a method for managing network connection. The device is used to connect a number of external devices to a network, and stores a plurality of pieces of network configuration information. The method includes detecting whether one or more external devices requests to connect to the network via the device; and determining the configuration information corresponding to each external device, configuring the allowed external devices and connecting the configured external devices to the network according to the determined network configuration information. A network connection managing system is further provided. | 12-11-2014 |
20140365647 | Network Visualization Systems And Methods - Example network visualization systems and methods are described. In one implementation, a method displays a network environment as a network graph using a first zoom level. The method receives a request to provide a second zoom level in a particular portion of the network environment. Network components are identified to display at the second zoom level in the particular portion of the network environment. The method further determines which network connections to display at the second zoom level in the particular portion of the network environment and generates a revised network graph containing the identified network components and the determined network connections. | 12-11-2014 |
20140365648 | Network Management Systems and Methods - Example network management systems and methods are described. In one implementation, a method identifies at least one network resource to be managed and identifies at least one domain to be managed. The method further identifies at least one service provider to be managed. A fusion object is created that defines the network resource, the domain, and the service provider to be managed. | 12-11-2014 |
20140365649 | MONITORING ACTIVITY ON A COMPUTER - A mechanism of monitoring activity on a computer which may be applied to measuring the performance of the computer, The computer is configured to track a first set of information relating to at least a first occurrence of at least one scenario on the computer. At least sonic of the first set of information is evaluated to make a determination about the first occurrence of the scenario. Based on that determination, the computer may be configured to track a second set of information relating to at least a second occurrence of the scenario on the computer, in which the second set of information includes at least some types of information not tracked in the first set of information. The second set of information can then be evaluated. | 12-11-2014 |
20140365650 | STORAGE OF MASS DATA FOR MONITORING - Disclosed are various in various embodiments are systems and methods providing for storage of mass data such as metrics. A plurality of data models are generated in the server from a stream of metrics describing a state of a system. Each of the metrics is associated with one of a plurality of consecutive periods of time, and each data model represents the metrics associated with a corresponding one of the consecutive periods of time. The data models are stored in a data store and each of the metrics is discarded after use in generating at least one of the data models. | 12-11-2014 |
20140365651 | Systems and Methods for Estimating Available Bandwidth and Performing Initial Stream Selection When Streaming Content - Systems and methods for determining available bandwidth and performing initial stream selection when commencing adaptive bitrate streaming using Hypertext Transfer Protocol (HTTP) in accordance with embodiments of the invention are disclosed. One embodiment of the invention includes measuring network bandwidth using a playback device, determining an initial network bandwidth estimate using the network bandwidth measurements, selecting an initial stream from said plurality of streams of encoded media that are encoded at different maximum bitrates rates using the playback device based upon the maximum bitrates of the plurality of streams and the initial bandwidth estimate; and commencing streaming of encoded media by requesting portions of the encoded media from the initial streams using the playback device. | 12-11-2014 |
20140365652 | Network Appliance for Monitoring Network Requests for Multimedia Content - A network appliance that monitors multimedia content requested by at least one networked computer coupled to a local area network and the Internet. The appliance includes a database, at least one interface processing packetized data encapsulating TCP/IP packet data generated by the network computer(s) and communicated over the local area network, routing logic for the TCP/IP packet data, and processing means processing the TCP/IP packet data to identify whether it specifies a URL representing at least one particular file type of multimedia content, and if so, adds the specified URL and an associated date and time to the database. It can include a first mechanism monitoring physical connections/disconnections to the local area network over time, and a second mechanism monitoring Internet connectivity over time. It can also provide access to information stored in the database and/or provide upload of stored information to a remote system for remote access to such information. | 12-11-2014 |
20140372594 | APPLICATION CONTROL OF EMBEDDED WEB CONTENT EXECUTION - Web content is displayed concurrently with application content of an application that is hosting the web content. The web content includes at least some content that can be executed or run, such as a script. Performance of the web content is monitored, such as by monitoring the amount of time the web content has been executing and/or an amount of memory used by the web content. Feedback regarding the performance of the web content is provided to the application hosting the web content, and the application can determine whether and/or how to alter execution of the web content based on the performance of the web content. Execution of the web content can be altered in various manners, such as by throttling execution of the web content or ceasing execution of the web content. | 12-18-2014 |
20140372595 | DETERMINING LOCATION OF HARDWARE COMPONENTS IN A CLOUD COMPUTING ENVIRONMENT BASED ON HARDWARE COMPONENTS SELF-LOCATING OTHER HARDWARE COMPONENTS - A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location. | 12-18-2014 |
20140372596 | PASSIVE MONITORING OF VIRTUAL SYSTEMS USING AGENT-LESS, NEAR-REAL-TIME INDEXING - Aspects of the present invention provide a solution for passively monitoring a computer system. In an embodiment, a read-only target is created based on the configuration of the virtual server disk used by the virtual server to access the storage associated therewith. This read-only target can be used to expose the virtual server disk for access by a monitoring crawler. Using the read-only target, a monitoring crawler can acquire a set of features regarding the virtual server from the virtual server disk. One or more of this set of features can be analyzed to perform passive monitoring of the virtual server. | 12-18-2014 |
20140372597 | OPTIMIZING RESOURCE USAGE IN SYSTEMS WHICH INCLUDE HETEROGENEOUS DEVICES, INCLUDING SENSORS AND SMARTPHONES - Managing devices in a system may comprise receiving information associated with a first device in the system and a first set of capabilities provided in the first device; receiving information associated with a second device in the system and a second set of capabilities provided in the second device; determining one or more required capabilities that need to be activated for the system, the system comprising at least the first device and the second device; for each of the one or more required capabilities, selecting automatically by a processor based on the information received and one or more criteria, which capability in the first device and the second device to activate to satisfy the one or more required capabilities; and activating said selected capability in the first device or the second device. | 12-18-2014 |
20140372598 | OPTIMIZING RESOURCE USAGE IN SYSTEMS WHICH INCLUDE HETEROGENEOUS DEVICES, INCLUDING SENSORS AND SMARTPHONES - Managing devices in a system may comprise receiving information associated with a first device in the system and a first set of capabilities provided in the first device; receiving information associated with a second device in the system and a second set of capabilities provided in the second device; determining one or more required capabilities that need to be activated for the system, the system comprising at least the first device and the second device; for each of the one or more required capabilities, selecting automatically by a processor based on the information received and one or more criteria, which capability in the first device and the second device to activate to satisfy the one or more required capabilities; and activating said selected capability in the first device or the second device. | 12-18-2014 |
20140372599 | IP DEVICE DISCOVERY SYSTEMS AND METHODS - A method for Internet Protocol (IP) device discovery implemented in a control network having a gateway device, a router, and an IP device at a location. A location management system including a IP device at a location having an IP address assigned by a router at the location. A gateway device for managing a set of two or more local management devices at a location. | 12-18-2014 |
20140372600 | STORAGE DISK FILE SUBSYSTEM AND DEFECT MANAGEMENT SYSTEMS AND METHODS - In accordance with one or more embodiments of the present invention, methods and systems disclosed herein provide for storage disk file and defect management. According to an aspect, a method includes communicating, to a first computing device, an identifier associated with a storage device. The method also includes receiving, from the first computing device, maintenance information associated with the identifier. Further, the method also includes implementing a storage disk file management policy at the storage device based on the maintenance information. Maintenance or defect information may be provided, for example, for a disk subsystem comprised within a storage device. A disk subsystem with an identified potential defect, even though potential defect is latent, creates a risk to the software workloads running on the IT resource and a potential hazard in a datacenter. | 12-18-2014 |
20140372601 | MONITORING APPARATUS AND MONITORING METHOD - A monitoring apparatus monitors a transport network connected with a plurality of communication service providing apparatuses configured to provide a plurality of communication services. The transport network includes a plurality of transport apparatuses mutually connected with one another via a plurality of lines. The transport apparatus multiplexes data transmitted by the plurality of communication service providing apparatuses and transfers the multiplexed data via the plurality of lines within the transport network so that the plurality of communication services are accommodated in the plurality of lines. The monitoring apparatus determines whether there is a line at which a failure occurs among the plurality of lines. When determined that there is a line at which a failure occurs among the plurality of lines, the monitoring apparatus calculates a recovery priority indicating a degree of influence of the failure on the plurality of communication services. | 12-18-2014 |
20140372602 | AUTOMATIC HEALTH-CHECK METHOD AND DEVICE FOR ON-LINE SYSTEM - The invention provides an automatic health check method for on-line system, comprising the following steps: receiving current status data of the on-line system from the on-line system; updating historical status statistical data based on the current status data, wherein the historical status statistical data is a statistical result for the status data of the on-line system until a previous moment from the moment when the on-line system starts to operate; transmitting the updated historical status statistical data to the on-line system; and the on-line system determining whether it is operating normally according to the updated historical status statistical data. In addition, the present invention correspondingly provides an automatic health check apparatus for on-line system. The method and apparatus according to the present invention can provide an effective and reliable health check mechanism for an on-line system such as bank POS transaction system. | 12-18-2014 |
20140372603 | METHOD AND APPARATUS TO MAP SERVICE OFFERINGS TO SERVICE ITEMS - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 12-18-2014 |
20140372604 | METHOD AND APPARATUS TO MAP SERVICE OFFERINGS TO CATALOG CATEGORIES - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 12-18-2014 |
20140372605 | METHOD AND APPARATUS FOR CREATING TENANT SPECIFIC CATALOGS BY USE OF CATALOG CATEGORY MAPPING - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 12-18-2014 |
20140372606 | IT SYSTEM INFRASTRUCTURE PREDICTION BASED ON EPIDEMIOLOGIC ALGORITHM - A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. The computer-implemented method further comprises computing at least one server computing system of each of a class I server computing system, a class S server computing system, and a class R server computing system of the plurality of the server computing systems based on a deployment rate, an undeployment rate, and a removing rate of the each of the class I server computing system, the class S server computing system, and the class R server computing system. | 12-18-2014 |
20140372607 | ADJUSTING ALLOCATION OF DISPERSED STORAGE NETWORK RESOURCES - A method begins by a processing module of a dispersed storage network (DSN) monitoring, over time for a user device, an actual service level in comparison to a subscription service level, where the subscription service level has a range of acceptable service, where the actual service level is a statistical measure of accessing the DSN, where the DSN includes a plurality of DSN resources that, in turn, includes a first performance level dispersed storage processing unit, a second performance level dispersed storage processing unit, a plurality of first performance level storage units, and a plurality of second performance level storage units. When the actual service level is outside of the range of acceptable service, the method continues with the processing module adjusting allocation of one or more DSN resources of the plurality of DSN resources to bring a future service level back inside the range of acceptable service. | 12-18-2014 |
20140372608 | SYSTEM AND METHOD FOR PRESENCE NOTIFICATION BASED ON PRESENCE ATTRIBUTE - Methods and apparatuses are provided for providing a presence notification. A presence server receives a request including a filtering rule from a watcher client. The filtering rule is defined based on presence attributes of the watcher client. The presence server stores a notification blocking filter corresponding to the filtering rule, when the request has been authorized using authorization related information. | 12-18-2014 |
20140372609 | DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity. | 12-18-2014 |
20140379889 | AUTONOMOUS METRIC TRACKING AND ADJUSTMENT - Example embodiments relate to autonomous metric tracking and adjustment. In some examples, a computing node may include a processor to run a main operating system and an application that runs on top of the main operating system. The computing node may include a hardware-level controller that dynamically adjusts individual hardware components of the computing node via control signals that do not pass through the main operating system. The adjustments may be based on a target metric from a scheduling service external to the computing node and individual performance metrics from the computing node. | 12-25-2014 |
20140379890 | SYSTEM AND METHOD FOR OPTIMIZING AGENT LOGIN IN A CONTACT CENTER - An agent login optimization system for optimizing login of agents at communication managers of a contact center is provided. The agent login optimization system includes a monitoring module for monitoring predetermined activities at a plurality of communication managers in the contact center. The monitoring includes monitoring call traffic at the plurality of communication managers and monitoring login requests of agents. The agent login optimization system further includes a determination module configured to determine a suitable communication manager from the plurality of communication managers based upon the monitoring to login an agent. The agent login optimization system further includes an agent login module for logging the agent into the suitable communication manager. | 12-25-2014 |
20140379891 | Methods and Apparatuses to Identify User Dissatisfaction from Early Cancelation - In the present disclosure methods and apparatuses for identifying web page transactions causing user dissatisfaction is presented. The description disclose method steps and means for determining at least one network characteristic for all transactions associated with a web page and said user, determining a network characteristics function dependent on said at least one network characteristic using the transactions not associated with cancellations and for each cancelled transaction determining a value indicative of if said cancelled transaction was a result of user dissatisfaction by comparing said at least one network characteristic for said cancelled transaction with a value derived from said network characteristics function. | 12-25-2014 |
20140379892 | SORTED EVENT MONITORING BY CONTEXT PARTITION - An event monitoring system that includes two stages, an event sorting stage and an event processing stage. The event sorting stage receives events provided by at least one application, and includes multiple event sorting systems. The event processing stage includes at least one event processing system that processes events forwarded by the event sorting stage. The event processing system(s) is/are capable of processing events that fall within a particular set of one or more context partitions that correspond to the respective event processing system. As the event sorting system receives an event, the event sorting system identifies which context partition the event falls within. The event sorting system then identifies the event processing system that corresponds to the identified context partition of the event, and then forwards the event to the identified event processing system. The event processing system then applies the set of one or more monitoring rules. | 12-25-2014 |
20140379893 | Frequent Sites Based on Browsing Patterns - Various embodiments provide a frequent sites module which is designed to generate frequent sites for a user that include websites that are relevant to the user based on browsing patterns of the user. In one or more embodiments, the frequent sites are generated from user-engagement data that indicates engagement by the user with websites identified in the user's browsing history. A web platform, e.g., a web browser, can display the frequent sites for the user in a frequent sites user interface container to enable the user to efficiently navigate to the websites that are relevant to the user by selection of websites from the frequent sites user interface container. Various embodiments describe other aspects of frequent sites based on browsing patterns, including multiple-device frequent sites, device-specific frequent sites, domain-specific frequent sites, URL-specific frequent sites, decaying of frequent sites, recent frequent sites, and contextual frequent sites. | 12-25-2014 |
20140379894 | USING DIFFERENT CONNECTIVITY CHECKS TO DETERMINE CAUSES OF CONNECTIVITY ISSUES - Connectivity is tested using different locations and contexts selected from different possible failure zones. The failure zones may include: client failure zones; Internet failure zones; and online service failure zones. The results relating to different connectivity tests performed using the different failure zones are correlated and analyzed in an attempt to determine a root cause of the connectivity issue. For example, the root cause may be determined to be a configuration problem of the client, a problem with the client's networking equipment, an ISP problem, an Internet backbone problem; a problem of the online service, and the like. Different contexts may also be used when performing the tests. These results may be compared to the other connectivity test results. The results from the tests may be provided to the client experiencing the problem. Aggregated test results may also be used to detect service wide issues and trigger an alert. | 12-25-2014 |
20140379895 | NETWORK EVENT PROCESSING AND PRIORITIZATION - The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include an event analysis component and one or more processing devices configured to execute the event analysis component. The event analysis component can be configured to obtain multiple events that are generated by network devices in a networking environment. The event analysis component can also be configured to identify impactful events from the multiple events. The impactful events can have associated device-level or link-level impacts. The event analysis component can also be configured to determine one or more failure metrics for an individual impactful event. The one or more failure metrics can include at least a first redundancy-related failure metric associated with redundant failovers in the networking environment. | 12-25-2014 |
20140379896 | DISTRIBUTED LIVENESS REPORTING IN A COMPUTER NETWORK - In one embodiment, liveness reporting is performed using a distributed approach. The embodiments include a management node that is configured to receive a message containing an indication of activity or inactivity of one or more subject nodes, and determine which of the one or more subject nodes are active based on the received message. The indication is derived from one or more observer nodes observing network traffic of the one or more subject nodes. The embodiments further include one or more observer nodes configured to observe network traffic of the one or more subject nodes in the network, generate the message containing the indication of activity or inactivity of the one or more subject nodes, and transmit the message to the management node. | 12-25-2014 |
20140379897 | Low-Risk Deployment of Web Services - There are provided systems and methods for providing low-risk deployment of a web service. In one implementation, such a method includes testing the web service on one or more virtual machines assigned to a testing environment of the system, and reassigning the one or more virtual machines to a production environment of the system configured to service live traffic for the web service. The method also includes hosting the web service using the same one or more virtual machines used to test the web service. | 12-25-2014 |
20140379898 | VISUAL DIAGRAMMING TOOL FOR HARDWARE CONFIGURATIONS - A system and method for diagramming a remote hardware system. A method may include receiving data from a monitoring module about hardware components forming the remote hardware system, automatically organizing the data into a logical data structure, representative of the hardware components and communicative connections therebetween, and based on the logical data structure, automatically creating and outputting a visual diagram of the hardware components and the communicative connections therebetween to a display device, the diagram being a schematic representation of the remote hardware system's configuration. In one embodiment, connectivity errors may be automatically identified and flagged in the displayed diagram. Additionally, in some embodiments, the displayed diagram may be interactive, permitting manipulation of one or more of the hardware components or communicative connections therebetween. | 12-25-2014 |
20140379899 | AUTOMATIC ADJUSTMENT OF APPLICATION LAUNCH ENDPOINTS - The adjustment of a number of application launch endpoint servers that may be used to service incoming connection requests. Application launch endpoints are entities, such as running code, that may be used to launch other applications. Examples of endpoints include virtual machines or sessions in a session management server. The system load associated with the incoming connection rate and number of users is monitored. In response, an add threshold and a perhaps a remove threshold is calculated. If the system load rises above the add threshold, application launch endpoint server(s) are added to the set of endpoints that can handle incoming connection requests. If the system load falls below the remove threshold, application launch endpoint server(s) are removed from to the set of endpoints. The add and remove thresholds may be calculated per tenant, and adjusted based on tenant behavior. | 12-25-2014 |
20140379900 | CUMULATIVE NODE HEARTBEAT RELAY AGENTS IN CONSTRAINED COMPUTER NETWORKS - In one embodiment, a message instructing a particular node to act as a heartbeat relay agent is received at the particular node in a network. The particular node is selected to receive the message based on a centrality of the particular node. Heartbeat messages are then collected from child nodes of the particular node in the network. Based on the collected heartbeat messages, a heartbeat report is generated, and the report is transmitted to a collecting node in the network. | 12-25-2014 |
20140379901 | PROGRESSIVE DEPLOYMENT AND TERMINATION OF CANARY INSTANCES FOR SOFTWARE ANALYSIS - A data processing method, comprising: using computing apparatus, causing instantiating a plurality of baseline application instances that are running a first version of software, and one or more canary application instances that are running a second version of the software; using computing apparatus including a load balancer, causing selectively routing a first proportion of incoming requests to the baseline instances, and routing a second proportion of the incoming requests to the canary instances; monitoring the plurality of canary instances to collect performance data for performance metrics; determining that the performance data indicates a negative performance issue, and in response thereto: using computing apparatus, automatically updating the first proportion to be larger and updating the second proportion to be smaller, and then reconfiguring the load balancer based upon the first proportion and the second proportion; terminating one or more of the canary application instances. | 12-25-2014 |
20140379902 | CONFIDENCE SCORING OF DEVICE REPUTATION BASED ON CHARACTERISTIC NETWORK BEHAVIOR - The technology disclosed relates to detection of anonymous proxies and bots making requests to a cloud based resource on the Internet, such as a web server or an App server. The technology can leverage one or more of: instrumentation of web pages that samples response times and other characteristics of communications by a requestor device over multiple network segments; lack of prior appearance of the requestor device across multiple, independently operated commercial web sites; and resolver usage by the requestor. These signals can be analyzed to score a requesting device's reputation. A location reported by a user device can be compared to a network characteristic determined location. | 12-25-2014 |
20140379903 | METHOD AND APPARATUS FOR RATE ADAPTATION IN MOTION PICTURE EXPERTS GROUP MEDIA TRANSPORT - Apparatus and methods for a Motion Picture Experts Group (MPEG) media transport (MMT) device for sending or receiving media content is provided. The MMT device comprises a memory unit and a controller. The controller is configured to measure an available bandwidth, receive fragments of a first encoded stream of the media content and fragments of a second encoded stream of the same media content based on the available bandwidth and a current transmission bandwidth. A mixed encoded stream comprises the fragments received from the first encoded stream and the fragments received from the second encoded stream. | 12-25-2014 |
20140379904 | TIME SERIES DATA PROCESSING DEVICE, TIME SERIES DATA PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING TIME SERIES DATA PROCESSING PROGRAM - A time series data processing device for processing time series data that is a sequence of data received from a system that is a processing target over time includes a time series data search processing unit that receives, for details of the time series data and occurrence time information, a time series data search condition including events of a plurality of the time series data and an interval condition that is a condition of time intervals of the events occurring, and changes the interval condition using an allowable time lag that is allowable time of a set time lag in a transmission source of the time series data to thereby reflect the set time lag in the time series data search condition; and a data monitoring unit that monitors the time series data received from the system that is the processing target, using the time series data search condition changed by the time series data search processing unit. | 12-25-2014 |
20140379905 | NODE DEVICE AND NETWORK SYSTEM - A node device provided on a network has a log-information storage unit in which log information on the node device is stored, a control unit that performs processing of producing the log information during operation to store the log information in the log-information storage unit, a first sending and receiving unit that receives data from an outside of the node device and to send data to the outside of the node device, and a log processing unit that receives the data from the outside of the node device through the first sending and receiving unit and to perform processing of reading the log information from the log-information storage unit to cause the first sending and receiving unit to send the log information irrespective of the control unit when the received data comprises a log request command expressing a request for the log information. | 12-25-2014 |
20140379906 | METHOD FOR TRACKING USER INTERACTION WITH A WEB PAGE - The present invention relates to a method and a system for tracking user interaction between a user device ( | 12-25-2014 |
20140379907 | DATA PROCESSING APPARATUS USING NETWORK-ON-CHIP TECHNOLOGY AND CONTROL METHOD THEREFOR - A data processing apparatus which enables power saving in a NoC structure that is not limited in routing. The data processing apparatus has a plurality of data processing modules, which performs data processing, and a plurality of routers, which relays data transmission between the plurality of data processing modules. It is determined whether or not data is stored in a connected data processing module among the plurality of data processing modules, and according to a result of the determination, a power saving instruction or a wakeup interrupt is issued for the connected data processing module. | 12-25-2014 |
20140379908 | CLIENT IN DISTRIBUTED COMPUTING SYSTEM THAT MONITORS SERVICE TIME REPORTED BY SERVER IN ORDER TO DETECT PERFORMANCE PROBLEMS AND AUTOMATICALLY ISSUE ALERTS - A client device in a distributed system sends a request to a server via a network and receives a service time duration from the server. The service time duration corresponds to time that the server spent servicing the request. A processor of the client device compares the service time duration with a dynamically generated service time threshold, and automatically issues one or more alert messages to a network operation center (NOC) when the service time duration is greater than the service time threshold. The service time threshold is dynamically calculated according to historic service time durations received from the server for a plurality of previous requests sent by the client device. The service time threshold is dynamically calculated according to historic service time durations of only previous requests of a same type as the request, where the previous requests sent by the client device are of a plurality of types. | 12-25-2014 |
20140379909 | Methods, Systems, And Computer Program Products For Providing Intelligent Monitoring Services - Methods, systems, and computer program products for intelligent monitoring services are provided. A method includes sampling data over a defined time period and calculating a normative value for the defined time period based on the sampled data. The method also includes monitoring incoming data, comparing a monitored value for the incoming data to the normative value, and generating a responsive action when the monitored value deviates from the normative value. | 12-25-2014 |
20150012639 | Systems, Methods and Media for Collaborative Caching of Files in Cloud Storage - Systems, methods and media are provided for collaborative caching of files in a cloud storage directory. One method includes providing, at a cloud storage server having a cloud storage directory, an interface configured for forming one or more groups. Each group has a plurality of members. The method also includes monitoring the cloud storage directory including a plurality of files that is shared amongst members of a working group and, upon detecting a file activity related to one of the plurality of files, updating a profile for the file. The method further includes determining using the updated profile whether to distribute the file to the group members by applying a policy to the updated profile. The method also includes distributing the file to the group members by downloading the file to cloud storage devices associated with the group members when it is determined to distribute the file. | 01-08-2015 |
20150012640 | Native Application Hotspot - In one embodiment, a method includes detecting interception of data sent by the computing device to a first network resource through a communication network. The first network resource corresponds to a particular domain of the communication network. The method also includes determining whether the communication network is administered by the particular domain; and automatically generating a request to access the communication network that identifies a second network resource based at least in part on the determination. The second network resource is configured to authenticate a user to the particular domain of the communication network. The method also includes sending the request to the second network resource to access the communication network. | 01-08-2015 |
20150012641 | Chronically-Problematic Response Alert System for Service Request and Fulfillment Between a Service Requester and a Service Performer - An electronic alert system and a related method of operation for identifying, determining, and reporting chronically-problematic responses for service request and fulfillment between a service requester and a service performer are disclosed. In one embodiment, the electronic alert system identifies and determines a chronically-problematic response by analyzing two relational data sets. A first set of relational data set correlates time elapsed between a first service request bell press by a service requester from a service request device, and a confirmatory signal of successful service fulfillment from a service request reception device held by the service performer, or from the service request device. Furthermore, a second set of relational data set correlates a number of repeated service request bell presses by the service requester, a time interval between each bell press, and the confirmatory signal of successful service fulfillment from the service request device or the service request reception device. | 01-08-2015 |
20150012642 | METHOD AND SYSTEM FOR MONITORING INDEPENDENT INVENTORIES STATUS - An approach for enabling a monitoring system to immediately identify different types of transactions that occur within a service provider network is disclosed. A proactive monitoring system receives a notification of a change of status of at least one of a plurality of assets provisioned within a network of a service provider. The proactive monitoring system also generates an audit record based on the data independent of one or more transaction classifications, whether the change of status is related to a transaction performed by the service provider, or a combination thereof. | 01-08-2015 |
20150012643 | INFORMATION PROCESSING SYSTEM, DEVICE MANAGEMENT APPARATUS, AND ASSET MANAGEMENT APPARATUS - An information processing system includes an asset management apparatus; and a device management apparatus; wherein the asset management apparatus includes a storage part configured to store asset information representing an asset status of a device as an asset, and the device management apparatus includes a reception part configured to repeatedly receive operating information representing an operating condition of the device, an acquisition part configured to acquire the asset information from the asset management apparatus, and a determination part configured to determine whether to exclude a first period in which the asset status is a predetermined status from a second period for calculating an availability rate of the device based on the received operating information. | 01-08-2015 |
20150012644 | PERFORMANCE MEASUREMENT METHOD, STORAGE MEDIUM, AND PERFORMANCE MEASUREMENT DEVICE - A performance measurement method includes acquiring first time-sequential data including input operation data that is transmitted from a first computer to a second computer, and a first time information indicating a time when the input operation data being transmitted from the first computer, the input operation data being associated with the first time information; acquiring second time-sequential data including drawing processing data that is transmitted from the second computer to the first computer, and a second time information indicating a time when the drawing processing data being transmitted from the second computer, the drawing processing data being associated with the second time information; specifying a similar period in which the input operation data and the drawing processing data are similar; and calculating a difference between the first time information and the second time information corresponding to the similar period as a response time of the drawing processing data. | 01-08-2015 |
20150012645 | COLLECTIVE OVER-THE-TOP APPLICATION POLICY ADMINISTRATION - Various communication systems and devices may benefit from a collective based administration of policies for applications. For example, certain wireless communication systems and devices may benefit from administration of policies related to over-the-top data transmission. A method can include supervising a group of applications. The method can also include monitoring at least one self-optimization of each of a plurality of applications of the group. The method can further include sending a request to at least one of the plurality of applications based on whether the self-optimizations benefit the group as distinct from a respective application. | 01-08-2015 |
20150012646 | MEDIA CONTROL DEVICE, MEDIA CONTROL TARGET DEVICE, AND METHODS OF OPERATING SUCH DEVICES - A media control device transmits an HDMI connection validation message based on a home network protocol to a first media control target device via an IP-based home network. The first media control target device transmits a first message based on a CEC protocol to the second media control target device via a CEC-based network. The media control device receives an HDMI connection information message based on the home network protocol via the IP-based home network. The media control device validates an HDMI connection between the first media control target device and the second media control target device on the basis of the HDMI connection information message. | 01-08-2015 |
20150012647 | ROUTER-BASED END-USER PERFORMANCE MONITORING | 01-08-2015 |
20150012648 | APPARATUS AND METHOD FOR PROVIDING OPERATIONAL STATUS FOR MULTIPLE COMMUNICATION NETWORKS - An apparatus and method for providing operational status for multiple communication networks is described. The apparatus includes a first transceiver circuit configured to communicate with first devices using a first communication network medium and including a visual indicator representing the status of communication, a second transceiver circuit configured to communicate with a plurality of second devices using a second communication network medium, and a controller determining the status of communication between the apparatus and the plurality of second devices and providing the status to the visual indicator. The method includes determining if a device is operating in a first communication network, determining if the device is operating in a second communication network, and displaying a visual indication that the device is operating in the first communication network using a visual indicator on the device, the visual indicator being shared by the first communication network and the second communication network. | 01-08-2015 |
20150012649 | MANAGING NETWORK DATA DISPLAY - Systems and methods for monitoring performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to a set of resources. The processing device uses the performance metric information to identify a subset of the resources corresponding to a display location associated with a visible portion of a display and to assess performance related to processing of the identified subset of the resources. In some embodiments, the processed performance data may be used to identify timing information associated with the subset of the embedded resources. Aspects of systems and methods for identifying and testing alternative resource configurations corresponding to the content associated with the original set of resources and for determining whether to recommend a resource configuration for improving performance of subsequent client requests for the content are also provided. | 01-08-2015 |
20150012650 | Monitoring Handheld Devices in a User Testing Mode - A system and method are presented for monitoring handheld devices in a testing environment. At least one handheld device is provided, typically several, that is capable of performing a first plurality of functions in a non-test mode, and a more limited number of functions in a test mode. In a test environment the handheld device should be set to perform in the test mode. In the event of the handheld device mode being changed from the test mode to non-test mode, the handheld device generates a non-test mode signal. A monitoring software application records the non-test mode signal. In one aspect, the monitoring application is embedded in a remote proctor device. The remote proctor device monitoring application may send a mode interrogation message to the handheld device, and the handheld device generates the non-test mode signal in response to the mode interrogation message. | 01-08-2015 |
20150012651 | Enterprise-Level Management, Control And Information Aspects Of Cloud Console - A method, computer-readable medium, and system for monitoring usage of computing resources provisioned across multiple cloud providers and/or data centers are disclosed. Events associated with usage of a plurality of computing resources may be accessed, where the plurality of computing resources may implement a virtual machine, a plurality of virtual machines of a cloud computing environment, etc. The events may be associated with a start, a stop, a status change, etc., of the plurality of computing resources. The events may be used to generate usage data for the plurality of computing resources. The usage data may include historical data associated with previous usage of the plurality of computing resources. Additionally, the usage data may be displayed using a graphical user interface, thereby enabling monitoring and/or tracking of usage of computing resources provisioned across at least one cloud provider and/or at least one data center. | 01-08-2015 |
20150012652 | Method and Apparatus for Open Management of Multi-Media Services - An architecture which permits externalized management of services includes a number of management service capability (MSC) definitions. Each operator may associate a management service capability with a Service/Service Capability for managing various aspects of the Service/Service Capability. An interface enables a variety of different management systems to utilize a common MSC structure, independent of the information models, transport mechanisms and management interface of the system using the MSC. With such an arrangement, management related integration costs associated with integrating and bundling complex multi-media services is significantly reduced. | 01-08-2015 |
20150012653 | Adaptive Packaging of Network Resources - In one embodiment, a method includes accessing a data store comprising a log of requests transmitted by a plurality of remote hosts, each request corresponding to one or more resources maintained by a web site; analyzing the requests and one or more attributes of the resources corresponding to the respective requests using a cost function relating to network performance, wherein a first component of the cost function is directed to a performance improvement achieved by grouping one or more of the resources for transmission to one or more remote hosts and a second component is directed to a performance inefficiency caused by grouping the one or more resources for transmission to the one or more remote hosts; and identifying one or more groupings of one or more resources that optimize the cost function for network performance. | 01-08-2015 |
20150019704 | MANAGEMENT OF COMPUTING SESSIONS - A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session. | 01-15-2015 |
20150019705 | MANAGEMENT OF COMPUTING SESSIONS - A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session. | 01-15-2015 |
20150019706 | CLOUD SERVICES LOAD TESTING AND ANALYSIS - Embodiments of the invention provide systems and methods for providing services related to managing computer systems. More specifically, embodiments of the present invention provide for providing load testing services to remote computer systems. Generally speaking, such a service can allow a customer to capture and replay realistic workloads from production to test systems. The service can help the customer evaluate the impact of change on their system performance (e.g., upgrades, patches, application changes, schema changes, impact of adding more users, hardware changes, etc.) with a real-life workload captured from production and replayed on comparable test system restored to a captured “point in time.” More specifically, the load testing service can setup and capture workloads from production systems and re-execute them with high fidelity on test copies of production databases which have the changes implemented. | 01-15-2015 |
20150019707 | CLOUD SERVICES PERFORMANCE TUNING AND BENCHMARKING - Embodiments of the invention provide systems and methods for providing services related to managing computer systems. More specifically, embodiments of the present invention provide for providing performance tuning and benchmarking services to remote computer systems. Generally speaking, the service can provide functions to help customers maintain a consistent performance of their databases with minimal downtime by pro-actively addressing issues or bottlenecks with periodic assessments, monitoring of performance metrics that are causing stress throughout the term of the service, reporting violations of agreed upon thresholds for performance, and reactively helping customers address performance issues that arise with reactive tuning | 01-15-2015 |
20150019708 | Domain Classification Using Domain Co-Occurence Information - Domain classification based on domain co-occurrence information derived from client request behavior is provided. The network requests of clients are analyzed to determine domain and time information. Distance information is generated based on the time between requests for a plurality of domains. The distance information for individual clients is combined to generate distance information for domain pairs. The distance information represents an amount of time or other measurement between queries associated with the two domains of the pair. By examining the client requests, a measure of the distance or relatedness of two domains may be determined. Co-occurrence information for a first set of domains is generated based on the co-occurrence of domains in the first set with domains in a second set of domains. Based on the co-occurrence information, a domain classification can be generated for domains in the first set of domains. | 01-15-2015 |
20150019709 | METHOD AND APPARATUS FOR CONTROLLING INITIATION OF MULTI-SERVICE TRANSACTIONS - A method and apparatus are disclosed for controlling multi-service transactions. When a request to initiate a multi-service transaction is received, the transaction is not immediately initiated. Rather, a determination is first made as to which services need to be invoked in order to complete the transaction. A further determination is then made as to whether at least one of the services is likely to be unable to complete processing needed to further the transaction to completion. If at least one of the services is likely to be unable to complete processing needed to further the transaction to completion (thereby meaning that the overall transaction is likely to fail), then the transaction is not initiated at all. By doing so, the method/apparatus prevents transactions that are likely to fail from being started, which prevents waste of resources and other problems associated with partial processing of failed transactions from arising. | 01-15-2015 |
20150019710 | INTEROPERABILITY MECHANISMS FOR INTERNET OF THINGS INTEGRATION PLATFORM - A method of maintaining interoperability amongst Internet of Things (IoT) devices connected via an IoT integration platform is disclosed. The method includes: receiving a selection of a semantic label associated with an IoT device; determining a recommendation of an interoperable rule based on the semantic label, the interoperable rule having a condition trigger and an action policy for execution at satisfaction of the condition trigger; presenting the recommendation on a rule management interface; and receiving a confirmation from a user through the rule management interface to activate the interoperable rule. | 01-15-2015 |
20150019711 | SERVER SYSTEM AND A DATA TRANSFERRING METHOD THEREOF - A server system includes a plurality of server nodes and a management module. Each server node includes a node control module that gathers operation state information of a corresponding server node. The node control module communicates with the management module through an uplink data channel. The operation state information of the corresponding server node is packaged into a data packet by each node control module. The data packet is automatically transferred to the management module by the node control module through the uplink data channel according to a default value. When the management module receives the data packet, the management module analyzes the data packet so as to control operation of the server node according to the operation state information of the server node. | 01-15-2015 |
20150019712 | METHOD FOR DETERMINING NETWORK TOPOLOGY - Presented is a method of determining network topology. A determination is made whether a remote port on a first network device for establishing a layer 2 connection is an aggregate port. If the remote port is an aggregate port, identify the aggregate port and a coupled second network device based on Management Information Base (MIB) attributes. Identify a base port of the second network device from the aggregate port on the first network device, and a local interface index number corresponding to the identified base port from a mapping between local interface index numbers and corresponding base ports of the second network device. | 01-15-2015 |
20150019713 | Control Groups for Network Testing - Novel tools and techniques are provided for testing performance of network connections. In some cases, a method for testing performance of a network connection might comprise establishing a plurality of test points within one or more segments in the network connection. With a computer, performance of a selected segment of the network connection at one or more first test points may be tested. The selected segment might have a first endpoint and a second endpoint. The performance of one or more sub-segments of the selected segment at one or more second test points may also be tested with the computer. The computer may also determine an isolated performance of a particular one of the sub-segments based on the testing. In some instances, the method might further comprise determining, with the computer, that performance of the one or more sub-segments has affected performance of the network connection. | 01-15-2015 |
20150019714 | PHYSICAL ENVIRONMENT PROFILING THROUGH INTERNET OF THINGS INTEGRATION PLATFORM - A method of profiling a physical environment via Internet of Things (IoT) devices connected via an IoT integration platform is disclosed. The method includes: receiving data streams from network-capable devices connected to the IoT integration platform; detecting presence of an entity in a physical environment surrounding or interacting with one or more of the network-capable devices from a subset of the data streams; storing an entity profile on a node graph representing the physical environment, wherein each entity profile is associated at least one of the network-capable device from which the presence is detected; and requesting a semantic label of the entity profile from a user of a first user account via one or more user interfaces. | 01-15-2015 |
20150019715 | Methods and Systems for Performance Monitoring for Mobile Applications - The present invention is directed towards methods and systems for performance monitoring for mobile applications. In an embodiment, a method of monitoring performance of a mobile application is provided. A mobile application is operated on a wireless mobile device. A progress indicator being displayed on a display screen of the mobile device during operation of the mobile application on the wireless mobile device is automatically detected. Data indicative of a time duration of the progress indicator is obtained. The data indicative of the time duration is communicated to a centralized server. | 01-15-2015 |
20150019716 | METHODS AND APPARATUSES FOR TRANSMITTING AND RECEIVING DATA AND RECORDING MEDIUM FOR EXECUTING THE METHODS - A method of transmitting data, the method includes transmitting a frame containing at least one data packet; generating at least one detection packet for detecting a loss of a last data packet among the at least one data packet; and in response to the last data packet of the frame being transmitted, transmitting the at least one detection packet so that the detection packet is transmitted subsequent to the data packet. Whether or not the last data packet is lost is determined by using the detection packet. | 01-15-2015 |
20150019717 | CONTEXT-AWARE PROXIMITY SERVICES - Disclosed herein are a variety of systems, operations, MAC primitives, and procedures for context-aware Peer-to-Peer communications and multi-application Peer-to-Peer communications. An example system for a context-aware Peer-to-Peer communications system may include a physical and Medium Access Control (PHY/MAC) layer and an upper layer above the PHY/MAC layer. The PHY/MAC layer may include at least one of a discovery function, an association function, a data transceiving function, a channel management function, a general scan function, a synchronization function, a power control function, or management and reporting function. The upper layer may be one of a service layer or an application layer. | 01-15-2015 |
20150019718 | METHOD FOR SERVICE DISCOVERY IN WIRELESS PERSONAL AREA NETWORK - Disclosed are methods for service discovery in a wireless personal area communication network. A method for service discovery, performed in a terminal, the method comprises performing a passive scan for searching a specific service based on whether to receive a frame including a specific service identifier; and, when it fails to search the specific service, performing an active scan which broadcasts a service discovery request command frame for searching the specific service. Thus, service discovery may be efficiently performed by reducing the operation complexity of the terminal and minimizing the power consumption of the terminal needed for service discovery, without support of a upper layer. | 01-15-2015 |
20150019719 | MAPPING/TRANSLATION TECHNIQUES FOR GENERATING ASSOCIATIONS BETWEEN NETWORK ADDRESSES AND ATTRIBUTES THAT WERE NOT DIRECTLY OBSERVED - In one embodiment, a mapping/translation technique is provided for generating an association between an observed network address and one or more attributes that are not directly observed. A network address is observed that is associated with a source device. A first attribute is determined, the first attribute being a directly observed attribute. The first attribute is mapped to a second attribute based on at least a predefined spatial, temporal, or identity-related correspondence between the first attribute and the second attribute, wherein the second attribute was not directly observed in connection with the network address. An association is generated between the second attribute and the network address. A record that maintains the association between the second attribute and the network address is stored. | 01-15-2015 |
20150019720 | DETERMINING FIXED/MOBILE AND PROXY/NON-PROXY NETWORK ADDRESSES - In one embodiment, a processing technique is provided for determining a refined attribute of a network address based on one or more other attributes. A network address associated with a source device in communication with a network is observed. One or more first attributes of the network address are determined, where the one or more first attributes indicate at least a spatial or temporal property of the network address. The one or more first attributes are processed to determine a second attribute to be associated with the network address, where the second attribute indicates whether the network address is a fixed or mobile network address, or is a proxy or non-proxy network address. A record is stored that maintains the association between the second attribute and the network address. | 01-15-2015 |
20150019721 | METHOD AND SYSTEM FOR CORRELATION OF INTERNET APPLICATION DOMAIN IDENTITIES AND NETWORK DEVICE IDENTIFIERS - System and methods for determining a relationship between an application-level identifier and a network-level identifier are provided. In one implementation, a discovery server receives a data request that includes an application-level identifier and a transitory network-level identifier. Based on the transitory network-level identifier, the discovery server determines a stable network-level identifier, and further maps the application-level identifier to the stable network-level identifier. | 01-15-2015 |
20150019722 | DETERMINING, MANAGING AND DEPLOYING AN APPLICATION TOPOLOGY IN A VIRTUAL ENVIRONMENT - A method and a system for determining, managing and deploying an application topology in a virtual environment are provided. QoS parameters, workload attributes and application topology elements are received. An application topology and a deployment strategy are determined based on the received one or more of QoS parameters, workload attributes, application topology elements and application topology patterns. Virtual environment components are identified based on the determined application topology and the deployment strategy. After the application topology is deployed, the QoS parameters of the virtual environment components are monitored. After analyzing the monitored QoS parameters with expected QoS parameters, a QoS parameter variance is detected. If the detected QoS parameter variance exceeds the pre-defined threshold, a corrective action for the application topology is determined. | 01-15-2015 |
20150019723 | METHOD AND APPARATUS FOR PROCESSING MESSAGES - The present disclosure relates to a method and apparatus for processing messages. The terminal message processing method According to one embodiment of the present disclosure, the method for processing terminal messages used by the apparatus for processing terminal messages can include the steps of: receiving a message from an application of the terminal; determining whether the message is from a pre-registered registration application; when the message is from the registration application, determining whether the message is a control message; and when the message is not from the registration application, transmitting the message to a device for processing server messages. According to one embodiment of the present disclosure, a message processing apparatus and method for reducing the transmission and reception of a control message for an application are provided, and battery consumption is reduced. | 01-15-2015 |
20150019724 | Adaptive Analysis of Diagnostic Messages - Adaptive processing of alert messages allows proactive maintenance. Alert messages are monitored and compared to a threshold. If a threshold number of the alert messages is exceeded, diagnostic codes are retrieved and a query value may be adjusted. | 01-15-2015 |
20150019725 | SERVER RESTART MANAGEMENT VIA STABILITY TIME - A computer-implemented method for monitoring server stability based on a stability time specification of a server includes specifying a stability time for the server, wherein the stability time is defined as a time between a starting state of the server and a stability point of the server. The server activity is monitored by an availability manager to determine an availability status of the server. Responsive to the server activity progressing to the stability point within the stability time, an embodiment determines that the server is stable. Responsive to the server activity failing to progress to the stability point within the stability time, an embodiment determines that the server is unreliable. | 01-15-2015 |
20150019726 | METHOD, APPARATUS AND SYSTEM FOR DEVICE DISCOVERY - The present invention provides a method, an apparatus and a system for device discovery. The method includes: acquiring, by a first device, a user identification of a target user, and acquiring, according to the user identification of the target user, broadcast information of a second device which the target user logs in; when broadcast information of another device is monitored through a D2D function, matching, by the first device, the monitored broadcast information with the broadcast information of the second device, and if the match is successful, determining, by the first device, that the second device and the first device are within a preset distance. According to the present invention, the accuracy of discovering a short distance user is improved and, thus, the problem in the prior art that the accuracy of discovering a user in a short distance cannot be guaranteed by using a cell ID is solved. | 01-15-2015 |
20150026330 | GENERATING UNIQUE IDENTIFIERS FOR MOBILE DEVICES - Systems and methods for generating unique identifiers for devices are disclosed. In some implementations, a set of characteristics of a device is received. The set of characteristics identifies an operating system (OS) and a manufacturer of the device. Whether the set of characteristics also includes a first identifier of the device is determined. The first identifier uniquely identifies the device among devices of a same OS and a same manufacturer as the device. Upon determining the set of characteristics includes the first identifier, a unique ID for the device is generated based on the OS of the device, the manufacturer of the device, and the first identifier. Upon determining the set of characteristics lacks the first identifier, a second identifier associated with the device is received. The unique ID is generated based on the OS of the device, the manufacturer of the device, and the second identifier. | 01-22-2015 |
20150026331 | APPARATUS AND METHOD FOR MANAGING MOBILE DEVICE SERVERS - A method that incorporates teachings of the present disclosure may include, for example, receiving at a media resource center a first pairing key from a first mobile device server and enabling the first mobile device to access at least one media device based on the first pairing key, where the at least one media device is operably coupled with the media resource center, where the first mobile devices provides media services by executing a web server application that utilizes the at least one media device, and where the first mobile device communicates with a second mobile device server to provide the media services. Other embodiments are disclosed. | 01-22-2015 |
20150026332 | Method and Apparatus to Securely Process Streams of Data of Network / Storage / Compute Devices of Private Enterprise Clouds in Real-time from the Public Cloud - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 01-22-2015 |
20150026333 | NETWORK SYSTEM, NETWORK MANAGEMENT APPARATUS AND APPLICATION MANAGEMENT APPARATUS - A network management apparatus is configured to: receive transmitted information acquisition request; generate, based on topology storage area, an application edge device list indicating at least one edge network device through which the traffic for providing an application indicated by the information acquisition request passes; identify a route through which the traffic for providing the application indicated by the information acquisition request passes, based on the generated application edge device list and the provision source of the application indicated by the information acquisition request; acquire quality information on the identified route; and transmit the acquired quality information to the application management apparatus. | 01-22-2015 |
20150026334 | METHOD FOR DISTINGUISHING TYPE OF COMMUNICATION NETWORK AND METHOD FOR PROVIDING CONTENT USING SAME - A method of determining the type of communication network. The method comprises measuring latency between the content server and a device that made a content transmission request, determining whether the measured latency is longer than a predetermined reference, and determining the content transmission request to be for over the mobile communication network if the measured latency is longer than the predetermined reference. Content can be provided through the mobile communication network and the Internet communication network by operating a single content server while distinguishing between the mobile communication network and the Internet communication network, without requesting content by installing an additional program by the client or operating an additional content server for the mobile communication network. Content can be provided more quickly by distinguishing between the mobile communication network and the Internet communication network. Content in different formats can be provided according to the type of the communication network. | 01-22-2015 |
20150026335 | METHODS AND APPARATUS FOR EVENT LOGGING IN AN INFORMATION NETWORK - Methods and apparatus for logging, analysis, and reporting of events such as reboots in a client device (e.g., consumer premises equipment in a cable network) using applications. In one aspect, an improved event logging and monitoring system is provided within the device with which the application(s) can interface to record event or error data. In one exemplary embodiment, the client device comprises a digital set-top box having Java-enabled middleware adapted to implement the various functional aspects of the event logging system, which registers to receive event notifications (including resource exhaustion data) from other applications running on the device. The network operator can also optionally control the operation of the logging system remotely via a network agent. Improved client device and network configurations, as well as methods of operating these systems, are also disclosed. | 01-22-2015 |
20150026336 | SYSTEMS, METHODS, AND DEVICES FOR DYNAMIC RESOURCE MONITORING AND ALLOCATION IN A CLUSTER SYSTEM - In an embodiment, the systems, methods, and devices disclosed herein comprise a computer resource monitoring and allocation system. In an embodiment, the resource monitoring and allocation system can be configured to allocate computer resources that are available on various nodes of a cluster to specific jobs and/or sub-jobs and/or tasks and/or processes. | 01-22-2015 |
20150026337 | TECHNIQUES FOR WEB SERVER MANAGEMENT - Techniques for provisioning and decommissioning web servers in an automated manner. In one embodiment, a threshold value relating to an operational metric of a web server can be stored. The metric can be monitored as the web server receives requests. If the metric exceeds the threshold value, additional web servers can be automatically provisioned to handle a portion of the requests. If the metric falls below the threshold value, the additional web servers can be automatically decommissioned. In another embodiment, information can be logged pertaining to web server requests received over time. Based on this information and a threshold value, patterns of high/low server load can be determined and a policy can be generated identifying time intervals during which additional web servers should be provisioned (or existing web servers should be decommissioned). The policy can be used at server runtime to provision or decommission web servers at the identified intervals. | 01-22-2015 |
20150032872 | Selectively Using Network Address Translated Mapped Addresses Based on their Prior Network Reachability - In one embodiment, network address translated (NAT) mapped addresses are selectively used based on their prior network reachability. One embodiment maintains for each particular mapped address (e.g., NAT public address pool member), a reachability status level based on prior usage of the particular mapped address to communicate with external destinations. By continuously monitoring the reachability “health” of mapped addresses, problem-experiencing mapped addresses can be avoided. One embodiment monitors the success and/or failure rates of connection attempts over a rolling time period to provide an up-to-date current view of the reachability status level of corresponding mapped addresses. In one embodiment, a network address translation device assigns, based on their reachability status level, these mapped addresses. One embodiment provides an administrative notification for particular mapped address or ceases using the particular mapped address in response to its reachability status level falling outside a predetermined or calculated level. | 01-29-2015 |
20150032873 | ACTIVITY ANALYSIS FOR MONITORING AND UPDATING A PERSONAL PROFILE - Provided are techniques for activity analysis for monitoring and updating a personal profile. User activities are monitored to create a user activity log. The user activity log and a user profile are analyzed using one or more profile entity to activity mappings to identify one or more suggestions for updating the user profile. The one or more suggestions are provided to update the user profile. In response to acceptance of at least one of the suggestions, the user profile is updated. | 01-29-2015 |
20150032874 | COMPUTER DATA VOLUME TRACKER SYSTEM AND METHOD - A system and computer implemented method for use with an user device in communications with an enterprise system (ES) in a workplace, includes: tracking data volume and usage times, via a data volume tracker application, of one or more enterprise software applications in the user device; storing the data volume, duration of usage times and actual date and time of usage in a memory wherein the data volume tracker application differentiates the stored data transferred to and from each service provider, for each connection type and for each of the enterprise software applications; and periodically reporting the stored data to a central computer of the ES, wherein the data volume tracker application, the enterprise software applications and the memory are each resident on the user device. | 01-29-2015 |
20150032875 | ADAPTIVE POLLING OF INFORMATION FROM A DEVICE - A capability is provided for adaptive polling of a device based on a set of polling control regions configured to control polling of the device. The set of polling control regions is defined based on at least one of a set of control parameters and non-parametric control information. A transition within the set of polling control regions is determined based on a current polling control region and a target polling control region that is determined based on input information received while in the current polling control region. The input information may include at least one of values of one or more parameters in the set of parameters and non-parametric input information. The transition may include remaining in the current polling control region or transitioning to a new polling control region. The transition may be performed based on a rapid up controlled down (RUCD) transition scheme. | 01-29-2015 |
20150032876 | MEASURING RESPONSE TRENDS IN A DIGITAL TELEVISION NETWORK - Techniques and systems for providing a trend server outside a content provider network to communicate with the content provider network to build a trend record based on responses received from the content provider network for monitoring certain activity trend or tendency in the content provider network and provide an alert when the content provider network behaves abnormally. | 01-29-2015 |
20150032877 | FAULT-TOLERANT MONITORING APPARATUS, METHOD AND SYSTEM - A fault-tolerant monitoring apparatus is arranged to monitor physical performance properties of a plurality of networked computing elements, each element including a processing unit and individual memory. The monitoring apparatus comprises a plurality of measurer apparatuses, each arranged to measure the physical performance properties of a single computing element, the physical performance properties being stored as local information in the individual memory of the computing element in which the measurement is made; and one or more collector apparatuses arranged to control collection of remote information representing physical performance properties from individual memory in a plurality of the computing elements; and storage of the remote physical performance information as replicate information in the individual memory of another computing element; wherein the remote physical performance information is collected using third party access. | 01-29-2015 |
20150032878 | Method and Apparatus to Securely Process Streams of Data of Network devices of Private Enterprise Clouds in Real time from the Public Cloud - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 01-29-2015 |
20150032879 | Method and Apparatus to Securely Process Streams of Data of Compute Devices of Private Enterprise Clouds in Real time from the Public Cloud - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 01-29-2015 |
20150032880 | Method and Apparatus to Securely Process Streams of Data of Storage Devices of Private Enterprise Clouds in Real time from the Public Cloud - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 01-29-2015 |
20150032881 | Method and Apparatus to Securely Process Streams of Data of Network Devices of Private Enterprise Clouds in Batch from the Public Cloud - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 01-29-2015 |
20150032882 | System and Method for Dynamically Grouping Devices Based on Present Device Conditions - A method to dynamically group devices based on device information, which is associated with a system for monitoring the device information that communicates information between a device and an enterprise. Information is collected from a device information source to obtain an actual status of a device. The actual status of the device is compared to a stored status of the device. The stored status is stored on a server of the enterprise. The enterprise determines if the actual status has been changed from the stored status. When a change is detected, the method performs at least one of the acts of automatically disassociating the device from a group that reflects the stored status and automatically associating the device with a new group to reflect the actual status. | 01-29-2015 |
20150032883 | METHOD OF IDENTIFICATION OF MULTIMEDIA FLOWS AND CORRESPONDING APPARTUS - The present invention generally relates to identification of multimedia flows, comprising
| 01-29-2015 |
20150032884 | METHOD AND SYSTEM FOR COMBINING TRACE DATA DESCRIBING MULTIPLE INDIVIDUAL TRANSACTION EXECUTIONS WITH TRANSACTION PROCESSING INFRASTRUCTURE MONITORING DATA - A transaction monitoring and tracing system which combines transactional performance monitoring aspects with infrastructure performance and utilization measures, like e.g. used memory or CPU load of transaction executing computing infrastructure. The system uses two types of agents deployed to the monitored system, a transaction and process agent, which is deployed to a process executing monitored transactions, and a host agent, which is deployed to a computer system executing processes monitored by a transaction and process agent. The transaction and process agent provides transaction tracing and process infrastructure measurements, the host agent provides host or operating system infrastructure measurements. All three types of measurements are tagged by the corresponding agent in a way that allows a later correlation of corresponding tracing and measurement data by an external monitoring node. Combining transactional and infrastructure monitoring allows fast detection of non-transactional root causes of monitored transaction performance degradations. | 01-29-2015 |
20150032885 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD - An image processing apparatus includes: a storage unit that stores image data; a transfer-path determining unit that determines a transfer path via which the image data is to be transferred from among multiple transfer paths connected to the storage unit; a selection unit that selects the transfer path via which the image data is to be transferred based on the determined transfer path; and an access-request control unit that issues a next access request to the storage unit after waiting a response to an already-issued access request to the storage unit when the determined transfer path is changed from a transfer path used in most recent transfer of the image data. | 01-29-2015 |
20150032886 | Remote Real-Time Monitoring System based on cloud computing - A remote real-time monitoring system based on cloud computing is disclosed, comprising: a monitored terminal which is a terminal for collecting data and processing control on site, a management terminal which is a user terminal for performing remote monitoring and managing on the monitored terminal, and a cloud monitoring platform. The monitored terminal and the management terminal are connected to the cloud monitoring platform through a network comprising GPRS, 3G, broadcast TV network, telecommunication network, power carrier network and satellite via the Internet. A monitoring service system operated on the cloud monitoring platform stores, analyzes and computes data sent by the monitored terminal A monitoring service system, a fault diagnosis system and a report analysis system and etc. are also mounted to monitor states of the monitored terminal and pre-warn a fault in real time. | 01-29-2015 |
20150032887 | Cloud-Based Access Management and Activity Monitoring of Mobile Devices - A control application executed on a target mobile device monitors applications used on the target mobile device and reports the monitored usage to a monitoring device. The control application receives access restrictions from the monitoring device, where each access restriction specifies a condition defined by a first user for causing the target mobile device to take an action restricting use of the target mobile device by a second user. If the control application detects satisfying of the condition specified by an access restriction, the control application enforces the access restriction at the target mobile device by taking the action specified by the access restriction to restrict the user of the target mobile device by the second user. | 01-29-2015 |
20150032888 | NETWORK EVENT MANAGEMENT - An apparatus for predicting a network event flood comprises an event rate detector for detecting rates of event emissions from one or more devices; an aggregator for producing an aggregate rate and an aggregate rate trend of the rates of event emissions from a plurality of the devices; a level generator for generating a plurality of levels comprising maximum acceptable event rate values of a plurality of the aggregate rate trends over plural time periods; a storage component for storing the plurality of levels; a comparator for comparing a current aggregate rate trend with at least a selected one of the levels; and a signaller for signalling a predicted event flood responsive to the comparator detecting that the current aggregate rate trend will exceed the at least a selected one of the levels at a first point in time. | 01-29-2015 |
20150032889 | MULTI-TASKER - The disclosure is directed to presenting a unified view of tasks and applications across multiple computing devices of a user. A unified view of the tasks can be presented using a task manager. The task manager presents a list of tasks that are executing at each of the devices. The user can perform multiple actions on the tasks, e.g., launch on a first device a task executing on a second device from the first device, or terminate from the first device a task that is executing on the second device. A unified view of the applications can be presented using an app tray. The app tray displays a list of apps installed on each of the devices of the user. In displaying the list on a particular device, the app tray displays the apps that are not installed on the particular device in a distinct format, e.g., as shadow icons. | 01-29-2015 |
20150032890 | PARENTAL CONTROL OF MOBILE CONTENT ON A MOBILE DEVICE - A method of parental control of content on a mobile device includes monitoring traffic activities on a mobile device and detecting suspicious traffic. | 01-29-2015 |
20150039744 | ELASTIC WAN OPTIMIZATION CLOUD SERVICES - In one embodiment, a cloud network provides cloud services to the one or more clients, where data usage of each client is monitored on a per client basis. If the data usage of any client is above a first predetermined threshold, then a WAN optimization platform is automatically implemented within the cloud network for the client having the data usage determined to be above the first predetermined threshold. | 02-05-2015 |
20150039745 | PERFORMANCE AND SECURITY MANAGEMENT OF APPLICATIONS DEPLOYED IN HOSTED COMPUTING ENVIRONMENTS - Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts. The agents capture and record system events from operating systems on the hosts that result from application component processes executing on the hosts. The system further includes a collection and analysis engine that obtains captured and recorded system events from the agents, identifies captured and recorded system events that pertain to an application transaction, and produces, from the identified system events, metric data reflecting quantity of computing resources used by the application component processes to process the application transaction. The system also includes a web dashboard that presents the metric data to a user, for example, on a web page. | 02-05-2015 |
20150039746 | METHODS AND SYSTEMS FOR IMPROVING WEBSITE PERFORMANCE - Methods and systems of the present invention allow for improving website performance. An exemplary method may comprise the steps of calculating a website quality score for a website (which may indicate the website's effectiveness), identifying changes to the website's attributes that would improve the website's quality score, and modifying the website to include such changes. | 02-05-2015 |
20150039747 | COMMUNICATION DEVICE EVENT CAPTURES - A user interaction or a timer event is detected in a communication device. A timestamp is associated with the user interaction or the timer event. In response to detecting the user interaction or the timer event in the communication device, the user interaction or the timer event and the timestamp are stored in a packet log file associated with the communication device. The packet log file can also include a packet trace of packets that are sent to and received by the communication device. This allows the user interactions and/or the timer events to be displayed chronologically in relation to the packets sent to and received by the communication device. | 02-05-2015 |
20150039748 | NETWORK STATE SERVER FOR APPLICATION PROVIDERS - State information relating to an operational state of a network may be provided to services, such as services provided by application servers, and used to enhance the providing of the services to devices. In one implementation, the state information may be received and may include: (1) information relating to the operational state of a particular portion of a network; or (2) information relating to the operational state of the network as relevant to a particular mobile device connected to the network. A request for the state information may be received from an application server that provides services based on the state information. The request may include an identification of the particular portion of the network or an identification of the particular mobile device. The requested state information may be provided to the application server. | 02-05-2015 |
20150039749 | DETECTING TRAFFIC ANOMALIES BASED ON APPLICATION-AWARE ROLLING BASELINE AGGREGATES - Various exemplary embodiments relate to a method of detecting anomalies in network traffic. The method includes: receiving a plurality of accounting reports from an application assurance device, the accounting reports indicating a metric of network performance; aggregating the metric from a plurality of accounting reports to determine a plurality of aggregated metrics corresponding to a plurality of intervals; storing the aggregated metrics in a database in association with the corresponding plurality of intervals; determining a rolling baseline for a current time period based on metrics of intervals corresponding to a primary partition and a sub-partition; comparing a metric for a current time period to the rolling baseline; and determining that an anomaly is occurring if the metric for the current time period differs from the rolling baseline by more than a pre-defined threshold. | 02-05-2015 |
20150039750 | METHOD OF LINKING TO AND MONITORING MACHINING DEVICES THROUGH A CLOUD SERVICE - A method of linking to and monitoring machining devices through the cloud service enables a user to use a cloud app on the cloud to link to machining device at a specific client through a cloud service. The cloud service has API function commands for the cloud app to call and use. The client has an integrated execution module to connect to the machining device. The integrated execution module on the client links to the cloud service through a cloud connection module. | 02-05-2015 |
20150039751 | DYNAMIC PARALLEL COORDINATES VISUALIZATION OF NETWORK FLOWS - Methods and systems for providing dynamic parallel coordinates visualization of network flows are described. One example method includes identifying protocol metadata associated with a plurality of network flows on a network; analyzing the protocol metadata associated with the network flows to determine one or more metadata attributes associated with the network flows; and presenting a parallel coordinates visualization of the network flows, the parallel coordinates visualization including a plurality of axes, each axis corresponding to one of the determined metadata attributes, wherein each of the network flows is represented as a line interconnecting respective points on each of the axes of the parallel coordinates visualization, and wherein a position of each point on its respective axis represents a value of the metadata attribute associated with the axis for the network flow represented by the line. | 02-05-2015 |
20150039752 | Advanced BACNet router - In a BACnet Internetwork, a BACnet Router is configured to improve communications between BACnet devices by caching the addresses and data parts of messages sent between the devices, for diagnostic purposes, to avoid duplication of information, perform proxy functionality and address duplicate device and Network address information. | 02-05-2015 |
20150039753 | SYSTEM AND METHOD FOR CAPACITY PLANNING FOR SYSTEMS WITH MULTITHREADED MULTICORE MULTIPROCESSOR RESOURCES - A method for expressing a hierarchy of scalabilities in complex systems, including a discrete event simulation and an analytic model, for analysis and prediction of the performance of multi-chip, multi-core, multi-threaded computer processors is provided. Further provided is a capacity planning tool for migrating data center systems from a source configuration which may include source systems with multithreaded, multicore, multichip central processing units to a destination configuration which may include destination systems with multithreaded, multicore and multichip central processing units, wherein the destination systems may be different than the source systems. Apparatus and methods are taught for the assembling of and utilization of linear and exponential scalability factors in the capacity planning tool when a plurality of active processor threads populate processors with multiple chips, multiple cores per chip and multiple threads per core. | 02-05-2015 |
20150039754 | METHOD OF ESTIMATING ROUND-TRIP TIME (RTT) IN CONTENT-CENTRIC NETWORK (CCN) - A method of estimating a round-trip time (RTT) is provided. The method may include providing content requested by an interest packet with an identifier to identify a second node that sends the content to the first node, determining a processing time (PT) in which an interest packet is processed in the second node, based on an arrival time in which the content is received by the first node, evaluating an instantaneous RTT for the content received by the first node, based on an arrival time in which the content with the identifier is received at the first node, a sending time in which the interest packet is sent to the second node, or the determined PT, and estimating an RTT for the interest packet based on the evaluated instantaneous RTT. | 02-05-2015 |
20150039755 | ANALYSIS OF NETWORK TRAFFIC - Embodiments generally disclosed herein include a computer-implemented method for monitoring and correlating network traffic data associated with a primary network that is in communication with a plurality of secondary networks. The method generates a network traffic data set by monitoring network traffic between the primary network and the plurality of secondary networks. The method also determines a mapping of network connectivity by monitoring inter-network routing information between the primary network and the plurality of secondary networks. In addition, the method generates a traffic measurement data set by monitoring network utilization statistics between the primary network and the plurality of secondary networks. With the collected data sets, the method then calculates a relational network mapping between the primary network and the plurality of secondary networks by correlating the network traffic data set, the mapping of network connectivity, and the traffic measurement data set. | 02-05-2015 |
20150039756 | PROVIDING PER-APPLICATION RESOURCE USAGE INFORMATION - An environment is described in which a processing system provides application-level usage information to users. In one scenario, for example, the processing system may provide personal usage information to a user who is operating a user device. The personal usage information itemizes the amount of data (and/or other resources) that has been consumed by each application run by the user device. In another scenario, the processing system may provide expected usage information associated with at least one candidate application provided by a marketplace system. The expected usage information describes an expected consumption of data (and/or other resources) by the candidate application upon running the candidate application by the user device. The processing system can tailor the expected usage information that it sends to a particular user based on user profile data. The user profile data describes a manner in which users operate applications. | 02-05-2015 |
20150039757 | ADVANCED INTELLIGENCE ENGINE - An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like. | 02-05-2015 |
20150039758 | Electronic Adverse Event Reporting System - An adverse event reporting system and related methods are provided. Aspects relate to associating a unique identifier of a device with resolution information configured to be automatically transmitted in response to an adverse event with the device. A consumer experiencing an adverse event with a remote device may use a communications device, such as a mobile phone, to capture and/or transmit the unique identifier, which may be located on or by the device. In one embodiment, capturing or deciphering the identifier causes the communications device to be directed to a virtual address for reporting the adverse event. The unique identifier may be used to automatically transmit resolution information to a second communications device that is not associated with the consumer. The second communications device may be associated with a vendor responsible for operation of the implicated device. The resolution information may comprise the identity and/or location of the device. | 02-05-2015 |
20150046578 | MOBILE TROUBLE TICKET - A device is configured to determine that the device is experiencing a problem, and to determine a problem type associated with the problem. The device is configured to determine a set of questions, based on the problem type, and to provide the set of questions to a user of the device. The device is configured to receive user input including responses to the set of questions. The device is configured to determine device information associated with one or more hardware components, hardware attributes, or software attributes associated with the user device. The device is configured to generate a trouble ticket based on the set of questions, the user input and the device information, and to transmit the trouble ticket. | 02-12-2015 |
20150046579 | METHODS AND APPARATUS TO DE-DUPLICATE IMPRESSION INFORMATION - Example methods and apparatus to de-duplicate impression information. An example method includes accessing a first set of cookies and a set of user identifiers, the cookies and user identifiers corresponding to devices accessing media via the Internet, identifying a pattern in the first set of cookies, obtaining impression information from a database proprietor, the impression information comprising a second set of cookies, identifying a subset of the second set of cookies that are associated with a same person based on the pattern, and associating impressions corresponding to the identified subset with the same person. | 02-12-2015 |
20150046580 | INFORMATION NOTIFICATION METHOD, INFORMATION NOTIFICATION SYSTEM, AND SERVER DEVICE - An information notification method for providing information from a server device to a plurality of devices connected to a network, including: reading notification information stored in association with information indicating a particular action of a user; acquiring operation histories of the plurality of devices; estimating, based on operation histories of one or more devices owned by the user among the plurality of devices, a no-operation period during which the user is unlikely to operate the one or more devices; determining, based on current operation state of the one or more devices, whether the particular action has been performed outside the no-operation period; and transmitting, when outcome of the determining is affirmative, the notification information associated with the particular action to a destination device among the one or more devices owned by the user. The destination device provides the user with the notification information. | 02-12-2015 |
20150046581 | COMMUNICATION SYSTEM, MANAGEMENT APPARATUS, COMMUNICATION METHOD AND COMPUTER-READABLE RECORDING MEDIUM - In this invention, a start request terminal transmits start request information including participation restriction information and participation authentication information to a management system. A transmission/reception unit of a participation request terminal transmits, to the management system, participation request information with which the participation request terminal requests participating in an established session. A state management unit determines whether a participation permitted terminal ID in a terminal management table matches the terminal ID of the participation request terminal, and when the participation permitted terminal ID in a terminal management table matches the terminal ID of the participation request terminal, the transmission/reception unit transmits the participation authentication information to the participation request terminal to inquire the participation authentication information. The participation determination unit compares the participation authentication information about the participation request terminal and the participation authentication information in the terminal management table, and determines whether to allow participation in the established session. | 02-12-2015 |
20150046582 | APPARATUS FOR INTERNETWORKED WIRELESS INTEGRATED NETWORK SENSORS (WINS) - The Wireless Integrated Network Sensor Next Generation (WINS NG) nodes provide distributed network and Internet access to sensors, controls, and processors that are deeply embedded in equipment, facilities, and the environment. The WINS NG network is a new monitoring and control capability for applications in transportation, manufacturing, health care, environmental monitoring, and safety and security. The WINS NG nodes combine microsensor technology, low power distributed signal processing, low power computation, and low power, low cost wireless and/or wired networking capability in a compact system. The WINS NG networks provide sensing, local control, remote reconfigurability, and embedded intelligent systems in structures, materials, and environments. | 02-12-2015 |
20150046583 | SYSTEM TO ENHANCE PERFORMANCE, THROUGHPUT AND RELIABILITY OF AN EXISTING CLOUD OFFERING - In for enhancing performance of applications, a cloud application programming interface (API) abstraction layer receives a request from an application of a given entity for core services shared among a plurality of entities. A requestor of the request is determined, and the performance level information for the requestor is determined based on entity specific performance rules defined by the given entity. The entity specific performance rules defined by the given entity are applied to requests from the application of the given entity and are not applied to requests from the other entities of the plurality of entities. The performance level information is included in the request. The request is routed for servicing by one or more of the core services using the performance level information in the request without affecting servicing of requests from other entities of the plurality of entities. | 02-12-2015 |
20150046584 | FABRIC NETWORK - Systems and methods relating to communication within a fabric network are presented. The fabric network includes one or more logical networks that enables devices connected to the fabric to communicate with each other using various profiles known to the devices. A device sending a message may follow a general message format to encode the message so that other devices in the fabric may understand the message regardless of which logical networks the devices are connected to. Within the message format, a payload of data may be included for the receiving device to forward, store, or process the message. The format and the contents of the payload may vary according to a header within the payload that indicates a profile and a message type within the profile. Using the profile and message type, the receiving devices may decode the message to process the message. | 02-12-2015 |
20150046585 | INTER-APPARATUS CONNECTION VERIFICATION SUPPORT SYSTEM, WEB SERVER APPARATUS AND INTER-APPARATUS CONNECTION VERIFICATION METHOD - A system includes a medical diagnostic imaging apparatus configured to generate medical images of subjects and to generate connection verification support information to be used by a connection-target apparatus to verify connection with medical diagnostic imaging apparatus; a peripheral apparatus expected to be connected with the medical diagnostic imaging apparatus via a communication network and configured to operate the medical images generated by the medical diagnostic imaging apparatus; and a web server apparatus configured to record the connection verification support information generated by the medical diagnostic imaging apparatus. The peripheral apparatus verifies connection with the medical diagnostic imaging apparatus by using the connection verification support information acquired from the web server apparatus. | 02-12-2015 |
20150046586 | SYSTEM AND METHOD FOR AUTOMATICALLY OPTIMIZING CAPACITY BETWEEN SERVER CLUSTERS - A resource management system for a virtual machine computing environment includes a software component that optimizes capacity between server clusters or groups by monitoring the capacity of server clusters or groups and automatically adding and removing host systems to and from server clusters or groups. The software component may be implemented at a server cluster management level to monitor and execute host system moves between server clusters and/or at a higher level in the resource management hierarchy. At the higher level, the software component is configured to monitor and execute host system moves between sets of server clusters being managed by different server cluster management agents. | 02-12-2015 |
20150046587 | SIGNALING OPTIMIZATION IN A WIRELESS NETWORK FOR TRAFFIC BASED ON HEART-BEAT MESSAGES - A method of optimizing management of presence information over a mobile network includes determining, by a host server, the presence information of a user of a mobile application on a mobile device based on heartbeat messages, while a first connection between the mobile device and the host server is closed, wherein the user is determined to be online when heartbeat messages are received from the mobile device in regular intervals of time. The user is determined to be offline when heartbeat messages are not received from the mobile device. The method may further include maintaining or closing a second connection between the host server and a content server based on the presence information of the user. Maintaining the second connection allows the content server to determine that the user is online, and closing the second connection allows the content server to determine that the user is offline. | 02-12-2015 |
20150052236 | LOAD BASED TARGET ALTERATION IN STREAMING ENVIRONMENTS - A method is provided in one example embodiment and includes receiving, at a virtual server, a request for video content from a client device; identifying a policy for a set of transform sessions; accessing a resource monitor in order to evaluate current load conditions associated with the virtual server; and determining an action to take based on the current load conditions. | 02-19-2015 |
20150052237 | TRANSMISSION OF LARGE DATA FILES OVER AN EXTENSIBLE SCRIPTING FILE FORMAT - Network management requests may be transmitted in JSON messages over a WebSocket connection to a network device. The network device may process the request and generate a response. The response may be transmitted back over the WebSocket connection in a series of partial response messages. A method of transmitting large data over the WebSocket connection includes transmitting a first message having an identifier value through a WebSocket connection and transmitting a second message having the identifier value through the WebSocket connection, in which the second message comprises an end-of-response indicator. | 02-19-2015 |
20150052238 | Device Compatibility Management - Methods and systems for automatically providing a notification of an operational problem between two devices are provided. The method may include searching online content for user feedback comments associated with a first device and a second device. Sentiment analysis may be performed for the user feedback comments and ian operational problem that occurs between the first device and the second device may be identified based on the sentiment analysis. Next, a notification of the operational problem may be provided. Additionally, a probable cause associated with the operational problem may be identified and a suggested solution based on the identified probable cause may be provided. The suggested solution may correct the operational problem between the first device and the second device. | 02-19-2015 |
20150052239 | CONTEXT BASED SPECTRUM MANAGEMENT SYSTEM - Generally, this disclosure provides systems, devices, methods and computer readable media for context based spectrum management. A device may include a user preference determination module to determine a level-of-service preference of a user of the device, the preference associated with an application. The device may also include a user state determination module, to determine a state of the user, and a device capability determination module, to determine capabilities of the device. The device may further include an application programming interface (API) to provide the context to a cloud-based server configured to manage spectrum. The context includes the preference, the state and the capabilities. The API is further configured to receive content delivery options from the cloud-based server. | 02-19-2015 |
20150052240 | METHOD AND IMPLEMENTATION FOR NETWORK INSTRUMENTATION AND TRAFFIC DISPOSITION WITH TIMESTAMPS - A device for instrumentation and traffic disposition of a network using one or more time-stamps may include a receiving port to receive a data packet. A device configuration module may be configured to determine whether the device is a boundary device located on a boundary of an instrumented sub-network of the network. If the determination is made that device is the boundary device, a frame processing module may insert a first time-stamp at a first offset from a frame checksum (FCS) field in a data frame associated with the data packet. Otherwise, a corresponding time-stamp may be inserted at a second offset from the FCS field. The one or more time-stamps may enable a receiving endpoint device of the network to determine timeliness information associated with the data packet. | 02-19-2015 |
20150052241 | COMPUTER SYSTEM PRODUCTIVITY MONITORING - Embodiments of the inventive subject matter include an apparatus comprising a processor and a computer readable storage medium having computer usable code. The computer usable code can be configured to gather information about a computer system. The computer usable code can be further configured to generate a profile of performance of the computer system based on the information about the computer system. The computer usable code can be further configured to generate a profile of usage of the computer system based on the information about the computer system. The computer usable code can be further configured to analyze the profile of performance of the computer system against the profile of usage of the computer system. The computer usable code can be further configured to determine that productivity of the computer system is inhibited based on the analysis of the profile of performance against the profile of usage. | 02-19-2015 |
20150052242 | INFORMATION PROCESSING SYSTEM, METHOD OF CONTROLLING INFORMATION PROCESSING SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM FOR CONTROLLER - An information processing system includes a plurality of information processing apparatuses and a controller that controls the information processing apparatuses. The controller includes a selector that selects one of the information processing apparatuses, as a collecting unit, each of the information processing apparatus including a retriever that retrieves historical information items from the other information processing apparatuses, the retriever being operable after the information processing apparatus is assigned as the collecting unit; and a collector that collects the historical information items to generate collected information. | 02-19-2015 |
20150052243 | TRANSPARENT SOFTWARE-DEFINED NETWORK MANAGEMENT - Systems and methods for network management, including adaptively installing one or more monitoring rules in one or more network devices on a network using an intelligent network middleware, detecting application traffic on the network transparently using an application demand monitor, and predicting future network demands of the network by analyzing historical and current demands. The one or more monitoring rules are updated once counters are collected; and network paths are determined and optimized to meet network demands and maximize utilization and application performance with minimal congestion on the network. | 02-19-2015 |
20150052244 | Sticky Order Routers - A sticky order routing system may include multiple order routers in communication with an electronic exchange for communicating transaction messages. Each of the order routers communicates transaction messages between multiple associated trading sessions and the electronic exchange, where of the associated trading sessions is assigned to the order router in communication with the electronic exchange. Transaction message traffic between the order routers and the electronic exchange is monitored, such as randomly, based on round-robin assignment, and/or trading data. In response to transaction message traffic exceeding a threshold, the trading session may be assigned to a new order router. | 02-19-2015 |
20150052245 | Methods, Apparatus and Articles of Manufacture to Monitor Media Devices - Methods, apparatus, systems and articles of manufacture to monitor media devices are disclosed. An example media device includes a data port to receive a removable storage device; and an application instrumented to obtain first data associated with a monitoring event of the application; reference the data port to retrieve a panelist identifier from the removable storage device in response to the monitoring event; and convey the first data and the panelist identifier to a remote computer. | 02-19-2015 |
20150052246 | SYSTEMS AND METHODS FOR MODELING QUALITY OF SERVICE FOR STREAMING MEDIA - A monitoring device includes a video buffer model and a user model. The video buffer model monitors a media program streaming across a network to a media client for perceivable transmission impairments. The user model reflects user dissatisfaction due to types of perceivable transmission impairments and timing, duration, and frequency of perceivable transmission impairments so as to estimate a quality of experience of the media program. The parametric model can include one or more parameterized functions, and a set of parameters used in at least one of the one or more of the parameterized functions at a point in time during the streaming of the media program can be based on a type of perceivable transmission impairment associated with the point in time. | 02-19-2015 |
20150058469 | Monitoring NAT Behaviors Through URI Dereferences in Web Browsers - A method comprising dereferencing, in a web browser, a Uniform Resource Identifier (URI) comprising a web resource and a reflex tag, creating a request message comprising a request for the web resource and a reflex request corresponding to the reflex tag, wherein the reflex request is a request for address and port information from a web server comprising the web resource, encapsulating the request message in a transport message comprising an Internet Protocol (IP) address and a port of the web browser, transmitting the transport message to the web server, receiving a response message from the web server, wherein the response message comprises a second IP address and a second port number of the browser as seen by the web server, and determining a characteristic of at least one Network Address Translation (NAT) device coupled between the web browser and the web server based on the second IP address and second port number. | 02-26-2015 |
20150058470 | SYSTEM AND METHOD FOR SHARING VXLAN TABLE INFORMATION WITH A NETWORK CONTROLLER - A method and system for sharing host entries between virtual tunnel endpoints (VTEPs). The method includes making a first determination that an NLHE is present in a locally learned host entry table on a VTEP where the NHLE is associated with a first timestamp, and making a second determination that a first entry corresponding to the NHLE is present in a Host-Specific Portion of Global Host Entry Table (HSPT) on the VTEP, where the first entry is associated with a second timestamp. Based on the second determination, making a third determination, using the timestamps, that the NHLE is more recent than the first entry and based on the third determination updating an active forwarding table on the first VTEP to include a second entry corresponding to the NHLE and to remove the first entry and sending the NHLE to a VXLAN controller operatively connected to the VTEP. | 02-26-2015 |
20150058471 | Measuring Resource Consumption in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for measuring resource consumption in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes determining, by a processing device, that a resource of an application of a multi-tenant Platform-as-a-Service (PaaS) system is initializing, the resource marked for usage tracking, accessing a list of initialization operations used in the initialization of the resource, determining that each of the initialization operations prior to a create usage record operation in the mapping are performed successfully, and creating a usage record for the resource using the create usage record operation. | 02-26-2015 |
20150058472 | DYNAMIC FILTERS FOR POSTED EVENT MESSAGES INITIATED AUTOMATICALLY BY EQUIPMENT - A system and method is disclosed for improving the efficiency of a service department when maintaining equipment. The equipment performs self-diagnosis and periodically reports a problem or other event by automatically generating an event code indicating that an event has occurred that requires maintenance of the equipment. The system then automatically posts initial information about the event on a secure message board, such as within the company's website, for access by one or more authorized personnel via a network. The event code is applied to a look-up table pre-programmed with rules identifying authorizations of certain personnel to receive posted information about the event and to contribute to a posting thread. A communications controller then applies the rules to the thread as the event is being resolved by the authorized personnel. Authorized personnel are allowed to dynamically modify the rules after the posting of the initial information. | 02-26-2015 |
20150058473 | NETWORK ADDRESS MAPPING TO NEARBY LOCATION IDENTIFICATION - In one implementation, software workload or device addresses (e.g., IPv4 or IPv6 addresses) are mapped to a nearby physical location identification. The physical location of a dematerialized workload or a device is determined by associating the network address of the dematerialized workload or device to the address of a physical tag. First, the physical tag is sensed in the vicinity of a physical device using short-range technology. Radio frequency identification (RFID), Bluetooth, barcode, near field communication (NFC), or other localized sensing of the location is used to provide the physical location identification. By letting a virtualized endpoint sense the physical location of a nearby physical device, locality is determined. | 02-26-2015 |
20150058474 | QUALITY OF SERVICE AGREEMENT AND SERVICE LEVEL AGREEMENT ENFORCEMENT IN A CLOUD COMPUTING ENVIRONMENT - A device may receive traffic to be processed by one or more cloud computing resources associated with a cloud computing service provided via a cloud computing environment. The device may determine enforcement policy information associated with the traffic. The device may determine an aggregated performance metric associated with the traffic. The aggregated performance metric may be based on information associated with the one or more computing resources that are assigned to process the traffic. The device may determine a maximum performance metric associated with the traffic, and the maximum performance metric may be identified in the enforcement policy information. The device may compare the aggregated performance metric and the maximum performance metric, and may manage the traffic based on comparing the aggregated performance metric and the maximum performance metric. | 02-26-2015 |
20150058475 | DISTRIBUTED POLICY-BASED PROVISIONING AND ENFORCEMENT FOR QUALITY OF SERVICE - Embodiments of the disclosure provide techniques for measuring congestion and controlling quality of service to a shared resource. A module that interfaces with the shared resource monitors the usage of the shared resource by accessing clients. Upon detecting that the rate of usage of the shared resource has exceeded a maximum rate supported by the shared resource, the module determines and transmits a congestion metric to clients that are currently attempting to access the shared resource. Clients, in turn determine a delay period based on the congestion metric prior to attempting another access of the shared resource. | 02-26-2015 |
20150058476 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing device includes a communication unit that makes communication with a plurality of service providing devices; a receiving unit that receives information relating to use of a function, which is provided by the information processing device, from one service providing device among the plurality of service providing devices; and a notification unit that notifies the other service providing device about a state of the information processing device through the communication unit in response to the reception of the information by the receiving unit. | 02-26-2015 |
20150058477 | COMMAND PERFORMANCE MONITORING - Command performance may be monitored. In a monitoring transaction, a product may be selected from a plurality of products in one group of a plurality of groups of products. Execution performance of a command by the selected product may be monitored. The monitored execution performance may be provided for determining compliance with a service level agreement for the product based on the monitored executed performance. | 02-26-2015 |
20150058478 | INFORMATION PROCESSING DEVICE LOAD TEST EXECUTION METHOD AND COMPUTER READABLE MEDIUM - An information device provided with: a test storage unit that stores test scenarios that include standby time comprising multiple instances of processing in which a request is sent and response to the request is received, and in which the time between sending and receiving is time during which a TCP connection is disconnected; a generation unit that generates a load generation unit that executes a test scenario and applies a load to a system that has been designated as a target for having a load applied thereto; a parameter storage unit that stores parameters for determining the length of the standby time; a parameter adjustment unit that adjusts parameters so that the desired number of requests per unit time reach the system; and a communication control unit that disconnects the TCP connection during the standby time that is included in the test scenario which is being executed by the load generation unit. | 02-26-2015 |
20150058479 | Method for Scalable Measuring of Connectivity Between Two Way Active Measurement Protocol (TWAMP) Entities - The present invention relates to method and arrangements to measure connectivity between Two Way Active Measurement Protocol TWAMP entities comprising a session-server ( | 02-26-2015 |
20150058480 | Measuring Instrument Access Apparatus, Field Device, and Method for Controlling the Access to a Measuring Instrument - A measuring instrument access apparatus receives a data packet for a field device unit and extracts external addressing information and instruction information. The measuring instrument access apparatus forwards the extracted information to a management device. The management device translates a field device feature from the external addressing information into internal addressing information of the field device unit and forwards a request to the field device unit. | 02-26-2015 |
20150058481 | METHOD & APPARATUS FOR MEASURING POWER, BANDWIDTH AND MONITORING THE OPERATION OF A NETWORK INFRASTRUCTURE FROM ANOTHER NETWORK INFRASTRUCTURE - A method and apparatus for the measurement of power consumption, bandwidth usage and the monitoring of the operation of a network from another network. The primary intended application is for an enterprise network (1 | 02-26-2015 |
20150058482 | SYSTEM INSIGHT DISPLAY - A system insight display includes a complex programmable logic device (CPLD), a network connecting module, and a baseboard management controller (BMC). The CPLD monitors a plurality of states of a plurality of function components. The BMC connects the CPLD through a predefined bus. The BMC can receive information corresponding to the plurality of states from the CPLD and establish a user interface to indicate the plurality of states. The BMC can respond to a display request from a remote computer through the network connecting module to display information regarding the plurality of states to the user interface. | 02-26-2015 |
20150058483 | PROVIDING SERVER PERFORMANCE DECISION SUPPORT - An application provides server performance decision support to end-users. The application monitors the transaction data of servers. The transaction data includes network communications as well as server specific information such as resource utilization. The application captures a sample of the transaction data. The captured sample can be random or predetermined. The sample is limited in length according to a preset time value. The application analyzes the sample to determine performance metrics for the server. The application presents the performance metrics within a business intelligence data structure to enable an end-user to data mine the performance metrics according to additional variables. | 02-26-2015 |
20150067136 | Rapid and Precise Methodology for Massive Small Cell Deployment - Small cell deployment may be provided. First, access point data may be captured by a technician device from an access point. Next, the access point data may be transmitted from the technician device to a backend server. The technician device may then receive post-check results corresponding to the access point from the backend server. The post-check results may be based on the transmitted access point data. | 03-05-2015 |
20150067137 | REDUCING BUFFER BLOAT WHILE PROBING FOR ADDITIONAL BANDWIDTH IN AN ADAPTIVE BITRATE NETWORK - In one embodiment, a device receives data from a network at a TCP buffer at a selected data rate, and copies the data from the TCP buffer to a decoder buffer at a reading rate. Once decreasing the reading rate to decrease a level of the decoder buffer, the device may increase the reading rate to an upshift probe rate, and monitors a TCP buffer level during reading at the upshift probe rate to determine whether the network can support the upshift probe rate. If the TCP buffer level decreases to a lower threshold during the upshift probe rate, the device returns to read data from the TCP buffer by the decoder buffer at the reading rate. If the TCP buffer level stays above the lower threshold during the upshift probe rate, the device may trigger a corresponding upshift in a send rate from a sender of the data. | 03-05-2015 |
20150067138 | OPTIMIZE DATA EXCHANGE FOR MVC-BASED WEB APPLICATIONS - Embodiments of the present invention disclose a method, computer program product, and system for reducing network traffic. In one embodiment, a computer determines that a webpage has changed and that an amount of data to be transmitted to update the portion of the webpage that has changed is smaller than an amount of data to be transmitted to update the entire webpage. | 03-05-2015 |
20150067139 | AGENTLESS MONITORING OF COMPUTER SYSTEMS - An agentless monitor may monitor a remote server through a communication session. The monitor may transmit commands for execution on the remote server by a simulated user. Results from the executed commands may be returned to the agentless monitor for parsing and execution of logical rules. The agentless monitor may be used, for example, to identify and terminate looping processes executing on the remote server before failure or performance degradation of the remote server. | 03-05-2015 |
20150067140 | PREDICTING SERVICE DELIVERY METRICS USING SYSTEM PERFORMANCE DATA - A method for predicting a computerized service delivery organization workload including collecting data of a computer implementing service delivery routine including overlapping samples of load values, overlapping samples of performance values, overlapping samples of event outputs, ticket values and ticket volumes, building a first correlation of said load values with said performance values for predicting new performance values based on new data, building a second correlation of said performance values with said event outputs, said ticket values and said ticket volumes, combining said first and second correlations into a third correlation for correlating said load values with a ticket volume and an event volume, and determining at least one projected event volume or projected ticket volume value using said third correlation and at least one projected load value of said computer. | 03-05-2015 |
20150067141 | ANALYTICAL DEVICE CONTROL SYSTEM - Analytical device control servers transmit analytical parameter information and analysis data concerning the analysis being controlled to a system control server at a predetermined time interval. When the system control server detects a fault in an analytical device control server, the system control server determines a new assignment destination from among other normally functioning analytical device control servers, transmits analytical parameter information and analysis data saved in an analysis information storage unit to the assignment destination analytical device control server, and transmits a command to continue execution of control of analysis of the analytical device to that analytical device control server. | 03-05-2015 |
20150067142 | AGGREGATION OF METRICS FOR TRACKING ELECTRONIC COMPUTING RESOURCES BASED ON USER CLASS HIERARCHY - An improved technique involves collecting data from a hosting environment that provides access to electronic computing resources and computing aggregated metrics from the data for a particular level of a user class hierarchy by aggregating metric values collected for subordinate levels of the user class hierarchy. Along these lines, a tracking server, upon receiving resource usage data, arranges the data in entries having values of metrics that describe some attribute related to resource usage and pertaining to a user class hierarchy. For a given level of the user class hierarchy, the tracking server performs an aggregation operation (e.g., a summation) of metric values over entries pertaining to subordinate levels of the user class hierarchy. The tracking server stores the result of the aggregation operation in an aggregation table for future report generation. | 03-05-2015 |
20150067143 | SYSTEM FOR VIRTUAL MACHINE RISK MONITORING - A virtual machine may allow execution of applications decoupled from physical hardware. The virtual machine may be executed by the physical hardware in a data center. A system can monitor and assess performance and reliability of the virtual machine based on device records of network components of the data center that are supporting operation of the virtual machine. | 03-05-2015 |
20150067144 | Method and System for Detecting Network Printers without Prior Knowledge of Network Topology - In one example, we describe a method and system for detecting network printers without any knowledge of the network topology. Discovery (our solution) uses three different utilities: Discover Computers runs on a domain attached computer, with a domain user account. It queries AD (Directory Services) and gets lists of users, groups, and computers. The computer list is then used by Discover Ranges. Discover Ranges uses Computers.txt and queries the DNS for the IP addresses. It builds a list of IP addresses used by Discover Printers. Discover Printers uses IPRanges.csv, and with 40 threads, opens port 9100 on each IP address. When successful, it then requests web page(s) to determine manufacturer and model for each device. The end result is UnivDriverlmport.csv, which is directly importable into the Universal PS Driver Wizard in the output management module. Other details and variations are also presented here. | 03-05-2015 |
20150067145 | DATA RATE MONITORING TO DETERMINE CHANNEL FAILURE - Data channels of a computer system may be remotely monitored to detect data channel degradation. A monitoring agent on a client may execute script commands on the remote computer system to monitor input/output (I/O) rates of a set of channels. The monitoring agent may compute an average data rate of the data channels and compare the I/O rate of each channel to the average. When the rate of a channel falls below the average by at least a threshold amount, an alert may be generated to indicate to an administrator a possible failure with the data channel. | 03-05-2015 |
20150067146 | CUSTOM CORRELATION OF A DISTRIBUTED BUSINESS TRANSACTION - A mechanism is provided for customizing communication of correlation data between servers using a custom or proprietary communication protocol. The system may modify a payload transmitted between servers to include monitoring parameters. The payload may be modified by expanding a portion of the payload or otherwise inserting data into the payload. The portion may include a header, footer, an additional property, a field, or other portion of the header. A mechanism may detect both outgoing calls and incoming requests to either modify the request with the payload or retrieve the payload from the request. The configuration preferences received from a user may be used to process the detected calls and modify a payload at a designed portion suitable to be expanded. Once sent, the configuration parameters may be used by a recipient server to detect the request with the modified payload and retrieve the monitoring parameter. The monitoring parameter may be used to correlate distributed transactions that occur over a set of servers which communicate with non-standard protocols. | 03-05-2015 |
20150067147 | GROUP SERVER PERFORMANCE CORRECTION VIA ACTIONS TO SERVER SUBSET - Business transactions and the nodes processing the transactions are monitored and actions are applied to one or more nodes when a performance issue is detected. A performance issue may relate to a metric associated with a transaction or node that processes the transaction. If a performance metric determined from data captured by monitoring does not satisfy a health rule, the policy determines which action should be performed to correct the performance of the node. When a problem is detected for multiple nodes, the present technology may address a subset of the multiple nodes rather than apply an action to each node experiencing the problem. When a solution is found to correct the problem with the subset of nodes, the solution may be applied to the other nodes experiencing the same problem. | 03-05-2015 |
20150067148 | AUTOMOTIVE OPEN SYSTEM ARCHITECTURE (AUTOSAR)-BASED COMMUNICATION METHOD AND COMMUNICATION APPARATUS THEREOF - An Automotive Open System Architecture (AUTOSAR)-based communication method and communication apparatus. According to an exemplary embodiment, the AUTOSAR-based communication method may filter input data, using a data range filter, a first valid data filter, or a second valid data filter, in order to decrease the length of an interrupt operation, and improve processing speed of an overall application system. | 03-05-2015 |
20150067149 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 03-05-2015 |
20150067150 | SYSTEMS AND METHODS FOR PROACTIVE MEDIA DATA SHARING - In some embodiments, a computer implemented method, a system, and/or a non-transitory computer readable medium can receive an actionable rule that represents user intent to share media data. The actionable rule can be analyzed to determine a set of conditions and a set of actions included in the actionable rule. The actionable rule, including the set of conditions and the set of actions, can be stored in a rule database. Context data can be acquired from a context database. Whether or not the set of conditions is satisfied based on the acquired context data can be determined. The set of actions can be executed when the set of conditions is satisfied based on the acquired context data. In some cases, executing the set of actions can include, at least in part, initiating a sharing of the media data with at least one target system. | 03-05-2015 |
20150067151 | SYSTEM AND METHOD FOR GATHERING AND DISPLAYING DATA IN AN ITEM COUNTING PROCESS - Methods and systems for providing information about production lines in a process environments are provided. In one embodiment, a method for providing a notification of a production line status includes receiving a status indication of a production line from a tracker associated with the production line. The method further includes transmitting the status indication from the tracker to a server. Finally, the method includes transmitting the notification from the server to a client device, wherein the notification comprises the status indication. | 03-05-2015 |
20150067152 | MONITORING SYSTEM, SYSTEM, AND MONITORING METHOD - A monitoring system includes an access unit, an access result analyzer, a creator, and an output unit. Based on access data that defines an order of one or more access processes necessary for receiving a service and access information used in the respective access processes, the access unit accesses a service providing system that provides the service and acquires access results of the respective access processes. The access result analyzer analyzes the access results and generates access result information on the respective access processes. Based on the pieces of access result information, the creator creates a report on whether the service is capable of being provided. The output unit outputs the report. | 03-05-2015 |
20150067153 | REMOTE MONITORING OF DATA FACILITY IN REAL-TIME USING WIRELESS SENSOR NETWORK - A method of monitoring a status of one or more computing devices in a computing system environment includes deploying a sensor network including a plurality of sensors to monitor multiple operating parameters of one or more computing devices of said computing system environment, each sensor being associated with one of said one or more computing devices. A base station computing device collects operating parameter data for the computing devices and analyzes the operating parameter data to (a) predict a failure of said one or more computing devices and/or (b) identify a fault condition of said one or more computing devices. Computing device operating parameters monitored include one or more of an operating temperature, a vibration, a cooling air flow rate, and a battery charge level. Monitoring systems for use in the method are disclosed. | 03-05-2015 |
20150067154 | Internet of Things Event Management Systems and Methods - Internet of Things (IoT) event objects can be tailored to specific device types and capabilities. An IoT event object can use a flexible definition of an event that can be reconfigured. An IoT event object allows for the ability to set different triggering conditions and priorities. Individual event definitions can be extended to create more complex events. A Notification Handler supports sending a request or command in response to an event that requires action. | 03-05-2015 |
20150067155 | SYSTEMS AND METHODS FOR MEASURING APPROXIMATE ENGAGEMENT OF USERS IN A SOFTWARE APPLICATION - Methods and systems are provided for measuring user engagement with an application. Heartbeat messages are sent from the application being monitored on a mobile computing device to a tracking server. Heartbeat messages may be stored on the mobile computing device for later transmission to the tracking server in situations where network connectivity is unavailable. A user session record is stored by the tracking server, and is closed upon a failure to receive a heartbeat message before a timeout interval elapses. A closed user session record may be reopened upon receiving a subsequent heartbeat message associated with the formerly closed user session. | 03-05-2015 |
20150067156 | METHOD AND APPARATUS FOR CREATING INTER DATACENTER COLLISION DOMAIN NETWORK STRETCH - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 03-05-2015 |
20150067157 | OPTIMIZE DATA EXCHANGE FOR MVC-BASED WEB APPLICATIONS - Embodiments of the present invention disclose a method, computer program product, and system for reducing network traffic. In one embodiment, a computer determines that a webpage has changed and that an amount of data to be transmitted to update the portion of the webpage that has changed is smaller than an amount of data to be transmitted to update the entire webpage. | 03-05-2015 |
20150067158 | METHOD AND APPARATUS FOR DYNAMIC SELF ADAPTING SOFTWARE DEFINED CLOUD MESHED NETWORKS - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 03-05-2015 |
20150067159 | HOSTED NETWORK MANAGEMENT - Systems and methods are disclosed that facilitate the evaluation of hosted computing devices in accordance with target patterns. A set of target patterns can be developed for elements common to a plurality of hosted computing networks. The set of target patterns can be defined utilizing a detailed pattern language to describe elements of a hosted computing device network and relationships between the elements. Thereafter, a hosted computing device network management component can utilize the set of target patterns to verify and validate a deployed hosted computing network or to process purposed modifications/configurations to a deployed hosted computing network. | 03-05-2015 |
20150067160 | SYSTEMS AND METHODS OF SPECIFYING SERVICE LEVEL CRITERIA - Methods, systems, and articles of manufacture to generate file transfer monitoring criteria are disclosed. An example method obtains a file transfer log file from a first network entity and obtains from the transfer log file file transfer metadata that is associated with file transfer activity between the first network entity and a second network entity. The file transfer metadata is used to generate a file transfer monitoring criterion that is associated with selectively monitoring the file transfer activity between the first network entity and the second network entity. Service level criteria associated with the file transfer event is automatically updated based on the file transfer monitoring criterion. | 03-05-2015 |
20150067161 | METHODS AND SYSTEMS FOR AUTOMATICALLY TRACKING THE REROUTING OF LOGICAL CIRCUIT DATA IN A DATA NETWORK - An example method involves generating, with a network management module, a data structure to store current reroute statistics based on rerouting of data from a logical circuit that has failed to a logical failover circuit in a network. The current reroute statistics include trap data corresponding to the logical circuit. The trap data includes a committed burst size. The logical circuit is identified by a first logical circuit identifier. The logical failover circuit is identified by a second logical circuit identifier. The first and second logical circuit identifiers are renamed until the logical circuit has been restored from failure. The table is updated with the network management module to store updated reroute statistics. The updated reroute statistics include updated trap data corresponding to the logical circuit. The updated reroute statistics are based on a change in status of the logical circuit resulting from the committed burst size having been exceeded. | 03-05-2015 |
20150067162 | SYSTEMS, METHODS, AND APPARATUS TO MONITOR MOBILE INTERNET ACTIVITY - Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example method comprises assigning a port of a proxy to the mobile device associated with a panelist. A property list file is transmitted to the mobile device, the property list file instructing the mobile device to transmit future requests for media to the port of the first proxy. A first request for media is received on the port of the proxy, the first request originating from the mobile device. The first request for media is associated with a demographic of the panelist associated with the mobile device based on an identifier of the port. | 03-05-2015 |
20150074258 | SCALABLE PERFORMANCE MONITORING USING DYNAMIC FLOW SAMPLING - Techniques for scalable performance monitoring using dynamic flow sampling are described. According to one approach, a method comprises intercepting, at an intermediary network device, one or more packets traveling between a source device and a destination device; identifying, at the intermediary network device, a traffic flow based on the one or more packets; determining, at the intermediary network device, whether to collect one or more metrics from the traffic flow based on one or more performance factors of the intermediary network device; in response to a determination to collect the one or more metrics from the traffic flow, the intermediary network collecting the one or more metrics from subsequently intercepted packets belonging to the traffic flow; wherein the method is performed by one or more computing devices. | 03-12-2015 |
20150074259 | MULTI-SERVICES APPLICATION GATEWAY AND SYSTEM EMPLOYING THE SAME - An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices. A services framework at the gateway device implements the communications and processing infrastructure for enabling service management, service configuration, and authentication of user of services at the intelligent gateway. The framework provides a storage and execution environment for supporting and executing received service logic modules relating to use, management, and support of the digital endpoint devices. Thus, the gateway device provides a network-based services point of presence for a plurality of digital endpoint devices at the premises. | 03-12-2015 |
20150074260 | AUTO DISCOVERY AND TOPOLOGY RENDERING IN SUBSTATION NETWORKS - System, method, and computer program product to capture, at a first network element in a substation network, a first data packet transmitted according to a predefined protocol, compare a MAC address of the first data packet to a MAC address table of at least one of the plurality of network elements, upon determining that the MAC address of the first data packet is defined in the MAC address table as belonging to a first substation power device, identify, from the MAC address table, a first port of a first network element, that the first substation power device is connected to, and retrieve, from a Substation Configuration Language file, a name for the first substation power device based on a logical node name in the first data packet, and generate a visual depiction of a network topology of the plurality of network elements and the first substation power device. | 03-12-2015 |
20150074261 | Reliable Address Discovery Cache - Reliable address discovery cache techniques are described. In an implementation, a reliable communication channel is established for control messages related to address resolution in a network. The communication channel is employed for communication of messages for internet protocol (IP) address acquisition, release, and mapping staleness between clients (e.g., nodes or endpoints) in the network and a cache manager component configured to maintain and update an address map for the clients. The cache manager component may also be configured to send directed messages via the communication channel to propagate changes in the mapping to the clients. Further, clients may provide explicit notifications regarding address release and staleness to the cache manager component to facilitate updating of the address map. In this way, a reliable and up-to-date address map is maintained and the amount of broadcast discovery messages and bandwidth consumed overall for address discovery operations may be reduced. | 03-12-2015 |
20150074262 | PLACEMENT OF VIRTUAL MACHINES IN A VIRTUALIZED COMPUTING ENVIRONMENT - Techniques for placement of a virtual machine (VM) on a host computing system in a virtualized computing environment are disclosed. In one embodiment, a first network device having network load less than a threshold value is determined. Further, the VM is placed on the host computing system coupled to the first network device. In this case, the host computing system transmits and receives network traffic associated with the VM via the first network device. | 03-12-2015 |
20150074263 | RESOURCE ALLOCATION IN COMPUTERS - A method and tangible medium embodying code for allocating resource units of an allocatable resource among a plurality of clients in a computer is described. In the method, resource units are initially distributed among the clients by assigning to each of the clients a nominal share of the allocatable resource. For each client, a current allocation of resource units is determined. A metric is evaluated for each client, the metric being a function both of the nominal share and a usage-based factor, the usage-based factor being a function of a measure of resource units that the client is actively using and a measure of resource units that the client is not actively using. A resource unit can be reclaimed from a client when the metric for that client meets a predetermined criterion. | 03-12-2015 |
20150074264 | TRAFFIC STATISTIC GENERATION FOR DATACENTERS - Systems and methods are disclosed for generating traffic statistics for a datacenter. Distributed, parallel processing may be used to generate traffic statistics from data sets about traffic in a datacenter. To reduce data sets from which such statistics are derived to manageable sizes and relevant processing times for distributed, parallel processing, traffic agents may be provided at end hosts in the datacenter. The traffic agents may summarize data traffic over large numbers of packets in terms of the various sockets over which they are transmitted. Reports on the various sockets may be sent by the various flow agents that monitor them to an analytic controller. The analytic controller may aggregate, provide flow-path information for, further reduce, and/or provision the resultant data for distributed parallel processing. | 03-12-2015 |
20150074265 | TRANSMISSION APPARATUS, TRANSMISSION METHOD, COMPUTER-READABLE STORAGE MEDIUM STORING TRANSMISSION PROGRAM, AND RELAY SYSTEM - Disclosed is a transmission apparatus or the like that is able to transmit information efficiently. The transmission apparatus, on the basis of history information which includes a service identifier and a message identifier associated therewith, transmits a difference between a third message having a large similarity ratio to a second message included in a specific service and the second message, and a message identifier identifying the second message via a communication network. | 03-12-2015 |
20150074266 | OFFLOADING APPLICATION TRAFFIC TO A SHARED COMMUNICATION CHANNEL FOR SIGNAL OPTIMIZATION IN A WIRELESS NETWORK FOR TRAFFIC UTILIZING PROPRIETARY AND NON-PROPRIETARY PROTOCOLS - A method for conserving network and battery usage is provided. The method includes determining that a device is communicating over at least two overlapping push channels and blocking one of the push channels to eliminate or reduce overlap between the at least two overlapping push channels. Related systems are also provided. | 03-12-2015 |
20150074267 | Network Anomaly Detection - Mechanisms for anomaly detection in a network management system are provided. The mechanisms collect metric data from a plurality of network devices and determine metric types for the metric data using metric type reference data. The mechanisms determine and apply properties from the metric type reference data to metrics of the determined metric types. The mechanisms monitor subsequent metric data for anomalies that do not conform to the applied properties. | 03-12-2015 |
20150074268 | MEDIACARD SYSTEMS AND METHODS - Embodiments of the invention are directed to methods, computer apparatuses, and systems for facilitating social interactions between multiple user computers and providing an interactive social experience for distributed viewers of media inputs over a communications network. Specifically, embodiments of the present invention are directed to generating, issuing, managing, trading, and displaying mediacards to a number of users through a reconfigured media presentation system. | 03-12-2015 |
20150074269 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 03-12-2015 |
20150074270 | SYSTEM AND METHOD FOR GENERATING A REPORT TO A NETWORK OPERATOR BY DISTRIBUTING AGGREGATION OF DATA - A method and system are for generating a report for delivery to or access or query by a network operator by determining, by a server-side proxy, optimization efficiency for traffic in a wireless network, tracking, by the server-side proxy, user-related information in the wireless network, generating, based on at least one of the optimization efficiency and the user-related information, a report for delivery to or access by an operator of the wireless network, the report including an alert of viral take-up of a new application, and performing, by the server-side proxy, traffic optimization functions alleviating traffic in the wireless network. | 03-12-2015 |
20150074271 | REPORTING THE STATE OF AN APPARATUS TO A REMOTE COMPUTER - The state of an apparatus is reported to a remote computer using an embedded device in the apparatus. The embedded device detects the state, generates a message that reports the state using a self-describing computer language, and sends the message to the remote computer. The remote computer receives the message and extracts the state of the embedded device from the message. | 03-12-2015 |
20150081875 | METHOD AND SYSTEM FOR OPERATING SYSTEM (OS) VERIFICATION - A method for operating system application performance verification of a mainframe server system is provided. The method comprises comparing system snapshots of the operating system application. The method further comprises determining results of operational changes to the operating system application based on the compared system snapshots. The method further comprises comparing system log verification of the operating system application with previous system logs of the operating system application. The method further comprises determining results of operational changes to the operating system application based on the compared system log verification with the previous system logs. The method further comprises determining results of operational changes to the operating system application based on the compared system log verification with the previous system logs. The method further comprises performing system checkouts of vendor tools installed on the operating system application. | 03-19-2015 |
20150081876 | Cross-domain inactivity tracking for integrated web applications - In a cloud computing environment, a user authenticates to multiple cloud services concurrently. A master service has knowledge of or tracks the cloud service(s) to which a user is authenticated. Each cloud service may enforce its own inactivity period, and the inactivity period of at least first and second cloud services may be distinct from one another. When the master service receives an indication that the authenticated user is attempting to take an action at a first cloud service despite an activity timeout there, the master service issues a status request to at least the second cloud service to determine whether the user is still active at the second cloud service (despite its different inactivity period). If the user is still active at the second cloud service, the master service provides a response, selectively overriding (re-setting) the activity timeout at the first cloud service to permit the action. | 03-19-2015 |
20150081877 | PREDICTION AND DISTRIBUTION OF RESOURCE DEMAND - A system for predicting one or more changes in demand for computational resources expected as a result of one or more events experienced by a business enterprise, and for selecting an appropriate distribution strategy for distributing computational tasks such that a single location with insufficient computational resources can communicate computational tasks in excess of a local computational resource capacity to one or more other locations for processing. | 03-19-2015 |
20150081878 | DESCRIBING DATACENTER RACK INFORMATION IN MANAGEMENT SYSTEM - Present disclosure relates to a rack management system for automatically construct a rack, configure, monitor and manage managed devices on rack. Rack management system includes: (a) user interface module, (b) database, (c) rack management communication interface, (d) rack management module, (e) device discovery module, and (f) file loader. User interface module is used to allow an administrator to enter or import rack management information of managed devices. Database is used to store the rack management information. Rack management communication interface is implemented to facilitate the communication between the rack management system and managed devices. Rack management module is used to construct, configure, monitor, and manage the managed devices. Device discovery module discovers all managed devices according to the information entered by the administrator through the user interface module. File loader is used to load rack management information to the database, device discovery module and rack management module. | 03-19-2015 |
20150081879 | MANAGING DATA PATHS IN AN OPERATOR GRAPH - Embodiments of the disclosure provide a method and, system for processing data such as a stream of tuples. The method can include receiving the stream of tuples to be processed by a plurality of stream operators operating on one or more computer processors. The method can include creating an overflow path that includes at least one stream operator that performs processing duplicative to at least one stream operator from the plurality of stream operators. The method can include monitoring a stream operator for a triggering condition. The method can include identifying a tuple from the stream of tuples to process on the overflow path. The method can include processing, on the overflow path, the identified tuple from the stream of tuples in response to the presence of the triggering condition. | 03-19-2015 |
20150081880 | SYSTEM AND METHOD OF MONITORING AND MEASURING PERFORMANCE RELATIVE TO EXPECTED PERFORMANCE CHARACTERISTICS FOR APPLICATIONS AND SOFTWARE ARCHITECTURE HOSTED BY AN IAAS PROVIDER - The present disclosure is directed to a system for monitoring and analyzing operation of a widely distributed service operated by an Infrastructure-as-a-Service (IaaS) tenant but deployed on a set of virtual resources controlled by an independent IaaS provider. The set of virtual resources provided to the IaaS tenant by the IaaS provider is hosted on a set of physical resources selected by the IaaS provider, and both the set of virtual resources and the set of physical resources can change rapidly in both size and composition (i.e., the resources are “ephemeral”). Although the monitoring system may not have visibility into the composition, configuration, location, or any other information regarding the set of physical resources, the monitoring system can evaluate the performance of the virtual resources and infer that a virtual resource within the set of virtual resources may be hosted on at least one physical resource that is underperforming. | 03-19-2015 |
20150081881 | SYSTEM AND METHOD OF MONITORING AND MEASURING CLUSTER PERFORMANCE HOSTED BY AN IAAS PROVIDER BY MEANS OF OUTLIER DETECTION - The present disclosure is directed to a system for monitoring and analyzing operation of a widely distributed service operated by an Infrastructure-as-a-Service (IaaS) tenant but deployed on a set of virtual resources controlled by an independent IaaS provider. The set of virtual resources can be organized into clusters in which resources are expected to behave similarly to each other. Virtual resources that do not behave similar to peer resources in the same cluster, i.e., outliers, may be indicative of problems that need to be addressed. The monitoring system can collect performance metric data from virtual resources, and compare the performance of each virtual resource in a cluster with the performance of every other virtual resource in the cluster to detect outliers. This comparison can involve correlation analysis, ANOVA analysis, or regression analysis. | 03-19-2015 |
20150081882 | SYSTEM AND METHOD OF ALERTING ON EPHEMERAL RESOURCES FROM AN IAAS PROVIDER - The present disclosure is directed to a system for monitoring and analyzing operation of a widely distributed service operated by an Infrastructure-as-a-Service (IaaS) tenant but deployed on a set of virtual resources controlled by an independent IaaS provider. The set of virtual resources provided to the IaaS tenant by the IaaS provider is selected by the IaaS provider and can change rapidly in both size and composition (i.e., the virtual resources are “ephemeral”). The monitoring system can integrate system-level metrics collected directly from virtual resources with infrastructure metadata characterizing the virtual resources collected from the IaaS provider to report on operation of the virtual resources. The infrastructure metadata can contain a resource type, a resource role, an operational status, an outage history, or an expected termination schedule. By integrating different sources of data, the monitoring system can avoid inaccurate analysis. | 03-19-2015 |
20150081883 | SYSTEM AND METHOD OF ADAPTIVELY AND DYNAMICALLY MODELLING AND MONITORING APPLICATIONS AND SOFTWARE ARCHITECTURE HOSTED BY AN IAAS PROVIDER - The present disclosure is directed to a monitoring system for rapidly updating a service architecture of a widely distributed service operated by an Infrastructure-as-a-Service (IaaS) tenant but deployed on a set of virtual resources controlled by an independent IaaS provider. The set of virtual resources provided to the IaaS tenant by the IaaS provider is selected by the IaaS provider and can change rapidly in both size and composition (i.e., the virtual resources are “ephemeral”). The monitoring system can infer from infrastructure metadata and/or system-level metric data how the virtual resources should be organized into groups, clusters and hierarchies. The monitoring system can also update the service architecture frequently to capture an expected rate of change of the resources, e.g., every five minutes. The monitoring system can then run analytics based on this inferred service architecture to report on service operation. | 03-19-2015 |
20150081884 | TECHNIQUES FOR SMART DATA ROUTING - Techniques for smart data routing are described. A system may include a storage module configured to store network conditions for a plurality of networks and locations and a server device. The server device may be configured to determine network conditions for each of a plurality of networks and locations based upon detected usage of at least one mobile application being accessed via each of the plurality of networks and in each of the locations. Determined network conditions may be stored at the storage module. The server may be further configured to receive a request for a communication from a client device. Based upon at least the determined network conditions, the server may be configured to determine routing information for the communication. Once determined, the server may be configured to provide the routing information for the communication to the client device. | 03-19-2015 |
20150081885 | AUTOMATED EVENT MANAGEMENT - Automating servicing of event managements within a cloud network. Such automation includes: identifying and receiving controlled instructions from clients and monitoring and aggregating data related to employing the resources, for correlation of data to pattern of events. Events can then be mapped to standard prescriptive actions and/or remedial measure—or alternatively the clients are enabled to determine the actions required. | 03-19-2015 |
20150081886 | DATA NETWORK DEVICE DISCOVERY OPTIMIZATION TO REDUCE DATA TRANSFER VOLUME - There is provided a method of reducing traffic on a data network. The method includes (i) reading an indicator of whether a last attempted communication with a network device was successful, and (ii) performing discovery of the network device at each time specified by a first schedule in response to the indicator indicating that the last attempted communication with the network device was successful, and at each time specified by a second schedule in response to the indicator indicating that the last attempted communication with the network device was not successful. There is also provided a system that performs the method, and a storage device that contains a program that controls a processor to perform the method. | 03-19-2015 |
20150081887 | Adaptive Industrial Ethernet - A system may include equipment divided into control groups. Each control group may be assigned a supervisor node. A server computer may communicate with the equipment in a control group via the supervisor node associated with that control group. The server computer may store a profile of the equipment. The profile may contain physical locations of the equipment, settings of the equipment, components of the control groups, and the association of supervisor nodes with the control groups. A display unit may display the profile of the plurality of the equipment as an overlay of the physical locations of the plurality of equipment on a map. | 03-19-2015 |
20150081888 | Monitoring Arrangement - A monitoring arrangement ( | 03-19-2015 |
20150081889 | INFORMATION PROCESSING APPARATUS, DEVICE MANAGEMENT SYSTEM AND DEVICE MANAGEMENT METHOD - An information processing apparatus is configured to communicate with a device through a first communication path and to communicate, through a second communication path, with a device management apparatus configured to manage the device, and to include a detection part, a transmission part, a reception part, and an acquisition part. The detection part detects connection with the device through the first communication path. The transmission part transmits predetermined notification including identification information of the information processing apparatus to the device management apparatus, when the connection with the device is detected. The reception part receives a device information acquisition request from the device management apparatus based on the predetermined notification. The acquisition part acquires device information of the device. The transmission part transmits, to the device management apparatus, response to acquisition of the device information including the identification information of the information processing apparatus and the device information. | 03-19-2015 |
20150081890 | SYSTEM AND METHOD FOR REAL-TIME ANALYSIS OF NETWORK TRAFFIC - A mirrored live-data flow of the live-data flow passing through a selected point within a network is monitored at a first processing node. The live-data flow comprises data that is in active transmission between endpoints in the network and prior to exit from the network and onward storage of the data in a database. Each packet within the mirrored data flow is decoded at the first processing node according to each protocol associated with a packet. Packets having a plurality of protocols associated therewith are decoded in parallel with each other. Each of the decoded packets are compared at the first processing node to a set of predetermined or deduced conditions. A predetermined or deduced response is executed based upon detection of a predetermined or deduced condition within the decoded packets. At least a portion of the decoded packets of the live-data flow causing execution of the predetermined or deduced response are processed at a second processing node to determine a manner for controlling an operation of the network at a same time the live-data flow is in active transmission between the endpoints in the network. The operation of the network is controlled in response to the processing step. | 03-19-2015 |
20150081891 | MANAGEMENT SYSTEM AND MONITORING APPARATUS - A management system including a network device provided in a customer environment, a monitoring apparatus, and a management server provided outside the customer environment is provided. When it is determined that an agreement has been obtained from a customer based on a customer status contained in status information acquired from the management server, the monitoring apparatus acquires setting information necessary for a monitoring operation from the management server to start the monitoring operation according to other content contained in the acquired status information. In one or more embodiments, the monitoring apparatus acquires the setting information only when it is determined that the agreement has been obtained from the customer. | 03-19-2015 |
20150081892 | ELECTRONIC DEVICE, METHOD OF TRANSMITTING INFORMATION BY ELECTRONIC DEVICE, AND SYSTEM FOR TRANSMITTING INFORMATION - A method of transmitting information by an electronic device is provided. The method includes collecting log information, determining whether a keep-alive message transmission period arrives, and when the keep-alive message transmission period arrives, transmitting the log information to a push server. | 03-19-2015 |
20150081893 | FABRIC ATTACHED STORAGE - Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition. | 03-19-2015 |
20150081894 | INTERFACE FOR MEDICAL INFUSION PUMP - An apparatus for indicating a change in operation of a medical infusion pump. The apparatus includes a memory configured to store an original pump parameter and a current pump parameter. The apparatus further includes a programmable circuit in electrical communication with the memory, the programmable circuit programmed to display the original pump parameter and the current pump parameter. A method indicates a change in operation of a medical infusion pump. | 03-19-2015 |
20150081895 | REMOTE ACTIVE WINDOW SENSING AND REPORTING FEATURE - A system and method is provided for remote active window sensing of a display in a computing device and reporting of the same. The system includes a tool including a remote monitoring and reporting component configured to monitor active windows of one or more remote devices and provide a report to a presenter as to whether the active windows of the one or more remote devices are for a presentation of the presenter. | 03-19-2015 |
20150081896 | LATENCY MEASUREMENT IN RESOURCE REQUESTS - Systems and method for the management and processing of resource requests by a service provider, such as a content delivery network (“CDN”) service provider, on behalf of a content provider are provided. The CDN service provider can measure the performance associated with the delivery of resources to a requesting client computing devices from various computing devices associated with the CDN service provider. In one embodiment, the CDN service provider can utilize commands responsive to an initial request for a resource that causes the requesting client computing device to transmit one or more supplemental resource requests. Information associated with the processing of the sequence of resource requests can be used to measure CDN service provider latencies. | 03-19-2015 |
20150081897 | LATENCY MEASUREMENT IN RESOURCE REQUESTS - Systems and method for the management and processing resource of requests by a service provider, such as a content delivery network (“CDN”) service provider, on behalf of a content provider are provided. The CDN service provider can measure the performance associated with the delivery of resources to requesting client computing devices from various computing devices associated with the CDN service provider. In one embodiment, the CDN service provider can utilize commands correspond to communication protocols that causes the requesting client computing device to transmit or receive protocol information from multiple computing devices associated with the CDN service provider's domain. Information associated with the processing of the protocol responses can be used to measure CDN service provider latencies. | 03-19-2015 |
20150081898 | PREDICTING THE PERFORMANCE OF A MULTI-STAGE COMMUNICATIONS NETWORK UNDER LOAD FROM MULTIPLE COMMUNICATING SERVERS - A capability is provided for predicting the performance of a communications network, such as a multi-stage communications network. The predicted performance includes, in one aspect, predicting the amount of bandwidth that a server of the communications network could deliver with a full load on the network. In one aspect, the predictive capability includes determining an aggregate load for each server of the network being analyzed; performing normalization on the loads of the links used by the servers to obtain updated link and/or server bandwidths; and determining for each server, a minimum bandwidth over the links in the server's route. | 03-19-2015 |
20150081899 | System and Method for Using Data Tags to Track and Manage Tasks to Provide Object-to-Object Services - The present invention relates to a method and system that use data tags to track tasks in applications to provide Object-to-Object (OTO) services. A first application data tag is issued by a data tag server as in an OTO service platform in response to an initiation of a first application by a first initiator. The first data tag specifies at least one first task for fulfilling a first service. The first application data tag is scanned by a first user terminal by a first participant. A first action data tag is issued by the data tag server. A first dynamically variable task data tag is issued by the data tag server to track the first task in the first action. The first dynamically variable task data tag is updated to record the completion of the first task in the first action when the first task is completed. | 03-19-2015 |
20150081900 | Abstract Representation and Provisioning of Network Services - A network management device connects to a device on the network, receives a trigger for an operation command, supplies to the device a command line interface command for the operation command, wherein a randomly generated string is included at the end of the command line interface command. The network management device receives the output of the operation command from the device, detects the end of the operation command output and parses the output using an XML-based parser. XML based configuration files are used for configuration of different network devices. XML based report files are used to generate different network reports. | 03-19-2015 |
20150089042 | DYNAMIC DISCOVERY OF APPLICATIONS, EXTERNAL DEPENDENCIES, AND RELATIONSHIPS - A monitoring system is arranged for automatically and dynamically discovering local applications running on servers in an enterprise-scale service environment as well as discovering external resources (both partitioned and non-partitioned resources) that the local applications use. The discovered objects and their dependencies are instantiated into a health map and the map is dynamically updated as applications and resources are added to and deleted from the enterprise-scale service environment. Health indicators such as events, performance counters, synthetic transactions, and SysLog and SNMP (Simple Network Management Protocol) service events for the mapped objects are monitored. The monitored health indicators are attributed to either the health of a local application or that of an external resource. Upon detection of a fault, the health map enables performance of root cause analyses and determination of the impact of the fault on the objects in the environment so that appropriate alerts can be raised. | 03-26-2015 |
20150089043 | User Device Monitoring - A method for monitoring a user device is disclosed. The method includes intercepting text of one or more applications being displayed on the user device. The method further includes generating one or more first patterns from the intercepted text. Thereafter, the one or more first patterns are compared with one or more pre-stored second patterns. Based on the comparison, capture of information is triggered and the captured information is sent to a server for generating alerts. | 03-26-2015 |
20150089044 | CLIENT LOCATION DISCOVERY - One or more implementations can include methods, systems and computer readable media for client location discovery. In some implementations, the method can include receiving, at an access point, a location discovery request message from a client and sending a request from the access point to a location server requesting location information for the client, when a location server is available. The method can also include receiving location information from the location server, when a location server is available and providing the access point location as location information, when a location server is not available. The method can further include sending the location information as a response to the client. | 03-26-2015 |
20150089045 | Determining Sampling Rate from Randomly Sampled Events - Mechanisms are provided for determining an event rate. The mechanisms sample a sequence of events to generate a set of sampled events. At least a subset of the sampled events have associated event sequence values indicating a position of the sampled event within the sequence of events. The mechanisms group the sampled events into a plurality of event groups based on a common characteristic of the events. The mechanisms determine, for each event group, sequence values of sampled events associated with the event group. The mechanisms calculate, for each event group, an estimated event rate based on the sequence values of the sampled events associated with the event group and the total number of events in the sequence of events. | 03-26-2015 |
20150089046 | PROVIDING NETWORK MANAGEMENT BASED ON MONITORING QUALITY OF SERVICE (QOS) CHARACTERISTICS OF WEB REAL-TIME COMMUNICATIONS (WEBRTC) INTERACTIVE FLOWS, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Embodiments include providing network management based on monitoring Quality of Service (QoS) characteristics of Web Real-Time Communications (WebRTC) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for providing network management based on monitoring QoS characteristics of WebRTC interactive flows is provided. The method comprises obtaining, by a QoS acquisition agent of a WebRTC client executing on a computing device, a WebRTC interactive flow QoS characteristic that indicates a quality of a WebRTC interactive flow over a network. The method further comprises communicating, by the QoS acquisition agent, the WebRTC interactive flow QoS characteristic to a QoS monitoring agent external to the WebRTC client. The method additionally comprises initiating, by the QoS monitoring agent, a network management task based on the WebRTC interactive flow QoS characteristic. In this manner, QoS characteristics may be collected and correlated in order to optimize a user's WebRTC experience. | 03-26-2015 |
20150089047 | CUT-THROUGH PACKET MANAGEMENT - Disclosed are various embodiments that relate identifying a source of corruption in a network made up of multiple network nodes. A network node is configured to provide corruption source identification while handling packets according to a cut-through scheme. According to some embodiments, a network node may perform a running error detection operation on a cut-through packet and then insert a debug indicator into the cut through packet. In other embodiments, the network node may process some packets according to a cut-through scheme while process other packets according to a store-and-forward scheme to detect packet corruption in a network. | 03-26-2015 |
20150089048 | ADJUSTING CONNECTION VALIDATING CONTROL SIGNALS IN RESPONSE TO CHANGES IN NETWORK TRAFFIC - Some embodiments provide a method for reducing the transmission of connection validating control signals when they are not needed. Network entities transmit connection validating control signals over network connections at regular intervals to validate that the network connections and the network entities remain functional. The method monitors data traffic fluctuations on the network connections to determine when connection validating control signals may not be needed. The method reduces unnecessary connection validating control signals in order to optimize the usage of network resources. | 03-26-2015 |
20150089049 | WIDE AREA NETWORK MONITORING - As exterior routing protocols generally do not provide information about the internal routing paths of an autonomous system, a particular autonomous system has limited information about the internal health of other autonomous systems. However, if a monitoring system has access to routing data and/or other network data from multiple points of an autonomous system, the monitoring system can estimate, with some accuracy, the health of the autonomous system. In turn, by monitoring at least some of autonomous systems forming a larger internetwork, such as the Internet, the monitoring system can estimate the overall health of at least portions of the internetwork. | 03-26-2015 |
20150089050 | MOBILE NETWORK SYSTEM - A communication caused by applications that cannot be managed by an operator is operated on a mobile network, and is difficult to control. Therefore, burst traffic induced by the applications needs to be effectively detected, restricted, and controlled. A system has a terminal that monitors an update status of applications on a mobile network, periodically monitors the update status of the applications, extracts traffic of the applications from packets transmitted through the mobile network, summarized a traffic volume induced by the applications to detect the burst traffic generated when any application is updated, and controls the traffic of the applications when the burst is generated. | 03-26-2015 |
20150089051 | DETERMINING A TIME OFFSET - A method comprises storing primary time-stamped media and secondary time-stamped media provided by a first device; storing primary time-stamped media and secondary time-stamped media provided by a second device; and using the secondary time-5 stamped media from the first and second devices to determine a time offset between the primary media from the first and second devices. | 03-26-2015 |
20150089052 | Context-Aware HTTP Compression - A system, method, and non-transitory computer readable medium for context-aware HTTP compression in an intercepting network device between a plurality of web servers and a plurality of web browsers are provided. A context collection module gathers a plurality of contexts and a decision making module evaluates a plurality of rules with the plurality of contexts to determine whether to compress content. A content compression module compresses the content selected for compression by the decision making module. | 03-26-2015 |
20150089053 | DYNAMICALLY SCRIPTABLE IP TRAFFIC LOAD BALANCING FUNCTION - A dynamically-scriptable load balancer including a packet input port, a packet output port, a dynamically scriptable load balancing engine, and an application interface for loading a load balancing script into the dynamically scriptable load balancing engine. | 03-26-2015 |
20150089054 | TECHNIQUES FOR PROVIDING VISUALIZATION AND ANALYSIS OF PERFORMANCE DATA - Techniques for providing visualization and analysis of performance data are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing visualization and analysis of performance data. The system may comprise one or more processors communicatively coupled to a mobile communications network. The one or more processors may be configured to monitor data traffic within the mobile communications network. The one or more processors may further be configured to collect network performance data associated with the mobile communications network. The one or more processors may also be configured to provide user-selectable options to a user at a mobile device for viewing the network performance data. The one or more processors may further be configured to process the network performance data based on the user-selectable options identified by the user. The one or more processors may also be configured to provide a visualization to be displayed at the mobile device based on the processed network performance data, where the visualization presents the processed network performance data that improves customer experience assurance. | 03-26-2015 |
20150089055 | SYSTEM AND METHOD FOR HARDWARE AND SOFTWARE MONITORING WITH INTEGRATED RESOURCE ACQUISITION - A method, system, and network providing hardware and software inventorying and monitoring provide the status of a local network of interconnected information technology devices. A user downloads and installs a local network monitoring software program from an online source onto a host computer system. The local network monitoring software system initiates an inventory of all information technology devices associated with said local network of information technology devices. Also, the local network monitoring software determines the operational status of the information technology devices and the status of software programs installed on the information technology devices. The results of the inventory and status determinations are presented to the host computer system. The presented information permits the user of said host computer system to initiate maintenance and support actions for the information technology devices in response to the operational status and status of software programs using the local network monitoring software. | 03-26-2015 |
20150089056 | DOMAIN POPULARITY SCORING - Systems and methods for scoring a domain including analyzing counter data and information obtained from a web site associated with the domain. Methods may include receiving requests to resolve the domain at an authoritative domain resolution server. A counter may be incremented for the domain based on the received requests. Information may be obtained from a web page associated with the domain. For example, obtaining information from the web page may include obtaining quantitative, qualitative, and/or functional information from the web page, such as link information, a status of network links corresponding to the link information, and associated ratios. The status of link information may include searching for functional details and/or results, such as, domain redirections, domain errors, mirror content, and commonly linked sites. A score may be calculated for the domain based upon the counter data and the information obtained from the web page associated with the domain. | 03-26-2015 |
20150089057 | METHOD AND APPARATUS FOR DISCOVERING, NEGOTIATING, AND PROVISIONING END-TO-END SLAS BETWEEN MULTIPLE SERVICE PROVIDER DOMAINS - Domains (multiple collaborating service providers) create service offerings between pairs of edge nodes that interconnect with other domains in the network. The service offerings may specify the available bandwidth, quality of service, reliability, available security, price, subscriber and service contextual specific and other SLA information. When a new service is to be created, the service definition is used along with information about the available service offerings to determine a set of networks to implement the service. Information associated with the service offerings may be flooded to all other networks. Alternatively, the service offering information may be provided to a trusted third party (SLA broker) which may provide SLA services on the network to select sets of domains to implement inter-domain services, and may also proxy to set up the service for the SLA requesting party. A hybrid approach may also be used. | 03-26-2015 |
20150095485 | REACTIVE THROTTLING OF HETEROGENEOUS MIGRATION SESSIONS IN A VIRTUALIZED CLOUD ENVIRONMENT - An approach for reactive throttling of heterogeneous migration sessions running concurrently in a virtualized cloud environment is disclosed. The heterogeneous migration sessions are characterized by several attributes such as the type of function performed by the migration session and the value that is attained by performing the migration session. An input/output (I/O) path to any resource in the virtualized cloud environment computing that is experiencing excessive resource congestion is identified. Bottlenecks along the I/O path are then determined. Virtual-to-physical resource mapping information of resources in the virtualized cloud computing environment are used to obtain a list of the heterogeneous migration sessions contributing to the bottlenecks along the identified I/O path. | 04-02-2015 |
20150095486 | FACILITATING THE RESOLUTION OF ADDRESS CONFLICTS IN A NETWORKED MEDIA PLAYBACK SYSTEM - Examples are disclosed and described to facilitate resolution of Internet Protocol address conflicts. An example method includes listening, by a first playback device having a first IP address, to a specified server port, receiving, by the first playback device from a second playback device via the specified server port, a message, wherein the message identifies a second IP address, wherein the second IP address has been assigned to the second playback device, determining, by the first playback device, whether the first IP address is the same as the second IP address, and when the first IP address is the same as the second IP address, obtaining, by the first playback device, a new IP address, wherein the new IP address is different from the first IP address and the second IP address. | 04-02-2015 |
20150095487 | THIRD-PARTY LINK TRACKER SYSTEM AND METHOD - An online user tracker system and methods including a third-party link tracker which tracks online user interactions involving third-party links made available on fourth-party mediums/systems. | 04-02-2015 |
20150095488 | SYSTEM AND METHOD FOR ACQUIRING LOG INFORMATION OF RELATED NODES IN A COMPUTER NETWORK - A system includes a plurality of apparatuses, each including a plurality of resources and a processor. The apparatus acquires an operation history of at least one resource among the plurality of resources, and monitors a state of the at least one resource among the plurality of resources. The apparatus notifies other apparatuses physically or logically associated with the apparatus of first control information when the state of the monitored at least one resource exceeds a threshold value, and increases a degree of detail for the acquired operation history when the state of the at least one resource exceeds the threshold value or second control information is notified from the other apparatuses. | 04-02-2015 |
20150095489 | STORAGE MANAGEMENT DEVICE AND CONTROL METHOD - An operation management server that manages a storage apparatus in which volumes are included and data is sent and received via transmission resources is provided. The operation management server includes a setting unit that sets a target value of the performance to some or all of the volumes; a monitoring unit that monitors the load factor of the transmission resources; and a bandwidth management unit that specifies a target transmission resource on the basis of the load factor of the transmission resources, that decides, on the basis of the target value, bandwidth allocation of some of the volumes that use the specified transmission resource, and that instructs a bandwidth control unit in the storage apparatus to adjust the bandwidth on the basis of the decided bandwidth allocation. | 04-02-2015 |
20150095490 | ONLINE SPARSE REGULARIZED JOINT ANALYSIS FOR HETEROGENEOUS DATA - A method and system are provided for online sparse regularized joint analysis for heterogeneous data. The method generates a latent space model modeling a latent space in which correlation information is encoded for a plurality of heterogeneous data points at respective time instants, responsive to respective energy-preserving projections and structure-preserving projections of the data points in the latent space. The method performs online anomaly detection on a current one of the data points responsive to the encoded correlation information for respective ones of the energy-preserving projections and structure-preserving projections for a previous one of the data points without anomaly. The method generates an alarm responsive to a detection of an anomaly for the current one of the data points. The method updates the latent space model for the current one of the data points, by a processor-based online model updater, responsive to a lack of the detection of the anomaly. | 04-02-2015 |
20150095491 | DIRECTING CLIENTS BASED ON COMMUNICATION FORMAT - Methods and systems for redirecting client requests are provided. According to one embodiment, a system includes a processor and a memory coupled to the processor and configured to provide the processor with instructions. A request is received from a client capable of communicating via multiple supported communication formats. The request is capable of being serviced by multiple servers each of which are configured to communicate via a different communication format. A server is selected from the multiple servers based on a traffic management policy. The traffic management policy is based on (i) different communication formats available via the multiple servers and (ii) performance expected to be provided to the client as a result of using each of the different communication formats. The client is then redirected to the selected server. | 04-02-2015 |
20150095492 | METHOD AND APPARATUS OF MATCHING MONITORING SETS TO NETWORK DEVICES - Monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of assigning a sample set to a network device operating on a network may include identifying the at least one network device, and identifying at least one object identifier associated with the at least one identified network device. The method may also include transmitting the at least one object identified to a memory location, and comparing the at least one object identifier to a plurality of sample sets and assigning relevancy scores to the plurality of sample sets based on the comparison. The method may also include assigning at least one sample set having a greater relevancy score than the other sample sets to the at least one network device. The sample sets may be SNMP sample sets. | 04-02-2015 |
20150100678 | SYSTEM AND METHOD FOR DETECTING SPAMMERS IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes processing a first text created by a user into a first bag of words, the first bag of words comprising a list of words that appear in the text, each of the words having associated therewith a number representing a number of times the associated word appears in the text; and computing a similarity between the first bag of words and at least one second bag of words. The method further comprises comparing the computed similarity with a threshold; and determining that the user is a spammer if the computed similarity bears a first relationship with the threshold. | 04-09-2015 |
20150100679 | WEB APPLICATION MONITORING VERIFICATION - Gathering web application analytic information. A proxy requests an application resource from a web application, on behalf of a client. The proxy receives the web application resource from the web application. The proxy, instruments the web application resource with a client executable script configured to cause analytic information to be gathered when the script is executed at a client. The web application resource is forwarded to a client. | 04-09-2015 |
20150100680 | SYSTEMS AND METHODS FOR CONFIGURING A PROBE SERVER NETWORK USING A RELIABILITY MODEL - Implementations relate to systems and methods for configuring a probe server network using a reliability model. A company, customer, or organization may wish to outsource the management of a set of name servers used to operate a domain name, such as a domain name associated with a Web site. In aspects, that deployment of name servers can be monitored by a separate set of failover or probe servers which are configured to track the uptime, operability, and performance of the underlying name servers, which can number in the thousands. An administrator or other user may wish to determine a minimum number of probe servers to apply to the name server topology, to achieve desired service levels. According to aspects, automated tools and logic are provided which model and simulate the overall network including the number and arrangement of necessary probe servers to ensure performance, failover reliability, and other factors. | 04-09-2015 |
20150100681 | TEMPERATURE SENSITIVE ROUTING OF DATA IN A COMPUTER SYSTEM - An apparatus and method routes data over network links based on a temperature of the network links. When the temperature of a link meets a first threshold a routing mechanism re-routes a portion of the network traffic over a lower temperature link to reduce the likelihood that the link will exceed a second threshold that necessitates that the link be throttled back or disabled. Re-routing data to cooler links allows the system to maintain the lowest possible temperature of the network links to gain optimal performance of the system. In the disclosed example, the network links include interconnect cable connections and backplane connections. A temperature of the network links is determined by monitoring a region of an integrated circuit near a line driver driving the network link. | 04-09-2015 |
20150100682 | INFORMATION PROVIDING APPARATUS AND METHOD, INFORMATION PROVIDING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information providing apparatus includes a collecting unit, a generating unit, and an output unit. The collecting unit collects log information of a service execution apparatus managed in an intranet and log information of a service execution apparatus managed outside the intranet. The generating unit generates analysis information by integrating the log information inside and outside the intranet on the basis of user information included in the log information in the intranet and the log information outside the intranet. The output unit outputs the analysis information generated by the generating unit. | 04-09-2015 |
20150100683 | IDENTIFICATION OF AN AUTHORITY-TYPE LEADER IN A SOCIAL NETWORK - Techniques for identification of an authority-type leader in a social network based on reputation are described. According to various embodiments, it is determined that one or more interactions with a first actor of a plurality of actors of an online social network correspond to decisions by other actors of the plurality of actors of the online social network that the first actor is an information authority on a particular topic. Thereafter, a reputation leadership score associated with the first actor and the particular topic is calculated, the reputation leadership score indicating a strength of the first actor's reputation as an information authority on the particular topic among the plurality of actors of the online social network service. The first actor is then classified as an information authority on the particular topic among the plurality of actors of the online social network service, based on the calculated reputation leadership score. | 04-09-2015 |
20150100684 | TEST AND MANAGEMENT FOR CLOUD APPLICATIONS | 04-09-2015 |
20150100685 | APPARATUS AND METHOD FOR SUPPORTING INTRA-CLOUD AND INTER-CLOUD EXPANSION OF SERVICE - An apparatus and method for supporting the expansion of cloud service are disclosed. The apparatus for supporting expansion of cloud service includes a service expansion management unit, and a service image management unit. The service expansion management unit requests the running of a service registered in a source cloud, and determines whether the expansion of service is required by monitoring the running service. The service image management unit acquires the one or more service images of the service whose expansion is determined to be required by the service expansion management unit from a service image database (DB), and registers the service images in a target cloud. | 04-09-2015 |
20150100686 | INFORMATION PROCESSING SYSTEM, SITE MONITORING APPARATUS, AND INFORMATION PROCESSING METHOD - In order to appropriately control the device information of devices managed by a plurality of systems, an information processing system comprises a site monitoring apparatus configured to collect device information from image forming apparatuses and a usage status analysis system configured to receive the device information from the site monitoring apparatus via a network and to analyze the received device information. The usage status analysis system receives specifying information for specifying a device list from the site monitoring apparatus, and transmits, to the site monitoring apparatus, update information that has been generated based on the specifying information. | 04-09-2015 |
20150100687 | CONTROL PROGRAM, CONTROL DEVICE, AND CONTROL METHOD - In a control device, a relationship extracting module extracts, from specification-item change information indicative of change information concerning specification items of hardware changed in the past and parameter change information indicative of change information concerning parameters set to the hardware, combinations of the specification-item change information and the parameter change information being in correlation. A change-pattern generator calculates a relational expression of the specification-item change information and the parameter change information for each of the extracted combinations, and generates a change pattern of the parameter change information corresponding to the specification-item change information by the calculated relational expression. | 04-09-2015 |
20150100688 | TRACKING USER BEHAVIOR RELATIVE TO A NETWORK PAGE - Disclosed are various embodiments for tracking user behavior relative to a network page and identifying user interest in various content items of the network page according to the user behavior. A network page that includes multiple content items is rendered for display in a client. A user action is obtained relative to the network page. A user behavior report is sent to one or more servers. The user behavior report indicates the user action, a timestamp associated with the user action, and one or more of the content items that are associated with the user action. | 04-09-2015 |
20150100689 | SYSTEM AND METHOD FOR TRIGGERING ON PLATFORM USAGE - A system and method for triggering on platform usage can include at a platform, receiving and storing a trigger configuration of an account; operating a platform comprising internally executing a process on behalf of an account and publishing at least one event when executing the process; at the platform, incrementing a counter in response to the at least one event and if the stored trigger configuration species a usage key associated with a category of counted events of the at least one event; monitoring counters in a context of an associated trigger; and processing the trigger upon the counter satisfying condition of an associated trigger. | 04-09-2015 |
20150100690 | Method and Apparatus for Processing Abnormality of Application Proxy Client - A processing method and apparatus for an application proxy client are provided. The method includes determining, on a terminal, that an application proxy client is uninstalled; and sending an uninstallation indication message from the terminal to a proxy server corresponding to the application proxy client, where the uninstallation indication message indicates that the application proxy client has been uninstalled from the terminal. | 04-09-2015 |
20150100691 | Systems and Methods for Performing Localized Server-Side Monitoring in a Content Delivery Network - Some embodiments provide systems and methods for performing localized and real-time server-side network performance monitoring. These systems and methods leverage the distributed architecture of a content delivery network (CDN) so as to perform distributed monitoring with each Point-of-Presence of the CDN responsible for monitoring performance to a localized set of end users. These systems and methods also leverage existing traffic flows from a server to a particular end user in order to perform real-time server-side network performance monitoring without the injection of specialized monitoring packets and without active involvement of the end user in deriving the performance measurements. The performance measurements are then used to optimize delivery of existing and future traffic flows to the end user. | 04-09-2015 |
20150100692 | MONITORING MEDIA EXPOSURE USING WIRELESS COMMUNICATIONS - Disclosed examples involve collecting a cookie at a client device based on media accessed via a web page at the client device, and selecting a portable device identifier at the client device. The portable device identifier corresponds to a closest one of a plurality of portable devices in wireless communication with the client device. The portable device identifier is associated with a particular person. In response to instructions embedded in the media, a hypertext transfer protocol (HTTP) request is sent to a server. The HTTP request includes the cookie, the portable device identifier, and information identifying exposure to the media. | 04-09-2015 |
20150100693 | REAL WORLD TRAFFIC - Methods and apparatus for testing real-world performance of an system under test are disclosed. The system under test is loaded with interactive transactions. A realistic mix of network traffic is simulated on the communications network. The performance of the system under test under load is tested. Accordingly, a real-world test of the system under test is provided. | 04-09-2015 |
20150106499 | TRANSFORMING CLOUD SERVICE MEASUREMENTS INTO ANONYMIZED EXTRAMURAL BUSINESS RANKINGS - A method, system, and computer program product for computing cloud services. A method commences upon invocation of instrumentation configured to monitor a plurality of applications running in a cloud environment. The instruments are configured to capture a first set of metrics and a second set of metrics of respective cloud service tenants. The captured metrics are compared and the comparisons are used to perform a ranking. The rankings of the compared metrics are then used to compare cloud service tenants (e.g., a respective first cloud service tenant is compared with respect to a second cloud service tenant). The ranking is based at least in part on the compared metrics. The rankings can be fairly compared by selecting the first set of metrics with respect to the second set of metrics where both sets of metrics pertain to a common domain, and/or a common application, and/or a common application feature. | 04-16-2015 |
20150106500 | APPLICATION PROVISIONING SYSTEM - Systems and methods are described for monitoring access to one or more web applications associated with an organization, and such that usage statistics related to software licenses associated with the accessed web applications may be captured and stored. Additionally these systems and methods may be used to monitor access to one or more applications stored locally on a computer system such that an organization may update the one or more applications stored locally on a computer system to be in compliance with software revisions. | 04-16-2015 |
20150106501 | FACILITATING HIGH QUALITY NETWORK DELIVERY OF CONTENT OVER A NETWORK - Providing for improved efficiency in delivery of content over a network is described herein. By way of example, a metric of communication related to electronic communication between a device and a network access point can be obtained and utilized to calculate or infer a resource load associated with delivering the content to the device. If the metric of communication indicates a resource load that exceeds a predetermined measure, a message can be sent to a content server originating the provisioning of content for the device. In particular aspects, the message can instruct the content server to reduce a resource-impacting characteristic of the content, or transmission of the content. The metric of communication can continue to be monitored, and the change to the resource-impacting characteristic can be maintained or revoked based on subsequent indications of the metric of communication. | 04-16-2015 |
20150106502 | DYNAMIC ASSIGNMENT OF CONNECTION PRIORITIES FOR APPLICATIONS OPERATING ON A CLIENT DEVICE - Providing for prioritization of applications operating on a client device with respect to access to online content or services is described herein. By way of example, the prioritizing can be correlated with allocation of network resources for respective applications. An application having higher priority can be allocated a larger amount of resources, a guaranteed amount of resources, a guaranteed quality of service, first access to resources, or the like. Likewise, an application with lower priority can be allocated a lower amount of resources, have best effort resources, access to residual resources, and so forth. In various embodiments, applications can be prioritized based on a status of the application with respect to the client device. As one illustrative example, applications actively receiving content, responding to user commands, or maximized or displayed on a graphic display can be afforded higher priority, whereas inactive or minimized applications can be afforded a lower priority. | 04-16-2015 |
20150106503 | PREDICTIVE CLOUD PROVISIONING BASED ON HUMAN BEHAVIORS AND HEURISTICS - Embodiments relate to predictively provisioning cloud resources based on human behaviors and heuristics. An aspect includes monitoring a collection of events relating to a customer application as well as monitoring an infrastructure load on resources for the customer application. A causal relationship is evaluated between an event and the infrastructure load. A predictive rule is then constructed based on the causal relationship. Resource requirements are anticipated based on the predictive rule and a provisioning of resources in a service domain is requested for the anticipated resource requirements. | 04-16-2015 |
20150106504 | SECURE CLOUD MANAGEMENT AGENT - A system for providing a secure management agent for high-availability continuity for cloud systems includes a computer processor and logic executable by the computer processor. The logic is configured to implement a method. The method includes receiving operating parameters and threshold settings for a plurality of computing clouds. Secure relationships are established with the plurality of computing clouds based on the operating parameters. Data is mirrored across the plurality of computing clouds. Threshold data is then monitored for the plurality of computing clouds to maintain a continuity of resources for the plurality of computing clouds. | 04-16-2015 |
20150106505 | METHODS AND APPARATUS TO MEASURE EXPOSURE TO STREAMING MEDIA - Methods and apparatus to measure exposure to streaming media are disclosed. An example method includes detecting an ID3 tag associated with streaming media presented at a client device. A first request is sent from the client device to a first internet domain, the first request identifying the streaming media. A redirection message is received from the first internet domain. In response to the redirection message, a second request is sent to a second internet domain specified by the redirection message. A cookie is provided identifying the client device to the second internet domain. | 04-16-2015 |
20150106506 | HUMAN-MACHINE INTERFACE (HMI) SYSTEM HAVING ELEMENTS WITH AGGREGATED ALARMS - A system manages human machine interface (HMI) applications for industrial control and automation. Software instructions stored on a tangible, non-transitory media and executable by a processor receive data indicative of a manufacturing/process control system being monitored and display a user interface indicative of a status of the manufacturing/process control system being monitored wherein the status is based on the received data. | 04-16-2015 |
20150106507 | SELECTION SYSTEM, SELECTION SERVER, SELECTION METHOD, AND COMPUTER READABLE MEDIUM - A selection system includes an acquiring unit, a candidate selecting unit, and a product selecting unit. The acquiring unit acquires device information of multiple devices. The candidate selecting unit selects, from among the multiple devices, a device whose device information does not meet a predetermined criterion, as a candidate for a device to be replaced. The product selecting unit selects, based on a selection result by the candidate selecting unit and product information regarding multiple products that meet the predetermined criterion, a device to be replaced, from among candidates selected, and a replacement product with which the device is to be replaced. | 04-16-2015 |
20150106508 | METHOD AND DEVICE FOR COMMISSIONING OF NODES OF A NETWORK - The present invention provides a method for commissioning of nodes of a network. The method comprises the steps of (S | 04-16-2015 |
20150106509 | METHOD FOR REPRESENTING USAGE AMOUNT OF MONITORING RESOURCE, COMPUTING DEVICE, AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREON FOR EXECUTING THEREOF - A method of representing a usage of a monitoring resource includes designating monitoring target processes based on a weight file including a resource weight assigned according to resource importance for each of at least one process, minimum and maximum values of a corresponding resource weight and a resource identifier, applying the resource weight to resource items including CPU, memory and I/O usage rates, the resource items influencing on each of the monitoring target processes and visually representing each of the monitoring target processes according to the applied resource weight by a user request or periodically. Therefore, this application may apply a resource weight according to a resource importance being used by each of processes so that a user may check and actively deal with a system status. | 04-16-2015 |
20150106510 | SECURED SEARCH - A method for estimating web traffic to a website is disclosed. The method may include obtaining a first set of reporting information from a secured external source that directs traffic to the website. The first set of reporting information may have a corresponding portion of reporting information which is not provided from the secured external source. The method may include obtaining a second set of reporting information from a unsecured external source that directs traffic to the website. The second set of reporting information may be different than the first set of reporting information. The method may also include generating an estimation of the corresponding portion of reporting information which is not provided from the secured external source by correlating the second set of reporting information with the first set of reporting information. | 04-16-2015 |
20150106511 | SECURE CLOUD MANAGEMENT AGENT - A method for providing a secure management agent for high-availability continuity for cloud systems includes receiving operating parameters and threshold settings for a plurality of computing clouds. Secure relationships are established with the plurality of computing clouds based on the operating parameters. Data is mirrored across the plurality of computing clouds. Threshold data is then monitored for the plurality of computing clouds to maintain a continuity of resources for the plurality of computing clouds. | 04-16-2015 |
20150106512 | PREDICTIVE CLOUD PROVISIONING BASED ON HUMAN BEHAVIORS AND HEURISTICS - A method of predictively provisioning cloud resources based on human behaviors and heuristics includes monitoring a collection of events relating to a customer application as well as monitoring an infrastructure load on resources for the customer application. A causal relationship is evaluated between an event and the infrastructure load. A predictive rule is then constructed based on the causal relationship. Resource requirements are anticipated based on the predictive rule and a provisioning of resources in a service domain is requested for the anticipated resource requirements. | 04-16-2015 |
20150106513 | SYSTEM AND METHOD FOR OPERATING NETWORK TRAFFIC REDUCTION POLICY IN OVERLOADED AREA - A system for operating network traffic reduction policy in an overloaded area includes a storage medium for storing policy agent identification information disposed at a wireless terminal apparatus in response to the wireless terminal apparatus identification information; a communication unit for receiving the wireless terminal apparatus identification information positioned at an overloaded area from a communication server; a confirmation unit for confirming the policy agent identification information disposed at the wireless terminal apparatus corresponding to the received wireless terminal apparatus identification information by the storage medium; and a processing unit for transmitting network usage cutoff policy information included with a timer for clearing network usage cutoff to policy agents corresponding to the policy agent identification information confirmed by the confirmation unit. | 04-16-2015 |
20150106514 | Methods and Systems for Network Connectivity - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers. | 04-16-2015 |
20150106515 | Bandwidth Measurement - Methods for testing network bandwidth availability in a non-intrusive manner. By implementing occasional, base-line bandwidth testing, a more accurate indication of actual transfer rate results. When an application dependent upon network bandwidth is first executed, a series of file transfers takes place utilizing a series of different sized pieces of content. | 04-16-2015 |
20150106516 | PROVIDING A WITNESS SERVICE - Described are embodiments directed at providing a witness service that sends notifications with a resource state to clients. Embodiments provide a protocol that includes various messages for registering and receiving notifications regarding the state of a resource. The protocol may include a message for requesting node information from a first node in a cluster. The node information identifies nodes in the cluster that provide a witness service, which monitors a resource. The protocol includes a message that is used to register with the witness service for notifications regarding a state, or state change, of a network or cluster resource. The protocol also includes messages for sending notifications with state information of the resource. | 04-16-2015 |
20150113116 | PROBLEM DETERMINATION IN A HYBRID ENVIRONMENT - A multi-mainframe system problem determination method includes recording, in a first computing system, diagnostic data, receiving, in the first computing system, a data collection trigger, responsive to the data collection trigger, coordinating, in the first computing system, synchronized collection of recorded diagnostic data with a second computing system and delivering collected diagnostic data to a storage medium. | 04-23-2015 |
20150113117 | OPTIMIZING DATA TRANSFERS IN CLOUD COMPUTING PLATFORMS - In various embodiments, methods and systems for optimizing data transfer are provided. Data transfer optimization is accomplished by a data transfer optimization server. A data transfer session is initiated. The initiation of the data transfer session comprises analyzing transfer parameters for one or more data-source devices. An optimum number of concurrent network calls is calculated for the data transfer session. The calculation is based on the data transfer parameters. At least a portion of the optimum number of concurrent network calls is allocated for executing the data transfer session. The transfer parameters are monitored for changes. The optimum number of concurrent network calls is updated for the data transfer session based on a triggering event associated with the data transfer session. Updating the optimum number of concurrent network calls comprises recalculating the optimum number of concurrent network calls based on the transfer parameters after the trigger event. | 04-23-2015 |
20150113118 | HIERARCHICAL NETWORK ANALYSIS SERVICE - A hierarchical network analytics system operated by a computing device or system is described. In some example techniques, the analytics system may determine results of a plurality of first level analyses each based at least in part on results of a respective plurality of data queries that return respective subsets of a plurality of types of network data. The analytics system may determine a result of a second level analysis based at least in part on results of the plurality of first level analyses. | 04-23-2015 |
20150113119 | SYSTEM AND METHOD FOR VIRTUAL PARALLEL RESOURCE MANAGEMENT - An improved system and method are disclosed for providing virtual parallel access to a shared resource. In one example, the method includes receiving a request from a device to take control of the shared resource. After determining that another device is currently in control of the shared resource, a timer is started. Control of the shared resource will automatically pass from the device currently in control to the requesting device when the timer expires. Input received from the device currently in control is executed. Input received from the device that has requested control is buffered and executed once control is transferred. | 04-23-2015 |
20150113120 | PREDICTIVE AUTO SCALING ENGINE - Techniques for predictively scaling a distributed application are described. Embodiments could monitor performance of an application within a cloud computing environment over a first window of time to collect historical performance data. Here, the application comprises a plurality of application instances. A workload of the application could be monitored over a second window of time to collect historical workload data. Embodiments could analyze both the historical performance data and the historical workload data to determine one or more scaling patterns for the application. Upon determining a present state of the application matches one of the one or more scaling patterns, a plan for predictively scaling the application could be determined. Embodiments could then predictively scale the plurality of application instances, based on the determined plan. | 04-23-2015 |
20150113121 | GENERATION AT RUNTIME OF DEFINABLE EVENTS IN AN EVENT BASED MONITORING SYSTEM - A system and methods for updating event definitions to a control file of an event based monitoring (EBM) server in a wireless communication network are disclosed. According to one aspect, the invention provides a method for updating event definitions without an exchange of a complete control file containing updated and non-updated event definitions between at least one EBM client and the EBM server. The method includes receiving at an EBM client a new definition of an event from one of an operational unit and an operator. The new definition includes an event identifier and a condition, the fulfillment of which triggers sending the new definition of the event to the EBM server. The method also includes sending a configuration change record to the EBM server. The configuration change record informs the EBM server of the new definition of the event to enable the EBM server to update the control file. | 04-23-2015 |
20150113122 | AUTOMATIC ASYNCHRONOUS HANDOFF IDENTIFICATION - Asynchronous handoffs between threads and other software components may be automatically detected, and the corresponding working objects may be tracked. The system may report monitoring information for an overall transaction that includes the original request and corresponding asynchronous requests. Automatically detecting asynchronous requests may include instrumenting a virtual machine, such as a Java Virtual Machine (JVM), to detect the creation of thread handoff objects and the object and/or thread execution. Thread handoff objects may automatically tracked, tracked based on data learned over time, tracked based on user input, and otherwise configured. In some embodiments, after detecting the creation of a thread handoff object, an identification of the object of the call may be identified as being tracked in another server or application. | 04-23-2015 |
20150113123 | METHOD AND APPARATUS FOR PERFORMING NETWORK DISCOVERY - Disclosed is a method and server for discovering virtual private networks with extranet configurations. An extent of a virtual private network (VPN) is determined based on matching criteria. Confirmed layer three (L3) VPNs are determined based on an enablement of a heuristic. The confirmed L3 VPNs are re-examined to determine extranet linkages. | 04-23-2015 |
20150113124 | DEVOLVED ROUTING IN SOFTWARE-DEFINED NETWORKS - A set of routing rules is receiving at a networking device in a data communication network from a controller in the data communication network implemented using the software-defined network architecture. A condition is detected at the networking device. A subset of the set of routing rules is selected in the networking device. The selecting is responsive to the condition. The subset of routing rules is applied in the networking device at a first time such that the networking device uses a first routing rule to route data traffic in the data communication network, and omits using a second routing rule received from the controller to route data traffic in the data communication network. A second subset of routing rules from the set of routing rules responsive to a second condition is applied autonomously at a second time at the networking device. | 04-23-2015 |
20150113125 | System and Method for Providing the Status of Safety Critical Systems to Untrusted Devices - A system and method is described for providing the status of safety critical systems to untrusted devices. | 04-23-2015 |
20150113126 | WEB BROWSER TRACKING - A technique for tracking web browsing activity of a client device that includes storing, in a memory, a client profile having a client identifier associated therewith, providing a client device with a cache file having the client identifier embedded therein, receiving from the client device an identification of a client action and the client identifier, and updating the client profile to include the identification of the client action. | 04-23-2015 |
20150113127 | METHOD AND A MOBILE AD-HOC NETWORK FOR THE EFFECTIVE IDENTIFICATION OF NEIGHBORING NODES - In a method for the effective identification of neighboring nodes in a mobile ad-hoc network, every node transmits within a given time raster (ΔT | 04-23-2015 |
20150113128 | SMALL DATA TRANSMISSION METHOD AND USER EQUIPMENT USING THE SAME - A small data transmission method, configured for a User Equipment (UE) to transceive a small data from a control node in a wireless network without establishing a Radio Resource Control (RRC) connection, and the method includes but not limited to the step of: monitoring a paging opportunity (PO) sub frame in a paging frame in an idle mode; when an identifier in the PO sub frame corresponding to the UE is detected, receiving a paging message corresponding to the PO sub frame; and analyzing the paging message, and when the paging message includes a small data indicator, extracting a data from an indicating address, in which the data is the small data. | 04-23-2015 |
20150113129 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO DETERMINE A NETWORK EFFICACY - Methods, apparatus, and articles of manufacture to determine a network efficacy are described. An example method to determine a network efficacy includes determining a connectedness for a user of a social networking site, determining an interactivity for the user, determining a network constancy for the user, and determining the network efficacy of the social networking site based on the connectedness, the interactivity, and the network constancy. | 04-23-2015 |
20150113130 | PROBLEM DETERMINATION IN A HYBRID ENVIRONMENT - A multi-mainframe system problem determination method includes receiving, in a first computing system, a data collection trigger, coordinating, in the first computing system, synchronized diagnostic data collection with a second computing system, and delivering the diagnostic data to a storage medium. | 04-23-2015 |
20150113131 | Scheduling A Service Event In A Network - In an embodiment, a system for scheduling a service event in a network includes a scheduling subsystem for scheduling the service event by selecting devices from a group, a monitoring subsystem for identifying those devices which did not successfully register with a registration subsystem of the network, and an analysis subsystem for determining selection criteria for identifying further devices which are expected to fail registration based on said devices having failed registration. By providing the selection criteria to the scheduling subsystem, the scheduling subsystem is enabled to adjust the scheduling based on the selection criteria, e.g., to avoid selecting the further devices in a further scheduling. | 04-23-2015 |
20150113132 | SYSTEM AND METHOD FOR OBSERVING AND CONTROLLING A PROGRAMMABLE NETWORK USING A REMOTE NETWORK MANAGER - A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors and a remote network manager. The one or more collectors are configured to receive network traffic data from a plurality of network elements in the network. The remote network manager is configured to connect to the one or more collectors over the Internet via a network interface. The one or more collectors extract metadata from the network traffic data and send the metadata to the network manager. | 04-23-2015 |
20150113133 | SYSTEM AND METHOD FOR OBSERVING AND CONTROLLING A PROGRAMMABLE NETWORK USING CLOSED LOOP CONTROL - A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes one or more collectors, a network manager, and a programmable network element. The one or more collectors are configured to receive network traffic data from a plurality of network elements and extract metadata from the network traffic data. The network manager is configured to receive metadata from the one or more collectors. The network manager identifies a network control objective for the network, identifies a programmable parameter of the programmable network element to achieve the network control objective, and programs the programmable network element. The network manager further determines whether the network control objective is met after programming the programmable network element and applies a control loop based on the network control objective to program the programmable network element. | 04-23-2015 |
20150113134 | MONITORING ENTITLEMENT USAGE IN AN ON-DEMAND SYSTEM - Methods and systems are provided for on-demand entitlement monitoring. One exemplary method involves an on-demand application server obtaining, from a database, usage information for a resource associated with an entitlement offered by a resource provider to a user of a client device and generating a graphical representation of usage of the resource by the user based at least in part on the usage information obtained from the database. In exemplary embodiments, the on-demand application server provides the graphical representation to the resource provider for integration into a graphical user interface display associated with a virtual application provided to the client device over a network. | 04-23-2015 |
20150113135 | NETWORK MONITORING BY USING PACKET HEADER ANALYSIS - A computer method and a system for detecting the file type of an electronic file, the method including the steps of: (a) using a predetermined number of bytes at the beginning of the file to create a list of probable file types; (b) testing the file against a detection rule for each file type in the list until a match is found; if no match is found (c) testing the file against other known detection rules for file types to find a match. | 04-23-2015 |
20150113136 | METHOD OF DETERMINING BROADBAND CONTENT USAGE WITHIN A SYSTEM - An end user network access point monitors and collects usage statistics associated with all content accessed by the end user devices through the access point. One or more external control servers collect the usage statistics from each access point, thereby compiling macro-level statistics related to content accessed by the end user devices. The one or more external control servers can be co-located with the network equipment of the broadband infrastructure provider, or the one or more external control servers can be independent of the broadband infrastructure. | 04-23-2015 |
20150113137 | EVENT REPORTING METHOD AND SYSTEM - The present invention is applicable to the field of communications technologies, and provides an event reporting method and system, where the method includes: reporting, by a terminal, information about a monitored event to a core network management control network element, so that the core network management control network element reports the information to a server, where the information about the event includes indication information of the monitored event or status information of the monitored event or both. The present invention effectively reduces a burden of a network server. | 04-23-2015 |
20150120901 | DETECTING POOR PERFORMING DEVICES - A device is configured to determine a set of performance indicators associated with a base station and a set of user devices, and determine that a quantity of the set of user devices does not exceed a threshold. The device is configured to receive performance information based on the set of performance indicators, and store the performance information based on determining that the quantity of the set of user devices does not exceed the threshold. The device is configured to determine a performance problem, associated with the base station, based on the performance information, and determine that a user device, of the set of user devices, is associated with the performance problem. The device is configured to provide information that identifies the user device. | 04-30-2015 |
20150120902 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION ACTIVITIES OF A COMMUNICATION DEVICE - Aspects of the subject disclosure include, for example, selecting a first communication device of the plurality of communication devices to analyze activities of the first communication device, presenting at a device activity information associated with the activities of the first communication device, facilitating an exchange of messages between the device and the first communication device, receiving a request from the device to transfer control of the first communication device to the device responsive to the device receiving an unsatisfactory response from the first communication device, and receiving control information from the device to adjust an operational aspect of the first communication device. Other embodiments are disclosed. | 04-30-2015 |
20150120903 | System for monitoring XMPP-based communication services - Monitoring a communication-based system, comprising: communication service supporting XMPP communication with remote devices; device management applications; external, independent monitoring service monitors the communication-based system; XMPP clients; sending and receiving XMPP messages; and analytical component analyzes XMPP messages to determine status of the system, to possibly restart the communication service if the current response time is below a threshold. Methods include monitoring API and XMPP format comprising monitoring request with name of command to receive performance metrics, and monitoring response that comprises performance metrics; and tags; XMPP messages comprising real command, not merely watching or monitoring processes; availability matrix and statistical data in a database; availability metrics is percentage of time when the communication service is available, in comparison to the time while it is unavailable or shut down; and performance metrics is number of messages processed in a unit of time and response time of the communication service. | 04-30-2015 |
20150120904 | VARIABLE CAPTURE BETWEEN APPLICATIONS - A first communication session is created with a first application written in first language. A change is detected in first variables in the first application. The first variables are retrieved from the first application in response to detecting a change in the first variables. The first communication session is transferred to a second application written in a second language. A change is detected in a second variable in the second application. The second variable is retrieved from the second application in response to detecting the change in the second variable. A common pair of variables are matched between the first variables and the second variable. The first communication session and the transferred first communication session are associated as a common communication session in response to matching the common pair of variables. One or more of the first plurality of variables is then used by the second application. | 04-30-2015 |
20150120905 | METHOD AND SYSTEM FOR MONITORING CONDITIONS IN A DYNAMIC NETWORK ENVIRONMENT - A method for monitoring network conditions by receiving a first condition definition describing a first network condition to be monitored in a network and an activation definition, determining a network topology of the network, and compiling the first condition definition to generate a first data plane component, a first control plane component, and an activation component. The method also includes deploying the first data plane component into a data plane of the network, where the data plane component captures and synthesizes a first stream of network events to generate a first modified stream of network events. The method also includes deploying the control plane component into a network operating system for the network. The control plane component receives and correlates the first modified stream of network events. The method also includes deploying an activation component that, upon receiving the correlated stream of events, initiates the activation definition. | 04-30-2015 |
20150120906 | AGENTLESS BASELINE PROFILE COMPILATION FOR APPLICATION MONITORING SOLUTION - Aspects of the present invention provide a solution for monitoring execution of an application on a computer system. In an embodiment, a plurality of base operating values is obtained via an agentless process for each of a set of resource utilization variables that measure performance of the computer system. Based on these base operating values, an application profile for the computer system is compiled. This application profile can include an upper process control limit and a lower process control limit for each of the set of resource utilization variables. Execution of an application can be monitored by gathering operating values from the computer system during execution of the application and comparing the gathered values to the corresponding upper process control limits and the lower process control limits in the application profile. | 04-30-2015 |
20150120907 | STORAGE AREA NETWORK QUEUE DEPTH PROFILER - A system for improving performance of a network includes a monitor that obtains data sets corresponding to network performance, infers characteristics from the data set and generates visualizations and recommendations. In one aspect, the network is a storage area network and the system generates a box plot showing response time based on inferred queue depth, and recommending a queue depth setting if possible. | 04-30-2015 |
20150120908 | REAL-TIME, DISTRIBUTED ADMINISTRATION OF INFORMATION DESCRIBING DEPENDENCY RELATIONSHIPS AMONG CONFIGURATION ITEMS IN A DATA CENTER - In a data center, real-time, distributed administration of information describing dependency relationships among configuration items may be carried out. In such a data center, each configuration item is associated with an independent agent that is coupled to other agents and maintains a record of dependencies amongst the configuration item associated with the agent and other configuration items. Administration of dependency information includes: detecting, by an independent agent associated with a particular configuration item, a change in the item's dependency; providing information describing the change in the particular configuration item's dependency to all other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item; and, for each of the other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item: updating the record of dependences for the configuration item associated with the independent agent. | 04-30-2015 |
20150120909 | DNS-ASSISTED APPLICATION IDENTIFICATION - Techniques are disclosed for classifying a network flow based on a domain name system (DNS) request. Embodiments receive a first DNS request associated with establishing a network flow with a remote service. Here, the first DNS request specifies a domain name associated with the remote service. The domain name is analyzed in order to determine a first classification for the remote service. The first classification is selected from a plurality of classifications. Embodiments then determine a network management policy to apply to the network flow, based on the determined first classification. | 04-30-2015 |
20150120910 | METHOD FOR DYNAMIC LOAD BALANCING IN CAMPUS DEPLOYMENTS - A method is described for dynamically assigning tasks to entities of different types within a network system based on preferences to perform the tasks on particular entities and/or network/device conditions. This ability to dynamically assign processing of tasks between disparate devices in a network system provides a more efficient network configuration and utilization of resources while not compromising throughput, overall network security, and/or network flexibility. | 04-30-2015 |
20150120911 | METHOD AND SYSTEM FOR NETWORK SERVICE HEALTH CHECK AND LOAD BALANCING - A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The operations include sending, to shared devices, one or more status queries regarding one or more device conditions for each of the shared devices, obtaining responses to the one or more status queries from each of the plurality of shared devices, the responses including the one or more device conditions for each of the shared devices, filtering the shared devices based on the one or more device conditions to obtain a subset of the shared devices, identifying the subset of the shared devices as a set of available shared devices, and transmitting information identifying the set of available shared devices to a client device. | 04-30-2015 |
20150120912 | AUTOMATED GENERATION AND DYNAMIC UPDATE OF RULES - The present subject matter relates to monitoring of an environment using data trend analysis. The method comprises obtaining at least one data trend pertaining to at least one data stream for a pre-defined period of time. The at least one data trend is indicative of a pattern followed by the at least one data stream. Further, at least one delta value pertaining to the at least one data stream may be computed, the at least one delta value being indicative of a deviation in the at least one data stream with respect to the at least one data trend at a specific time instance. Furthermore, at least one relationship between a plurality of data streams is identified based on the at least one data trend and identity metadata associated with each data stream. Based on the at least one delta value and the at least one relationship, at least one rule is generated. | 04-30-2015 |
20150120913 | DYNAMIC CLONING OF APPLICATION INFRASTRUCTURES - Techniques for dynamically cloning application infrastructures are provided. In one embodiment, a computer system can monitor one or more metrics pertaining to an infrastructure for an application at a first site. If the one or more metrics exceed or fall below one or more corresponding thresholds, the computer system can clone the infrastructure at a second site distinct from the first site, thereby enabling the application to be hosted at the second site. | 04-30-2015 |
20150120914 | SERVICE MONITORING SYSTEM AND SERVICE MONITORING METHOD - A method detects a request higher than the baseline in baseline monitoring and stores the request in an outlier request DB. The method selects a common pattern from requests stored in the outlier request DB, differentiates between a request including the pattern and a request not including the pattern, and monitors them with different baselines as different services. | 04-30-2015 |
20150120915 | Policy Service Logging Using Graph Structures - A policy service logging system includes one or more servers connected by a network. The one or more servers are configured to provide a graph structure having a plurality of nodes. Each node is in communication with at least one other node. The graph structure is configured to process log entries of network resource requests subject to policy implemented by a policy service. As log entries flow through the graph structure, the nodes perform operations on the log entries. | 04-30-2015 |
20150120916 | SYSTEM, METHOD AND APPARATUS FOR TRAFFIC MIRROR SETUP, SERVICE AND SECURITY IN COMMUNICATION NETWORKS - The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination. | 04-30-2015 |
20150120917 | METHODS AND APPARATUS FOR SCALABLE PRIVATE SERVICES - Methods and apparatus for providing scalable private services in service provider networking environments. A service provider that provides a large, public, multi-tenant implementation of a web service to multiple customers via a public API endpoint may allow a customer to request the establishment of a private implementation of the service. In response, a service private instance may be automatically and/or manually established for the customer that provides a private API endpoint to the service and that is at least in part implemented on single-tenant hardware that is not shared with other customers. The service private instance may initially be implemented as a relatively small scale and possibly limited implementation of the service when compared to the service public instance. As the needs of the customer grow, the service private instance may be automatically and/or manually scaled up from the initial implementation. | 04-30-2015 |
20150120918 | TRAVERSAL OF SYMMETRIC NETWORK ADDRESS TRANSLATOR FOR MULTIPLE SIMULTANEOUS CONNECTIONS - Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is disclosed. The likelihood of connection failure during symmetric NAT traversal may be reduced by serializing critical time windows after port prediction. Once a connection request has been sent for a first connection, port prediction for a subsequent connection may be delayed until a connectivity check has begun for the first connection. This process may be repeated to handle NAT traversal for multiple simultaneous connections to different nodes. | 04-30-2015 |
20150120919 | PREFERRED RESOURCE SELECTOR - A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context of a client computer with an intranet access criterion to form a comparison result. The computer selects at least one preferred uniform resource identifier based on the comparison result, indicating the intranet is accessible. The computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network. | 04-30-2015 |
20150120920 | CROSS-CLOUD COMPUTING RESOURCE USAGE TRACKING - Systems and methods for cross-cloud computing resource usage tracking. An example method comprises: receiving a request comprising an operational specification of a computing resource; selecting a first provisioning cloud in view of the operational specification; receiving an updated operational specification of the computing resource; receiving a first provisioning offer from the first provisioning cloud and a second provisioning offer from a second provisioning cloud responsive to the updated operational specification; selecting the second provisioning cloud in view of the first and second provisioning offers; providing an interface between the first computing resource and a second computing resource residing in a second provisioning cloud; and tracking resource usage data of the first computing resource across the provisioning clouds. | 04-30-2015 |
20150120921 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 04-30-2015 |
20150120922 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 04-30-2015 |
20150120923 | Optimization Of Resource Utilization In A Collection of Devices - Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups. | 04-30-2015 |
20150127804 | SYSTEMS AND METHODS FOR DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM - Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods. | 05-07-2015 |
20150127805 | DYNAMIC BANDWIDTH ALLOCATION SYSTEMS AND METHODS USING CONTENT IDENTIFICATION IN A SOFTWARE-DEFINED NETWORKING CONTROLLED MULTI-LAYER NETWORK - A method, a Software-Defined Networking (SDN) controller, and a network include operation of a multi-layer SDN network and uniquely identifying streaming content on higher layers relative to the multi-layer SDN network through deep packet inspection; associating the streaming content to a multi-layer service on the SDN network; and monitoring the streaming content on the SDN network over the multi-layer service. This can include dynamically adjusting bandwidth of the multi-layer service utilizing OpenFlow on the SDN network based on the monitoring. The deep packet inspection can utilize a Bloom filter embedded in a resource identifier of the streaming content by the content provider, wherein the embedded Bloom filter is transparent to content players and does not require changes to storage on associated web servers for the streaming content. | 05-07-2015 |
20150127806 | NODE DE-DUPLICATION IN A NETWORK MONITORING SYSTEM - Systems, methods, apparatuses, and computer program products for node de-duplication. One method includes discovering, by a network monitoring apparatus, nodes in a network, and collecting a list of internet protocol (IP) addresses, media access control (MAC) addresses, domain name system (DNS) names, and sysnames for each of the nodes discovered in the network. The method may also include comparing the collected list of information for each of the discovered nodes with corresponding information for current nodes and other discovered nodes. The method may then includes determining duplicate nodes that are duplicates of the other discovered nodes and/or the current nodes based on the comparison of the IP addresses, MAC addresses, DNS names, and sysnames. | 05-07-2015 |
20150127807 | MODELING COMPUTER NETWORK TOPOLOGY BASED ON DYNAMIC USAGE RELATIONSHIPS - A method for modeling dependencies in a computing system including a plurality of resources, the method includes monitoring data communications made between the resources of the plurality of resources; modeling dependencies, at least among and between the resources, based, at least in part, upon the monitored data communications; and generating a set of topology graph(s), including at least a first topology graph, based upon the modeled dependencies. | 05-07-2015 |
20150127808 | USING CLOUD RESOURCES TO IMPROVE PERFORMANCE OF A STREAMING APPLICATION - A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. The streams manager specifies to the cloud manager streams infrastructure and one or more streams application components for the virtual machines. The cloud manager provisions one or more virtual machines in a cloud with the specified streams infrastructure and streams application components. The streams manager then modifies the flow graph so one or more portions of the streaming application are hosted by the virtual machines in the cloud. | 05-07-2015 |
20150127809 | METHOD AND APPARATUS FOR DISTRIBUTING ETHERCHANNEL LOAD BASED ON VARIANCE - Techniques are disclosed for determining a preferred hashing algorithm for load balancing physical interface utilization in a network device, such as a switch, configured with a port-channel architecture. While a current hashing algorithm is being applied to network traffic flows, a forwarding engine of the network device retrieves snapshot data of each flow and evaluates the flows against other hashing algorithms. The forwarding engine, for each hashing algorithm result, calculates statistical measures, such as mean, variance, and coefficient of variation. These measures are used to determine the preferred hashing algorithm to subsequently be applied. Once determined, the networking device may notify a user (e.g., a system administrator) of the algorithm. | 05-07-2015 |
20150127810 | STREAMING STATE DATA FOR CLOUD MANAGEMENT - A cloud manager uses streams to monitor state of the cloud. A cloud state streaming policy specifies state data to stream, along with one or more initial operators for processing the streams. An archive mechanism allows archiving the streamed data when specified data in the streams exceeds one or more defined thresholds. A user interface allows adjusting the streaming of cloud state data to focus on data of interest to a user. The cloud manager thus allows a user to determine state of a cloud via the streamed state data. | 05-07-2015 |
20150127811 | NETWORK FALLBACK USING RESOURCE REQUEST EXPECTATIONS - Methods for network fallback using resource request expectations are provided. In one aspect, a method includes receiving a resource request, the resource request including one or more request expectations. The method also includes sending the resource request to a hostname via a first network connection. The method also includes evaluating network activity in response to the sent resource request. The method also includes resending the resource request to the hostname via a second network connection based on the evaluated network activity and the one or more request expectations. Systems and machine-readable media are also provided. | 05-07-2015 |
20150127812 | CAPACITY FORECASTING BASED ON CAPACITY POLICIES AND TRANSACTIONS - According to one aspect of the present disclosure, a method and technique for capacity forecasting is disclosed. The method includes: storing, in a memory, resource data associated with an environment, the resource data comprising inventory information of applications, processing resources and storage resources of the environment; and providing a ledger module executable by a processor unit to: create a capacity-associated transaction; identify and link at least one of an application, processing resource and storage resource to the transaction from the resource data; determine an initiation time and duration associated with the transaction; and forecast a change in capacity of at least one linked storage resource for the transaction and a time of the change in capacity. | 05-07-2015 |
20150127813 | CONTEXTUAL BROWSER COMPOSITION AND KNOWLEDGE ORGANIZATION - Various systems and methods for organizing knowledge are described herein. A context of a browsing session of a plurality of online resources is identified. User browsing behavior during browsing of the plurality of online resources is tracked. Using a computing device, a relevance metric of the plurality of online resources is determined using the user browsing behavior, with the relevance metric measuring a relevance of the plurality of online resources in view of the context. The relevance metric, an indicia of the context, and the plurality of online resources are stored in a database on the computing device. | 05-07-2015 |
20150127814 | Monitoring Server Method - A monitoring server method includes the following steps. First, the baseboard management controller (BMC) receives the running status information of a system device transferred by the system management software. Then, the BMC determines whether or not the system device is operated in a normal state. When the system device is operated in an unusual state, the virtual sensor data record in the sensor data recorder is set in an abnormal state by the BMC. Then, the BMC generates an event according to the abnormal state to trigger a platform event filter (PEF) of the BMC to issue a warning signal to a remote management host. | 05-07-2015 |
20150127815 | MODELING COMPUTER NETWORK TOPOLOGY BASED ON DYNAMIC USAGE RELATIONSHIPS - A method for modeling dependencies in a computing system including a plurality of resources, the method includes monitoring data communications made between the resources of the plurality of resources; modeling dependencies, at least among and between the resources, based, at least in part, upon the monitored data communications; and generating a set of topology graph(s), including at least a first topology graph, based upon the modeled dependencies. | 05-07-2015 |
20150127816 | DATACENTER HEALTH ANALYSIS USING DNS SWITCHING - Technologies are generally described for monitoring application health in datacenters through load rebalancing. In some examples, a domain name server (DNS) module may cyclically vary load provided to an application instance. A monitoring module may then measure application output data and/or parameters associated with the processing of the load by the application based on a difference or a comparison between parts of the cyclical load variation. The monitoring module may use the measured data/parameters to both determine the health of the application instance and to cause the DNS module to adjust the periodic variation of the load. | 05-07-2015 |
20150127817 | NETWORK-BASED HIGH PERFORMANCE SAP MONITORING SYSTEM AND METHOD - Provided are a network-based high performance SAP monitoring system and method, including a hardware engine selecting packets to be updated from input packets by performing session-based filtering and pattern matching on the input packets, identifying to which application protocol belongs among dynamic information and action gateway (DIAG) protocol, remote function call (RFC) protocol, and hypertext transfer protocol (HTTP) protocol, and adding identification information of the identified application protocol to the packet to be uploaded and a software engine including a DIAG processor processing the DIAG protocol, RFC processor processing the RFC protocol, and HTTP processor processing the HTTP protocol, when receiving the packet added with the identification information from the hardware engine, referring SAP application protocol identification information, extracting data transmitted and received between servers of an SAP client and one of the DIAG processor, RFC processor, and HTTP processor, thereby sorting and processing the three types of SAP application protocol such as the DIAG protocol, RFC protocol, and HTTP protocol. | 05-07-2015 |
20150127818 | MEDIA PLAYLIST CONSTRUCTION FOR VIRTUAL ENVIRONMENTS - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 05-07-2015 |
20150127819 | METHODS AND APPARATUS TO CREDIT BACKGROUND APPLICATIONS - Methods, apparatus, systems and articles of manufacture are disclosed which credit background applications. Examples disclosed herein set a threshold for bandwidth activity based on the bandwidth pattern. Examples disclosed herein compare a bandwidth usage of the application executing in the background to the threshold for bandwidth activity. Examples disclosed herein determine a state of the application executing in the background as one of active or inactive based on the comparing, and generate a log file comprising an identification of the application, a timestamp, and the state of the application. | 05-07-2015 |
20150127820 | APPARATUS AND METHOD FOR SEARCHING ACROSS GROUPS OF NETWORKED DEVICES FOR DEVICES HAVING A SAME FUNCTION - A search device in a system in which first and second device groups are connected to each other, acquires first history information that specifies transmission sources and transmission destinations of communication executed between devices in the first device group, and second history information that specifies transmission sources and transmission destinations of communication executed between devices in the second device group. The search device searches across the first and second history information for a pair of a first device in the first group and a second device in the second group, by comparing the first and second history information, where the first device has a same function as the second device. | 05-07-2015 |
20150127821 | CONTROL DEVICE - To reduce the processing load of the control calculations run on a PLC while quickly providing data representing a state of control, a PLC for communicating data with an external device executes a user program to manage a controlled object. The user program executes a program that monitors data representing a state of control, which can be referenced or updated. When a monitoring condition is met, the monitoring program transmits a data message representing the state of control via a server to the external device using a PUSH-type protocol. | 05-07-2015 |
20150127822 | MANAGING DEVICES IN A HETEROGENEOUUS NETWORK - A system that accesses managed devices in a heterogeneous network includes a controller, coupled to the managed devices, having processor hardware, an operating system running on the processor hardware, an application framework layer that provides low level communication and resource management to the operating system, and a mapping layer that that provides data routing for the system and includes a plurality of user equipment devices, coupled to the controller, that communicate with the managed devices through the controller, where the controller and the user equipment devices provide messages for the managed devices in a first format and where at least some of the managed devices receive messages in a plurality of different formats and wherein the mapping layer converts messages in the first format to at least one of the different formats prior to providing the messages to the managed devices. The first format may be a CoAP/LWM2M format. | 05-07-2015 |
20150127823 | RESOLVING COMMUNICATION COLLISIONS IN A HETEROGENEOUS NETWORK - Resolving heterogeneous communication collisions in a system includes measuring a quality-of service value for at least one communication connection, determining if a communication collision is reducing the quality-of-service value to below a pre-determined threshold, and, if a communication collision is reducing the quality-of-service value to below a pre-determined threshold, iteratively modifying the at least one communication connection until either a maximum number of iterations has been exceeded or the quality of service value exceeds the pre-determined threshold. Modifying the at least one communication connection includes a number of possible techniques, such as changing technology used by at least one interface corresponding to the communication connection, changing a frequency band used by at least one interface corresponding to the communication connection, changing transmission parameters used by at least one interface corresponding to the communication connection, and using transmission gaps to transmit data. | 05-07-2015 |
20150127824 | SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - A site controller adapted to be used in an automated monitoring system for monitoring and controlling a plurality of remote devices via a host computer connected to a first communication network is provided. The site controller is configured for controlling communication with the host computer and a plurality of communication devices that define a second communication network associated with the plurality of remote devices. Briefly described, in one embodiment, the site controller comprises a transceiver configured to communicate with the plurality of communication devices via the second communication network; a network interface device configured to communicate with the host computer via the first communication network; and logic configured to: manage communication with each of the plurality of communication devices, via a first communication protocol, based on one or more communication paths for each of the plurality of communication devices, each communication path comprising one or more communication devices involved in the communication link between the transceiver and each of the plurality of communication devices; and manage communication with the host computer via a second communication protocol. Other aspects, features, and embodiments are also claimed and described. | 05-07-2015 |
20150127825 | INCREMENTAL BROWSER-BASED DEVICE FINGERPRINTING - A method for incrementally fingerprinting a computing device includes steps for executing device-identification code programmed to retrieve a complete set of device configuration metrics from a web browser of the computing device, interrupting execution of the device-identification code after retrieval of a first subset of the device configuration metrics, generating a partial device fingerprint from the first subset, generating a temporary device identifier from the partial device fingerprint, and generating a subset indicator identifying the device configuration metrics that compose the first subset. Additional steps include writing the temporary device identifier and the subset indicator to browser-based storage of the computing device, resuming execution of the device-identification code, querying the browser-based storage for presence of the temporary device identifier, and retrieving, responsive to detecting the temporary device identifier, a second subset of the device configuration metrics, the second subset comprising device configuration metrics not identified by the subset indicator. | 05-07-2015 |
20150127826 | PROVIDING ALTERNATIVE REPRESENTATIONS OF VIRTUAL CONTENT IN A VIRTUAL UNIVERSE - An invention for automatically reducing a load on a server functioning with a virtual universe is provided. In one embodiment, there is an alternative representation tool, including a detection component configured to detect a load on a server, and a determination component configured to determine whether the load on the server exceeds a predefined threshold. The alternative representation tool further comprises a rendering component configured to provide an alternative representation of a virtual content renderable in the virtual universe to reduce the load on the server in the case that the load on the server exceeds the predefined threshold. | 05-07-2015 |
20150127827 | Lawful Interception in an IP Multimedia Subsystem Network - A method and apparatus for providing lawful interception in an IMS network. A first node in an IMS network receives a message from a Lawful Intercept mediation system node instructing the first node to perform lawful interception on a target. The first node sends a subscribe request message towards a second node located in an IMS core network. The subscribe request message includes at least an identity of a service type to be monitored. The first node subsequently receives a notify message from the second node, the notify message including session information from which intercept related information can be derived. The first node then sends intercept related information towards the Lawful Intercept mediation system node. | 05-07-2015 |
20150127828 | SERVICE ORIENTED ARCHITECTURE SERVICE DEPENDENCY DETERMINATION - Service dependency is determined for services in a service oriented architecture (SOA) environment. The steps in determining service dependency include: recording a first triple describing a first service call where the first service calls the second service, and determining the first service is dependent upon the second service based, at least in part, upon the first triple. The recording action is performed dynamically, the recording occurring when the first service call is made. Other related steps include recording the first triple to a timestamp indicating when the first service call is made. | 05-07-2015 |
20150134807 | Determining Community Gatekeepers in Networked Systems - Methods, systems, and articles of manufacture for determining community gatekeepers in networked systems are provided herein. A method includes identifying a plurality of groups of nodes in a network system, wherein each of the plurality of groups of nodes includes a given node; measuring a marginal contribution made by the given node to a centrality metric associated with each of the identified plurality of groups of nodes in the network system; and deriving a centrality metric of the given node by averaging the marginal contribution made by the given node across each of the identified plurality of groups of nodes in the network system. | 05-14-2015 |
20150134808 | SYSTEMS AND METHODS FOR MONITORING AND APPLYING STATISTICAL DATA RELATED TO SHAREABLE LINKS ASSOCIATED WITH CONTENT ITEMS STORED IN AN ONLINE CONTENT MANAGEMENT SERVICE - Shareable links can be created to share content items and information pertaining to activity on those shareable links can be monitored and stored in an online content management service. Based on this activity information, predetermined actions can be executed. These actions can include sending notifications regarding link activity, disabling shareable links, and/or updating sharing limitations related to the shareable links. Using the activity information, popular shared content items can be identified and recommendations for sharing unshared content items can be provided to the user. Additionally, advertisements can be tailored to the relative popularity of the shared content items. | 05-14-2015 |
20150134809 | EXTENSIBLE KERNEL FOR ADAPTIVE APPLICATION ENHANCEMENT - Resource use by applications used by user equipment (UE) is adaptively controlled. A UE can comprise a modem-network kernel component that can be well partitioned from modem operations and can facilitate adaptively controlling use of functional blocks for applications of the UE, and enhancing use of network resources in connection with use of applications by the UE. The kernel component can operate in a protected area of the baseband and can utilize APIs and interfaces available to it by existing modem stacks and UE operating systems. The kernel component can interact with the communication network to adaptively present network enabler functions to other parts of the system. The kernel component can facilitate managing secure communication with the communication network to facilitate proper cross-layer optimization practices, including capabilities for compression and decompression, rate shaping, and event notification associated with the communication network and UE subsystems. | 05-14-2015 |
20150134810 | Identifying Properties of a Communication Device | 05-14-2015 |
20150134811 | Identifying Properties of a Communication Device | 05-14-2015 |
20150134812 | ANALYTICS BASED SCOPING OF HTML5 WEB STORAGE ATTRIBUTES - A method, system, and computer program product for optimizing storage of Web storage attributes through analytics is provided. The method includes identifying and storing in memory of a computer, utilization of different Web storage attributes by different end users across different Web application sessions from different Web browsers and analyzing the stored utilization of different Web storage attributes to identify a past scope of utilization for each of the different Web storage attributes. The method further includes, responsive to receiving a request from a requestor for an optimal storage location of a particular Web storage attribute, determining an identified past scope of utilization for the particular Web storage attribute, mapping the determined identified past scope of utilization for the particular Web storage attribute to the optimal storage location, and returning an indication of the mapped optimal storage location of the particular Web storage attribute to the requestor. | 05-14-2015 |
20150134813 | ASSOCIATING A DATA COLLECTOR WITH A NETWORK ACCOUNT | 05-14-2015 |
20150134814 | EQUIPMENT MANAGEMENT SYSTEM AND PROGRAM - An equipment manager manages connected equipment. A Web server is able to provide Web contents that include a monitoring program for monitoring the states of equipment managed by plural equipment management devices. A Web-contents-display controller acquires the Web contents that are transmitted from the Web server, executes the monitoring program, acquires an equipment-management-device-address list, uses the acquired equipment-management-device-address list to connect to each of the plural equipment management devices, acquires equipment data that is managed by each of the equipment management devices, and displays that equipment data on one screen of the Web browser. | 05-14-2015 |
20150134815 | COMPUTER SYSTEM PRODUCTIVITY MONITORING - Embodiments of the inventive subject matter include gathering, from a plurality of sensors of a computer system, information about the computer system. Embodiments further include generating a profile of performance of the computer system indicating a state of components of the computer system during use. Embodiments further include generating a profile of usage of the computer system indicating current activities and usage of the computer system. Embodiments further include analyzing the profile of performance of the computer system against the profile of usage of the computer system to determine if the state of the components of the computer system during use is acceptable for the current activities and usage of the computer system. Embodiments further include determining that productivity of the computer system is inhibited based, at least in part, on the analyzing the profile of performance of the computer system against the profile of usage of the computer system. | 05-14-2015 |
20150134816 | MEASUREMENTS BASED ON PANEL AND CENSUS DATA - A first set of usage data for a first set of resources on a network and a second set of usage data for a second set of resources on a network are accessed. The first set of resources were accessed by a first group of client systems and the first set of usage data is determined based on information received from the first group of client systems sent as a result of beacon instructions included with the first set of resources. The second set of usage data is determined based on information received from monitoring applications installed on a second group of client systems that accessed the second set of resources. Users of the second group of client systems are a sample of a larger group of users that use resources on the network. Initial usage measurement data for a third set of resources on the network is determined based on the first set of usage data. The third set includes one or more common resources that are included in the first set of resources and the second set of resources. One or more adjustment factors are determined based on the second set of usage data and applied to the initial usage measurement data to generate adjusted usage measurement data. One or more reports are generated based on the adjusted usage measurement data. | 05-14-2015 |
20150142946 | Applying Sequenced Instructions to Connect Through Captive Portals - Embodiments apply a set of sequenced instructions to connect to a network through a captive portal. A computing device detects a network access point and obtains the instruction set corresponding to the network access point. The instruction set is derived by a cloud service from crowdsourced data describing interactions between mobile computing devices and the network access point. Applying the instruction set includes performing actions such as navigating web pages to accept terms and conditions, provide user or device information, and more. | 05-21-2015 |
20150142947 | Configuring Captive Portals With a Cloud Service - Embodiments provision captive portals on network access points (NAPs). In response to a request from a NAP owner, a cloud service associates a NAP with the NAP owner and provides a control channel for configuring the NAP. The NAP owner inputs configuration settings describing the captive portal. The cloud service processes the configuration settings to generate configuration data. The cloud service transmits the configuration data to the NAP. The NAP applies the configuration data to configure the NAP. Some embodiments configure Wi-Fi hotspots with captive portals for gated access to the Internet. | 05-21-2015 |
20150142948 | EXTENDING POLICY RULESETS WITH SCRIPTING - Embodiments are directed towards using policy rules that may be extended by scripting operative on a traffic management device. Each policy rule may have a condition and a corresponding action. If the condition is a script, a script engine separate from the policy engine may be employed to execute the script to determine if the condition is met. Otherwise, the policy engine may determine if the condition is met based on declarative expressions that comprise the condition. If the condition is met the action corresponding to the policy rule may be executed. Scripts may be used to compute the values of operands that may be used in one or more of the expression that comprise a condition for a policy rule. Also, the action corresponding to a policy rule may be implemented using a script that is executed by a script engine. | 05-21-2015 |
20150142949 | SYSTEM AND METHOD FOR COLLABORATIVE DESIGNING, DEVELOPMENT, DEPLOYMENT, EXECUTION, MONITORING AND MAINTENANCE OF ENTERPRISE APPLICATIONS - The various embodiments herein provide a system and method for providing collaborative designing, development, deployment, execution, monitoring and maintenance of an enterprise application. The system comprises a distributed cache shared across a plurality of nodes to form a cluster of nodes, a cluster manager to implement one or more clustering strategies, a load balancer to distribute a load across the nodes in the cluster, a data access layer to connect to a plurality of data stores using one or more persistent store adaptors, a data management layer to provide access to business data and meta-data, a processing engine to support Online Transaction Processing (OLTP), a service container for generating business services by wiring platform services with business rules and an Enterprise Application Designer to build the enterprise applications by wiring platform services as business services using the business rules. | 05-21-2015 |
20150142950 | MANAGEMENT OF CLOUD PROVIDER SELECTION - A computer-implemented method, a computer program product, and a system for selecting a host from a plurality of host for an application pattern component using a service level agreement (SLA) requirement are provided. The computer-implemented method for selecting a host from a plurality of hosts for an application pattern component using a service level agreement requirement can include receiving the service level agreement requirement for the application pattern component. The method can include receiving a first capability metric of the host from the plurality of hosts. The method can include determining whether the first capability metric of the host from the plurality of hosts is sufficient for the service level agreement requirement. The method can include selecting the host in response to the host being sufficient for the service level agreement requirement. | 05-21-2015 |
20150142951 | PERFORMANCE OF A STREAMING APPLICATION BY RUNNING EXPERIMENTAL PERMUTATIONS - A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. In response, the cloud manager provisions one or more virtual machines in a cloud. The streams manager builds a permutation of a flow graph for the streaming application using the virtual machine(s), runs the permutation in parallel with the corresponding portion of the flow graph, and compares the performance of the original portion of the flow graph to the performance of the permutation. When the performance of the permutation exceeds the performance of the original part of the flow graph, the streams manager modifies the flow graph so the permutation replaces the original part of the flow graph. In this manner a streaming application can dynamically evolve to increase its performance as needed. | 05-21-2015 |
20150142952 | MAINTAINING VIRTUAL MACHINES FOR CLOUD-BASED OPERATORS IN A STREAMING APPLICATION IN A READY STATE - A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. The cloud manager provisions one or more virtual machines in a cloud with the specified streams infrastructure and streams application components. The streams manager then modifies the flow graph so one or more portions of the streaming application are hosted by the virtual machines in the cloud. When performance of the streaming application indicates a virtual machine is no longer needed, the virtual machine is maintained and placed in a ready state so it can be quickly used as needed in the future without the overhead of deploying a new virtual machine. | 05-21-2015 |
20150142953 | SYSTEMS AND METHODS FOR RECEIVING AND PROCESSING DETECTED EVENTS - Techniques for receiving and processing detected events are provided. A bit array may be received from a device. Each bit value in the bit array may indicate whether a user initiated event relating to interaction with a website was detected by the device. Data regarding a start time associated with the bit array may be received. Each bit value in the bit array is associated with a time increment after the start time. | 05-21-2015 |
20150142954 | SYSTEMS AND METHODS FOR ESTIMATING USER ATTENTION - Techniques for estimating user attention on a website or application are provided. First activity data for a first user of a website or an application may be identified. The first activity data may indicate activities of the first user on the website or the application. A first predetermined period of inactivity may be detected in the first activity data. A response triggering event may be initiated after the first predetermined period of inactivity. An indication of a user response to the response triggering event may be monitored for. Whether the first user is passively present on the website or the application may be determined based on the monitoring for the indication of the user response. | 05-21-2015 |
20150142955 | METHODS AND SYSTEMS FOR FACILITATING NETWORK SWITCHING - Methods, servers, and mobile devices for network selection are disclosed. A server may receive a first set of data reflecting network performance status of a first network at a plurality of locations and network performance status of a second network at the plurality of locations. The server may also receive, for example from a mobile device, a second set of data reflecting network device usage for a device operating in association with the plurality of locations. The server may also output data associated with a proposed network for the device based, at least in part, on a determination of a first impact of the network device usage on the network performance status of the first network and a determination of a second impact of the network device usage on the network performance status of the second network. | 05-21-2015 |
20150142956 | MAINTAINING VIRTUAL MACHINES FOR CLOUD-BASED OPERATORS IN A STREAMING APPLICATION IN A READY STATE - A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. The cloud manager provisions one or more virtual machines in a cloud with the specified streams infrastructure and streams application components. The streams manager then modifies the flow graph so one or more portions of the streaming application are hosted by the virtual machines in the cloud. When performance of the streaming application indicates a virtual machine is no longer needed, the virtual machine is maintained and placed in a ready state so it can be quickly used as needed in the future without the overhead of deploying a new virtual machine. | 05-21-2015 |
20150142957 | SESSION BASED NETTRACE AND TEST CALL - Methods and apparatus are provided for performing a trace session between a first user equipment (UE), and a second UE in a telecommunications network including an IMS network. A trace session initiator activates the trace session with an activation request message, or a Session Initiation Protocol (SIP) INVITE message, including trace settings comprising informational elements describing the trace session. The activation message may be converted into the SIP I NVITE message and sent towards the first and/or the second UE. The SIP INVITE message may include trace settings as extensible mark-up language (XML) informational elements within the body of the SIP INVITE request message and/or as request Uniform Resource Identifier informational elements within the SIP INVITE request message. Network elements in the communications path between the UEs are configured to detect the trace session by detecting the trace settings in the SIP INVITE request message and act accordingly. | 05-21-2015 |
20150142958 | CONTROL NODE AND COMMUNICATION CONTROL METHOD - A network manager is included in a mobile communication system including virtual call processing servers realized on any of one or more physical servers in association with an area in which a mobile communication terminal is present, and performing a communication process of the mobile communication terminal. The network manager includes a detection unit that detects processing load of a communication process of each physical server, a node generation unit that generates a virtual call processing server for each area based on the detected processing load of the communication process, and a control unit that performs control to transmit a signal related to the communication process from the mobile communication terminal to the virtual call processing server generated in association with the area in which the mobile communication terminal is present. | 05-21-2015 |
20150142959 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARTUS, INFORMATION TERMINAL APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM - An information processing apparatus has login information acquisition means for acquiring a plurality of pieces of login information with user IDs for identifying users related with terminal IDs for identifying terminals for use by the users; terminal ID registration means for registering the acquired login information by relating each of the user IDs with the plurality of terminal IDs; delivery information generation means for generating different pieces of delivery information to be delivered to each terminal that are identified by the plurality of terminal IDs for each of the user IDs; and delivery means for delivering the generated different pieces of delivery information to the each terminals. | 05-21-2015 |
20150142960 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING SYSTEM - An information processing apparatus includes a memory, and a processor coupled to the memory and configured to acquire a first identifier indicating a device coupled to a network at a first time point, acquire a second identifier indicating a device coupled to the network at a second time point after the first time point, and determine whether or not the second identifier is identical to the first identifier. | 05-21-2015 |
20150142961 | NETWORK ELEMENT IN NETWORK MANAGEMENT SYSTEM,NETWORK MANAGEMENT SYSTEM, AND NETWORK MANAGEMENT METHOD - A network element serves as a first network element, monitors communication with a monitor apparatus to monitor the state of the monitor apparatus, and controls the setting of monitor connection with one or more second network elements which are communicably connected to the first network element and the setting of monitor connection between the second network elements and the monitor apparatus, according to the monitor result. | 05-21-2015 |
20150142962 | SYSTEM AND METHOD FOR OBSERVING AND CONTROLLING A PROGRAMMABLE NETWORK USING CROSS NETWORK LEARNING - A system and method for observing and controlling a programmable network via higher layer attributes is disclosed. According to one embodiment, the system includes a plurality of network systems, and a remote network manager. The remote network manager is configured to connect over the Internet to the plurality of enterprise systems, a plurality of collectors, or combinations thereof. The remote network manager simultaneously and centrally analyzes a network condition of a plurality of network systems, learns a network pattern from a first network system of the plurality of network systems, and predicts a network behavior of a second network system of the plurality of network systems. | 05-21-2015 |
20150142963 | SMART TERMINAL AND METHOD FOR COLLECTION DATA SUBSCRIPTION - A smart terminal and a method for subscribing to collection data are disclosed. The smart terminal in accordance with an embodiment of the present invention includes: a main application configured to make a data collection request; a plurality of subscription applications configured to subscribe to collection data being collected according to the data collection request made by the main application; a gateway module configured to perform communication with an internal/external device, request a target device in the internal/external device for data collection according to the data collection request made by the main application, and receive a collection data report from the target device if the target device collects the collection data; and a data hub configured to have the collection data report transferred thereto from the gateway module and provide the collection data to the subscription applications. | 05-21-2015 |
20150142964 | METHOD OF OUTPUTTING ESTIMATED QOES ON A TERMINAL ON AN APPLICATION BASIS - Implementations and techniques for outputting information about estimated QoEs on a terminal on which plural applications can be executed are generally disclosed. The estimated QoEs may be obtained by performing QoE estimation on an application basis. | 05-21-2015 |
20150142965 | DISTRIBUTED DEPLOYMENT DEVICE AND METHOD - A distributed deployment device that distributedly deploys a module to a node includes the configuration described below. The event collecting unit collects an event from a sensor network. The generation event information collecting unit collects a generation situation of the event in a node. The deployment destination determining unit determines a node of a deployment destination of the module in accordance with the generation situation of the event. The traffic reduction amount collecting unit collects a traffic reduction amount in the node in a case in which the distributed deployment of the module is controlled with respect to the node. The event collection cost calculating unit calculates a collection cost of the event from the node. The event information transmission interval control unit controls a transmission interval of the generation situation of the event in the node in accordance with the traffic reduction amount and the collection cost. | 05-21-2015 |
20150142966 | SIGNAL-FLOW ARCHITECTURE FOR COOPERATIVE CONTROL AND RESOURCE ALLOCATION - Methods and supporting systems for allocating a resource among multiple agents are disclosed. Multipoint-to-multipoint communication is established among the agents, with each agent using an amount of a resource. A first agent receives information associated with the resource usage of a second agent and determines the difference in resource usage between itself and the second agent. Based in part on the resource usage difference, the first agent is controlled to modify its use of the resource. | 05-21-2015 |
20150142967 | METHOD AND APPARATUS FOR MONITORING NETWORK SERVERS - A server monitoring system includes one or more monitoring engines running on a computer, a system database running on a computer, and a user interface running on a computer to remotely monitor one or more servers across any suitable network and provide alerts and status via either user interface computer or a suitable remote notification system. | 05-21-2015 |
20150142968 | Service Discovery - Service discovery and other operations related to enabling devices to announce, discover or otherwise control their services and/or the services offered or available from other devices is contemplated. The service discovery may facilitating service discovery for services sourced from devices inside and outside of a network and/or from devices having incompatible messaging capabilities. | 05-21-2015 |
20150142969 | WEB PAGE PERFORMANCE SCORING - A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors. | 05-21-2015 |
20150142970 | NETWORK LINK MONITORING AND TESTING - In some embodiments, a link monitoring system (“LMS”) is configured to obtain link status metrics and packet transmission metrics for network links forming a network channel between a first network device and a second network device. The LMS can obtain link status metrics from the first network device and the second network device and can also initiate the generation of packets on the network links to obtain the packet transmission metrics. Based on the status metrics and packet transmission metrics, the LMS can determine if the network links are malfunctioning. | 05-21-2015 |
20150142971 | System and Method for a Rate Control Technique for a Lightweight Directory Access Protocol Over MQSeries (LOM) Server - A system and method for controlling rates for a Lightweight Directory Access Protocol (LDAP) over MQSeries (LoM) server. The system includes a health metrics engine that calculates an actual delay value, a LoM server that asynchronously obtains the actual delay value from the health metrics engine and place the delay value between one or more requests, and a LDAP master that accepts the one or more requests and send information in the one or more requests to a LDAP replica. | 05-21-2015 |
20150142972 | CONGESTION MANAGEMENT AND LATENCY PREDICTION IN CSMA MEDIA - A facility for congestion management and latency prediction is described. In various embodiments, the facility sums a series of fractional transmission delays wherein each fractional transmission delay is measured as a probability of a failed transmission attempt multiplied by the cost of the failed transmission attempt, and provides the sum. | 05-21-2015 |
20150142973 | SYSTEMS AND METHODS OF DETECTING AND ASSIGNING IP ADDRESSES TO DEVICES WITH ARP REQUESTS - A method of discovering and assigning an IP address to a device to be discovered in a communication network having multiple interconnected nodes includes continuously monitoring, by the device to be discovered, the network for address resolution protocol (ARP) requests. The discoverer node transmits a number of ARP request to the network. The device to be discovered receives the number of ARP requests. The device to be discovered determines whether the number of ARP requests are unanswered by other devices in the network. The device to be discovered answers to the number of ARP requests with an ARP reply to claim an IP address associated with the number of ARP requests. The discoverer node and the device to be discovered exchange a pair of User Datagram Protocol (UDP) packets to complete the detection process. | 05-21-2015 |
20150149608 | INFORMATION TECHNOLOGY RESOURCE MANAGEMENT - Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event. | 05-28-2015 |
20150149609 | PERFORMANCE MONITORING TO PROVIDE REAL OR NEAR REAL TIME REMEDIATION FEEDBACK - Embodiments provide for monitoring of an online user experience and/or remediating performance issues, but are not so limited. A computer-implemented method of an embodiment operates to receive, pre-aggregate, and aggregate client performance data as part of providing an end-to-end diagnostics monitoring and resolution service. A system of an embodiment is configured to aggregate performance data of a plurality of client devices or systems as part of identifying latency issues at one or more of a tenant level, geographic location level, and/or service provider level. Other embodiments are included. | 05-28-2015 |
20150149610 | METHOD AND SYSTEM FOR ADJUSTING HEAVY TRAFFIC LOADS BETWEEN PERSONAL ELECTRONIC DEVICES AND EXTERNAL SERVICES - A network traffic monitoring system monitors communications that a large number of personal electronic devices will direct to various services via various proxies. When a detection system determines that the volume of requests directed to at least one of the services exceeds a capacity limit threshold, a control system will command the proxies to instruct the devices to slow or stop the service requests until the system determines that it is clear to resume communication. | 05-28-2015 |
20150149611 | Centralized Resource Usage Visualization Service For Large-Scale Network Topologies - Methods and apparatus for supporting customer-directed networking limits in distributed systems are disclosed. A client request is received via a programmatic interface, indicating a particular lower resource usage limit to be imposed on at least one category of network traffic at a particular instance of a network-accessible service. Resource usage metrics for one or more categories of network traffic at the particular instance are obtained. In response to a determination that resource usage at the particular instance has reached a threshold level, one or more responsive actions are initiated. | 05-28-2015 |
20150149612 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - An apparatus for calculating the effect of an action on a network includes a mapping module that creates a mapping of a plurality of devices of a networked computing environment. The mapping describes a relationship between a primary device and at least one device of the plurality of devices. The apparatus includes an action module that determines a plurality of potential actions to be performed on the primary device. The apparatus includes a calculation module that calculates an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. The apparatus includes an optimization module that performs an optimization action in response to calculating the effect of the potential action. The optimization action maximizes availability of the networked computing environment. | 05-28-2015 |
20150149613 | OPTIMIZED FRAMEWORK FOR NETWORK ANALYTICS - A system may receive raw information associated with a network and may prepare the raw information to create optimized information. The optimized information may include the raw information that has been sorted. The system may correlate the optimized information to create a set of correlated information. The system may aggregate at least two sets of correlated information to create aggregated information. The system may determine that network analytics are to be performed using the set of correlated information or the aggregated information. The system may determine information associated with performing the network analytics, including the set of correlated information or the aggregated information. The system may perform the network analytics based on the information associated with performing the network analytics. The system may provide a result associated with performing the network analytics. The result may indicate a manner in which to improve a performance of the network. | 05-28-2015 |
20150149614 | ASCERTAIN TETHERING OF DEVICE - Systems, methods and procedures are described for ascertaining tethering of a device in a communication network. In one implementation, a wireless device provides Internet connectivity to a computing device using a wireline or wireless transmission medium. In one arrangement, the wireless device, in the tethered arrangement with the computing device, may provide receiving and sending of data communications capability to the computing device. In one implementation, the communication entity that is hosting the network may ascertain that tethering is occurring by analyzing communications generated or passing through the computing device. | 05-28-2015 |
20150149615 | PROCESS CAGE PROVIDING ATTRACTION TO DISTRIBUTED STORAGE - A computer-implemented method may include running the process on a first processing node. The process running on the first processing node initially operates on first data. The method may include monitoring the process to identify a first data node that provides the first data to the process. In addition, the method may include determining whether performance would likely be improved by transferring the process to a second processing node. The method may include transferring the process to the second processing node. Further, the method may include transferring a result of the process operating on the first data from the second processing node to the first processing node. | 05-28-2015 |
20150149616 | SERVER AND SHARE LINK MANAGEMENT METHOD THEREOF - A server and a share link management method are provided. The server generates a first share link in response to a request, and generates a first workflow according to the first share link. The server transmits the first share link to at least one electronic device via a network according to the first workflow. The server monitors at least one first status which is generated by the at least one electronic device in response to the first share link, and adjusts the first workflow according to the at least one first status. The share link management method is applied to the server to implement the aforesaid operations. | 05-28-2015 |
20150149617 | CLOUD-BASED MONITORING APPARATUS - A cloud-based monitoring apparatus includes a cloud-based network system, a cloud-based database connected with the cloud-based network system, at least one gateway control unit connected with the cloud-based network system, at least one mobile apparatus connected signally with the cloud-based database, at least one basic detection module connected signally with the gateway control unit, at least one serial bus module connected signally with the gateway control unit, at least one analog I/O module connected signally with the gateway control unit, at least one digital I/O module connected signally with the gateway control unit, and an ISP connected signally with the cloud-based database. The gateway control unit, the basic detection module, the serial bus module, the analog I/O module, and the digital I/O module are all mounted in a monitored environment and have at least individual monitor parameters. | 05-28-2015 |
20150149618 | INFORMATION TECHNOLOGY RESOURCE MANAGEMENT - Embodiments relate to information technology resource management and scaling. According to one aspect, an upcoming event impacting an application operating on one or more resources is identified. A workload on the application is predicted based on the upcoming event identified and historical data about a previous event having similarity with the upcoming event. The prediction is performed using a predefined rule. A number of resources required to process the predicted workload is ascertained using a past scaling history of the application. The resources are scaled based on the ascertained number of said resources determined before the occurrence of the event. | 05-28-2015 |
20150149619 | USER STATE CONFIRMATION SYSTEM, USER STATE CONFIRMATION METHOD, SERVER DEVICE, COMMUNICATION TERMINAL DEVICE, SERVER COMPUTER PROGRAM, AND TERMINAL COMPUTER PROGRAM - In order to remotely confirm a state of monitored person without using monitoring sensors, a user state confirmation system ( | 05-28-2015 |
20150149620 | CALCULATING THE EFFECT OF AN ACTION IN A NETWORK - A method for calculating the effect of an action on a network includes creating a mapping of a plurality of devices of a networked computing environment. In one embodiment, the mapping describes a relationship between a primary device and at least one device of the plurality of devices. In another embodiment, the method includes determining a plurality of potential actions to be performed on the primary device. In a further embodiment, the method includes calculating an effect of a potential action of the plurality of potential actions on the plurality of devices in response to simulating performing the potential action on the primary device. In yet another embodiment, the method includes performing an optimization action in response to calculating the effect of the potential action. In certain embodiments, the optimization action maximizes availability of the networked computing environment. | 05-28-2015 |
20150149621 | METHOD AND SURVEY SERVER FOR GENERATING PERFORMANCE METRICS OF URLS OF A WEBSITE - A method and survey server for generating performance metrics of URLs of a website. The survey server collects website visit data from a plurality of user devices. The website visit data comprise URLs of webpages of the website displayed on each specific user device during a visiting of the website by a user of the specific user device. The survey server also collects participation data from some of the plurality of user devices. The survey participation data correspond to survey information received from the users of the user devices in relation to the visit of the website, and comprise an indication of the users having either or not fulfilled a purpose of visit. The survey server further analyzes the website visit data and the survey participation data to generate performance metrics of the URLs of the website with respect to fulfilling the purpose of visit of the website. | 05-28-2015 |
20150149622 | Scheduling Requests for Data Transfers in a Multi-Device Storage System - Apparatus and method for scheduling requests for data transfers in a multi-device storage system. In some embodiments, a system includes at least one server coupled to a pool of storage devices to transfer data from the storage devices to client devices responsive to requests. A request scheduler is adapted to receive into a memory a plurality of requests each having a service identifier (ID) and a payload size, to set a deadline for each request responsive to the service ID and the payload size, to forward the requests to the server for processing in an order based on service ID and, responsive to the deadline being reached for a selected request, to advance the selected request for immediate processing by the server. | 05-28-2015 |
20150149623 | MANAGEMENT SYSTEM AND METHOD FOR CONTROLLING THE SAME - A management system configured to collect operational information of network devices provided on a plurality of local networks includes a first management unit configured to separately manage the collected operational information in a plurality of tenants to which different access rights are set, a second management unit configured to tally and manage in group units a part of the operational information of the plurality of tenants managed separately by the first management unit, and a providing unit configured to provide the tallied operational information managed by the second management unit, wherein the second management unit manages the tallied operational information so as to hide or exclude a part of the tallied operational information. | 05-28-2015 |
20150149624 | Fast Detection and Remediation of Unmanaged Assets - In one aspect, methods, system, and computer-readable media for monitoring unmanaged assets in a network having a plurality of managed machines include: at a first managed machine of the plurality of managed machines, wherein the plurality of managed machine are arranged in a linear communication orbit and have respective identifiers, and each managed machine is coupled to at least one respective neighbor by a corresponding local segment of the linear communication orbit: responding to a detection instruction for detecting unmanaged assets currently present in the network, by: scanning for live unmanaged machines within a selected portion of the network that is associated with a range of identifiers that includes identifiers between the respective identifiers of the first managed machine and a respective neighbor of the first managed machine; and generating a local report identifying one or more unmanaged machines that have been detected within the selected portion of the network. | 05-28-2015 |
20150149625 | METHOD AND SYSTEM FOR LOW-OVERHEAD LATENCY PROFILING - The present disclosure provides a method, non-transitory computer-readable storage medium, and computer system that implement a latency monitoring and reporting service configured to collect and report latency of service transactions. In one embodiment, a chronicler object is generated and transmitted to a charging engine, where the chronicler object is configured to collect a set of time points as the chronicler object travels through one or more components of the charging engine. Upon return of the chronicler object, the set of time points is extracted from the chronicler object and added to one of a plurality of accumulator objects. Each accumulator object includes a plurality of sets of time points from a plurality of chronicler objects that are received during a reporting window. The plurality of sets of times points of each accumulator object is used to calculate the latency of service transactions. | 05-28-2015 |
20150149626 | SYSTEM OF REDUNDANTLY CLUSTERED MACHINES TO PROVIDE FAILOVER MECHANISMS FOR MOBILE TRAFFIC MANAGEMENT AND NETWORK RESOURCE CONSERVATION - A method for providing fault tolerance in mobile traffic management services is provided. The method includes detecting, at a mobile device, that one component of multiple components for providing mobile traffic management services is non-operational, at capacity, or near capacity, identifying the mobile device serviced by the one component, retrieving information for the mobile device serviced by the one component, from a repository coupled to the one component and the multiple components, re-assigning the mobile device originally serviced by the one component to another one of the multiple components for servicing, and communicating with the another one of the multiple components for servicing communication requests of the mobile device. | 05-28-2015 |
20150149627 | METHOD AND APPARATUS FOR COORDINATING NETWORK - Embodiments of the present invention relate to a method and an apparatus for coordinating a network. The method includes: receiving or monitoring network information; determining, according to the network information, whether a network operation needs to be coordinated; and coordinating the network operation if determining, according to the network information, that the network operation needs to be coordinated. The apparatus provided in embodiments of the present invention includes: a network information acquiring unit, a coordination determining unit and a coordinating unit. The method and the apparatus for coordinating the network provided in embodiments of the present invention can reduce the probability of occurrence of various network problems due to that a network operation is fixed or is preset by an operator, so that the network operation can achieve an expected network objective, thereby reducing maintenance cost of the operator. | 05-28-2015 |
20150149628 | SYSTEM AND METHOD FOR A SERVICE METERING FRAMEWORK IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment executed at a service metering framework (SMF) engine including a processor, and includes interfacing, by an event listener at the SMF engine, with an application being executed in a cloud by a remote client device, detecting a metering event associated with the application during execution of the application, receiving a value of at least one metering attribute associated with the metering event, and storing the at least one metering attribute and the value as a formatted metered record in a SMF database searchable according to the metering attribute. In a specific embodiment, the event listener exposes an application programming interface (API) of the SMF engine to the application to facilitate definitions of the metering event and the at least one metering attribute in the application. | 05-28-2015 |
20150295771 | Automatically Determining Locations of Network Monitors in a Communication Network - Automatically identifying a location of a network monitor within a network topology is described. A location of a network monitor within a network topology (which can, and often does, change structure, constituent devices, or both) is determined by monitoring transmissions passing through the network link to which the network monitor is connected. The network monitor uses locally unique device identifiers present in a network transmission to identify the devices or ports most commonly communicating with each other. | 10-15-2015 |
20150295788 | METHOD AND SYSTEM FOR ON DEMAND ELASTIC MANAGEMENT OF DEVICES AND SERVICES - A method and system are disclosed that enables a customer to specify when services should be provisioned on a “just-in-time” or elastic basis. By dynamically specifying when services should be received, a customer is better able to suit such services to customer needs, thereby allowing the customer to only pay for what is actually used. Using an on-demand portal, a customer may prescribe when (or the degree to which) services should be enabled, and/or when the devices that utilize those services, or the services themselves, need to be monitored. Accordingly, the customer is given flexibility to dictate when services are required or when their services or devices require monitoring by a service provider, and the service provider is given the flexibility to tailor the amount of resources required to support and manage the customer's demands, thereby enabling more efficient use of both the customer's and service provider's resources. | 10-15-2015 |
20150295790 | MANAGEMENT OF VIRTUAL MACHINE RESOURCES IN COMPUTING ENVIRONMENTS - Embodiments of the present disclosure call for a method, a system, and a computer program product for managing virtual resources for a virtual machine of interest on a physical server. The method includes monitoring a plurality of physical servers, on a computing system. Each physical server provides an initial level of virtual resources to a plurality of virtual machines. The method also includes receiving a requested level of virtual resources for a virtual machine of interest hosted by a first physical server from the plurality of physical servers. The method also includes determining whether the first physical server is able to host the requested level of virtual resources for the virtual machine of interest. The method also includes determining, in response to the first physical server not being able to host the requested level of resources for the virtual machine of interest, a path. | 10-15-2015 |
20150295793 | HIGH-PERFORMANCE COMPUTING EVALUATION - In one embodiment, a computer-implemented method includes iteratively running a client application on two or more combinations of two or more hardware platforms and one or more software products, where the two or more hardware platforms and the one or more software products reside in an integrated evaluation appliance. The running of the client application on the two or more combinations is monitored by a computer processor. A result of running the client application on a first hardware platform and a result of running the client application on a second hardware platform are output, where the first hardware platform and the second hardware platform are among the two or more hardware platforms residing in the evaluation appliance. | 10-15-2015 |
20150295794 | HIGH-PERFORMANCE COMPUTING EVALUATION - In one embodiment, a computer-implemented method includes iteratively running a client application on two or more combinations of two or more hardware platforms and one or more software products, where the two or more hardware platforms and the one or more software products reside in an integrated evaluation appliance. The running of the client application on the two or more combinations is monitored by a computer processor. A result of running the client application on a first hardware platform and a result of running the client application on a second hardware platform are output, where the first hardware platform and the second hardware platform are among the two or more hardware platforms residing in the evaluation appliance. | 10-15-2015 |
20150295795 | SYSTEM FOR TRACKING DIFFUSION - A tracking system is provided comprising a non-transitory computer readable storage medium having stored therein data representing instructions executable by a programmed processor for monitoring a database. The storage medium comprises instructions for receiving a current shortened content address from a requesting user, the current shortened content address including a shortened content address base and an appended link identifier, and instructions for determining a content address associated with the current shortened content address. The storage medium further comprises instructions for storing the shortened content address base and the appended link identifier in a database and instructions for determining if the tracking system has previously received a request for a shortened content address associated with the content address from the requesting user. The storage medium also comprises instructions for generating a new link identifier when the system has not previously received a request for a shortened content address associated with the content address from the requesting user and instructions for recording a chain of relationships of appended link identifiers with any new link identifiers in the database | 10-15-2015 |
20150295798 | UNIVERSAL REPORTING SYSTEM - A universal reporting solution system for a dimensional data associated with a worksite management system is provided. The universal reporting solution system includes a receiving module coupled to a categorization module. The categorization module is configured to form independent metrics and derives additional metrics. The categorization module buckets the dimensional data within independent metrics and combines the bucketed dimensional data to obtain reporting information. The reporting information is further utilized to generate reports independent of an entity with which the reporting information is associated. | 10-15-2015 |
20150295800 | Always-On Monitoring in the Cloud - A mechanism is provided in a data processing system for monitoring a virtual machine in a distributed computing system. An out-of-virtual machine monitor receives, via an out-of-band path, disk and memory state data of the virtual machine exposed in a hypervisor hosting the virtual machine. The out-of-virtual machine monitor interprets logical information from the virtual machine disk and memory state data. The out-of-virtual machine monitor parses the logical information to extract related system or log information for a monitoring endpoint. The out-of-virtual machine monitor translates the system or log information to a standard format expected by the monitoring endpoint. The out-of-virtual machine monitor forwards a monitoring data stream to the monitoring endpoint. | 10-15-2015 |
20150295803 | REMOTE MAINTENANCE SERVER, TOTAL MAINTENANCE SYSTEM INCLUDING THE REMOTE MAINTENANCE SERVER AND METHOD THEREOF - The present disclosure discloses a remote maintenance system including a remote maintenance server configured to remotely control facilities, and a service center server configured to receive information on an abnormal facility among the facilities from the remote maintenance server, and perform service registration based on the information on the abnormal facility. | 10-15-2015 |
20150295804 | Methods and Systems for Performing a Prefetch Abort Operation - The present invention relates to systems, apparatus, and methods of determining whether to abort a prefetch operation. The method includes receiving a prefetched object downloaded from a content server, and checking the prefetched object to determine the prefetched object's size. The method further includes determining a probability of use of the prefetched object, checking a link between a server and a client to determine the link's bandwidth, and checking the link between the server and the client to determine the link's latency. In addition, the method includes, based on at least one of the size of the prefetched object, the probability of use of the prefetched object, the bandwidth of the link, and the latency of the link, determining whether to forward the prefetched object to the client. | 10-15-2015 |
20150295806 | SELECTIVE ENABLEMENT OF OPERATING MODES OR FEATURES VIA HOST TRANSFER RATE DETECTION - Examples of selective enablement of operating modes or features of a storage system via host transfer rate detection are disclosed. In one example implementation according to aspects of the present disclosure, a storage device includes an interface configured to couple the storage device to a computing host indirectly via an intermediate fabric; and a storage controller configured to determine whether a nominal data transfer rate of the interface across the intermediate fabric is at or above a predetermined threshold, and selectively enable coalescing of status information that is to be returned to the computing host via status combining across multiple host requests responsive to it being determined that the nominal data transfer rate is at or above the predetermined threshold. | 10-15-2015 |
20150295807 | MANIPULATION OF STREAMS OF MONITORING DATA - Streams of monitoring data relating to part of a communications network, are manipulated automatically by looking up a corresponding indexed value in a stored index, and selectively replacing that attribute value with the corresponding indexed value. The selective replacement is based on a characteristic of the stream of monitored data, or the network being monitored. The selection or the indexed values can be adapted dynamically. Such selective replacement at the attribute field level can enable the data to be enriched with embedded information or be compressed more efficiently with less processing overhead by exploiting knowledge of the data format and the network configuration. It is compatible with hardware implementations. The embedded information can enable subsequent processing of the monitored data to be speeded up. | 10-15-2015 |
20150295808 | SYSTEM AND METHOD FOR DYNAMICALLY MONITORING, ANALYZING, MANAGING, AND ALERTING PACKET DATA TRAFFIC AND APPLICATIONS - A computer-implemented system and method is describe, having a usage and performance analyzer system (UP AS) for receiving a data packet or information from a computer or mobile device via a usage and performance analyzer module (UP AM) for evaluating and implementing policies via a dynamic offender polices and enforcement (DOPE) module. Further, wherein the DOPE module comprises a past actions, status, and timers (PAST) module for classifying specific users. A targeted offers notifications and enforcement (TONE) module is for interacting with specific users and devices. | 10-15-2015 |
20150295809 | COMMUNICATION SYSTEM - A communication system in the present invention has a plurality of information processing devices each executing communication control processing on user terminals connected via a network, and the communication system includes: an outside situation information acquiring unit which acquires outside situation information representing a preset outside situation of a place where the information processing device is installed; and a communication control unit which instructs so that the communication control processing executed on the user terminals by a predetermined one of the information processing devices is executed by another one of the information processing devices, on the basis of the outside situation information acquired by the outside situation information acquiring unit. | 10-15-2015 |
20150295816 | EXECUTING LOOPS - A method of executing a loop computer program comprising receiving at an execution unit a set of state variables which define an entry state, wherein one of the state variables defines a sequence of loop options; recording the entry state in a storage unit; in the execution unit, executing a first loop option in the ordered sequence of loop options in the entry state, using as parameters at least one of the other state variables in the set of state variables, wherein executing the first loop option comprises cancelling the first loop option from the ordered sequence, carrying out processing steps using at least one state variable, and determining if any of the state variables have altered as a result of the processing steps, wherein if none of the state variables have altered, entering a next loop iteration with an entry state in which the first loop option is cancelled from the ordered sequence, revealing a new first loop option, and; if at least one of the state variables has altered, reinstating the cancelled first loop option in the ordered sequence and entering a next loop iteration with an entry state defined by the altered state variable (s) and the original ordered sequence, whereby each next loop iteration receives a new entry state. | 10-15-2015 |
20150295817 | REDUNDANCY DEVICE UNIT AND METHOD FOR DETERMINING FAULT IN INDUSTRIAL CONTROL SYSTEM, INDUSTRIAL CONTROL SYSTEM AND INDUSTRIAL SYSTEM COMPRISING REDUNDANCY DEVICE UNIT - A redundant device unit includes a first device connected with a field device via a first link and a second link in series. The first device, initially active in use, when active sends diagnostic information indicating whether there is a fault in the first link and/or the second link. A second device connected with the field device via the second link and a third link in series, initially passive in use, receives the first diagnostic information from the first device. When the first diagnostic information indicates that there is a fault in the first link and/or the second link, the first device switches to passive and the second device switches to active and generates second diagnostic information indicating whether there is a fault in the second link and/or the third link. A determination regarding the fault is made based on the first and second diagnostic information. | 10-15-2015 |
20150296032 | USER LOCATION TRACKING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving information from a remote system comprising one or more time periods during which a location of the client device can be tracked and monitoring the location of the client device during each of the time periods by obtaining a plurality of location coordinates from the client device during the time period and persistently storing the location coordinates on the client device. | 10-15-2015 |
20150304173 | MANAGING ISOLATION REQUIREMENTS OF A MULTI-NODE WORKLOAD APPLICATION - In an approach to manage isolation requirements of a multi-node workload application, a computer determines one or more first isolation levels for each of a plurality of workload nodes. The computer receives performance data for the plurality of workload nodes and analyzes the performance data for statistical trends in the performance data. The computer identifies an adverse trend in the statistical trends of the performance data and identifies a root cause of the adverse trend in the performance data. The computer then identifies one or more second isolation levels required to meet performance targets, the second isolation levels including an adjustment to the first isolation levels for the plurality of workload nodes. | 10-22-2015 |
20150304177 | PROCESSOR MANAGEMENT BASED ON APPLICATION PERFORMANCE DATA - Application performance data that indicates a level of service provided in executing one or more applications is determined in software running on one or more processor cores in a computing system that executes the one or more applications. The application performance data is provided to a controller in the computing system that is distinct from the one or more processor cores. | 10-22-2015 |
20150304178 | BRINGING ATTENTION TO AN ACTIVITY - An activity associated with a digital medium may be detected. An interest of a user may be identified responsive to detecting the activity. The interest may be stored, and one or more online communities monitored for the interest to find content associated with the interest. The user may be notified of the content in a scalable manner to keep the user up-to-date with the interest. | 10-22-2015 |
20150304179 | Real-time remote log acquisition method and system - Disclosed are a method and system for remotely acquiring in real time a log, and the method includes: when a log server IQAS triggers acquisition of the log, the IQAS issues a log acquisition message to an Access Control Server (ACS); after establishing a TCP session with a Customer Premise Equipment (CPE), the ACS issues a log parameter setting message to the CPE according to an acquired log acquisition message; and the CPE acquires a debugged log according to an acquired log parameter setting message, and reports the debugged log to the IQAS through a UDP message. The disclosure is beneficial to subsequent extension of multiple log ports and capable of supporting simultaneous reporting of operation logs to a log server IQAS by multiple log ports, the method provided by embodiment of the disclosure can be implemented in a flexible way and there are no interferences between the multiple log ports, thus it is possible to implement real-time monitoring of an operation state of a Customer Premise Equipment (CPE), thereby implementing in-time positioning of a failure in respective modules of the CPE. | 10-22-2015 |
20150304182 | PROGRAM DEVELOPMENT IN A DISTRIBUTED SERVER ENVIRONMENT - According to one embodiment of the present invention, a system for processing a computer program for a distributed server environment executes the computer program in the distributed server environment in accordance with a configuration for the computer program. The computer program is generated within a development environment. The configuration indicates a type of server environment and is associated with one or more data sets for processing by the computer program. The system monitors execution of the computer program within the distributed server environment and provides a program status to the development environment. The system displays results produced by the computer program within the distributed server environment via the development environment. Embodiments of the present invention further include a method and computer program product for processing a computer program in substantially the same manners described above. | 10-22-2015 |
20150304183 | SYSTEM FOR PROCESSING CONNECTION DATA TO A PLATFORM OF AN INTERNET SITE - The present invention relates to a system ( | 10-22-2015 |
20150304186 | BRINGING ATTENTION TO AN ACTIVITY - An activity associated with a digital medium may be detected. An interest of a user may be identified responsive to detecting the activity. The interest may be stored, and one or more on-line communities monitored for the interest to find content associated with the interest. The user may be notified of the content in a scalable manner to keep the user up-to-date with the interest. | 10-22-2015 |
20150304188 | METHOD AND APPARATUS FOR DETECTING MULTIMEDIA CONTENT CHANGE, AND RESOURCE PROPAGATION SYSTEM - A method and apparatus for detecting a multimedia content change, and a resource propagation system. The method comprises: when importing a resource address of multimedia content, acquiring original feature information of the multimedia content; receiving first feature information of the multimedia content from a client; determining, according to the first feature information and corresponding original feature information of the multimedia content, whether the resource address of the multimedia content is abnormal; and detecting whether multimedia content at an abnormal resource address is changed. It is firstly determined whether a resource address corresponding to multimedia content is abnormal, and if the resource address is abnormal, then it is determined whether the multimedia content corresponding to the resource address is changed, thereby preventing repeated checking of a large number of normal resource addresses, improving the detection efficiency, and reducing the detection cost. | 10-22-2015 |
20150304189 | A NETWORK CABLE AND AN ELECTRONIC SYSTEM FOR THE LOCALIZATION OF AT LEAST ONE ELECTRIC/ELECTRONIC DEVICE INSIDE AT LEAST ONE BUILDING - The present invention refers to a network cable and to an electronic system for the localization of at least one electric/electronic device inside at least one building in which the network cable is arranged to connect the at least one electric/electronic device to a port of a telecommunication network wherein the network port is equipped with means for the storage and delivery of data relating to the position and identity of the port, the network cable having a localization module configured for receiving the data relating to the position and identity of the port from the data storage and delivery means, identifying the at least one electric/electronic device and assigning a localization to the electric/electronic device identified by association of the data received. | 10-22-2015 |
20150304193 | CONTROLLER, CONTROL SYSTEM, AND CONTROL METHOD - A controller for using a first data item transmitted via a network to generate a second data item for controlling an entity to be controlled over the network, wherein the controller is characterized in being provided with: an adjustment unit for adjusting, with respect to the maximum delay time permissible on the network, the time by which generation of the second data item is started using the first data item after the first data item has been received; and a delay compensation unit, designed using a model of the entity to be controlled and the maximum delay time permissible on the network, for compensating for the delay of the first and second data items that can be generated using the network. | 10-22-2015 |
20150304195 | PLATFORM-ENFORCED USER ACCOUNTABILITY - Embodiments for implementing platform-enforced user accountability are generally described herein. A policy is accessed at a computing platform, the policy to define an expected behavior of a user of the system. Based on the policy, a sensor to use to enforce the policy is determined Data is obtained from the sensor, with the data indicative of an activity performed by the user, and using the data, a determination is made whether the user is in compliance with the expected behavior defined in the policy. | 10-22-2015 |
20150304197 | SYSTEM AND METHOD FOR NETWORK AWARE ADAPTIVE STREAMING FOR NOMADIC ENDPOINTS - In a system for streaming data over a network, the type and rate of streaming are automatically varied based on available network bandwidth. Video media is transcoded into different bit rate encodings that are divided into segment files. Segments are sent from a network-aware adaptive streaming (NAAS) server and reassembled and presented to a media player at a client device. The system may download additional segment files ahead of time from multiple NAAS servers to increase throughput. A playback status (“bookmark”) may be maintained to keep track of what the user has viewed and to allow the user to continue playing from where the user left off. The user may continue watching from the bookmark point on the same device or on a different device. | 10-22-2015 |
20150304198 | COMPUTER NETWORKS - A method and apparatus for identifying similar and coordinated communications between computers connected by a network are described. Communications between a plurality of pairs of computers are monitored to obtain respective flow metrics for a first and second pair of computers. The flow metric represents at least one property of the data flow between the pair of computers. Representations of the evolution of the data flows between the pairs of computers are updated using the flow metrics. The representations of the evolution of the data flows are compared to determine the similarity of the data flows between the pairs of computers. The first pair of computers and the second pair of computers are identified as exhibiting similar and coordinated communication if their data flows are determined to be similar. | 10-22-2015 |
20150304199 | CATEGORIZING IP-BASED NETWORK TRAFFIC USING DNS DATA - A method and system for categorizing Internet Protocol (IP) based network traffic is configured to monitor domain name system (DNS) transactions between at least one customer device and a DNS service. The DNS transactions are used to populate a data table, which is used to enrich a data record (e.g., IPDR). In particular, an IP address and/or customer ID in the data record is used to look up the corresponding domain name in the data table, which is added to the data record. The enriched data record is used to categorize the IP traffic. | 10-22-2015 |
20150304202 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SUSTAINING ACTIVE CONTROL OVER CONCURRENT SESSION CONNECTIONS - Methods, systems, and computer readable media for sustaining active control over concurrent session connections are disclosed. According to one example, the disclosed subject matter describes herein a method that includes opening a plurality of session connections to a device under test (DUT), wherein each of the opened session connections is associated with an initial window size value and receiving data from the DUT via one or more of the opened session connections. The method further includes communicating a packet instructing the DUT to cease sending the data via the one or more of the opened session connections in the event the data received from the DUT equals the initial session window size value and utilizing at least one of the opened session connections not being used to receive the data from the DUT in order to resume active communication of the data with the DUT. | 10-22-2015 |
20150304229 | Method and system for allocating receiving resources in a gateway server - The disclosed embodiments relate to a method and apparatus for allocating resources in an efficient manner in a gateway service device. The apparatus includes of a gateway server or head end unit connected to a plurality of end user terminals. The gateway server contains a controller for managing the allocation of receiving resources used for providing services to the end user terminals. The method includes receiving a service request, comparing the request to services already in use and, if a match is found, providing an updated data stream containing new information regarding the service to the end user terminals. | 10-22-2015 |
20150304230 | DYNAMIC MANAGEMENT OF A CLOUD COMPUTING INFRASTRUCTURE - Provided is a method of dynamically managing a cloud computing infrastructure. A cloud computing infrastructure is configured on a cloud service provider based on a parameter. The parameter is monitored for a variation. If the variation in the parameter is more than a predefined level associated with the parameter, an action is performed related to operation of the cloud computing infrastructure | 10-22-2015 |
20150304439 | COMMUNICATION DEVICE AND COMMUNICATION METHOD - A communication device includes: a purpose information estimator that estimates purpose information indicating a purpose of movement of a user who moves using the mobile object, based on mobile-object-specific information that includes at least one of a usage schedule and a usage history of the mobile object, and user-specific information that includes at least one of an activity schedule and an activity history of the user who moves using the mobile object; a formation-condition determinator that determines a formation condition for a virtual network for the mobile objects of which the purpose information estimated by the estimator is the same or similar, based on the mobile-object-specific information and the user-specific information in the plurality of mobile objects; and a virtual network former that forms a virtual network through which the mobile objects that satisfy the formation condition determined by the determinator among the plurality of mobile objects can communicate with each other. | 10-22-2015 |
20150309910 | Website Performance Tracking - Novel tools and techniques are provided for tracking website performance and providing a user with website performance data. Embodiments include systems, methods and apparatus for identifying that the user has accessed a website from a user device, obtaining one or more website performance metrics and forwarding one or more website performance metrics to a performance information generator associated with a website performance tracking server. A performance information message is then created by the performance information generator and the performance information message is transmitted to the user device. The performance information message may be displayed to the user on the user device. In selected embodiments, the performance information message is displayed to the user in real-time as the user accesses the website. | 10-29-2015 |
20150312104 | AUTO-DISCOVERY OF PRE-CONFIGURED HYPER-CONVERGED COMPUTING DEVICES ON A NETWORK - In a computer-implemented method for auto-discovery of pre-configured hyper-converged computing devices on a network, upon initial connection to a network, an auto-discovery request is automatically broadcasting over the network, by a first pre-configured hyper-converged computing device for supporting a virtualization infrastructure, to other pre-configured hyper-converged computing devices on the network. A response to the auto-discovery request is received from the other pre-configured hyper-converged computing devices for auto-discovery of the other pre-configured hyper-converged computing devices on the network. | 10-29-2015 |
20150312111 | APPARATUS AND METHOD FOR DISTRIBUTING RULE OWNERSHIP AMONG DEVICES IN A SYSTEM - A first device in a group of devices is assigned a role of operating as a server node for the group of devices. The server node determines that an entity is associated with one device in the group of communication devices. The server node creates a token and associates the token with the entity. The server node also identifies a resource type to which the entity belongs, assigns ownership for the token to one device based on the device being associated with the entity and further based on one or more of: at least one incident allocation criterion; at least one entity allocation criterion; and at least one node allocation criterion. One device executes at least one predefined entity rule associated with the resource type based on ownership of the token assigned to the entity. | 10-29-2015 |
20150312114 | SESSION ANALYSIS SYSTEMS AND METHODS - A method and system analyze session data. In some embodiments, the method includes receiving a request to analyze session data that includes a user-defined data segmentation setting that includes a restriction on the analysis. The method further includes aggregating the session data based on the user-defined data segmentation setting. The method then generates a graphical representation of the aggregated session data. | 10-29-2015 |
20150312116 | VIRTUAL PERFORMANCE MONITORING DECOUPLED FROM HARDWARE PERFORMANCE-MONITORING UNITS - The current document is directed to virtualized PMUs provided by virtualization layers. The currently disclosed virtualized PMUs are decoupled from the underlying PMU hardware features of processors on which the virtualization layer executes. The decoupling is achieved, in part, by time multiplexing the underlying hardware PMU registers to provide a greater number of virtualized PMU registers than the number of hardware-PMU registers provided by at least some of the underlying hardware PMUs. The decoupling is also achieved by providing for monitoring, by the virtualized PMU registers, of computed processor events and approximated processor events in addition to the processor events monitored by the underlying hardware PMUs. In addition, the virtualized PMU registers are implemented, in certain implementations, to support a variety of different monitoring modes, including monitoring of processor events that occur only during execution of the virtualization layer and monitoring of hardware-thread-specific processor events. | 10-29-2015 |
20150312120 | MONITORING OF AVAILABILITY DATA FOR SYSTEM MANAGEMENT ENVIRONMENTS - A method and system for monitoring availability data of a system management (SM) environment. In response to determining that a retrieved connection configuration establishes communication between a SM environment and a SM portal server that includes a central repository, availability data is collected from an availability module. The availability data pertains to availability of resources at endpoints of one or more terminal systems. The connection configuration is associated with the SM environment. Te SM environment is coupled to the SM portal server and the availability module. The SM environment includes the one or more terminal systems. | 10-29-2015 |
20150312122 | INFORMATION PROCESSING TERMINAL AND CONTROL METHOD - An information processing terminal on which a web browser operates includes a setting unit configured to set a limitation condition for limiting transmission of local storage data to a web server providing a web application, and a determination unit configured to determine a value indicating a status of network connection of the information processing terminal in accordance with the set limitation condition when the status of the network connection of the information processing terminal is online. Even when the status of the network connection of the information processing terminal is online, the transmission of the local storage data to the web server from the web application is limited in accordance with the determined value. | 10-29-2015 |
20150312123 | METHOD AND APPARATUS FOR ISOLATING A FAULT IN A CONTROLLER AREA NETWORK - A controller area network (CAN) has a plurality of CAN elements including a communication bus and controllers. A method for monitoring the controller area network CAN includes identifying active and inactive controllers based upon signal communications on the communication bus and identifying a candidate fault associated with one of the CAN elements based upon the identified inactive controllers. | 10-29-2015 |
20150312124 | METHODS AND POLICIES TO SUPPORT A QUALITY-OF-STORAGE NETWORK - A method for managing data in a Quality-of-Storage (QoSt) network comprising a plurality of nodes includes receiving current QoSt network topology information. A plurality of data streams is received at a data storage interface of the QoSt network. Differentiated treatment is performed upon received data streams in the data storage interface. Such differentiated treatment is contingent upon at least different types of data in the received data streams based on a plurality of QoSt attributes. A plurality of data management operations is performed on the data obtained by the plurality of data streams based on the data storage interface and based on received current QoSt network topology information. | 10-29-2015 |
20150312125 | EFFICIENT ACQUISITION OF SENSOR DATA IN AN AUTOMATED MANNER - Information describing a rule to be applied to a traffic stream is received at an edge network device. The traffic stream is received at the edge network device. A preliminary data analysis of the traffic stream is performed at the edge network device in accordance with the rule. A determination is made that further analysis of the traffic stream should be performed from a result of the preliminary analysis. The traffic stream data is sent to another network device for further analysis. | 10-29-2015 |
20150312127 | Data Usage Analysis and Reporting - A system and method that allows for information relating to data and communication resource usage to be gathered and analyzed such that particular data transactions and usage can be classified based on purpose and/or type. Further, the system and method provide reporting based on amount of usage and/or purpose or type of usage so that associated costs and usage can be calculated applied and allocated to particular accounts, divisions, groups or individuals within and outside of a company or entity. Further, the system may restrict data usage of devices to data usage that can be allocated to particular accounts based on purpose, source, destination or other. | 10-29-2015 |
20150312358 | SYSTEM AND METHOD FOR GENERATING USE STATISTICS FOR LOCATION-BASED APPLICATIONS - A system for analyzing the use of location-based service applications including: a mobile device. A carrier-positioning infrastructure interacts with the mobile device for enabling the use of location-based applications by the mobile device. A mobile location-based application provider communicates with the carrier-positioning infrastructure to provide a location-based application to the mobile device. A location transaction platform monitors the use of the location-based application by the mobile device. An analytics server communicates with the location transaction platform and location stamps an occurrence of use of the location-based application by the mobile device and performs a task in accordance with predetermined rules as a function of the location-based stamp. | 10-29-2015 |
20150312364 | Intelligent Global Services Bus and System for Mobile Applications - A communications system including a plurality of mobile user computing devices, and a service provider subsystem for enabling communications between any of the mobile user computing devices and enterprise network systems. The service provider subsystem has a plurality of clusters strategically distributed across at least one geographical region and interconnected by a global services bus. Each of the clusters includes a plurality of nodes interconnected to a distributed memory storage bus. Each of the nodes includes a service manager module for monitoring services available to the node, a service access point module for enabling communications between the node and enterprise network systems, a client access point module for enabling communications between the node and at least one of the mobile user computing devices, and a message control point module for managing communications between the client access point module and the service access point module. | 10-29-2015 |
20150319045 | DISCOVERING NON MANAGED DEVICES IN A NETWORK SUCH AS A LAN USING HTTP - The topology of a computer network may be by the process of discovery in which each of the devices of the network is interrogated to thereby produce details of the network and its operation, preferably in the form of a network map which may be displayed on a visual display unit showing the devices and links between the devices. At its simplest, and where the device is a “managed” device, this information is usually provided by interrogation using a known protocol, such as the SNMP (Simple Network Management Protocol), of the so-called ‘agent’ of each device which stores the device's unique MAC address, the type of device and the MAC addresses embedded in the data passing into a particular port which thereby gives the MAC addresses of the origin of the data and hence the MAC address of the devices which are connected to the ports directly or indirectly. | 11-05-2015 |
20150319050 | METHOD AND APPARATUS FOR A FULLY AUTOMATED ENGINE THAT ENSURES PERFORMANCE, SERVICE AVAILABILITY, SYSTEM AVAILABILITY, HEALTH MONITORING WITH INTELLIGENT DYNAMIC RESOURCE SCHEDULING AND LIVE MIGRATION CAPABILITIES - A multi-cloud fabric system is disclosed to include a services controller in communication with resources of more than one cloud and responsive to policies from a user. The services controller monitors service level agreement (SLA), service assurance, and high availability and based thereon and on the policies from the user, moves resources across clouds of the more than one cloud to optimize performance of the system. | 11-05-2015 |
20150319053 | Method and Apparatus For Assigning Network Resource - A method of assigning network resource between users of a network is disclosed. The method comprises the steps of monitoring a measure of user experience of users accessing a service within the network (step | 11-05-2015 |
20150319054 | SYSTEM AND METHOD FOR LINKING MULTIPLE DEVICES INTO A SINGLE PROFILE WHEN MAKING ONLINE PURCHASES - Disclosed are systems, methods, and computer program products for simplifying the use of an online service by linking different devices into a single profile when making online purchases. An example method comprises determining that the user has begun working with the online service; determining the device that the user is employing to work with the online service; determining whether the device is new or not by checking a user profile; when the device was not determined as being known in the user profile, adding the device to a user profile associated with the user; and downloading all necessary data from the user profile to the online service. | 11-05-2015 |
20150319055 | COMMUNICATION SYSTEM, APPARATUS, METHOD AND COMPUTER READABLE MEDIUM - Methods and apparatus for operating a first apparatus in a communication system. The method comprises receiving content from a second apparatus, and determining whether to store the received content on at least one storage apparatus associated with the first apparatus based, at least in part, on priority information associated with the received content, the priority information indicating an evaIuation of a service provided by the received content. | 11-05-2015 |
20150319056 | METHOD FOR PROVIDING INFORMATION - A method includes: inputting information indicating power usage corresponding to each of a plurality of user IDs; generating a differential value between i) a first cumulative value of power usage corresponding to a first user ID in a prescribed period and ii) a second cumulative value of power usage corresponding to a second user ID in the prescribed period; generating a first conversion value by converting the differential value to a use time of an electric home appliance corresponding to a first type among electric home appliances corresponding to the first user ID; generating display data indicating that the differential value corresponds to the first conversion value; and transmitting the display data to an information terminal device corresponding to the first user ID. | 11-05-2015 |
20150319059 | Mote-Associated Log Creation - Methods and/or systems relating to mote networks having one or more logs. | 11-05-2015 |
20150319061 | METHOD TO DETECT TIME-DELAYS IN NON-PERIODIC SIGNALS - A method for carrying data on a live host signal, comprising the steps of: varying timing in a host signal in response to data to be encoded, wherein variations in timing are smaller than a sampling period for detection and capture of the digital signal receiving the live host signal; sensing pulse timing variations in the received live host signal by comparison to a reference signal; and determining information in the sensed timing variations. | 11-05-2015 |
20150319062 | BUFFERED SUBSCRIBER TABLES FOR MAINTAINING A CONSISTENT NETWORK STATE - Some embodiments provide a novel network control system that provides publications for managing different slices (e.g., logical and/or physical entities) of a network. The publications are published from publisher controllers in the network control system to subscriber controllers. The network control system uses publications with generation numbers and buffered subscribers to implement the fixed points in order to help maintain a consistent network state. Buffered subscribers buffer the inputs received from a publisher in case the publisher becomes unavailable. Rather than deleting all of the output state that is based on the published inputs, the buffered subscriber allows the subscriber to maintain the network state until an explicit change to the state is received at the subscriber from a publisher (e.g., a restarted publisher, a backup publisher, etc.). | 11-05-2015 |
20150319068 | METERING SOFTWARE INFRASTRUCTURE IN A CLOUD COMPUTING ENVIRONMENT - A system and method include determining, by a processing device, a first quantity associated with usage of a hardware resource on which a virtual machine is instantiated in a cloud, determining, by the processing device from the virtual machine, a second quantity associated with usage of a software resource utilized on the virtual machine, and determining usage of the cloud in view of the first quantity and the second quantity. | 11-05-2015 |
20150319069 | Method, Apparatus, and System for Identifying Abnormal IP Data Stream - A method, an apparatus, and a system for identifying an abnormal IP data stream, which are used to improve identification accuracy. The method provided by the embodiments of the present invention includes: receiving Y elements sent by a data collection node; mapping the Y elements to N buckets; acquiring a bucket in the N buckets as a target bucket; acquiring r upper traffic limits of a first object in r buckets within the current time interval, the first object is any object mapped to the target bucket; and identifying, according to a preset abnormal object type and the r upper traffic limits within the current time interval, whether the first object is an abnormal object, where the preset abnormal object type is a heavy hitter or a heavy changer. | 11-05-2015 |
20150319096 | SECONDARY INPUT QUEUES FOR MAINTAINING A CONSISTENT NETWORK STATE - Some embodiments provide a novel network control system that uses secondary input queues to receive and store inputs from multiple input sources prior to moving the inputs to a primary input queue for processing. The secondary input queues provide a separate storage for each input source so that the inputs from the different sources do not get mixed with each other to ensure that fixed points and barriers sent to the controller maintain their integrity. | 11-05-2015 |
20150319097 | METHODS AND SYSTEMS FOR PRIORITIZING NAMESERVERS - Methods, devices and systems are disclosed for dynamically adjusting the load priority of a backup nameserver in a computer network based on the health and responsiveness of primary and backup nameservers. | 11-05-2015 |
20150319230 | DIMENSION BASED LOAD BALANCING - One method includes receiving partitions, generating assignment plans for assignment of the partitions to servers based on dimensional values of dimensions as determined by different assignment heuristics, selecting one of the assignment plans for execution based on analyzing the dimensional values in accordance with the assignment plans, and executing the selected assignment plan on scalable storage. Another method includes determining, for a triggered optimization module that a server is over utilized on a dimension, selecting candidate operations for partitions assigned to the server, for a higher priority optimization module than the triggered optimization module, removing a candidate operation from the candidate operations that would diminish a modeled state of scalable storage, determining an operation of the candidate operations that would improve the modeled state of the scalable storage with respect to a metric of the dimension on the server, and executing the operation on the scalable storage. | 11-05-2015 |
20150319233 | LOAD BALANCING AMONG SERVERS IN A MULTI-DATA CENTER ENVIRONMENT - According to an example, in a method for load balancing among servers, the GLB device may receive detection results of performance of the servers sent by each SLB device, in which the detection results include a performance parameter and a corresponding IP address of each server of the servers. In addition, the GLB device may determine which server of the servers has a highest performance among the servers according to the performance parameters of the servers sent by the SLB devices, and the IP address of the determined server may be stored. Moreover, the GLB device may receive an access request from a client, obtain the stored IP address of the determined server, and send the IP address of the determined server to the client. | 11-05-2015 |
20150319728 | Precise and Custom Location Based Service Discovery Application for Wired and Wireless Devices - The present disclosure discloses a method and network device for providing precise and custom location based service discovery application for wired and wireless devices. Specifically, a network device determines a location of a client device. The network device also identifies a first region including the location of the client device, and identifies at least one network device associated with the first region. Responsive at least to determining that the at least one network device is associated with the first region that comprises the location of the client device, the network device selects the at least one network device, from a set of network devices, for presenting as an available resource to the client device. | 11-05-2015 |
20150326443 | METHODS AND APPARATUSES FOR DISCOVERY AND NOTIFICATION OF SERVICES - Methods and apparatuses for discovery and notification of services are described for creating a service, discovering the service, and providing notification of the service. In one embodiment, the methods and apparatuses for discovery and notification of services identifies a content provider; identifies a service wherein the service corresponds with the content provider; forms a service record within the service registry wherein the service record represents the service; and allows a content user to discover the service through the service registry. | 11-12-2015 |
20150326446 | AUTOMATIC ALERT GENERATION - Improved techniques of identifying when a device needs of service involve using data analytics to determine conditions when a device administrator of a computerized device is to be sent an alert regarding that device. Along these lines, a device monitoring system receives state data from a device that indicates the device is in a particular state, e.g., running certain applications, using some percentage of the processor and memory capacity, etc. The device monitoring system maps the device state data to a decision of whether or not to send a device administrator an alert concerning the device. The decision itself is a result of applying a model to the state data that is derived from the application of data analytics on historical device state data and administrator login data. | 11-12-2015 |
20150326447 | Quality of User Experience Analysis Using Echo Locate - The techniques described herein involve analysis of client device Quality of Experience diagnostic files including an operations log or diagnostic files for a client device. The client device Quality of Experience diagnostic files may be generated by a client device and sent to a network node for analysis. The diagnostic files may be analyzed to determine device Key Performance Indicators and a device Quality of Experience, and to determine a root cause of a network problem (such as dropped calls) leading to a diminished Quality of Experience. In some embodiments, the diagnostic files may be aggregated to form a database of aggregated diagnostics, which can be used to further analyze a network to determine the root cause of a network problem. In some embodiments, the aggregated diagnostics may be indexed according to location, time, device type, device problem, or access technology. | 11-12-2015 |
20150326452 | COMPUTATION OF STORAGE NETWORK ROBUSTNESS - Embodiments of the invention include a method for determining the health of a storage network of electronic devices. In some embodiments, the method may include determining a data size of a catalogue of data items stored in one or more electronic devices within a network of electronic devices; determining a storage capacity of the network of electronic devices; determining a storage health of the network of electronic devices based on the data size of the catalogue of data items and the storage capacity of the one or more electronic devices; and outputting the storage health of the network of electronic devices. | 11-12-2015 |
20150326453 | System and Protocol for Remote Device Monitoring and Control - Embodiments of the present invention relate to systems and protocols for a media management application to be used by a supervisor to monitor, manage, and control what a subject is watching, listening to, or interacting with on a media delivery device. A media interaction application executes on a media delivery device and is configured to collect media interaction data based on tracked user interactions with media content on the media delivery device. A remote media management application executes on a portable electronic device and is configured to monitor the media interaction data and further configured to issue media management instructions to the media interaction application. A communications broker executes on a first network server and is configured to provide secure communications between the media interaction application and the remote media management application. A media interaction analysis application executes on a second network server and is configured to receive the media interaction data from the media interaction application, to transform the media interaction data into summary media interaction data, and to provide the summary media interaction data to the remote media management application. The media interaction application is further configured to transmit the media interaction data to the remote media management application via the communications broker. The remote media management application is further configured to issue the media management instructions to the media interaction application via the communications broker. And the media interaction analysis application is further configured to receive the media interaction data via the communications broker. | 11-12-2015 |
20150326458 | Systems and Methods for Monitoring Participant Attentiveness Within Events and Group Assortments - Systems, methods, and non-transitory computer readable medium are described for monitoring participant attentiveness within events and for group assortments. In some embodiments, communications received from an online participant of an event may be monitored. Based on the monitored communications, a steady state level may be determined. Changes within the monitored communications from the steady state level may be detected and then stored within an event participation log. | 11-12-2015 |
20150326459 | SERVICE LEVEL MANAGEMENT IN A NETWORK - A method and a server for determining a service level in a network for a user. The network includes information on the at least one user and at least one application associated with the at least one user. In the method at least one application is classified into a group among multiple groups according to an importance set for each of the at least one application, utilization of network resources by each of the application is determined by monitoring a characteristic within the network, at least one network parameter is determined for each of the groups based on the utilization of the network resources, a group in which exists at least one most important application associated with the user is determined, and the service level is provided for the user, which corresponds to the determined group. | 11-12-2015 |
20150326465 | GENERATING PRODUCTION SERVER LOAD ACTIVITY FOR A TEST SERVER - A method of replicating on a test server a production load of a production server. The method can include creating the production load on the production server by processing client requests received from clients. The method further can include, while the client requests are processed, via a processor, in real time, replicating the production load to generate a replicated production load that represents the client requests and defines state information representing unique states formed between the production server and the respective clients. The method also can include, in real time, communicating the replicated production load in order to replicate the production load on the test server. | 11-12-2015 |
20150326486 | APPLICATION IDENTIFICATION IN RECORDS OF NETWORK FLOWS - In one embodiment, a method is provided for improving data center and endpoint network visibility and security. The method comprises detecting a communication flow of a plurality of packets over a network, and generating a flow identifier that uniquely identifies the communication flow. After determining an application associated with the communication flow, a flow record is generated. The flow record includes the flow identifier and an indication of the application associated with the communication flow. The indication of the application may be, for example, a hash of the application binary file. | 11-12-2015 |
20150326497 | GROUP BASED POLICY MANAGEMENT - The present disclosure provides for managing policies within a group. A group, which includes numerous group members, is configured to share resources from a single pool of resources. In addition, a group of policies applicable to the group are also identified. Whenever a request is received from one of the group members, a determination is made as to whether such a request violates the policies applicable to the group. | 11-12-2015 |
20150326674 | DEVICE AND SESSION IDENTIFICATION - Technologies are generally described for a systems, methods and devices for implementing device and session identification. In some examples, a processor may receive a first communication from a device. The first communication may include requests to interact with a web page, a session identifier associated with the first communication, and a protocol address associated with the device. The processor may receive a second communication from the device. The second communication may include a device identifier associated with the device, where the device identifier may be different from the internet protocol address, and the session identifier. The processor may link the first communication with the device identifier based on the session identifier. The processor may further analyze the first communication with respect to the device identifier to produce an analyzed first communication. | 11-12-2015 |
20150326675 | SCALABLE SEGMENT IDENTIFIER ALLOCATION IN SEGMENT ROUTING - Exemplary methods for allocating multiple local sub-blocks (LsBs) of segment identifiers (IDs) include allocating a first set of LsBs, each LsB associated with a start index and a range, wherein the start index indicates a starting SID of a corresponding LsB and the range indicates a total number of SIDs included in the corresponding LsB, each LsB identified by a sub-block number. In one embodiment, the methods include mapping a plurality of segment routing global block (SRGB) indexes to a plurality of corresponding SIDs of the first set of LsBs, the mapping performed based on the SRGB indexes, start indexes of each LsB, and ranges of SIDs of each LsB. In one embodiment, the methods include advertising the first set of LsBs by transmitting a first advertisement message that includes the start indexes, ranges of SIDs, and sub-block numbers of all LsBs of the first set of LsBs. | 11-12-2015 |
20150326681 | Delivering Personalized Content Based on a Social Graph of Sharing Activity of Users of the Open Web - A social graph is built which includes interactions, sharing activity, and connections between the users of the open Web and can be used to improve ad targeting and content personalization. Sharing activity between two users will affect ads or content that both users will be presented while surfing the Web. This sharing activity includes sending of links, sending of videos, sending of files, cutting and pasting of content, sending text messages, and sending of e-mails. Building of the social graph can include creating an edge in the social graph that is representative of a particular category type. Based on the social graph, personalized digital content can be selected. | 11-12-2015 |
20150333964 | Application Scenario Identification Method, Power Consumption Management Method, Apparatus, and Terminal Device - A method for identifying an application scenario of a terminal device, where the method includes analyzing an application program running on a terminal device by means of compilation to obtain characteristic data of the application program; and determining, from a scenario characteristic data set according to the characteristic data of the application program, application scenario information corresponding to the characteristic data of the application program, where the scenario characteristic data set includes a correspondence between multiple types of application scenario information and characteristic data of multiple application programs. Because characteristic data of an application program is more likely to be unique in describing a corresponding application scenario, application scenario information corresponding to the characteristic data of the application program is relatively accurate. Therefore, an application scenario of a terminal device can be relatively accurately identified according to the embodiments of the present disclosure. | 11-19-2015 |
20150333969 | PREDICTIVE NETWORKING ARCHITECTURE FOR NEXT-GENERATION MULTISERVICE, MULTICARRIER WANS - In one embodiment, network traffic data is received regarding traffic flowing through one or more routers in a network. A future traffic profile through the one or more routers is predicted by modeling the network traffic data. Network condition data for the network is received and future network performance is predicted by modeling the network condition data. A behavior of the network is adjusted based on the predicted future traffic profile and on the predicted network performance. | 11-19-2015 |
20150333980 | MAINTAINING IP TABLES - Data including a set of one or more resources and one or more associated IP addresses is updated based on monitored DNS responses. A request is received from a client device for a resource identified by an IP address. The IP address is matched to one of the IP addresses in the set of one or more IP addresses. A particular resource associated with the matched IP address is identified. A particular network policy that applies is identified. The identified particular network policy is applied to the received request. | 11-19-2015 |
20150333981 | INFORMATION PROCESSING APPARATUS AND REPORT GENERATING METHOD - An information processing apparatus includes: a software information acquiring unit that acquires, from a terminal device, software information on software running on the terminal device; a specifying unit that specifies region information on a region to which a user using the terminal device belongs, on the basis of the software information; a device management information acquiring unit that acquires device management information on usage of a device; a generating unit that generates a report on the basis of the region information and the device management information; and an output unit that outputs the report to the terminal device. | 11-19-2015 |
20150333982 | METHOD AND APPARATUS FOR MANAGING APPLICATION PACKAGE INSTALLED IN MOBILE COMMUNICATION TERMINAL - A method of managing application packages installed in a mobile communication terminal is provided. The method includes detecting an application package which meets a condition for changing a state into an inactive state among the application packages and, if the detected application package is in the active state, changing a user interface corresponding to the detected application package to indicate the inactive state of the application package and displaying the changed user interface on a user screen. | 11-19-2015 |
20150333984 | CONSOLIDATED PERFORMANCE METRIC ANALYSIS - Performance metrics may be received from multiple data processing elements associated with a performance metric domain and a consolidated performance metric may be determined. Grouping the performance metrics into performance metric groups may be performed based on their respective associations with different aspects of the data processing elements. | 11-19-2015 |
20150333985 | IDENTIFYING AN ANALYSIS REPORTING MESSAGE IN NETWORK TRAFFIC - Examples disclosed herein relate to identifying an analysis reporting message in network traffic. Examples include accessing network traffic exchanged with a web server application and identifying, in the network traffic, an analysis reporting message. In examples described herein, the analysis reporting message may include information representing a client system analysis of at least one prior transaction of the client system. | 11-19-2015 |
20150333987 | PROACTIVE MONITORING TREE WITH SEVERITY STATE SORTING - The disclosed embodiments relate to a system that displays performance data for a computing environment. During operation, the system first determines values for a performance metric for entities that comprise the computing environment. Next, the system displays the computing environment as a tree comprising nodes representing the entities and edges representing parent-child relationships between the entities. While displaying the tree, the system displays the child nodes for each parent in sorted order based on values of the performance metric associated with the child nodes. | 11-19-2015 |
20150333988 | DISTRIBUTED SYSTEM TO DETERMINE A SERVER'S HEALTH - Exemplary embodiments for a distributed system for determining a server's health are disclosed. The systems and methods provide for a network controller to direct one or more servicing nodes to check the health of one or more servers, and report a health score to the network controller. The network controller may then calculate, update and maintain a health score for each server in the network from the various health scores reported to it from the servicing nodes. This allows a distributed system to be used to facilitate network operations, as a single device is not relied on for periodically determining each server's health. | 11-19-2015 |
20150333994 | FILE BLOCK PLACEMENT IN A DISTRIBUTED NETWORK - A method for predicting available bandwidth for a candidate flow on a link in a distributed network includes obtaining information about a plurality of flows carried by the link, the information including a current bandwidth consumption for each of the flows carried by the link; identifying whether each of the flows carried by the link has a local constraint or a remote constraint; and computing the available bandwidth for the candidate flow based at least in part on the information about the flows carried by the link and the identification of whether each of the flows carried by the link has a local constraint or a remote constraint. The predicted available bandwidth can be used to predict bandwidth consumption for active flows. The predicted available bandwidths can be used in selecting file block placement options. | 11-19-2015 |
20150333999 | PERFORMANCE MONITORING IN A MULTI-SITE ENVIRONMENT - In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein. | 11-19-2015 |
20150334199 | METHOD ENABLING A NETWORK MONITORING SYSTEM TO NON-INTRUSIVELY ASSESS QUALITY OF USER EXPERIENCE DURING THE LOADING OF A WEBPAGE - A provided method provides an assessment of quality of user experience during the loading, on a client, of a web page from a remote server via a network, according to the http protocol, the web page having a root file and at least one reference to a resource, including: a first step including identifying and timestamping the loading of a root file by the client; and a second step including: a step of identifying and timestamping the loading, by the client, of a resource assigned to the root file, a step of processing the timestamps to determine a relative load time of the resource corresponding to the period between the start time of the root file loading and the end time of the loading of the resource assigned to the root file; a step of analysis assessing the user experience in which the relative resource load time is an index. | 11-19-2015 |
20150341219 | NETWORK DEVICE AND OPERATING METHOD THEREOF - An operating method of a network device includes determining whether a first predetermined connection port and a second predetermined connection port of the network device are interconnected via a network connection element after the network device is powered on, and performing a predetermined function under a condition that the first predetermined connection port and the second predetermined connection port are interconnected via the network connection element. | 11-26-2015 |
20150341229 | LOAD GENERATION APPLICATION AND CLOUD COMPUTING BENCHMARKING - Benchmarking of a cloud computing instance is performed by a benchmarking application via direct system calls and locally stored measures to lower impact on benchmarking. Furthermore, stored measures are uploaded to a server when benchmarking is not being performed, so as not to have the uploading impact measurement. The benchmarking is performed via an application profile comprising a plurality of benchmark indicia. Benchmarking indicia may be specific to 64-bit operating systems. Benchmarking indicia may be variable, in which a thread pool in the benchmarking application increases or decreases active threads based on the variance of the benchmarking indicia. In this way, a benchmarking application can simulate an application load not only by benchmarking indicia, but also by time. | 11-26-2015 |
20150341232 | Daily Counts and Usage Probabilities For a User of an Online Service - In one embodiment, a method includes, for each of multiple interactions by a user with an online service, collecting: device information describing a device used by the user for the interaction; access information describing how the user accessed the online service for the interaction; and a count value of the interaction. The method further includes determining based on the collected information a historical count value for each of one or more particular combinations of device and access information. | 11-26-2015 |
20150341234 | METHOD FOR GENERATING GRAPHIC INTERFACE FOR MONITORING NETWORK NODES IN A NETWORK - A method is for generating a graphic interface for monitoring a plurality of network nodes in a network. The network nodes include a plurality of master nodes and a plurality of non-master nodes each being managed by one of the master nodes. In the method, an electronic device executes the steps of: establishing a connection with one of the master nodes that serves as a root node; obtaining a first packet, from each of the network nodes, and obtaining a second packet from each o f the non-master nodes within a management hierarchy of the root node; generating synthesized status data associated with each of the network nodes based on the corresponding one of the packets; and generating the graphic interface containing the synthesized status data. | 11-26-2015 |
20150341236 | MONITORING DEVICE MESH NETWORK SYSTEMS AND METHOD - Methods, systems, devices, and software are described for data transmission to and from a monitored device via a mesh network. Monitoring devices report usage, status, location, and other pertinent data via a mesh network, and perhaps other networks as well. Novel data collection, transmission, and aggregation techniques are described. Data transfer may be bi-directional in order to manage and update device status and operation. The monitored device location may be tracked with the reported information. | 11-26-2015 |
20150341237 | Binning of Network Transactions in a Storage Area Network - A monitoring system maintains multiple counts. Each of these counts is associated with a range and indicates a number of network transactions that occurred in a storage area network (SAN) during a time period with values that are within the associated range. When the monitoring system identifies the occurrence of a network transaction between devices in the SAN, the monitoring system determines a time duration and/or a size of the network transaction. The monitoring system identifies a count associated with a time range that includes the determined time duration and increments the identified count. Additionally, the monitoring system identifies a count associated with a size range that includes the determined size and increments the identified count. | 11-26-2015 |
20150341238 | IDENTIFYING SLOW DRAINING DEVICES IN A STORAGE AREA NETWORK - A link in a storage area network (SAN) is identified that is being affected by one or more slow draining devices. Devices in the SAN are identified as candidates for potentially being a slow draining device affecting the link. For each identified candidate device, metric data is identified that describes, for example, traffic activity of the candidate device, such as data transmission rates of the candidate device. Additionally, metric data is identified for the link. For each candidate device, a correlation value is determined that indicates the likelihood that the candidate device is a slow draining device affecting the link. The correlation value of a candidate device is determined based on the correlation between the metric data of the device and the metric data of the link. One or more of the correlation values are presented to a user via a user interface. | 11-26-2015 |
20150341239 | Identifying Problems In A Storage Area Network - For each monitored entity in a storage area network (SAN), metric data associated with the entity is collected. Based on the metric data of an entity, a determination is made as to whether the entity experienced abnormal events. For each entity for which one or more abnormal events are identified, the information system determines an aggregated event score based on the abnormal events identified for the entity. Representation of the entities are presented to a user, where the representations are ordered based on the aggregated event scores of the entities. | 11-26-2015 |
20150341241 | METHOD AND APPARATUS FOR SPECIFYING MACHINE IDENTIFIERS FOR MACHINE-TO-MACHINE PLATFORM SUPPORT - An approach is provided for determining, specifying, or associating a unique identifier with a machine in a machine-to-machine communications network. The approach includes specifying a unique identifier for a machine attached to a sub-network of an aggregator, wherein the machine and the aggregator comprise at least a portion of a machine-to-machine deployment. The approach also includes associating the unique identifier with a message directed to or originating from the machine via the aggregator, wherein the unique identifier is exposed beyond the sub-network for determining a connectivity status of the machine. | 11-26-2015 |
20150341244 | Performance Analysis of a Time-Varying Network - Methods and systems are described for storing network device identities and application assignments as a function of time to facilitate analysis of network devices and applications even in a temporally dynamic network. Server assignments are stored as a function of time for various applications executed within a network. Performance data are indexed according to a server and/or port unique identifier and stored as a function of time. Using the time-based server assignments and time-based performance data, the system can be queried using at least one of an application and intermediate entity identifier to determine the performance of the application, the entity, or both at one or more points in time. | 11-26-2015 |
20150341245 | NETWORK MANAGEMENT MODEL EXTENSION - A communications network has network elements and management parts and a stored model of the network. The network elements have a controllable energy consumption status represented explicitly in the stored model. Indications of the controllable energy consumption status are passed between the management parts and network elements in a format which is compatible with the format of the model, such as by extension of TMF 814. Representing such energy status information more explicitly means it can be exchanged or distributed more efficiently, and passing the indication in a format compatible with a standard format of the network model, means a discovery request can be more easily used at various different management levels, and by various different parts of the network. | 11-26-2015 |
20150341246 | SYSTEM AND METHOD FOR ANOMALY DETECTION IN INFORMATION TECHNOLOGY OPERATIONS - An anomaly detection system is able to detect spatial and temporal environment anomalies and spatial and temporal behavior anomalies, and monitor servers for anomalous characteristics of the environment and behavior. If metrics and/or characteristics associated with a given server are beyond a certain threshold, an alert is generated. Among other options, the alert can take the form of a heat map or a cluster cohesiveness report. | 11-26-2015 |
20150341247 | ELEPHANT FLOW DETECTION IN A COMPUTING DEVICE - Example embodiments relate to elephant flow detection in a computing device. In example embodiments, a computing device may monitor a socket for a given flow. The computing device may then determine whether the flow is an elephant flow based on the monitoring of the socket. If so, the computing device may signal the network that transmits the flow that the flow is an elephant flow. | 11-26-2015 |
20150341279 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero. | 11-26-2015 |
20150341444 | TOKEN-BASED CORRELATION OF CONTROL SESSIONS FOR POLICY AND CHARGING CONTROL OF A DATA SESSION THROUGH A NAT - A method of handling packets sent across a packet switched network comprising a policy server acting as a policy and charging rules function. The method comprises providing a first set of policy rules at said policy server, and installing these from the policy server into an access gateway over a first service control session. These policy rules cause packets belonging to a given IP session to be diverted by the access gateway to a network address translator. At the network address translator, an IP source address of said packets is translated into a translated IP source address identifying a deep packet inspection node. The network address translator forwards the packets to the deep packet inspection node configured to perform deep packet inspection of IP packet. | 11-26-2015 |
20150341455 | METHOD AND APPARATUS FOR MONITORING WEBSITE ACCESS DATA - A method for monitoring and analyzing website visit data includes acquiring real-time source data of sessions established between a client terminal and a server; classifying the real-time source data of sessions into a plurality of categories based on the website and a session identifier; caching the categories of the real-time source data of sessions in the memory; if a categorized session is valid, calculating visit effect data of the session using the source data; consolidating the visit effect data of the session with a sum of visit effect data; and updating the sum of visit effect data; if a categorized session is invalid, calculating failure effect data of the session; consolidating the failure effect data of the session with the sum of visit effect data; and deleting the source data of the session from the memory. | 11-26-2015 |
20150350021 | GENERATION AND MANAGEMENT OF COMPUTING INFRASTRUCTURE INSTANCES - Various techniques are described herein for generating and managing computing infrastructure instances within datacenters. Data identifying various computing infrastructure characteristics may be receive and analyzed in order to determine one or more computing infrastructure definitions to be instantiated within a datacenter. Specific datacenters may be determined for instantiating the computing infrastructure definitions, various provisioning and configuration management tools may be selected, and computing infrastructure instances comprising multiple interoperable services (e.g., web services) and other components may be provisioned, configured, tested, and maintained. In some examples, instance execution data may be received and analyzed via instance monitor components transmitted and deployed within computer infrastructure instances executing on datacenters. Instance monitor components may collect instance execution data, which may be analyzed to identify issues of performance, stability, cost, and the like, associated with various combinations of computing infrastructure definitions, datacenters, services, and configurations. | 12-03-2015 |
20150350036 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR INTERCEPTION, QUARANTINE AND MODERATION OF INTERNAL COMMUNICATIONS OF UNCONTROLLED SYSTEMS - Embodiments disclosed herein may intercept, quarantine, and moderate communications internal to an uncontrolled system. An example of an uncontrolled system may be a web application associated with a social networking site. In accessing the social networking site, a user may type in a message. An instance of the uncontrolled system running on the user's device may prepare a request containing the message. Some embodiment disclosed herein may determine that the message is subject to moderation, intercept the request, and place the message in a queue. This determination may be based on the destination of the request as well the type of the message. Some embodiments may reconstruct the original request for resubmission. If the session is expired, some embodiments may log in for the user and resubmit the reconstructed request. Some embodiments may wait for the next time the user logs in to resubmit the reconstructed request. | 12-03-2015 |
20150350037 | COMMUNICATION DEVICE AND DATA PROCESSING METHOD - A packet reception state monitoring unit calculates a target stored data number as a target number of audio packets stored in a memory based on the variation in the reception intervals of audio packets, and a reproduction control unit controls the audio reproduction speed in accordance with the difference between the target stored data number and a memory-stored data number. When the memory-stored data number is smaller than the target stored data number, reproduction control is performed in a low-speed reproduction mode at a lower speed than a regular reproduction speed. When the memory-stored data number is larger than the target stored data number, reproduction control is performed in a high-speed reproduction mode at a higher speed than the regular reproduction speed. A reproduction speed changing process is performed, with hysteresis being given to transitions of the difference between the memory-stored data number and the target stored data number. | 12-03-2015 |
20150350038 | METHODS OF GENERATING COMMUNITY TRUST VALUES FOR COMMUNITIES OF NODES IN A NETWORK AND RELATED SYSTEMS - A method of evaluating trust in a network may include defining a community of nodes of the network from a larger set of nodes of the network. A respective individual trust value may be generated for each node of the community of nodes, and a community trust value may be generated based on the individual trust values of nodes of the community. Related systems are also discussed. | 12-03-2015 |
20150350039 | DEEP PACKET INSPECTION (DPI) OF NETWORK PACKETS FOR KEYWORDS OF A VOCABULARY - An aspect of the present disclosure provides deep packet inspection (DPI) of network packets for keywords of a vocabulary. In one embodiment, a mapping specifying association of respective keywords to corresponding unique pattern codes is maintained, with each pattern code being shorter in length compared to the corresponding keyword and being computed based on a formula. Upon receiving a network packet, a token (containing a sequence of characters) present in the network packet is first identified and the formula then applied to the identified token to generate a token code. The token is determined to match a specific keyword when the token code equals the pattern code corresponding to the specific keyword in the mapping. | 12-03-2015 |
20150350040 | ENABLING AN EARLY RESPONSE TO A DISEASE BASED ON DATA ANALYTICS - Enabling an early response to a disease based on data analytics. This invention relates to effective management of diseases and more particularly to effective management of disease by enabling an early and appropriate response to the disease using data analytics. The system comprises of a disease analytics platform connected to a plurality of data sources and at least one stakeholder. | 12-03-2015 |
20150350045 | METHOD AND SYSTEM FOR PROCESSING BROWSER CRASH INFORMATION - The disclosure discloses a method and a system for processing browser crash information. The method comprises: receiving browser crash status information uploaded when a browser crashes; according to the browser crash status information, generating crash identification information to indicate whether allowing the browser to upload a crash data packet or not; feeding the crash identification information back to the browser; if the crash identification information indicates allowing the browser to upload the crash data packet, receiving crash information including the crash data packet uploaded by the browser; starting up an automatic crash data packet analyzing program to analyze the crash data packet; and sending the analyzing result of the crash data packet back to the browser uploading the crash data packet. The disclosure provides a solution at cloud system level to specifically collect, process, analyze and identify the browser crash information. | 12-03-2015 |
20150350046 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes: a reception unit that sequentially receives a plurality of UDP packets sequentially transmitted in a certain data size and at a certain time interval; a first and second calculation units that acquire a plurality of reception time intervals each between two UDP packets successively received by the reception unit, and calculate evaluation values for evaluating a delay state of the reception time intervals; a determination unit that combines the evaluation value calculated by the first calculation unit and the evaluation value calculated by the second calculation unit, and determines reliability of the evaluation values based on at least the two evaluation values; and a bandwidth information outputting unit that outputs bandwidth information according to a bit rate determined by the certain data size and the certain time interval on the basis of the reliability of the evaluation values determined by the determination unit. | 12-03-2015 |
20150350047 | OPTIMIZATION OF COMPUTING RESOURCES THROUGH MONITORING AND MANIPULATING AVAILABILTY - In a method of managing a computing network, an expected behavior of a host is determined. The host is associated with a network resource, and is configured to be switched between active and inactive states. When the host is in the inactive state, a message is transmitted via the network on behalf of the host based on the expected behavior thereof such that the host appears to be in the active state. Related computer systems and computer program products are also discussed. | 12-03-2015 |
20150350048 | User Defined Objects for Network Devices - Systems and methods are provided herein. An exemplary servicing node may include: an interface to a data network, the interface coupled to an object machine; and the object machine, the object machine: receiving a data packet from the data network using the network interface, the data packet comprising at least one of a destination address, a destination port number, and an application protocol; determining a condition associated with the at least one of the destination address, the destination port number, and the application protocol; identifying a program name using the condition; executing a program using a name table, the name table linking each of a plurality of program names to a respective program, the executing comprising getting an instruction of the program, the instruction including object information. | 12-03-2015 |
20150350051 | Quickly locating devices - A set of computing devices are networked together. Each device maintains data about the other computing devices in the set, namely, a time and location of a last successful connection between the device and one or more of the other devices. The data at a device is updated as computing devices in the set move out of communication range with one another, for example (a) when the particular computing device itself loses contact with one of the other computing devices in the set, or (b) when the particular computing device receives a notification from one of the other computing devices that such other computing device has lost contact with a computing device that the other computing device had been in contact with. The connection table data is then used to locate a lost computing device, or the identity of a device that has such information in its connection table. | 12-03-2015 |
20150350052 | SYSTEM AND METHOD FOR INFERRING TRAFFIC LEGITIMACY THROUGH SELECTIVE IMPAIRMENT - Described is a system and method for determining a classification of an application that includes initiating a stress test on the application, the stress test including a predetermined number of stress events, wherein the stress events are based on a network impairment. A response by the application to each stress event is identified and the application is classified as a function of the response into one of a first classification and a second classification, the first classification indicative of a normal application and the second classification indicative of an undesired application. If, the application is in the second classification, a network response procedure is executed. | 12-03-2015 |
20150350053 | METHOD AND SYSTEM FOR POLICY-BASED CONTROL IN A DISTRIBUTED NETWORK - A method and a system is disclosed for policy-based control of a communication network having a distributed architecture, including at least one heterogeneous communication network, which network elements provide for registering events, sending notifications of the occurrence of events and enforcing a policy upon said events if certain conditions are met, wherein the PEP serves as a server towards a PDP, being a client. By applying the method and system of the invention, multiple Stakeholders, having each at least one Policy Decision Point, can influence policy enforcements carried out at a Policy Enforcement Point. | 12-03-2015 |
20150350055 | SHARED RESOURCE CONTENTION - Contention for shared resources in a shared resource environment may be determined based on measurements from a probe running in the shared resource environment. The measurements can be compared to benchmarks, and a contention value may be determined based on the comparison. | 12-03-2015 |
20150350075 | DYNAMIC LOOP DETECTION AND SUPPRESSION - Systems and methods are described for effectively managing and maintaining a communication network by monitoring communications to detect a loop condition, and effectively route the communication to one or more destinations known to reduce or eliminate the occurrence of a looping condition. In one embodiment one or more computing devices may be configured to detect or assign an identifier to an incoming network communication, retrieve routing information from a routing database identifying one or more destinations to route the communication. The one or more computing devices may be further configured to compare the routing information with the identifier to determine an appropriate destination to route the communication. | 12-03-2015 |
20150350089 | METHOD AND APPARATUS FOR FLEXIBLE AND EFFICIENT ANALYTICS IN A NETWORK SWITCH - Embodiments of the present invention relate to a centralized network analytic device, the centralized network analytic device efficiently uses on-chip memory to flexibly perform counting, traffic rate monitoring and flow sampling. The device includes a pool of memory that is shared by all cores and packet processing stages of each core. The counting, the monitoring and the sampling are all defined through software allowing for greater flexibility and efficient analytics in the device. In some embodiments, the device is a network switch. | 12-03-2015 |
20150350346 | COMMUNICATION APPARATUS, CONTROL METHOD THEREOF, AND RECORDING MEDIUM - A method of controlling a communication apparatus includes searching for external apparatus information about an external apparatus sent from the external apparatus, displaying identification information for identifying the external apparatus by using a web browser, based on the searched external apparatus information, and receiving, based on the identification information displayed by using the web browser, designation of any piece of identification information, wherein the searching searches for external apparatus information sent from an external apparatus that does not belong to a same network as the communication apparatus, and wherein in a case where designation of identification information about the external apparatus that does not belong to the same network as the communication apparatus is received, the communication apparatus is caused to belong to the same network as an external apparatus corresponding to the designated identification information and a communication is established between the communication apparatus and the external apparatus. | 12-03-2015 |
20150350377 | PROVIDING ON-DEMAND SERVICES - A service system receives a request for a service from a computing device of a user. In response to receiving the service request, the service system determines the content of the request and communicates a data collection module to the user device. Based on the content of the request, the service system determines a data collection instruction. The service system communicates the data collection instruction to the data collection module, which executes the instruction, thus resulting in collection of data from the user device and/or devices associated with the user device. The service system then receives the collected data. Based on an analysis of the received data, for example, the service system determines a response to the service request. For example, the service system determines a service product that is responsive to the request. The service system then communicates the response to the user device. | 12-03-2015 |
20150356103 | SYSTEMS AND METHODS FOR ADVANCED TARGETING - A system for testing the effectiveness of webpage configurations is disclosed. Tags indicating dependency between sections of a webpage may be associated with the sections. In response to a version of a first section of a webpage being tested, an associated tag may indicate that the content or behavior of a second section is dependent on the first section. A webpage configuration including content of the first section, and corresponding behavior and content of the second section, may be transmitted to a web client. Data may be collected indicating the effectiveness of the webpage configuration. | 12-10-2015 |
20150358197 | Systems, Methods, and Apparatuses for Providing Adaptive User Notifications - Methods and apparatuses are provided for providing adaptive user notifications. A method may include detecting an event. The method may further include determining usage of one or more connected apparatuses. The method may also include determining, based on the determined usage, a notification method for notifying of the event. The method may additionally include generating an event notification message based on the determined notification method. The method may further include causing the event notification message to be sent to a connected apparatus to trigger the connected apparatus to provide an alert indicative of the event in accordance with the determined notification method. Corresponding apparatuses are also provided. | 12-10-2015 |
20150358205 | ANALYZING NETWORK TRAFFIC FOR LAYER-SPECIFIC CORRECTIVE ACTIONS IN A CLOUD COMPUTING ENVIRONMENT - A device may receive information that identifies a set of rules for analyzing network traffic associated with a cloud computing environment. The device may receive network traffic information associated with the cloud computing environment. The network traffic information may be associated with network traffic transmitted to or transmitted from the cloud computing environment. The device may analyze the network traffic information using the set of rules, and may identify an action to be performed based on analyzing the network traffic information using the set of rules. The device may identify a layer of the cloud computing environment, at which to perform the action, based on analyzing the network traffic information using the set of rules. The device may cause the action to be performed to modify a configuration associated with the layer of the cloud computing environment. | 12-10-2015 |
20150358207 | Method of Obtaining Optimized Use Case for Communication Network - Method of Obtaining Optimized Use Case for Communication Network A method of obtaining an optimized combination of use cases for a communication network is disclosed. The method includes presenting on a display device a set of objectives, wherein at least one communication network indicator is associated with the set of objectives, and each of the set of objectives is measurable by a set of key performance indicator (KPI)s; receiving a selection to one or more objectives from the presented set of objectives through an input device; outputting a first optimized combination of use cases having the most positive impact to KPIs of the selected set of objectives; and presenting on the display the optimized use cases combination. | 12-10-2015 |
20150358208 | COMPONENT DEPENDENCY MAPPING SERVICE - Systems and methods are provided for mapping dependencies between system components and for analyzing and acting on possible root causes for anomalies experienced by the system components. Aspects of the present disclosure may present for display information associated with the dependency maps and ranked lists of possible root causes of anomalies. Ranking comprises determination of which operating parameters of related system components, when anomalous, will have the greatest effect on the operation of monitored system components. When possible root causes are ranked, notifications may be issued to alert administrators or other systems of the anomaly and the likely root causes. | 12-10-2015 |
20150358218 | STATISTICAL MONITORING OF CUSTOMER DEVICES - A network device receives configuration information for monitoring, via a network, control data for a monitored customer device. The configuration information includes business rules for responding to an event when the control data is outside baseline control limits. The network device identifies original equipment manufacturer (OEM) or service provider recommended limits for the control data and receives initial control data, associated with the monitored customer device, for a particular time period. The network device determines, based on the initial control data, baseline control limits related to the OEM or service provider recommended limits. The network device receives, an indication of an out-of-bounds event, wherein the out-of-bounds event includes at least one instance where subsequent control data is outside the baseline control limits and initiates, based on the business rules, an action responsive to the out-of-bounds event. | 12-10-2015 |
20150358219 | SYSTEM AND METHOD FOR GATHERING INFORMATION - An information gathering system includes: an ID gathering mechanism, provided at a transmitter side node, that generates a collective identifier from one or a plurality of individual identifiers of respective management targets, each of the individual identifiers being generated according to a state of a corresponding management target; and an ID analysis mechanism, provided at a receiver side node, that restores an individual identifier from the collective identifier and specifies a management target based on the restored individual identifier. | 12-10-2015 |
20150358224 | SYSTEMS AND METHODS FOR EPHEMERAL EVENTING - Embodiments are provided for ephemeral eventing. Ephemeral eventing may involve sending metadata portions associated with content items from a user device to a content management system prior to uploading the content portions of the content items. The content management system may then assign the content items to one or more events. The event assignments may then be sent back to the user device, allowing the content items to be locally displayed according to their events as if the content items had already been uploaded to the content management system. | 12-10-2015 |
20150358250 | MANAGING NETWORK DATA DISPLAY - Systems and methods for monitoring performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to a set of resources. The processing device uses the performance metric information to identify a subset of the resources corresponding to a display location associated with a visible portion of a display and to assess performance related to processing of the identified subset of the resources. In some embodiments, the processed performance data may be used to identify timing information associated with the subset of the embedded resources. Aspects of systems and methods for identifying and testing alternative resource configurations corresponding to the content associated with the original set of resources and for determining whether to recommend a resource configuration for improving performance of subsequent client requests for the content are also provided. | 12-10-2015 |
20150358256 | OPTIMIZED JOB SCHEDULING AND EXECUTION IN A DISTRIBUTED COMPUTING GRID - Disclosed example methods for network switch control include accessing link characteristics for a plurality of network switches. The disclosed example methods also include comparing the link characteristics for the plurality of network switches with resource characteristics associated with a data processing function to determine a first one of the network switches on which to execute the data processing function. The disclosed example methods also include scheduling data processing function to be executed by the first one of the network switches. | 12-10-2015 |
20150358391 | Application Monitoring for Cloud-Based Architectures - An example system may include one or more collectors, an analyzer, and a presentation module. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes. The plurality of data streams are captured and provided by a plurality of meters deployed on at least one cloud computing platform to respectively meter the plurality application nodes. The analyzer processes the plurality of data streams to generate real-time performance data for an application associated with the plurality of application nodes. The presentation module streams the real-time performance data to at least one stakeholder of the application for display via a dashboard. The real-time performance data includes one or more performance metrics describing the performance of plurality of the application nodes of the application. | 12-10-2015 |
20150359016 | APPARATUS AND METHOD TO ESTIMATE ROUND TRIP TIME VIA TRANSPORT CONTROL PROTOCOL SIGNALS - The disclosure provides a method, apparatus, and computer program product directed to a client estimation of round trip time via transport control protocol (TCP) signals over multiple radio access technologies. A TCP probe signal is transmitted to a server via a TCP connection, and an acknowledgment signal is received from the server via the TCP connection in response to the TCP probe signal. A round trip time is then estimated based on the acknowledgment signal. | 12-10-2015 |
20150363289 | Mobile device application monitoring software - A software application for monitoring the performance of other software applications on mobile devices using efficient crowd sourced data and recommending third party software apps based on a user's demographics and mobile device data. | 12-17-2015 |
20150365269 | USAGE OF MAPPING JUMPER PINS OR DIP SWITCH SETTING TO DEFINE NODE'S IP ADDRESS TO IDENTIFY NODE'S LOCATION - A method for identifying the location of a server node in a cloud computing room includes determining IO level definition of IO ports according to an IP-Mapping table containing a physical location, an IP address, and an IO level definition for each server node, powering on all the server nodes, retrieving the IO level definition from high/low states of the IO ports, defining the IP address according to the IO level definition retrieved and the IP-Mapping table, detecting hardware or software errors and sending event alert messages when errors are detected in a particular server node, reinstalling or resetting the particular server node when diagnosing, and locating the server node from the IP address of the particular server node and the IP-Mapping table. | 12-17-2015 |
20150365286 | OPERATING A DUAL CHIPSET NETWORK INTERFACE CONTROLLER ('NIC') THAT INCLUDES A HIGH PERFORMANCE MEDIA ACCESS CONTROL CHIPSET AND A LOW PERFORMANCE MEDIA ACCESS CONTROL CHIPSET - Operating a dual chipset network interface controller (‘NIC’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a NIC control module, an amount of network traffic being processed by the NIC; determining, by the NIC control module, whether the amount of network traffic being processed by the NIC exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the NIC exceeds a predetermined threshold, configuring, by the NIC control module, the NIC to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the NIC does not exceed the predetermined threshold, configuring, by the NIC control module, the NIC to utilize the low performance media access control chipset for data communications operations. | 12-17-2015 |
20150365303 | ANALYZING SCADA SYSTEMS - At least one aspect disclosed herein is directed to a SCADA project analysis system. The system includes memory ad at least one processor coupled to memory. The processor is configured to receive information regarding a supervisory control and data acquisition (SCADA) system configured to monitor an industrial process, the information describing at least one first programmable device within the SCADA system, identify at least one analyzer from a plurality of analyzers based on the information, the at least one analyzer being configured to generate an assessment of the SCADA system based on the information, the assessment describing at least one capability of the SCADA system, execute the at least one analyzer to generate the assessment of the SCADA system based on the information, and provide the assessment to an external entity. | 12-17-2015 |
20150365307 | COMMUNICATION DEVICE FOR SEARCHING FOR SPECIFIC DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND RECORDING MEDIUM - A communication device that participates in a network includes a storing control unit that stores images, a search unit that searches for a predetermined external device from the network, a transmission unit that transmits stored images to the external device via the network, a determination unit that determines the frequency of participation in the network, and a changing unit that changes the time for searching for the external device according to determination results of the determination unit. | 12-17-2015 |
20150365309 | METHODS AND SYSTEMS PROVIDING A SCALABLE PROCESS FOR ANOMALY IDENTIFICATION AND INFORMATION TECHNOLOGY INFRASTRUCTURE RESOURCE OPTIMIZATION - A method for anomaly identification and IT resource optimization includes retrieving, by a workload engine executing on a first computing resource, from a database populated by a client agent executing on a second computing resource, a metric associated with a process. The method includes analyzing, by the workload engine, the retrieved metric and the process. The method includes associating, by the workload engine, at least one workload with the process, responsive to the analysis. The method includes analyzing, by an exception engine executing on the first computing resource, the retrieved metric, the process, and the at least one workload; analyzing includes applying at least one workload rule to the at least one workload. The method includes identifying, by the exception engine, an operational anomaly within the process, responsive to the analysis by the exception engine. The method includes providing a recommendation for mitigating the operational anomaly. | 12-17-2015 |
20150365310 | REMOTE METERING FOR PANELIST WEB USAGE - A method for remotely recording Web usage by a panelist includes receiving at a remote processor, a command from a local client to display a Web page; identifying the local client and the panelist operating the local client; accessing the Web page; rendering the Web page in a remote browser; sending an image of the Web page to a local browser of the local client; and recording Web usage metrics associated with a display of the image on the local browser. | 12-17-2015 |
20150365311 | SCALABLE SOFTWARE MONITORING INFRASTRUCTURE, USING PARALLEL TASK QUEUING, TO OPERATE IN ELASTIC CLOUD ENVIRONMENTS - Provided are a method, a system, and a computer program product in which a plurality of cloud images that execute in a plurality of nodes are maintained by a monitoring server, in a cloud computing environment. The monitoring server maintains information on an increase and a decrease in number of the plurality of cloud images in the cloud computing environment. | 12-17-2015 |
20150365312 | EFFICIENTLY UTILIZING PROBE PACKETS WITHIN A NETWORK - According to one aspect, a method includes monitoring traffic between a first network element and a second network element, and determining when no packets have been sent from the first network element towards the second network element within a predetermined amount of time. When it is determined that no packets have been sent from the first network element towards the second network element within the predetermined amount of time, the method includes sending at least one smart probe packet from the first network element to the second network element | 12-17-2015 |
20150365342 | SYSTEM AND METHOD FOR ROUTING WORK REQUESTS IN AN ENTERPRISE - A resource allocation system of an enterprise is disclosed for allocating resources for a work request in an enterprise. The resource allocation system includes a monitor module configured to monitor the work request and availability of the resources in the enterprise, wherein the work request is characterized by one or more attributes. The resource allocation system further includes a resource matching module configured to match the attributes of the work request with the resources to determine one or more first type and second type of resources. The resource allocation system further includes an assignment module configured to assign the first type of resources to the work request while the second type of resources are unavailable, and re-assign the second type of resources to the work request when the second type of resources become available. | 12-17-2015 |
20150365443 | METHOD, SERVER AND APPARATUS FOR ESTABLISHING POINT-TO-POINT CONNECTION - When a first device is establishing a point-to-point connection with a second device, a server provides connection instructions for assistance. The connection instructions define multiple connection flows. When the connection instructions are received, the first device attempts a first connection flow under a priority order. If failed, another connection is tried by the first device. The server monitors connection status and adjusts the connection instructions according to statistics and circumstances. | 12-17-2015 |
20150365480 | METHODS AND SYSTEMS FOR COMMUNICATING WITH ELECTRONIC DEVICES - Methods and systems for communicating with electronic devices are provided. In some embodiments, a method for interacting with electronic devices may include a method for interacting with electronic devices on a network, the method comprising the steps of: searching for the presence of a signal generated by an electronic device; detecting the presence of an unregistered electronic device on the network; receiving schema from electronic device; associating the received device schema with a record of data in a database or other repository; and using the associated data to control a function of the electronic device through the network. | 12-17-2015 |
20150372855 | METHOD AND SYSTEM FOR CLUSTERING EVENT MESSAGES - The current document is directed to methods and systems for processing, classifying, and efficiently storing large volumes of event messages generated in modern computing systems. In a disclosed implementation, received event messages are normalized to identify non-parameter tokens within the event messages. The non-parameter event tokens are used to compute a metric for each event message. The metrics are used, in turn, to identify a type-associated cluster to which to assign each received event message. The type-associated clusters are created dynamically as streams of event messages are processed. The type-associated clusters may be dynamically split and merged to refine event-message typing. | 12-24-2015 |
20150372868 | Information Handling System Operational Management Through Near Field Communication Device Interaction - Configuration information to configure an information handling system is obtained by sending an identifier for the information handling system to a portable information handling system, such as a mobile telephone, with a first NFC communication. The mobile telephone retrieves the configuration information, such as through a network interface, and sends the configuration information to the information handling system with a second NFC communication. Configuration information includes a variety of information, such as IP and MAC address, BIOS settings, software applications, firmware versions and end user specific settings. | 12-24-2015 |
20150372869 | Distributed Gateways for Overlay Networks - Techniques provided herein enable a set of independent, unconnected devices in a network to support distributed Layer 3 (L3) gateway functionality for an overlay based virtual network by intelligently triggering proxy addressing information updates. | 12-24-2015 |
20150372884 | SYSTEM VERIFICATION OF INTERACTIVE SCREENSHOTS AND LOG FILES BETWEEN CLIENT SYSTEMS AND SERVER SYSTEMS WITHIN A NETWORK COMPUTING ENVIRONMENT - A computer-implemented method for system performance verification is provided. The computer-implemented method includes invoking an integrated system tool to perform system performance verification of a client system. The computer-implemented method further includes monitoring administrative actions within an interface of the client system of an administrative device during the system performance verification. The computer-implemented method further includes recording screenshots of the monitored administrative actions, wherein the recorded screenshots are recorded to administrative log files of the administrative device. The computer-implemented method further includes transmitting the recorded screenshots to a storage location of system log files, wherein the recorded screenshots are associated with appropriate system log files for performing diagnosis of system performance verification of the client system. | 12-24-2015 |
20150372885 | METHOD, APPARATUS, AND SYSTEM FOR TRACING RESOURCE PROPAGATION - The present invention, relating to the field of Internet technologies, provides a method, apparatus, and system for tracing resource propagation. The method comprises: generating a resource address pointing to a location where a resource is stored; when the resource is propagated, adding a user identifier and a propagation behavior identifier of a user propagating the resource to the resource address, and recording the user identifier and the propagation behavior identifier; and acquiring a propagation path of the resource according to the recorded user identifier and propagation behavior identifier; wherein the user identifier is used to identify a user who is logged in and propagates the current resource; and the propagation behavior identifier is used to identify a primary resource propagation behavior between the resource propagator and a previous resource propagator. According to the present invention, a user identifier and a propagation behavior identifier of a user propagating a resource are added to a resource address, and resource propagation is traced by recording a content change of the resource address, thereby conducting statistics collection for and evaluation on contributions of the user to the resource propagation. | 12-24-2015 |
20150372886 | APPARATUS, SYSTEM AND METHOD OF DATA COLLECTION AFTER SOFTWARE REMOVAL - Embodiments of the present invention are directed to generating and delivering data elements out of the context of an application installation. Each data element generated by an application is transmitted to a collection server after a networked computing device has connected back to a network, and even after the application has been removed from the networked computing device. Each data element is associated with a globally unique transaction identifier. Each data element and its corresponding transaction identifier are packaged together for transmission to the collection server via one or more of a plurality of transmission pathways, including a messaging pathway. The collection server uses the transaction identifier to check whether a corresponding data element is already stored by the collection server. The data element is stored by the collection server, if not already stored. | 12-24-2015 |
20150372887 | SYSTEM AND METHOD FOR MONITORING AND DIAGNOSTICS IN A MULTITENANT APPLICATION SERVER ENVIRONMENT - A system and method for monitoring and diagnostics in an application server environment. A system can comprise one or more computers, which can include an application server environment executing thereon, together with a plurality of deployable resources configured to be used within the application server environment, and a plurality of partitions, wherein each partition provides an administrative and runtime subdivision of a domain. A diagnostic framework, such as a WebLogic Diagnostic Framework (WLDF) can also be provided, wherein the diagnostic framework is configured to perform at least one action from the group consisting of partition scoped logging, partition scoped monitoring, and partition scoped diagnostic imaging. | 12-24-2015 |
20150372890 | PERFORMANCE EVALUATION OF AN INFORMATION RESOURCE IN A COMPUTER NETWORK ENVIRONMENT - Systems and methods of evaluating performance of an information resource in a computer networked environment are provided. A data processing system can obtain a request for a performance metric of an information resource. A number of visits to the information resource by an audience segment, and an aggregate number of visits to the information resource can be determined and used to identify a first metric. A global audience segment number and a global aggregate audience number can also be determined and used to identify a second metric. A performance metric associated with the information resource can get determined based on the first metric and the second metric. | 12-24-2015 |
20150372891 | System and method for facilitating the exchange of user traffic between web sites - System and methods for facilitating link exchange partnerships between Webmasters in which an approximately equal and optimal amount of user traffic is sent between the web sites. Specifically, the method of creating a link exchange partnership and fulfilling of its obligations includes providing a Webmaster the opportunity to propose link exchange partnerships with other Webmasters, giving the Webmaster on the receiving end of the link exchange partnership proposal the opportunity to accept or decline the request, determining the maximum amount of user traffic that two Webmasters can agree to send to each other while still accounting for each of the Webmasters other link exchange partnerships, and displaying Partner Widgets on both Webmasters' web sites that display links to the other web site's content to a determined percentage of each web site's users with the intention that the displaying of the links will result in an approximately equal and optimal amount of user traffic directed from one web site to the other web site. | 12-24-2015 |
20150372892 | Embedded Performance Monitoring of a DBMS - Embedded Performance Monitoring is an “out-of-box” approach for performance monitoring of a DBMS. Performance monitoring of a DBMS is achieved through use of a browser to access the DBMS once a DBMS is installed and configured. The approach exploits a DBMS configured with the native capability to provide performance monitoring data and software via a browser. To retrieve and use the performance monitoring data from the DBMS, a browser executes software downloaded to the browser from the DBMS using web-based technologies. | 12-24-2015 |
20150372895 | Proactive Change of Communication Models - The invention concerns a method, arrangement and computer program product for handling communication between at least two applications in a communication network with the aid of at least one communication queue, the arrangement comprising a processor acting on computer instructions whereby said arrangement is operative to receive, in at least one common default communication queue, messages from a variety of applications according to a default communication model, distribute the messages to destination applications, monitor network communication parameters, predict the status of the communication quality based on the monitored network communication parameters, compare the predicted status with at least one communication failure criterion, select a corresponding relief communication model if the communication failure criterion is fulfilled, and implement the selected relief communication model. | 12-24-2015 |
20150372966 | SYSTEM AND METHOD FOR ADDRESS BASED LOCATIONS - Techniques are provided for identifying a locations of application users based on originating address. Techniques to generate a set of address-to-location mappings include a system configured to receive information about a plurality of location-known requests that originated from an address, wherein the information indicates a plurality of locations for the originating address. The system is further configured to identify a geographical area based, at least in part, on the plurality of distinct locations; map the geographical area to a corresponding geographical locality; and associate the address to the geographical area and the corresponding geographical locality generating an address-to-location mapping. Address-to-location mappings may be further clustered into address-range-to-location mappings and stored as a data pack. Using these techniques, location information may be determined for a received location-unknown request that originated from a particular address. | 12-24-2015 |
20150373071 | ON-DEMAND HELPER OPERATOR FOR A STREAMING APPLICATION - A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. When a bottleneck is detected, the streams manager automatically adjusts a helper operator to help the operator experiencing the bottleneck, thereby dynamically improving performance of the streaming application. Helper operators can be dynamically created and destroyed by the streams manager as needed, and can be deployed to virtual machines in a cloud. | 12-24-2015 |
20150373109 | METHODS AND SYSTEMS FOR VIRTUALIZING AND MANAGING CLOUD STORAGE SOURCES - Methods and systems for virtualizing and managing cloud storage sources are disclosed. The method includes detecting devices in communication with a docking station and identifying a file on one of the devices. The method also includes identifying a plurality of cloud storage sources and calculating a weighted value for each storage source among the plurality of storage sources. The method further includes selecting a storage location within the plurality of cloud storage sources based on the calculated weighted values and storing the file at the selected storage location. | 12-24-2015 |
20150381419 | RESOURCE RECONCILIATION - A method to reconcile multiple instances of a single computer resource identified by resource discovery operations includes: (1) accessing information describing one or more resources; (2) identifying, via the accessed information, at least one resource that has been detected or discovered by at least two of the discovery operations; and (3) merging attributes associated with the identified resource from each of the at least two discovery operations into a single, reconciled resource object. Illustrative “resources” include, but are not limited to, computer systems, components of computer systems, data storage systems, switches, routers, memory, software applications (e.g., accounting and database applications), operating systems and business services (e.g., order entry or change management and tracking services). | 12-31-2015 |
20150381425 | OPPORTUNISTICALLY CONNECTING PRIVATE COMPUTATIONAL RESOURCES TO EXTERNAL SERVICES - A description of computing resource requirements for execution of an application associated with a publicly available service is obtained. Access to computing resources is opportunistically obtained from a computing entity that includes a private computing device that is external to, and separate from, the publicly available service. The computing resource requirements are intelligently matched to available computing resources of the computing entity with private computing resources that are temporarily available from a private computing device source. The intelligent matching is performed using an optimization analysis. | 12-31-2015 |
20150381430 | MANAGEMENT DEVICE AND INFORMATION PROCESSING SYSTEM - A management device includes a memory, and a processor coupled to the memory, configured to acquire an actual value of past traffic volume for each of logical interfaces set on physical interfaces included in the network devices, and store the acquired actual value in a storage unit, refer to the actual value of the traffic volume and, based on the actual value of the traffic volume, predict a future value of traffic volume for each of the logical interfaces, and add up, for each of the plurality of network devices, the predicted value of traffic volume for each of the logical interfaces to compute a predicted value of traffic volume of each of the network devices, and, based on the predicted value of traffic volume of each of the network devices, select one of the network devices to which a new network is to be assigned. | 12-31-2015 |
20150381433 | MANAGEMENT SUPPORT METHOD, MANAGEMENT SUPPORT DEVICE, AND MANAGEMENT SUPPORT PROGRAM - A management support method includes causing a first reference server to run a first application that is installed in each of a plurality of managed servers, causing a second reference to run a second application that is in an exclusive relation with the first application when the second application is present in any one of the plurality of managed servers, presenting a judgement result whether the second reference server is to be operated continuously by comparing an operating state of the first application on the first reference server and an operating state of the second application on the second reference server, and selecting whether the first application or the second application is to be operated in the first reference server when the judgement result is that the second reference server is not to be operated continuously. | 12-31-2015 |
20150381438 | Network User Usage Profiling - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 12-31-2015 |
20150381439 | VIRTUAL TAPE LIBRARY (VTL) MONITORING SYSTEM - Monitoring of storage systems, including virtual tape libraries (VTLs), may be performed with automated systems. Automated monitoring may be performed through an SSH connection to a storage manager for the storage system. For example, a method may include initiating, by a monitoring server, an SSH connection to a storage manager; issuing commands, by the monitoring server, through the SSH connection to monitor a storage device coupled to the storage manager; receiving, by the monitoring server, responses to the issued commands through the SSH connection; matching, by the monitoring server, the responses to automation rules; and executing, by the monitoring server, commands based on the matched automation rules. | 12-31-2015 |
20150381441 | DATA COLLECTION APPARATUS, DATA COLLECTION SYSTEM AND METHOD FOR DATA COLLECTION IN VEHICLES - The present invention pertains to a data collection apparatus, including a data input interface which is configured to receive electronic data items from a plurality of electronic application components, a data collection processor coupled to the data input interface, a data storage coupled to the data collection processor and configured to store electronic data items received by the data collection processor as electronic report data, a trigger module coupled to the data collection processor and configured to trigger the read-out of selected electronic report data by the data collection processor from the data storage, at least one communication module coupled to the data collection processor, and a storage management unit coupled to the data collection processor and configured to select one or more of the communication modules for the data collection processor to output the read out electronic report data to a communication module of a remote station. | 12-31-2015 |
20150381443 | CONDITION MONITORING SYSTEM AND METHOD FOR CREATING OR UPDATING SERVICE INFORMATION - A condition monitoring system for a network of distributed devices. The system includes at least one portable communication device and at least one central control server. Each of the devices is provided with a monitoring unit for receiving and processing the condition data from at least one sensor and with a communication link between the monitoring unit and the central control server. The central control server is configured to store the condition data in combination the identification data. The monitoring unit is provided with a communication interface for connecting the portable communication device to the monitoring unit. The monitoring unit is configured to automatically provide updated condition data to the portable communication device upon establishment of the connection to the monitoring unit. | 12-31-2015 |
20150381447 | SERVICE COORDINATION FOR A DATA CENTER - According to an example, a service coordination apparatus may include a processor that is to determine whether each GLB node-pair in a node-pair state table is at a normal state after receiving a DNS request. If a GLB node-pair in the node-pair state table is not at the normal state, a second DNS response may be sent to a node sending the DNS request according to a DNS parsing list. If each GLB node-pair in the node-pair state table is at the normal state, a proximity list may be inquired. If a record corresponding to the DNS request is searched out from the proximity list, a first DNS response may be sent to the node sending the DNS request according to the searched out record. If not, a second DNS response may be sent to the node sending the DNS request according to the DNS parsing list. | 12-31-2015 |
20150381451 | Method and Apparatus for Estimating a Maximum Time Interval Error in a Data Transmission Network - A method for use in connection with a data transmission network includes receiving a plurality of time interval error data samples over a sampling period and comparing a duration of the sampling period to a time threshold for the sampling period. If the duration of the sampling period is less than or equal to the time threshold for the sampling period, the method includes processing the received plurality of data samples so as to calculate in real time a maximum time interval error. However, if the duration of the sampling period exceeds the time threshold for the sampling period, the method includes dividing the sampling period into a finite number of sub-intervals and processing the data samples in each sub-interval so as to produce a respective intermediate result for each sub-interval. Each of these intermediate results is stored directly after it is produced, and these stored intermediate results are processed so as to estimate the maximum time interval error. | 12-31-2015 |
20150381452 | DETECTING VIRTUAL PRIVATE NETWORK USAGE - According to some aspects described herein, a system may determine whether a network actor appears to be using an intermediary such as a VPN and/or proxy server. This may be accomplished by directing the network actor to request and/or access a network-segment identification resource which may, in some embodiments, be stored in another region of the global network. The system may include links and/or other identifiers pointing the network actor to one or more network-segment identification resources. The network actor may access the network-segment identification resources using the links or identifiers, and the system may use information about the request for the network-segment identification resource to determine whether the network actor is associated with multiple source addresses. | 12-31-2015 |
20150381453 | INTEGRATED GLOBAL RESOURCE ALLOCATION AND LOAD BALANCING - In various embodiments, methods and systems for integrated resource allocation and loading balancing are provided. A global resource allocator receives usage information of resources in a cloud computing system. The usage information is associated with a plurality of accounts and consumer operations pairs on servers of the cloud computing system. For selected account and consumer operation pairs associated with a particular resource, allocation targets are determined and communicated to the corresponding server of the selected account and consumer operation pairs. The servers use the resource based on the allocation targets. A load balancer receives the usage information the resource and the allocation targets. The allocation targets indicate a load by the selected account and consumer operation pairs on their corresponding servers. The load balancer performs a load balancing operation to locate a server with a capacity to process the allocated target of the selected account and consumer operation pairs. | 12-31-2015 |
20150381456 | Method for Estimating Traffic Rate Between Virtual Machine Pair, and Related Device - A method for estimating a traffic rate between a virtual machine pair, and a related device are provided. When a rate of traffic sent by a virtual machine vm-x1 to a virtual machine vm-y1 is estimated, reference is made to at least rates of sending traffic by N21 virtual machines deployed in N2 physical hosts and including the virtual machine vm-x1, rates of traffic sent by N1 switching devices to N4 switching devices, rates of receiving traffic of N31 virtual machines deployed in N3 physical hosts and including the virtual machine vm-y1, and rates of outgoing traffic of the N4 switching devices, thereby facilitating relatively accurate estimation of a traffic rate between a virtual machine pair. | 12-31-2015 |
20150381465 | Real Time Verification of Cloud Services with Real World Traffic - Using real world network traffic for both a primary and ancillary system. A method includes accessing intercepted network traffic directed to a primary system. The intercepted network traffic is real network traffic sent by entities sending messages directed to the primary system. One or more policy constraints are identified on network traffic to be used at an ancillary system. Based on the one or more policy constraints, a subset of the intercepted network traffic is identified. The subset of the intercepted traffic is sent to the ancillary system, where the subset of the intercepted traffic is consumed by the ancillary system. | 12-31-2015 |
20150381467 | SYSTEM AND METHOD THEREOF FOR DYNAMICALLY TESTING NETWORKED TARGET SYSTEMS THROUGH SIMULATION BY A MOBILE DEVICE - A method and system for dynamically testing a networked target system (NTS) through simulation by a mobile device. The method comprises: receiving at least one test specification designating at least a type of the test and a number of step repeater devices (SRDs) required for the test; receiving, from the mobile device, a request to establish a secure connection; establishing the secure connection with the mobile device by impersonating the NTS; capturing each step performed by a user of the mobile device on an application installed thereon, wherein the application operates in conjunction with the NTS; setting all SRDs designated in the test specification with each captured step, thereby causing the SRDs to perform the captured step; receiving, from the SRDs, information respective of performance of the NTS; and generating a performance testing report based on the received information. | 12-31-2015 |
20150381731 | IDENTIFYING A TASK EXECUTION RESOURCE OF A DISPERSED STORAGE NETWORK - A method begins by a plurality of dispersed storage network (DSN) units of a DSN determining to perform a DSN level task for a range of DSN addresses. The method continues with each of the plurality of DSN units executing a scoring function using one or more properties of the range of DSN addresses and one or more properties of each of the plurality of DSN units to produce a scoring resultant. The method continues with each of the plurality of DSN units identifying a DSN unit of the plurality of DSN units to execute the DSN level task based on the scoring resultant. The method continues with the identified DSN unit executing the DSN level task for the range of DSN addresses. | 12-31-2015 |
20160006576 | INFORMATION NOTIFICATION METHOD - When it is determined that a position of the display terminal is within a range of a prescribed distance from the house and when it is determined that the log information and the information indicating the operational state of the one electric home appliance are not consistent with each other, the server provides the display terminal with information on a possibility of a malfunction of the one electric home appliance while the position of the display terminal is still within the range of the prescribed distance from the house. | 01-07-2016 |
20160006611 | METHOD AND APPARATUS OF PERFORMING REMOTE MANAGEMENT OF A MANAGED MACHINE - Disclosed are an apparatus and method of remotely communicating with a managed machine. One example method of operation may include selecting the managed machine operating in a communication network, transmitting a connection request message to the managed machine and establishing a secure connection between the managed machine and an administrator machine. The example method may also include responsive to connecting with the managed machine, executing a host service on the managed machine, and connecting to the host service over the communication network via an application client operating on the administrator machine. | 01-07-2016 |
20160006624 | MAINTAINING IP TABLES - Data including a set of one or more resources and one or more associated IP addresses is updated based on monitored DNS responses. A request is received from a client device for a resource identified by an IP address. The IP address is matched to one of the IP addresses in the set of one or more IP addresses. A particular resource associated with the matched IP address is identified. A particular network policy that applies is identified. The identified particular network policy is applied to the received request. | 01-07-2016 |
20160006628 | DETERMINING GEO-LOCATIONS OF USERS FROM USER ACTIVITIES - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining geo-locations of users from user activities. One of the methods includes obtaining information associated with multiple client devices located at multiple geographic locations; identifying a group of client devices based on network addresses assigned to the client devices; obtaining a prediction that the client devices are in a first geographic location; and determining a probability distribution that the client devices are distributed across multiple locations including or adjacent to the first geographic location. | 01-07-2016 |
20160006629 | APPLIANCE CLEARINGHOUSE WITH ORCHESTRATED LOGIC FUSION AND DATA FABRIC - ARCHITECTURE, SYSTEM AND METHOD - A computerized method for controlling or connecting a plurality of computer appliances in a networked control system comprised of control center, computer appliance and peripherals for the purposes of establishing an automated framework and technical devices for intelligent integration of two or more applications, logic rules, data repositories and/or services together to automate, manage, synchronize or monitor knowledge or business solutions in real-time. The control center, computer appliances or peripherals can store and process structured or unstructured data; the control center is communicating with each appliance or periphery across a communication network; the control center can determine when an appliances or peripheral requires maintenance or update; the control center controls the current inventory of computer appliances and peripherals; the control center can add or reinitialize a new computer appliance or peripheral; the computer appliance can also add peripherals. A user can interact with the control center, computer appliance or a peripheral to perform monitoring, management or analysis functions. | 01-07-2016 |
20160006630 | COMPUTER SYSTEM EVALUATION METHOD, COMPUTER SYSTEM CONTROL METHOD, AND COMPUTER SYSTEM - When one of nodes performs a prescribed task, a management computer: obtains a replaceable part value group containing configuration information for components of a group that includes the node, and stores the obtained replaceable part value group in history information; receives at least one node to be evaluated; obtains a replaceable part value group containing configuration information for respective components of a group that includes said node to be evaluated, and stores the obtained replaceable part value group in history comparison target information; selects a combination of the history comparison target information and the history information having matching elements; calculates an evaluation value for the selected combination of the history comparison target information and the history information; and outputs a combination of an evaluation value and a node identifier indicating the history comparison target information and the history information having the matching elements. | 01-07-2016 |
20160006633 | MONITORING ITEM SELECTION METHOD AND DEVICE, AND STORAGE MEDIUM | 01-07-2016 |
20160006637 | FAST SNAPSHOTS - A fast snapshot is configured to store a state of a computing environment at a point in time. The fast snapshot operation is performed by avoiding reference counts of one or more data units associated with the snapshot from being updated at a creation and a deletion time. | 01-07-2016 |
20160006638 | Tracking Virtual IP Connection Changes - Systems and methods are disclosed for designating a network device as a primary device for probing a virtual IP address and designating a second network device as a standby device for probing the virtual IP address. Results of probe requests may be shared with a plurality of network devices within a mesh. | 01-07-2016 |
20160006640 | MANAGEMENT COMPUTER, ALLOCATION MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - A management computer for managing allocation of an application and an application probe in a computer system including a plurality of computers, the management computer comprising a probe management part configured to determine a computer for allocating a new application and a new application probe, the probe management part being configured to: retrieve a computer satisfying a configuration condition and a monitoring interval condition; compute a value of a monitoring spike, in a case where the new application and the new application probe are allocated to the retrieved computer, determine the retrieved computer as a candidate computer to which the application and the application probe are to be allocated, in a case where it is determined that the computed value of the monitoring spike is smaller than a predetermined threshold. | 01-07-2016 |
20160006641 | ANALYSIS AND DIAGNOSIS OF CONNECTIVITY IN A MULTI-DEVICE NETWORK - System and method for diagnosing the state of a device connected to one or more computer networks. The method can include gathering and analyzing a status and configuration of every computer network interface available on a device, gathering and analyzing the network configuration information on a device, and, if available, gathering of GPS configurations, status, and data. The method can also include testing of network connectivity for the device using a preset server as a control and the testing of network connectivity for the device to arbitrary networked resources. | 01-07-2016 |
20160006662 | Internet-Wide Scheduling of Transactions - A method and system for distributing content on a network through network-wide transactions is disclosed. The method and system monitors the network using triggered measurement of the performance of an element of the network, dynamically computing, based on the monitoring, the regions of the network with available performance capacity for the transaction to proceed at a given time, determining, based on the computing, a scheduled time for the transaction to proceed, and distributing the content according to a schedule related to the scheduled time. | 01-07-2016 |
20160006691 | Method and System for Monitoring Domain Name Registraitons - Improved approaches to domain name monitoring. The monitoring of domain names, e.g., registrations therefor, is beneficial to holders of similar domain names, trademark owners, and competitors. Such monitoring can be automatically performed. | 01-07-2016 |
20160013968 | COMMON INFORMATION MODEL (CIM) OBJECT TRANSFER VIA REQUESTOR STATISTICAL TRACKING | 01-14-2016 |
20160013969 | NETWORK OPERATING SYSTEM FOR MANAGING AND SECURING NETWORKS | 01-14-2016 |
20160013989 | SERVICE DISCOVERY AND/OR EFFORT ESTIMATION IN NETWORKED COMPUTING ENVIRONMENTS | 01-14-2016 |
20160013990 | NETWORK TRAFFIC MANAGEMENT USING HEAT MAPS WITH ACTUAL AND PLANNED /ESTIMATED METRICS | 01-14-2016 |
20160013992 | METHODS AND APPARATUS TO RETIRE HOSTS IN VIRTUAL SERVER RACK DEPLOYMENTS FOR VIRTUAL COMPUTING ENVIRONMENTS | 01-14-2016 |
20160013994 | System for Gathering Music Intelligence | 01-14-2016 |
20160013996 | METHOD AND SYSTEM FOR NETWORK MONITORING USING SIGNATURE PACKETS | 01-14-2016 |
20160013999 | LOGGING SERVER APPLIANCE FOR HOSTED SYSTEM COMMUNITIES AND OPERATION CENTER | 01-14-2016 |
20160014000 | METHOD AND DEVICE FOR ANALYZING EVENTS IN A SYSTEM | 01-14-2016 |
20160014002 | Method of, and apparatus for, monitoring traffic in a communications network | 01-14-2016 |
20160014004 | PROCESSING DATA UNITS | 01-14-2016 |
20160014009 | DYNAMIC ROUTING SYSTEM | 01-14-2016 |
20160014010 | Performance Monitoring with Reduced Transmission of Information | 01-14-2016 |
20160014039 | METHODS AND APPARATUS TO PROVISION A WORKLOAD IN A VIRTUAL SERVER RACK DEPLOYMENT | 01-14-2016 |
20160014217 | INFORMATION PROCESSING TERMINAL AND CONTROL METHOD | 01-14-2016 |
20160014842 | DATA BUNDLING AND FAST DORMANCY BASED UPON INTELLIGENT APPLICATION LEARNING | 01-14-2016 |
20160020959 | FORENSIC SOFTWARE INVESTIGATION - In accordance with aspects of the disclosure, systems and methods are provided for managing forensic investigations of client assets associated with a client based on a forensic service agreement between the client and a cloud service provider, including establishing the forensic service agreement between the client and the cloud service provider for servicing the forensic investigations of the client assets associated with the client, acquiring forensic data related to each client asset associated with the client, and generating one or more client inventory records for each client asset based on the forensic data related to each client asset, and generating one or more client evidence records for each client asset based on each client inventory record generated for each client asset. | 01-21-2016 |
20160020961 | DETERMINING SERVER UTILIZATION - Ways are disclosed for determining a utilization of a server or group of servers. In one embodiment, a method includes determining a disk utilization factor (DUF) that indicates a utilization of one or more mass-storage disks of some server; determining a processor utilization factor (PUF) that indicates a utilization of one or more processors running on the first server; and based on the DUF and PUF deriving a server-utilization factor (SUF) that indicates a level of utilization of the first server, which includes incorporating one or more of (1) power-usage data or (2) financial-cost data that are associated with each of the disks and processors. | 01-21-2016 |
20160020964 | SYSTEM AND METHOD FOR MANAGEMENT OF CLOUD-BASED SYSTEMS - System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping. | 01-21-2016 |
20160020970 | ROUTER AND INFORMATION-COLLECTION METHOD THEREOF - The present invention provides a router including a storage device, a communication module, and a controller. The storage device stores a web-page code corresponding to a graphical user interface, wherein the web-page code includes an information-gathering code. The controller enables the communication module to transmit the web-page code to the first electronic device coupled in response to a predetermined web-page request received from the first electronic device, wherein the information-gathering code is arranged to collect an environment information sector of the first electronic device and transmit the environment information sector of the first electronic device to the router. | 01-21-2016 |
20160020971 | NODE INFORMATION DETECTION APPARATUS, NODE INFORMATION DETECTION METHOD, AND PROGRAM - A node information detection apparatus ( | 01-21-2016 |
20160020972 | MONITORING DOMAIN ALLOCATION PERFORMANCE - Systems and methods for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request corresponding to two or more embedded resources. The processing device uses the processed performance metric information to determine an allocation of one or more domains to be associated with the two or more embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent requests for the two or more embedded resources using each of a variety of alternative allocations of domains associated with the two or more embedded resources. The processing device may also consider a number of factors, including domain selection criteria obtained from an original content provider. Aspects of systems and methods for generating recommendations to use a particular allocation of domains to process a subsequent request corresponding to the two or more embedded resources are also provided. | 01-21-2016 |
20160020976 | Incident-Based Adaptive Monitoring of Information in a Distributed Computing Environment - According to one embodiment of the disclosure, a system monitors a first metric associated with a host device. The system accesses, at a monitoring frequency, data associated with the first metric. The system determines, based on the data, a metric rating for the first metric. The system further determines, based on the metric rating, whether the metric rating is above a threshold. The system modifies, based at least in part on the metric rating being above the threshold, a monitoring behavior of a probe. | 01-21-2016 |
20160020981 | Automated Tool Discovery And Configuration For Network Tool Optimizers - Network tool optimizers and related methods are disclosed that provide automated discovery and configuration of network tool devices. The disclosed embodiments include tool processors having tool discovery engines and tool configuration engines that provide discovery of tool information and generation of rules for filter engines within the network tool optimizer (NTO) so that relevant network traffic received by the NTO is forwarded to network tool devices connected to the NTO. New network traffic sources connected to the NTO can also be automatically configured to forward relevant traffic to the network tool devices based upon the discovered tool information. Further, a database of tool information can be stored within the NTO and can be used by the NTO in determining relevant traffic for connected tool devices. A variety of different implementations can use the automatic tool discovery and configuration embodiments. | 01-21-2016 |
20160020982 | METHOD, DEVICE AND SYSTEM FOR ONLINE PROCESSING OF DATA - A method, a device and a system for online data processing are provided. A central OLAP server sends a data request message to one or more sub OLAP servers. The central OLAP server receives user service data from the one or more sub OLAP servers. The user service data received from each OLAP server includes service volumes of one or more roaming users and service volumes of one or more non-roaming users that meet a first condition, and the service volume information of a user includes a user identifier and a service volume of the user. The central OLAP server then sums up a total service volume for each user based on the service volume information of the user reported by the sub OLAP servers, and obtains total service volume information of each of selected users whose total service volumes meet a second condition. The total service volume information of a user includes a user identifier and a total service volume of the user. Thus the efficiency of online data processing can be improved. | 01-21-2016 |
20160020986 | METHOD AND SYSTEM FOR AGGREGATING DIAGNOSTIC ANALYZER RELATED INFORMATION - A method for communicating information related to a diagnostic analyzer includes receiving user identification information from a portable computer. A user associated with the user identification information operates the diagnostic analyzer. First diagnostic analyzer information is retrieved from at least one database that relates analyzer information to the user of the diagnostic analyzer. The first diagnostic analyzer information is related to the diagnostic analyzer. The first diagnostic analyzer information is communicated to the portable computer. Second diagnostic analyzer information from the diagnostic analyzer is retrieved. The second diagnostic analyzer information is generated by the diagnostic analyzer. The first and the second diagnostic analyzer information is communicated to the portable computer. The portable computer is configured to display the first and the second diagnostic analyzer related information. | 01-21-2016 |
20160021164 | LIVE MEDIA STREAM VALIDATION - A method includes receiving at least one manifest file, playlists and video chunks for at least one channel of a live media stream. The method includes validating, by a processing device, the live media stream to ensure that the at least one manifest file, the playlists and the video chunks are available. Validating the live media stream includes determining whether the at least one live media stream complies with at least one predetermined standard. The method includes validating the live media stream to ensure that the files are not stale and live. The method also includes validating the live media stream to ensure that the video chunks are properly sequenced, and validating the live media stream based on Hypertext transfer protocol (HTTP) headers for the video chunks to determine whether errors are received associated with the live video stream. | 01-21-2016 |
20160021193 | METHOD OF AUTOMATICALLY CLOSING AN APPLICATION ON TRANSPORT DISCONNECT - A computer readable storage medium, storing instructions, which, when executed by a processor, cause the processor to perform a shutdown method for one or more applications. The method may comprise monitoring a communication link with a vehicle computing system. The method may further comprise transmitting a termination message based upon detecting a disconnection of the communication link. The termination message includes instructions to shutdown the one or more applications utilizing the communication link. | 01-21-2016 |
20160021201 | SYSTEMS AND METHODS FOR TRACKING SHARING OF WEB CONTENT - Systems and methods are provided for tracking sharing of an electronic content. An exemplary method may include receiving a request to access content associated with a web address by a user. Based on a unique identity assigned to the user and the web address, a unique tracking web address may be generated. This tracking web address may be shared with additional users. As other users request content associated with the tracking web address, information regarding the sharing of the electronic content may be determined and stored, allowing for tracking of sharing behavior of users. | 01-21-2016 |
20160021203 | DATA PROCESSING SYSTEM PROGRAM PRODUCT AND METHOD FOR COMMUNICATING INFORMATION RELATED TO USER ACTIVITIES ON ELECTRONIC SITES - Information related to activity of a user may be provided using a method or a data processing system program product to perform the method. In one embodiment, the method includes sending a first view request to a first electronic site, receiving a first view from the first electronic site, and first information related to the first view request to a second entity that is different from the first entity. In another embodiment, a data processing system program product may perform a method of sending information related to a view request from the user for an electronic site. The information is to be sent to an entity that is different from an entity that substantially controls or owns the electronic site and different from an Internet service provider of the user, if the user is to use the Internet service provider in accessing the electronic site. | 01-21-2016 |
20160021204 | METHODS AND APPARATUS TO SHARE ONLINE MEDIA IMPRESSIONS DATA - Methods and apparatus to share online media impression data are disclosed. An example method includes receiving, at a database proprietor, a first request from a client device, the first request including an audience measurement entity cookie identifier of an audience measurement entity cookie; and determining, with a processor of the database proprietor, a cookie mapping of the audience measurement entity cookie to a database proprietor cookie that is assigned by the database proprietor and associated with the client device. | 01-21-2016 |
20160021205 | AUTOMATIC DETECTION OF VIP GUESTS ON WIRELESS NETWORKS - The present disclosure discloses a method and network device for automatic detection of VIP guests on wireless networks. The network device can receive a request for network access, by a client device used by a guest user, at a location associated with an entity. Furthermore, the network device can identify characteristics of a sponsor of the guest user, the sponsor being associated with the entity; and/or email domain for the guest user; and/or characteristics of a particular check-in station at which the guest user checked in for access at the location associated with the entity. The network device then determines a set of one or more characteristics of the network access by the client device used by the guest user, and provides the client device used by the guest user network access per the determined set of characteristics of the network access. | 01-21-2016 |
20160026552 | System, Method, and Computer Program Product for Storage Management Dashboard - An example method for providing contextual information of a computer system includes determining a current state of an attribute of one or more storage resources. The one or more storage resources is coupled to a computer system, and the current state of the storage resource attribute is monitored by a performance monitoring tool. The example method includes determining a target state of the attribute and displaying a user interface including contextual information regarding the attribute. The example method further includes rendering in the user interface a graph representative of the current state and the target state of the attribute o. In some examples, the method further includes determining a forecast for the attribute and rendering the forecast in the user interface. In some examples, the user interface may include a visual indication of whether the attribute is in violation of a policy. | 01-28-2016 |
20160028553 | Network Adaptive Content Download - Techniques for managing content downloads to a computing device. The techniques include an agent on the computing device determining for each network of a plurality of networks available to the computing device, costs of downloading content and an exemption list. The exemption list includes content downloads that are exempted from costs charged by a particular network. The agent determines possible content downloads for the computing device. The agent also assesses potential costs associated with the possible content downloads based upon the costs and exemption lists determined for the plurality of networks. Based upon the assessment, the agent selects one of the networks for downloading at least part of the possible content downloads. | 01-28-2016 |
20160028587 | NODE DISCOVERY AND CLUSTER FORMATION FOR A SECONDARY STORAGE APPLIANCE - Techniques are disclosed for identifying “free” compute nodes that have not been configured as a member of a secondary storage system. As disclosed, a node may automatically detect that it is a free node (i.e., one available to join a distributed computing cluster which provides the secondary storage system or to form a new cluster). When a node detects that it is not part of a cluster, the node may build an initial network configuration and begin advertising itself as a free node. Once the initial network state is available, the node may broadcast advertisements observed by a management tool and joined to the secondary storage system. | 01-28-2016 |
20160028594 | Generating and Utilizing Contextual Network Analytics - Previously known network management practices fail to inform network operators about client-side performance and experience issues. By contrast, various implementations disclosed herein include systems, methods and apparatuses that generate one or more shared-resource traffic quality indicator values. Each shared-resource traffic quality indicator value characterizes at least a portion of the network by assessing a number of network performance characterization values in relation to one or more capacity values of one or more shared network resources. Each network performance characterization values provides a corresponding quantitative characterization of a quality of experience associated with the use of media content data received by a respective client device. In some implementations, quality of experience is characterized by at least one of an indication of perceptual quality of media content data and an indication of continuity with which media content data is used by a respective client device at a particular subscription tier. | 01-28-2016 |
20160028596 | Network Service Discovery - Service discovery for an application lacking capabilities sufficient to facilitate Universal Plug and Play (UPnP), Zero-configuration networking (Zeroconf), Simple Service Discovery Protocol (SSDP) or other service discovery protocols relying upon multicast User Datagram Protocol (UDP) is contemplated. The service discovery may be facilitated with a discovery proxy configured to identify available services and a discovery service having capabilities sufficient to apprise the application of the services identified with the discovery proxy. | 01-28-2016 |
20160028598 | DISTRIBUTED PLATFORM TEST NETWORK - A test network is provided to test updates to configurations and resources of a distributed platform and to warm servers prior to their deployment in the distributed platform. The test network tests and warms using real-time production traffic of the distributed platform in a manner that does not impact users or performance of the distributed platform. At least one distributed platform caching server passes content requests that it receives to the test network using a connectionless protocol. The test network includes a test server that is loaded with any of a configuration or resource under test or whose cache is to be loaded prior to the server's deployment into the distributed platform. The test network also includes a replay server that receives the requests from the caching server, distributes the requests to the test server, and monitors the test server responses. | 01-28-2016 |
20160028600 | Integrated Adaptive Anycast For Content Distribution - A system includes first and second cache servers a domain name server, and a route controller. The cache servers are each configured to respond to an anycast address. Additionally, the first cache server is configured to respond to a first unicast address, and the second cache server is configured to respond to a second unicast address. The router controller configured to determine wither the status of the first cache server is non-overloaded, overloaded, or offline. The route controller is further configured to instruct the domain name server to provide the second unicast address when the status is overloaded or offline, and modify routing of the anycast address to direct a content request sent to the anycast address to the second cache server when the status is offline. The domain name server is configured to receive a request from a requestor for a cache server address. Additionally, the domain name server is configured to provide an anycast address to the requestor when the status of the first cache server is non-overloaded, and provide the second unicast address to the requestor when the status of the first cache server is offline or overloaded. | 01-28-2016 |
20160028601 | INTERNET CONNECTIVITY PROBE - Described herein are reception of first processor-executable program code and a configuration file specifying a target internet protocol address, an asset-identifying information type, and a security protocol, and execution of the received first processor-executable program code to identify a first one or more network communication interfaces of the first computing system, generate a message including information conforming to the asset-identifying information type, the information identifying a first asset, secure the message based on the security protocol, and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces. | 01-28-2016 |
20160028606 | Scalable Extendable Probe for Monitoring Host Devices - According to one embodiment, a system includes a probe controller associated with a host device and configured to abstract a plurality of device-specific monitoring operations associated with a plurality of heterogeneous host devices to a normalized set of monitoring operations. The probe controller facilitates monitoring of the host device using the normalized set of monitoring operations. The system also includes a first specialized probe module associated with the host device and configured to provide device-specific information in response to the normalized set of monitoring operations. The first specialized probe module accesses, in response to receiving a notification from the probe controller to determine a metric associated with the host device, the metric associated with the host device. The first specialized probe module communicates the metric to the probe controller. | 01-28-2016 |
20160028607 | IDENTIFYING SERVICES PROVIDED OVER SECURED CONNECTIONS USING DNS CACHING - A method for communication includes intercepting Domain Name System (DNS) messages that are sent in a communication network in preparation for setting up respective communication sessions that provide respective services associated with respective service types. DNS information that is indicative of the respective service types is extracted from the intercepted DNS messages, and the extracted DNS information is cached. A service type associated with a given communication session is identified using the cached DNS information, and a traffic policy is applied to the given communication session depending on the identified service type. | 01-28-2016 |
20160028641 | ADVANCED NOTIFICATION OF WORKLOAD - Providing advanced notification of workload. A reference to a second website provided to a first website for posting by the first website can be identified. Information associated with the first website can be analyzed to determine whether the reference to the second website will cause an increase in workload to the second website. Responsive to determining the reference to the second website will cause the increase in workload to the second website, an alert can be communicated to the second website or an entity that manages the second website, the alert indicating that the increase in workload to the second website will occur. | 01-28-2016 |
20160028645 | DIAGNOSIS OF NETWORK ANOMALIES USING CUSTOMER PROBES - Methods, apparatuses and systems for diagnosing network anomalies and allocating repair resources in a computer network receive network anomaly reports (NARs) from a group of customers. Each NAR specifies a network anomaly observed by a customer at a network endpoint. Each NAR is entered into a database and associated in the database with attributes including at least one customer attribute associated with the sender of that NAR or network attribute associated with the network anomaly specified in that NAR. A time period is detected during which the difference between an aggregate number of NARs received within that time period and a baseline number of NARs received during prior time periods of substantially identical duration exceeds a threshold. The attributes associated with the NARs received during the time period are analyzed to identify a network anomaly specified in those NARs. Repair resources are further preferentially allocated to the identified network anomaly. | 01-28-2016 |
20160028684 | Selecting between Domain Name System Servers of a Plurality of Networks - Managing domain name system services for a plurality of networks is disclosed. A computer identifies information for the plurality of networks to which a client device is connected. The computer receives a request to identify a domain name. In response to the request, the computer selects a particular set of domain name system servers of a particular network in the plurality of networks based on the information for the plurality of networks and a set of rules for selecting the particular set of domain name system servers when identifying the domain name for the Internet protocol address. The computer then sends the request to identify the domain name for the Internet protocol address to a domain name system server in the particular set of domain name system servers. | 01-28-2016 |
20160028797 | INTERNET PROTOCOL VERSION 6 CONTENT ROUTING - A content delivery system includes a cache server, a domain name server, and a redirector. The domain name server is configured to receive a request for a cache server address, and provide an IPv6 anycast address. The redirector is configured to receive a content request addressed to the IPv6 anycast address from a client system, receive load information from the cache server, and determine if the cache server is available. The redirector is further configured to forward the content request to the cache server when the cache server is available. The cache server is configured to receive the content request forwarded from the redirectors, send a response to the content request to a client system, the response including an IPv6 unicast address of the cache server as a source address, an IPv6 unicast address of the client system as a destination address, and the IPv6 anycast address as a home address, and provide the content to the requestor. | 01-28-2016 |
20160028802 | PEER-TO-PEER GROUP RE-FORMATION - Disclosed are peer-to-peer group re-formation techniques. The techniques enable automatic reformation of a peer-to-peer group when the Group Owner (“GO”) device is lost. To do so, the techniques enable selection of a one of the peer devices in the peer-to-peer group as a next GO device responsive to detecting the loss of the original GO device. Then, the peer device selected as the next GO device automatically activates as the GO device, while the other peer devices scan for and connect to the next GO device. | 01-28-2016 |
20160028834 | TRAFFIC ENGINEERING OF CLOUD SERVICES - Traffic engineering of cloud services include receiving, by an enterprise network agent of an enterprise network, a policy from an operator of the enterprise network and transmitting, by a processor, the policy to a cloud service provider. Aspects also include monitoring an incoming traffic to the enterprise network from the cloud service provider and collecting data regarding the incoming traffic and transmitting collected data regarding the incoming traffic to the cloud service provider. | 01-28-2016 |
20160028838 | DRYER WITH COMMUNICATION INTERFACE - A forced air hand dryer includes a communication device that communicatively couples to a computing entity in provide data regarding the use of the hand dryer, and/or to set an operating configuration of the hand dryer. | 01-28-2016 |
20160028839 | METHODS AND APPARATUS TO MONITOR ONLINE ACTIVITY - Methods and apparatus are disclosed to monitory online activity. An example method includes collecting first uniform resource locators from a first client device having a meter. The example method also includes collecting second uniform resource locators from a second client device not having a meter. The example method also includes determining that ones of the second uniform resource locators from the second client device correspond to online activity of a user associated with the first client device based on ones of the first uniform resource locators matching at least portions of the ones of the second uniform resource locators. Additionally, the example method includes associating the second client device with the user of the first client device. | 01-28-2016 |
20160034326 | MONITORING A BUSINESS TRANSACTION UTILIZING PHP ENGINES - An agent executing on a server identifies a function provided from a PHP library and executed by a PHP server and monitors the function. The present system places an interceptor on a first function in order to the identity of a second function. The second function may be identified from the first function return value from the route object, argument, PHP program state, or some other part of the execution environment at the time the first function is intercepted. From the data analyzed at the time the first function is intercepted, the present system identifies the second function which is also modified with an interceptor. The second function is monitored via the interceptor to determine performance and is associated with a business transaction. | 02-04-2016 |
20160036621 | MANAGEMENT SYSTEM AND MANAGEMENT METHOD - A management system is applicable to an electronic apparatus. The management system includes at least one first transceiving module, a comparing module and a processing module. The first transceiving module is configured for receiving first input data inputted from a corresponding first input/output interface, and for outputting second input data according to the first input data. The comparing module is configured for receiving the second input data, for comparing the second input data with a plurality of first mapping data in a database, for converting the second input data to third input data according to a first comparison result, and for outputting the third input data. The processing module is configured for receiving the third input data, and for converting the third input data to fourth input data such that the electronic apparatus performs corresponding operations according to the fourth input data. A management method is disclosed herein as well. | 02-04-2016 |
20160036640 | INTERNET PROTOCOL NETWORK MAPPER - A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets. | 02-04-2016 |
20160036656 | MONITORING DEVICE USAGE - Estimating a level of concurrency is provided. An estimated level of concurrency of a device is determined. A first average response time, wherein the first average response time is an average of response times of a first set of operations of the device is determined. A second average response time is determined, wherein the second average response time is an average of response times of a second set of operations of the device, wherein each of the second set of operations is initiated under conditions of minimal interference of the device. A threshold based on the estimated level of concurrency is determined. The estimated level of concurrency is updated based, at least in part, on a ratio of the second average response time to the first average response time. | 02-04-2016 |
20160036663 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR GENERATING A MODEL OF NETWORK APPLICATION HEALTH - Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that corresponds to activities of multiple applications that are operable to execute on at least one networked device, and combining the received activity data to remove redundant portions thereof and/or to reconcile inconsistencies therein. Based on the received activity data, ones of the multiple applications are identified, and relationships between the identified applications are determined. A model is generated including the identified applications and the relationships therebetween, and a representation of the model is displayed. Related computer program products are also provided. | 02-04-2016 |
20160036664 | CONTINUED DEEP PACKET INSPECTION CLASSIFICATION AFTER ROAMING - A non-transitory computer readable medium when executed by one or more devices, causes performance of operations including forwarding, by a network device, a set of messages corresponding to a particular connection to a server, the set of messages being forwarded between a client device and a server via the network device, receiving, by the network device, a copy of a second set of messages corresponding to the particular connection that are transmitted between the client device and the server via without being transmitted through the network device, and analyzing, by the network device, both sets of messages to obtain a classification associated with the particular connection to the server. | 02-04-2016 |
20160036666 | INFORMATION SHARING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION TERMINAL - An information sharing system includes a first information terminal, an information processing apparatus capable of displaying an image providable from the first information terminal, and a second information terminal. The information processing apparatus includes a shutdown detector to detect a shutdown of data communication between the information processing apparatus and the first information terminal, and a reporting unit to report the shutdown of the data communication between the information processing apparatus and the first information terminal to the second information terminal when the shutdown detector detects the shutdown of the data communication. The first information terminal includes a shutdown detector to detect a shutdown of the data communication between the first information terminal and the information processing apparatus, and a reporting unit to report the shutdown of the data communication between the first information terminal and the information processing apparatus to the second information terminal. | 02-04-2016 |
20160036667 | CUSTOMIZED DEPLOYMENT IN INFORMATION MANAGEMENT SYSTEMS - According to certain aspects, an information management system may be configured to: receive system information relating to one or more data storage requirements associated with a first user; access an electronic database containing deployment configuration rules usable in determining information management cell configurations; generate a recommended deployment configuration for an information management cell associated with the first user based at least in part on the system information and the deployment configuration rules; receive computing infrastructure information relating to computer hardware components within the information management cell that are available for use in implementing the recommended deployment configuration; and generate an installation script for the information management cell based at least in part on the recommended deployment configuration and the computing infrastructure information. | 02-04-2016 |
20160036668 | ADAPTIVE CENTRALIZED COLLECTION OF PERFORMANCE MANAGEMENT DATA USING A METAMODEL - A method is provided for obtaining performance measurements via metamodels streamed from multiple types and models of network devices connected to a network. The method comprises installing a generic collection agent on a server connected to the network, retrieving the metamodels from the network devices by the collection agent, storing the metamodels in a collection of metamodels on the server to be accessed by the collection agent and the network devices, analyzing the metamodels to provide the network devices with addressing information, streaming the performance measurements from the network devices to the collection agent using the addressing information, and analyzing and storing the performance measurements for later use. | 02-04-2016 |
20160036669 | SELECTION OF MESSAGE PASSING COLLECTIVES IN PRESENCE OF SYSTEM NOISE - Consideration of system jitter in selecting a “message passing collectives algorithm” used in a message passing interface. A set of multiple message passing collectives algorithms are ranked against each other with at least some consideration of relative jitter-related performance as between the algorithms. The consideration of jitter includes consideration of “system jitter” (OS jitter and/or network jitter). In some embodiments, multiple rankings are performed for different levels of system jitter. | 02-04-2016 |
20160036670 | DETECTION OF OUTAGE IN CLOUD BASED SERVICE USING SYNTHETIC MEASUREMENTS AND ANONYMIZED USAGE DATA - Outage detection in a cloud based service is provided using synthetic measurements and anonymized usage data of the cloud based service. Synthetic measurements and usage data are processed through a shared aggregator to generate aggregated data. The synthetic measurements and the usage data are analyzed through a decision tree to correlate an outage based on the synthetic measurements and the usage data. A confidence value is assigned to the outage. An alert is generated that includes information associated with the outage and the confidence value. | 02-04-2016 |
20160036671 | FAILURE ANALYSIS IN CLOUD BASED SERVICE USING SYNTHETIC MEASUREMENTS - A failure analysis of a cloud based service is provided using synthetic measurements of the cloud based service. The synthetic measurements associated with a customer experience is executed on the cloud based service to determine a health of the cloud based service. The synthetic measurements simulate the customer experience which includes a use scenario of a customer of the cloud based service. Failures associated with the health of the cloud based service are aggregated, where the failures are detected from the synthetic measurements. A distribution is generated from the failures. The distribution is presented to a stakeholder. | 02-04-2016 |
20160036675 | IDENTIFYING A BOTTLENECK IN A DATA TRANSFER - A system, methods and apparatus are provided for determining the locus of a bottleneck in a data transfer between a data receiver (e.g., a client device) and a data sender (e.g., a computer server). The locus may be one of a receiver realm encompassing the data receiver (especially a receiver application that consumes the data), a sender realm encompassing the data sender (especially a sender application that produces the data), and a communication link realm that encompasses the communication link(s) over which the data are conveyed (and possibly network-layer protocols and lower that use the communication link(s)). A monitor entity may employ a state-machine model to represent and track progress of a given data transfer between states, using information collected from the data receiver and data sender to identify state transitions. Given a time at which a transfer was delayed or halted, the monitor outputs the locus of the problem. | 02-04-2016 |
20160036677 | MONITORING DEVICE USAGE - Monitoring a level of utilization is provided. An initial numerical range based, at least in part, on a count of service channels of a device is determined. A candidate numerical range, defined by an upper value and a lower value, based, at least in part, on the initial numerical range, is determined. A level of utilization of a first measurement interval of the device is estimated by: repeatedly updating the lower value and the upper value based, at least in part, on the level of utilization, until the lower value and the upper value differ less than a pre-determined threshold; and determining an estimated level of utilization based, at least in part, on the lower value and the upper value. The estimated level of utilization is reported. | 02-04-2016 |
20160036678 | NETWORK RESOURCE MONITORING - According to an example of the present disclosure, a service template providing a service may be found according to type of the service. A resource zone matching the service template may be found from a resource pool. A network resource matching a service unit in the service template may be found from the resource zone. A network parameter configured for the service unit may be sent to the network resource. Usage state information of the network resource may be updated. | 02-04-2016 |
20160036679 | Predicting the Future State of a Mobile Device User - In one embodiment, a method includes receiving first data indicating a current usage of a mobile device by a user. The method includes accessing second data associated with past user states of the user, where each user state corresponds to a temporal, spatial, or modal accessibility of the user. A future user state of the user is determined based on a weighted set of predictor functions, each predictor function comprising a machine-learned algorithm for a particular user state. The probability of each user state is based on past user states of the second data, wherein each past user state is weighted by a decay factor based on the corresponding time. One of the user states is selected as the future user state, and the operation of the mobile device is adapted at a future time to account for that future user state. | 02-04-2016 |
20160036680 | PACKET MONITORING METHOD, PACKET MONITORING APPARATUS, AND STORAGE MEDIUM - A packet monitoring method includes storing acquisition time indicating time when a packet including the transmission source information and the destination information is obtained lastly, and a first counter value into a first memory, in association with a combination of transmission source information and destination information of a plurality of packets; receiving a first packet; extracting acquisition time associated with a combination of transmission source information and destination information included in the first packet from the first memory; determining whether a time period from the extracted acquisition time to acquisition time of the first packet is shorter than a predetermined time; and increasing the first counter value stored in the first memory and associated with the combination of transmission source information and destination information included in the first packet by a predetermined value when it is determined that the time period is shorter than the predetermined time. | 02-04-2016 |
20160036681 | SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network. | 02-04-2016 |
20160036682 | DIAGNOSTIC HEARTBEAT THROTTLING - A method, system, and computer program product for a diagnostic heartbeat throttling are provided in the illustrative embodiments. A component, executing using a processor and a memory in a data processing system, sends diagnostic heartbeat packets over a communication link at a first rate, wherein a diagnostic heartbeat packet is a packet comprises a header, a set of heartbeat parameters, and a set of diagnostic attributes. The component detects a change in data traffic over the communication link. The component changes a rate of sending diagnostic heartbeat packets from the first rate to a second rate responsive to the change in the data traffic over the communication link. | 02-04-2016 |
20160036762 | DYNAMIC DNS-BASED SERVICE DISCOVERY - Techniques are provided for performing dynamic DNS-SD. In an embodiment, an apparatus includes one or more databases, one or more transceivers to receive a first Domain Name System (DNS) query from a first computing device, the first DNS query defining a first service discovery name space, and one or more processors in communication with each of the one or more databases and the one or more transceivers. The one or more processors generate and append a first metadata associated with the first computing device to the first DNS query. The one or more transceivers transmit the first DNS query and the first metadata to a Domain Name System (DNS) server computer, receive, from the DNS server computer, a first response responsive to the first DNS query, and relay, to the first computing device, the first response. | 02-04-2016 |
20160036880 | METHODS AND APPARATUS TO DETERMINE AN END TIME OF STREAMING MEDIA - Methods, apparatus, systems and articles of manufacture to determine an end time of streaming media are disclosed. An example method includes analyzing bandwidth usage data corresponding to bandwidth usage associated with streaming media, and determining an end time of the media based on the bandwidth usage data. | 02-04-2016 |
20160036924 | Providing Higher Workload Resiliency in Clustered Systems Based on Health Heuristics - Embodiments provide workload processing for clustered systems. In an illustrative, non-limiting embodiment, a computer-implemented method may include identifying a server as an active node of a cluster; assigning a workload to the server in response to the identification; determining, after the assignment, that the server is no longer an active node of the cluster; calculating, in response to the determination, a probability that the server is capable of continuing to execute the workload; and deciding, based upon the probability, whether to allow the workload to remain assigned to the server. | 02-04-2016 |
20160036925 | PEER NEGOTIATION OF AREA SERVICE PREFERENCES - Methods and systems may provide for joining an overlay network of a plurality of peer devices and identifying a local preference for an area service available to the plurality of peer devices. Additionally, the local preference may be used to negotiate a common preference for the area service with the plurality of peer devices. In one example, the common preference is a best fit value for the plurality of peer devices on the overlay network. | 02-04-2016 |
20160036929 | LONG TERM TARGETING OF CONTENT ITEMS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for long term targeting. In one aspect, a method includes identifying a user including assigning the user a unique identifier and recognizing the user each time the user interacts with a content management system; logging user actions and preferences as a user interacts with one or more web based resources over time, over different devices and with different browsers including storing preferences of the user; receiving from the user a request for content, the request received at the content management system; and targeting content to the user based on the stored preferences. | 02-04-2016 |
20160036930 | WEB ANALYTICS TAGS - Systems and methods that facilitate capturing web analytics data are disclosed. One example method can include the acts of receiving a web page request from a client computer and providing the requested web page to the client computer. The requested web page can include one or more analytics tags. The method can also include capturing at least one of client side information, performance of, or one or more user interactions with the web page and providing the captured information to a web server associated with the web page. These interactions can include user actions that do not include a call to a web server, such as actions that occur during an AJAX flow. | 02-04-2016 |
20160036931 | Real-Time Calculated And Predictive Events - Embodiments of the present invention provide systems, methods, and computer storage media directed to an analytics tool for detecting real-time user or “visitor” events based on real-time data. More specifically, events are detected based on actions not taken by a user. In this regard, events can be defined and, thereafter, detected based on inactions of a user. In some cases, events are inferred or predicted based on a calculated likelihood of a user not performing an action. Upon determining an event based on an action not being performed by a user, an interested party may be notified thereof such that the interested party can influence, in real-time, visitor conversion. | 02-04-2016 |
20160036932 | METHOD AND SYSTEM FOR DETERMINING USER LOCATION - There is disclosed a method of determining a user location based on web service session information. The method is executable at a server. The method comprises (i) based on the indication of the user interaction within the first modifiable component of the first web service, determining a first location-indicating parameter, the first location-indicating parameter being suggestive of a first user location of interest; (ii) based on the indication of the user interaction within the second modifiable component of the second web service, determining a second location-indicating parameter, the second location-indicating parameter being suggestive of the first location of interest; (iii) determining a user current location, at least in part based on the first location-indicating parameter determined and the second location-indicating parameter; and (iv) providing the user with the future web service session, the future web service session having a modifiable component having been modified by the server based on the user current location. | 02-04-2016 |
20160041851 | EXECUTING A COMMAND ON AN OPTIMAL SMART DEVICE - Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device. | 02-11-2016 |
20160043910 | System and Method for Obtaining Deterministic Performance in Virtual Desktop System - A virtual desktop system includes a user system, a system manager, and a virtualization host including a processor and a performance module. The performance module is operable to receive a first data packet, determine that the first data packet is associated with the user system, and add a label to the first data packet, the label being operable to provide performance information for the virtual desktop system. The user system is operable to receive the first data packet and extract the performance information from the label. The system manager is operable to receive the performance information from the user system. | 02-11-2016 |
20160043911 | SERVICE LEVEL AGREEMENT BASED STORAGE ACCESS - A method and a system implementing a service level agreement based storage access system. A service level agreement based storage access system presents a single interface for data storage consumers and translates generic data operation requests to data operation request specific to a storage server. The SLA based storage access system also monitors storage server performance and may throttle processes to ensure service level agreements are not violated. | 02-11-2016 |
20160043914 | REMOTELY MONITORING NETWORK DIAGNOSTICS - Devices, methods, and systems for remotely monitoring network diagnostics are described herein. One method includes monitoring a control system network of a site for a plurality of diagnostic messages, wherein the diagnostic messages include a set of parameters, collecting diagnostic data associated with the diagnostic messages, correcting a parameter within the set of parameters to conform to a parameter threshold limit, and alerting a user upon the collected diagnostic data having an abnormal parameter within the set of parameters. | 02-11-2016 |
20160043915 | Detecting Trends in Electronic Communications for Steganography Analysis - Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file. | 02-11-2016 |
20160043916 | MONITORING STREAMING MEDIA CONTENT - Methods, apparatus and articles of manufacture to monitor streaming media are disclosed. Example media monitoring methods disclosed herein include extracting metering data having a first format from media. In some disclosed examples, the media is to be provided to a media device via a transport stream, and the extracted metering data identifies at least one of the media or a source of the media. Disclosed example methods also include transcoding the extracted metering data to form transcoded metering data having a second format different from the first format. Disclosed example methods further include, prior to transmitting the transport stream to provide the media to the media device, transmitting the transcoded metering data to the media device for receipt by a meter executed by the media device. | 02-11-2016 |
20160043918 | Self-Organizing Multiple Appliance Network Connectivity Apparatus For Controlling Plurality Of Appliances - An appliance network connectivity apparatus includes a voltage sensor that generates a signal at an output that is proportional to a voltage provided to the appliance. A current sensor generates a signal at an output that is proportional to a current flowing through the appliance. A processor determines the electrical characteristics of power consumed by the appliance and executes web server software for communicating data through a network. A relay controls power from the power source to the appliance. A memory stores the electrical characteristics. A network interface provides the electrical characteristics to the network. | 02-11-2016 |
20160043920 | CONNECTION MONITORING DEVICE AND CONNECTION MONITORING METHOD - A connection monitoring device includes: first and second connection systems in which monitored devices are connected in cascade in forward and backward directions, respectively; a storage unit to store configuration information on connection configuration of the monitored devices and connection permitting information including information on a path permitted between the connection monitoring device and the monitored devices within paths undefined in the configuration information; and a control unit to change from a first monitoring state in which the connection configuration of the monitored devices is monitored in accordance with the configuration information to a second monitoring state in which the connection configuration of the monitored devices is monitored in accordance with the configuration information and the connection permitting information in a case where a configuration modification, accompanied with cutting of any one of connections of the first and second connection systems, of the monitored devices is performed. | 02-11-2016 |
20160043923 | INTERNET INFRASTRUCTURE MEASUREMENT METHOD AND SYSTEM ADAPTED TO SESSION VOLUME - The technology disclosed relates to refined survey of Internet infrastructures. A pattern of measurements is disclosed that can improve data collection by increasing the number of measurements per survey session according to a function described in areas that have few measurements, and decreasing the average number of measurements per session in heavily measured areas. These are new problems that arise from implementation of technology developed by these inventors and their colleagues. | 02-11-2016 |
20160043924 | SYSTEM AND METHOD FOR MONITORING USER ACTIVITY ON A PLURALITY OF NETWORKED COMPUTING DEVICES - Among other things, we describe monitoring and interactively supervising user activity on a plurality of networked computing devices. Some embodiments relate to methods and systems configured for remote automatic selection and monitoring of a most actively used computer device from among a plurality of computer devices accessible to and logged into by a specific user. Such methods and systems may also involve the display of the user's screen on a dedicated monitoring display device. Where multiple users are monitored, the displays of the user devices that are most actively used may be reproduced on the monitoring device display in dedicated view ports for the users being monitored. Embodiments may involve the use of software agents installed and executing on each user device that is turned on. Such software agents assist in allowing the monitoring device to determine which of the user devices is most actively used by a particular user. | 02-11-2016 |
20160043926 | METHOD AND APPARATUS FOR DISTRIBUTED CONTROL OF AN INTERFACING-DEVICE NETWORK - A local controller maintains a local database which stores information associated with a set of interfacing devices of a local-area network. The local database can include a database mirror for a remote database, of a remote controller, that stores information for a set of provisioned interfacing devices. When a remote controller hosting the remote database is offline, the local controller can maintain primary control of interfacing devices within the local area network. However, when the local controller determines that the remote controller has come online, the local controller can rescind primary control of interfacing devices within the local area network to the remote controller. | 02-11-2016 |
20160043962 | GROUPING OF NETWORK DEVICES - The present disclosure relates to granting of network access to a new network device. Specifically, various techniques and systems are provided for connecting a new network device to a network and limiting access of the network device while authenticating the new network device. More specifically, exemplary embodiments of the present invention include methods and systems for receiving information associated with one or more capabilities of the network devices on the network, analyzing the information associated with the one or more capabilities of the network devices on the network, wherein analyzing includes determining one or more capabilities common to the network devices, and generating a grouping of network devices, wherein the grouping includes network devices that share a common capability. | 02-11-2016 |
20160044124 | NETWORK TRAFFIC MONITORING SYSTEM AND METHOD TO REDIRECT NETWORK TRAFFIC THROUGH A NETWORK INTERMEDIARY - A network traffic monitoring system for redirecting network traffic between a client device and a cloud service includes a monitor proxy server configured as a network intermediary between the client device and the cloud service; and a published identity provider. The published identity provider is configured to receive a login request from a client device and to authenticate the client device at a federated identity provider. The published identity provider is configured to receive from the federated identity provider a redirect response including an identity assertion and a redirect web address to the cloud service. The published identity provider is configured to rewrite the redirect web address to the web address of the monitor proxy server. As a result, network traffic between the cloud service and the client device is routed through the monitor proxy server after user authentication using the published identity provider. | 02-11-2016 |
20160050101 | Real-Time Network Monitoring and Alerting - In one embodiment, a real-time data analysis system | 02-18-2016 |
20160050129 | PERFORMANCE ASSESSMENT BASED ON ANALYSIS OF RESOURCES - Systems, methods, and computer-readable storage media that may be used to evaluate performance of resources and/or content campaign impressions are provided. One method includes, for each of a first set of resources: (1) filtering path data to extract a first set of path data items including an interaction with the resource and a second set of path data items including paths excluding an interaction with the resource; (2) calculating first and second conversion metrics based on an amount of the first and second sets of path data items, respectively, resulting in a conversion action; and (3) calculating an incremental conversion metric for the resource based on the first conversion metric and the second conversion metric. The method further includes generating resource comparison data comparing one or more of the first set of resources based on the incremental conversion metrics. | 02-18-2016 |
20160050130 | DEVICE SWITCHING FOR A STREAMING SERVICE - A method includes receiving registration information for a plurality of user devices associated with a streaming service. The method includes storing information about switching statistics for switching between the plurality of user devices that receive the streaming service. The method includes determining an expected switching scenario when switching between the plurality of user devices is probable to occur. The method also includes monitoring a current user device among the plurality of user devices that currently receives the streaming service to detect the expected switching scenario. The method further includes initiating preparation for handover of streaming service, and performing handover of the streaming service from the current user device to at least one resuming user device among the plurality of user devices. | 02-18-2016 |
20160050135 | REAL-TIME MEASUREMENT OF USER INTERFACE PERFORMANCE IN A REMOTE DESKTOP ENVIRONMENT - A computer-implemented method or real-time measurement of a user interface performance in a remote desktop environment is provided. The computer-implemented method may include host computer receiving a command data package and a client request time from client computer, where the client request time is a timestamp of a time at which the command data package was sent from client computer to host computer. The computer-implemented method may further include host computer recording the client request time and a request arrival time, where the request arrival time is a timestamp of a time at which the command data package was received by host computer. The computer-implemented method may further include host computer calculating a first traverse time, where the first traverse time is a time difference between the client request time and the request arrival time to determine a real-time measurement of a user interface performance in the remote desktop environment. | 02-18-2016 |
20160050136 | DYNAMIC BASLINE DETERMINATION FOR DISTRIBUTED TRANSACTION - The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the portion of the application associated with the anomaly. By automatically capturing data for just the portion associated with the anomaly, the present technology reduces the resource and time requirements associated with other code-based solutions for monitoring transactions. A method for performing a diagnostic session for a request may begin with initiating collection of diagnostic data associated with a request. An application thread on each of two or more servers may be sampled. The application threads may be associated with the same business transaction and the business transaction may be associated with the request. The diagnostic data may be stored. | 02-18-2016 |
20160050158 | Workflow-Based Resource Management - Concepts and technologies are disclosed herein for workflow-based resource management. A process can execute a resource management application. The process can obtain load data that describes a resource load associated with resources. The processor can analyze the load data to detect a change in resource load associated with one of the resources and identify workflows that includes the resource. The workflows can include a description of how the resources are utilized during execution of a process by the resources. The processor can identify a relevant workflow that is associated with the process and issue commands to resources associated with the relevant workflow to proactively adjust capacity of the resources associated with the relevant workflow. | 02-18-2016 |
20160056993 | Tenant-Specific Log for Events Related to a Cloud-Based Service - A method, system, and/or computer program product establishes and utilizes a tenant-specific log for events related to a cloud-based service. A metamodel is created for a cloud-based service running on a cloud. The cloud-based service is provided to a specific tenant of the cloud, and the metamodel describes types of resources, on the cloud, that are providing the cloud-based service for the specific tenant. The metamodel is appended to the cloud-based service. In response to the cloud-based service being executed for the specific tenant of the cloud, the metamodel is used to identify a set of resources that are actually providing the cloud-based service for the specific tenant. A tenant-specific log for events related to the cloud-based service is established, where the tenant-specific log tracks events that occur on each actual resource on the cloud that provides the cloud-based service to the specific tenant. The tenant-specific log is then retrieved. | 02-25-2016 |
20160057012 | METHOD AND APPARATUS FOR VERIFYING AND MANAGING A CLIENT SYSTEM NETWORK AND NETWORK DEVICES - An approach is provided for managing and verifying configuration of a client network and the network devices by assessing or sharing network/device information. The approach includes querying a client system to determine one or more information items associated with a network and one or more network devices in the client system. The approach further includes generating a verified profile for the network and the one or more network devices. The approach also includes analyzing a modification in an active profile associated with the network and the one or more network devices. Further, the approach includes initiating an update to the verified profile or to the active profile based on a validation of the modification. | 02-25-2016 |
20160057021 | INTELLIGENT INFRASTRUCTURE MANAGEMENT USER DEVICE - An infrastructure management device comprises a processor configured to obtain port status and networking device status for each of one or more physicals networking devices in a system. The device also comprises a display unit coupled to the processor and configured to display one or more virtual networking devices, and a user input element configured to provide user input to the processor. The port status indicates that a cable is inserted into the first port and the processor obtains cable data identifying one or more characteristics of the cable inserted into the first port. The processor is configured to compare the one or more characteristics of the cable inserted into the first port with one or more characteristics defined in the work order. The processor is configured to provide a notification to a user indicating whether the one or more characteristics of the inserted cable comply with the work order. | 02-25-2016 |
20160057025 | Policy Declarations for Cloud Management System - Some embodiments provide a method for a system that monitors a network to prevent violations of declared policies. The method stores network state data received from a plurality of data sources as a set of tables. The method receives a declaration of a policy that specifies a set of conditions for a particular set of network state entities received from at least two of the data sources. The set of conditions is specified as an existence of a set of data tuples involving the set of network state entities in the stored set of tables. The method monitors the network state data according to the declared policy. | 02-25-2016 |
20160057026 | Policy Management System with Proactive and Reactive Monitoring and Enforcement - Some embodiments provide a method for a system that monitors a network to prevent violations of network policies. The method stores network state data that describes the network. The method identifies that a first set of stored network state data violates a particular policy declared for the network. The method issues a command to a first cloud management application to modify the network state data such that the modified network state data does not violate the particular policy. The method determines whether a requested action that modifies a second set of network state data, received from a second cloud management application, violates any policies. The method responds to the second cloud management application to permit the requested change when the modified second set of network state data does not violate any policies and deny the requested change when the modified second set of network state data violates the particular policy. | 02-25-2016 |
20160057027 | Policy Management System for Heterogeneous Cloud Services - Some embodiments provide a method for a system that enforces policy for a network. The method receives (i) a first set of network state data from a first cloud management application that manages a first aspect of the network and stores its network state data in a first format and (ii) a second set of network state data from a second cloud management application that manages a second aspect of the network and stores its network state data in a second format. The method stores the first and second sets of network state data in a single, unified data format. The method monitors the stored sets of network state data to determine whether the network state violates one or more network policies that constrain the network state received from the first and second cloud management applications. | 02-25-2016 |
20160057029 | INFORMATION PROVIDING METHOD - An information providing method is an information providing method for consumer electronics devices, a display device, and a server, all of which are connected via a public network, the information providing method including: (a) receiving, by the server from the consumer electronics devices, information pieces on the consumer electronics devices; (b) filtering, by the server, the information pieces on the consumer electronics devices received in step (a), to obtain one or more filtered information pieces, and performing, by the server, processing for generating display information for display, by the display device, in a specific display format; and (c) transmitting, by the server, the display information generated in step (b) to the display device. | 02-25-2016 |
20160057031 | SYSTEMS AND METHODS FOR HIGH VOLUME LOGGING AND SYNCHRONIZATION FOR LARGE SCALE NETWORK ADDRESS TRANSLATION - The present invention is related to a method for high volume logging for large scale network address translation. A first device intermediary to a plurality of clients and a plurality of database servers allocates a portion of memory to each packet engine in a plurality of packet engines executing on a respective core of a plurality of cores of the first device. The first device establishes large scale network address translation (LSN) for the plurality of clients, the first device logging LSN information of sessions to a corresponding logging buffer established in a respective packet engine's portion of memory. The first device identifies, for a LSN session, a packet engine from the plurality of packet engines to log the information for the LSN session and stores information of the LSN session to the logging buffer in the packet engine's portion of memory. | 02-25-2016 |
20160057034 | SYSTEMS AND METHODS FOR CORRELATING DERIVED METRICS FOR SYSTEM ACTIVITY - A system can correlate derived metrics for system activity to determine problems and recommend solutions. Using a hierarchy of derived metrics from a set of raw metrics, a system can identify a problem, correlate related metrics and determine a recommended solution. For example, raw metrics can be collected about computing resources. Analyzers can process the raw metrics and outputs from other analyzers to gather metrics that include metrics derived from other metrics. When a problem symptom is discovered, derived metrics (and other metrics) can be correlated with the symptom to help identify the problem. Using the correlated metrics, a system can recommend a solution to an identified problem. | 02-25-2016 |
20160057036 | Direct Binary File Transfer based Network Management System Free of Messaging, Commands and Data Format Conversions - Telecommunication network management operations are performed based on accessing network management data (NMD) files via GUIs and general purpose computers including a network management system (NMS) server, and automatic routines for transferring binary NMD files between the general purpose computers and remote network elements (NEs) being managed. A system user produces configuration files at the NMS server for NEs using a network management GUI, and the hardware of NEs automatically complete the network management operations indicated by the NMD files transferred to them from the NMS server and produce their status files to the NMS server. The network management GUI displays network status based on the latest NE status files at the NMS server. This provides direct, binary file transfer based NMS communication that avoids the complexity and restrictions of intermediate messaging protocols or transaction languages and conversions thereof. | 02-25-2016 |
20160057039 | SYSTEMS AND METHODS TO COMPUTE CARBON FOOTPRINT OF NETWORK SERVICES WITH NETWORK FUNCTION VIRTUALIZATION (NFV) AND SOFTWARE DEFINED NETWORKING (SDN) - A method, through a server, to determine carbon footprint of a network service, in a network, includes determining power consumption and cooling requirements of network devices associated with the network service; determining associated carbon footprint coefficients for power sources associated with each of the network devices; and determining carbon footprint of the network service based on the power consumption, the cooling requirements, and the associated carbon footprint coefficients. | 02-25-2016 |
20160057063 | TRANSFER DEVICE, CONTROL DEVICE AND COMMUNICATION METHOD - A transfer device operates within a network including a plurality of transfer devices and a control device. The transfer device includes a processor and a network connecting device. The network connecting device receives a packet. When a packet received from any of the plurality of transfer devices does not satisfy a process condition notified from the control device, the processor performs control such that a request message is not transmitted until a specified time period elapses from reception of the received packet. The request message is a message for requesting the control device to notify the transfer device of a process applicable to the received packet. When process information, which is information representing the process applicable to the received packet, has been obtained by the time the specified time period elapses, the processor processes the received packet in accordance with the process information. | 02-25-2016 |
20160057106 | System and Method to use Common Addresses on Different Interfaces in a Management Controller without Conflict - A management controller includes a first data communication interface for communicating with a first network interface, a second data communication interface for communicating with a second network interface, and a processor. The first network interface provides a first network interface mode that permits a processing system to access a network, an operating system-to-management controller (OS-to-MC) pass-through mode that permits the management controller to access the processing system, and a network-to-management controller (Net-to-MC) pass-through mode that permits the management controller to access the network. The second network interface permits the management controller to access a management station. The management controller provides a common Media Access Control address and a common Internet Protocol address to the first data communication interface and to the second data communication interface without causing conflict on the network. | 02-25-2016 |
20160057237 | System and Method for Securing Pre-Association Service Discovery - A method for operating a station when discovering a service includes generating a first identifier of the service, generating a second identifier of the service in accordance with a first parameter, and transmitting a request instructing a generating of a third identifier, the request including the first identifier of the service and the first parameter. The method includes receiving a first response including the third identifier, determining that the first response is not valid when the second and third identifiers are not equal, and determining that the first response is valid when the second and third identifiers are equal. | 02-25-2016 |
20160065382 | Method and System For Configuring Instrumentation Devices - A method and system for managing an instrumentation device include accessing an image of the instrumentation device. Based on the image, an identity for the instrumentation device is determined. The identity is used to register the instrumentation device by configuring a gateway at a multimedia content distribution network client location to access and communicate with the instrumentation device. The identity of the instrumentation device and the gateway may be stored for future configuration of the gateway. | 03-03-2016 |
20160065419 | METHOD AND APPARATUS FOR GENERATING INSIGHT INTO THE CUSTOMER EXPERIENCE OF WEB BASED APPLICATIONS - Methods, apparatuses, and computer program products capable of providing insight and understanding into the user experience of web based applications are provided. One method includes collecting and measuring application level key performance indicators, detecting user actions by monitoring network side user traffic in a network, correlating the user actions with the application level key performance indicators in order to evaluate and quantify a quality of experience (Qo E) of the user, and correlating poor Qo E with network side key performance indicators in order to determine an underlying root cause of the poor Qo E. | 03-03-2016 |
20160065420 | INCREASING THE ACCURACY OF SERVICE QUALITY MANAGEMENT METRICS - According to embodiments of the present invention, one or more computer processors determine a source for a performance indicator of a target service element is known. The one or more computer processors select, at run time, a source for the performance indicator that has a least amount of information gaps. The one or more computer processors determine information associated with the performance indicator from the source. The one or more computer processors determine whether the determined information associated with the performance indicator is more current than a quality indicator periodicity value that is associated with the target service element. In response to determining that the determined information associated with the performance indicator is more current than a quality indicator periodicity value that is associated with the target service element, the one or more computer processors selecting the performance indicator. | 03-03-2016 |
20160065425 | VISUAL REPRESENTATIONS OF STATUS - An example device in accordance with an aspect of the present disclosure is to generate a visual representation of a status of a metric. The visual representation is to be updated according to the granularity during at least a portion of a time period. The visual representation is to depict passage of time along a first dimension, and is to separate the time period into a plurality of time blocks to be depicted as being stacked along a second dimension of the visual representation. | 03-03-2016 |
20160065429 | SURFACING AN ENTITY'S PHYSICAL LOCATIONS VIA SOCIAL GRAPH - Techniques for determining a location of an entity are described. A determination module using member profile data may determine the location of the entity. Member profile data can include information about a member's employer and the employer's location. The determination module accesses member profiles from a social network. Additionally, the determination module may create a subgroup of entity-related member profiles from the accessed member profiles. The entity-related member profiles can be associated with a specific entity. Furthermore, the determination module may determine a suggested location for the specific entity based on location information derived from the related member profiles. Moreover, the determination module may calculate a connection density for the specific entity based on connections associated with the entity-related member profiles. Subsequently, the determination module may determine that the suggested location is a physical location when the calculated connection density is above a pre-determined threshold value. | 03-03-2016 |
20160065430 | MONITORING APPARATUS AND METHOD THEREOF - A monitoring apparatus includes an acquisition unit, a monitoring unit, first and second transmission units, a generation unit, and a stop unit. The acquisition unit acquires a list including network devices to be a monitoring target from a management apparatus that manages network devices registration information. The monitoring unit acquires device information from the network devices included in the list and performs monitoring processing. The first transmission unit transmits at least a part of the acquired device information to the management apparatus. The generation unit generates, in a case where a network device satisfying a predetermined condition is identified according to a monitoring processing result, failure information as failure of the identified network device. The second transmission unit transmits the generated failure information to the management apparatus. The stop unit stops the monitoring processing for the network device corresponding to the generated failure information based on the predetermined condition. | 03-03-2016 |
20160065433 | Cross-Layer Link Failure Alerts - Described herein is a network device configured to determine and provide alerts of communication link failures across layers of a communication stack of the network device. The network device determines at a radio link layer of the communication stack that a communication link between the network device and a network has failed. The network device then alerts one or more components associated with another layer of the communication stack of the determination that the communication link has failed. | 03-03-2016 |
20160065436 | IDENTIFYING A CLOUD SERVICE USING MACHINE LEARNING AND ONLINE DATA - Analyzing network traffic includes identifying, by a computer related to an enterprise, an endpoint outside of the enterprise of a network connection between a resource of the enterprise and the endpoint; and autonomically determining, by the computer related to the enterprise, when the endpoint is associated with a cloud service provider. An indication that the endpoint is associated with the cloud service provider can then be stored by the computer related to the enterprise. | 03-03-2016 |
20160065440 | Methods and Computer Program Products for Collecting Storage Resource Performance Data Using File System Hooks - Provided are methods and computer program products for collecting storage resource performance data using file system hooks. Methods may include determining a location for a function dispatch table, and modifying the function dispatch table to redirect a request for an operation. In response to a received request for the operation, an intent to perform the operation is recorded to estimate an operational queue length, and data associated with the operation is recorded in a hash table. In response to recording data associated with the operation, a function corresponding to the operation to perform the operation is invoked. Elapsed time and storage size is recorded. | 03-03-2016 |
20160065441 | METHODS AND APPARATUS TO PREDICT END OF STREAMING MEDIA USING A PREDICTION MODEL - Methods and apparatus to predict end of streaming media using a prediction model are disclosed herein. Examples disclosed herein determine a bandwidth rate associated with streaming media presented in a streaming media application from a proxy. Examples disclosed herein also generate a prediction model based on characteristics of the bandwidth rate and determine an end time for the streaming media from the prediction model. | 03-03-2016 |
20160065443 | RETROREFLECTIVE OBJECT TAGGING - A method for retroreflective tagging of objects in a data processing system is described herein. The method includes first monitoring tagging of objects in memory of the data processing system. Subsequently, an application of a new tag to an existing one of the objects can be detected that differs from a previously applied tag of the existing one of the objects. Thereafter, the end user responsible for the new tag can be prompted to retroreflectively tag the existing one of the objects with the new tag. In response to an affirmation by the end user, the new tag is applied to the existing one of the objects and also to others of the objects tagged with the previously applied tag. | 03-03-2016 |
20160065476 | ACCESS NETWORK CAPACITY MONITORING AND PLANNING BASED ON FLOW CHARACTERISTICS IN A NETWORK ENVIRONMENT - An example method for access network capacity monitoring and planning based on flow characteristics in a network environment is provided and includes receiving, at a server in a first network, a request from a client at a second network for accommodating flow characteristics for a flow through the first network between the client and a remote destination, accommodating the flow characteristics if the request can be fulfilled with available network resources allocated to the client by the first network, measuring the flow at the first network between the client and the remote destination, exporting flow details including flow measurements and the requested flow characteristics to a flow collector, and denying the request if the flow collector determines that the flow measurements do not match the requested flow characteristics. In some embodiments, the flow measurements include fine-grain flow measurements, wherein the method further comprises receiving a request for the fine-grain flow measurements. | 03-03-2016 |
20160065635 | USING MESSAGING ASSOCIATED WITH ADAPTIVE BITRATE STREAMING TO PERFORM MEDIA MONITORING FOR MOBILE PLATFORMS - Methods, apparatus, systems, storage media, etc., to perform media monitoring for mobile platforms using messaging associated with adaptive bitrate streaming are disclosed. Example methods disclosed hereinto monitor media on a mobile platform include accessing a first uniform resource locator (URL) included in a first message originated by the mobile platform to stream first media according to an adaptive bitrate streaming protocol. Such example methods also include requesting network log information corresponding to the first URL from a service provider providing network access for the mobile platform. Such example methods further include monitoring presentation of the first media on the mobile platform using the network log information. | 03-03-2016 |
20160071040 | METHOD AND SYSTEM FOR ENABLING DATA USAGE ACCOUNTING THROUGH A RELAY - A method and system for enabling data usage accounting is described herein. The method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session that includes a final endpoint can be received through a secure application. The request for the data session can be intercepted and modified to cause the request to be re-directed back to the secure application. A connection with a relay server can be initiated instead of the final endpoint such that data usage accounting for the data session is to be conducted at a remote location. | 03-10-2016 |
20160072662 | Automated Alert Management - Alerts may be received from an event monitoring system that monitors computing resources of a computer system. Based on an alert ruleset, an alert management module may determine whether to provide notification of the alert. If the alert management module decides to provide notification of the alert, then the alert management module may initiate the creation of an issue ticket corresponding to the alert in an issue tracking system. If the alert management module decides not to provide notification of the alert, then the alert management module may discard the alert. | 03-10-2016 |
20160072687 | METHOD FOR CONTROLLING MONITORING ITEMS, MANAGEMENT COMPUTER, AND COMPUTER SYSTEM IN CLOUD SYSTEM WHERE VIRTUAL ENVIRONMENT AND NON-VIRTUAL ENVIRONMENT ARE MIXED - In a cloud environment that provides both virtual environment and non-virtual environment, in order to address a problem in that monitoring items that vary depending on usage cases must be managed, the present invention proposes a management method in which whether each server brings about a virtual environment or a non-virtual environment is managed by performing registration processing in cooperation with image management and a service resource registration task. In addition, user manager monitoring profile item management information for virtual/no-virtual environment is prepared, and with reference to this information, calculation methods, which specify monitoring items to be monitored out of monitoring items and infra monitoring items for each environment, are managed. With the use of these calculation methods, a user manager and an infrastructure manager may perform optimal monitorings. | 03-10-2016 |
20160072688 | FAULT MONITORING IN MULTI-DOMAIN NETWORKS - The present subject matter relates to fault monitoring in multi-domain networks. In an example, alarm messages associated with multiple network entities in the multi-domain network are received. Upon receiving the alarm messages, state information of network entities traversed by services across the multi-domain network prior to receiving the alarm messages is acquired. The state information of the network entities for each of the services comprises hierarchical relationships between physical level entities, logical level entities, and service level entities traversed by a respective service. A network entity is identified from the acquired state information that matches with the faulty network entity corresponding to each of the alarm messages. Services that are impacted by the faulty network entity are determined based on traversing the state information of the network entities, through the hierarchical relationships, from the identified network entity to the service level entities. | 03-10-2016 |
20160072690 | TRACKING USER PHYSICAL ACITVITY WITH MULTIPLE DEVICES - Methods, devices, and computer programs are presented for creating a unified data stream from multiple data streams acquired from multiple devices. One method includes an operation for receiving activity data streams from the devices, each activity data stream being associated with physical activity data of a user. Further, the method includes an operation for assembling the unified activity data stream for a period of time. The unified activity data stream includes data segments from the data streams of at least two devices, and the data segments are organized time-wise over the period of time. | 03-10-2016 |
20160072692 | TWO-WAY REMOTE COMMUNICATION SYSTEM - The described technology is directed towards server-controlled testing and/or monitoring of a client device application program. The server loads plug-in components directed towards the testing and/or monitoring operations, and instructs the client device to couple counterpart plug-in components to the client device application program. The server's plug-in components communicate with the application program's plug-in components to run the testing and/or monitoring operations, which may be automated, send queries to the client to receive responses, and send commands to the client to take actions. The server includes dashboards for interacting with the client device. The client device includes virtual input devices that allow the server to inject input into the client application program. | 03-10-2016 |
20160072730 | NONINTRUSIVE DYNAMICALLY-SCALABLE NETWORK LOAD GENERATION - A method for nonintrusive network load generation may include determining available resources in a distributed computing system, where the distributed computing system includes a plurality of computing devices and a target deployment. Based on an amount of available resources between the target deployment and a plurality of source computing devices, the plurality of source computing devices may be selected to generate a network load directed from the plurality of source computing devices to the target deployment. The plurality of source computing devices may be a subset of the plurality of computing devices in the distributed computing system. A network-traffic generator service may be provided to the plurality of source computing devices in order to generate the network load directed from the plurality of source computing devices to the target deployment. The performance of the distributed computing system in response to the generated network load may be monitored. | 03-10-2016 |
20160072765 | System and Method For Logging Communications - A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device. | 03-10-2016 |
20160072854 | Processing Signaling Changes - The disclosure relates to tracking commands and data received from many sources. A device may receive a command from a user and forward the command to a network device. The device may also receive data from the network device and may determine whether the received data indicates that a previously forwarded command was received by the network device. If the received data does not indicate that the command was received, the device may perform one or more actions, such as resending the command. | 03-10-2016 |
20160072893 | COMMUNICATIONS METHOD, SYSTEM, AND COMPUTER PRODUCT - A communications method includes transmitting a sensor data collection request to a second network that includes a group of nodes having sensors, the transmitting being performed by a first communications apparatus of plural of communications apparatuses configured to communicate through a first network; and transmitting reception information to the first communications apparatus via the first network, when sensor data is received that is transferred by multihop communication among nodes in the second network and corresponds to the sensor data collection request, the reception information indicating reception of the sensor data, and the transmitting of the reception information being performed by a second communications apparatus of the plural communications apparatuses. | 03-10-2016 |
20160072904 | METHOD AND SYSTEM FOR ENABLING DATA USAGE ACCOUNTING FOR UNRELIABLE TRANSPORT COMMUNICATION - A method and system for data usage accounting are described herein. On a computing device that includes enterprise applications and personal applications, a datagram send request for an enterprise application can be received. The datagram send request may involve unreliable transport communication with a final destination and may be conducted in a native fashion with respect to the enterprise application. Based on the datagram send request, addressing information of a relay destination that is different from the final destination can be received. In addition, outbound datagrams of the unreliable transport communication can be corresponded with the received addressing information of the relay destination. The outbound datagrams of the unreliable transport communication may also be supplemented with the addressing information of the final destination. The outbound datagrams of the unreliable transport communication may also be transmitted to the relay destination to enable a data usage accounting of the datagram send request. | 03-10-2016 |
20160072911 | PHYSICAL LOCATION INFLUENCED CACHING - Aspects of the present disclosure relate to the caching of network content requested by a user of a client computing device during a browsing session. The client computing device's various networks and varying bandwidth can have a negative impact on the browsing session. Caching of network content can enhance performance. For example, network content can be cached on a wireless mobile device so that it is available on the device at a further time without requiring significant bandwidth or, in some cases, even a network connection. Predicting the bandwidth at the time the cached content will be accessed can allow customized caching and an improved user experience. | 03-10-2016 |
20160073252 | SYSTEM AND METHOD FOR REMOTE DEVICE RECOGNITION AT PUBLIC HOTSPOTS - Described are various embodiments of a system and method in which device-identifying data can be used to uniquely recognize and optionally track and report on device activity at one or more hotspot locations by way of the creation and management of a device profile uniquely associated with such devices and stored in a network accessible knowledge base. | 03-10-2016 |
20160078388 | SYSTEMS AND METHODS FOR CODE INSTRUMENTATION FOR ANALYTICS - A system and method of inserting instrumentation analytics into a business application program that is written in a web browser language is disclosed. The method includes receiving at an instrumentation server the business application program, parsing the business application program to generate an abstract syntax tree, examining the abstract syntax tree to identify function calls within the business application program, and inserting an instrumentation framework into the business application program to create a modified business application program, the instrumentation framework monitoring function calls during operation of the modified business application program. A system to implement the method and a computer-readable medium are disclosed. | 03-17-2016 |
20160080210 | HIGH DENSITY SERIAL OVER LAN MANAGMENT SYSTEM - A baseboard management controller (BMC) of a system can receive a first serial output from a first server device and a second serial output from a second server device. The BMC can send the first serial output and the second serial output to a network interface controller (NIC) for transmission over a network to a computing device. | 03-17-2016 |
20160080211 | METHODS AND SYSTEMS FOR CONTROLLER-BASED DATA FORWARDING RULES WITHOUT ROUTING PROTOCOLS - A method includes determining a plurality of network segments comprising a network, determining a manner in which the plurality of segments are connected, determining network segments and how segments are connected, at least in part, without a routing protocol, discovering a plurality of external network segments via a hub device associated with the network and utilizing the plurality of network segments comprising the network, the manner in which the plurality of segments are connected and the plurality of external network segments. | 03-17-2016 |
20160080214 | PROCESSING DIAGNOSTICS OF MEDIA SERVICES - A system that incorporates the subject disclosure may include, for example, a device receiving diagnostic information from a plurality of client devices delivering media content, wherein the diagnostic information relates to a media delivery service quality and wherein the diagnostic information is sent automatically by the client devices; performing a data compression procedure for the diagnostic information; transmitting compressed data comprising the diagnostic information to an aggregator device; and sending to the client devices a message to delay or prevent transmission of additional diagnostic information in accordance with an instruction received from the aggregator device. Other embodiments are disclosed. | 03-17-2016 |
20160080217 | Methods and Systems for Auto-Starting and Auto-Stopping Databases - Systems and methods are presented for auto-starting and auto-stopping databases in a cloud server environment. In some embodiments, a method can include accessing, by an initial server in a network-based system, a request to connect to a target database located in a target server of the network-based system. The method can also include determining, by an administrative database (admin database) residing in the initial server, a location of the target database residing in the target server, switching an execution context from no database in the target server to a copy of the admin database in the target server, performing an auto-start procedure to auto-start the target database in the target server, switching the execution context from the admin database in the target server to the target database in the target server, and transmitting a completion acknowledgement indicating the target server is connected to the target DB. | 03-17-2016 |
20160080218 | System and Method for Network Health and Management - A system and method for network health and management. Intelligent assessments of a current or new network configuration can be performed based on a health of the network that is derived using health messages that are indicative of the utilization of one or more forwarding tables in a plurality of network switches. | 03-17-2016 |
20160080219 | MONITORING SYSTEM, FACILITY MANAGEMENT DEVICE, MONITORING METHOD, AND PROGRAM - A monitoring system comprises an equipment management device, a relay server, and monitoring terminals. The equipment management device is configured to establish with the relay server first communication for notifying the monitoring terminals of the states of equipment items. Furthermore, the equipment management device is configured to establish with the relay server second communication, which is different from the first communication, for monitoring equipment information regarding the equipment items from each of the monitoring terminals. The monitoring terminals establish the first communication and second communication with the relay server. The relay server is configured to relay the first communication and second communication. | 03-17-2016 |
20160080221 | METHODS AND SYSTEMS FOR CONTROLLER-BASED NETWORK TOPOLOGY IDENTIFICATION, SIMULATION AND LOAD TESTING - A method includes receiving information describing an addition of a first site comprising at least one application to an existing network wherein the information is selected from the group consisting of type of site, planned connectivity to the site and planned policies for the site and estimating an impact on the operation of the at least one application and associated network traffic using statistical analysis of monitored data collected from a second site similar to the first site. | 03-17-2016 |
20160080222 | SYSTEM AND METHOD FOR MANAGEMENT OF NETWORK MONITORING INFORMATION - A system and method for management of network monitoring information includes a non-transient memory and one or more processors coupled to the non-transient memory and configured to read instructions from the non-transient memory to cause the information handling system to perform operations, The operations include collecting real-time network monitoring information from one or more network switching units, storing the collected real-time network monitoring information in a data storage system using a first column family, periodically aggregating the collected real-time network monitoring information to generate corresponding history information, storing the aggregated history information in the data storage system using a second column family different from the first column family, retrieving information from the data storage system based on one or more first queries, the stored real-time network monitoring information, and the stored aggregated history information, and providing the retrieved information for use during network monitoring. | 03-17-2016 |
20160080223 | DYNAMIC MANAGEMENT OF NOTIFICATIONS - A method of managing notifications relating to at least one train asset is provided. The method includes receiving an information from the train asset and further analyzing the information received. The first set of notifications is generated based on the analysis of the information received. A second set of notifications is prepared from the first set of notifications by removing at least one notification based on a first predetermined set of rules, silencing at least one notification based on a second predetermined set of rules, cancelling at least one notification based on a third predetermined set of rules, and prioritizing at least one notification based on a fourth predetermined set of rules. Thereafter, the second set of notifications is displayed to the user. A number of notifications in the second set of notifications is less than a number of notifications in the first set of notifications. | 03-17-2016 |
20160080225 | METHODS AND SYSTEMS FOR TIME-BASED APPLICATION DOMAIN CLASSIFICATION AND MAPPING - A method includes detecting at a device on a network an application having an anchor domain, marking the application with a traffic source having an entry point domain that accessed the application and a time of detection and designating network flows from the traffic source within a predetermined time from the time of detection as belonging to the application. | 03-17-2016 |
20160080226 | EVENT DRIVEN METRIC DATA COLLECTION OPTIMIZATION - Systems, methods, and other embodiments associated with event driven metric data collection optimization are described. In one embodiment, a method includes providing a domain knowledge catalog that defines, for each of a plurality of source metrics: i) a plurality of target type relationships and ii) for each target type relationship, a plurality of metrics that are related to the source metric. For a particular system, a deployment topology is determined defines target entities that are included in the system, where the target entities comprise respective instances of a subset of the target type relationships. The method includes receiving configuration of an event related to a source metric. The domain knowledge catalog is accessed and metrics that are related to the subset of target type relationships for the source metric are selected for collection. | 03-17-2016 |
20160080229 | APPLICATION PERFORMANCE MONITORING METHOD AND DEVICE - A response time of an access to an application is monitored, and, when a trouble may occur, an alert is given to an administrator to reduce a workload on the administrator. A response time of the application is measured, a request in which the response time exceeds a reference value is extracted, and exceeding requests are aggregated in units of predetermined time widths. An interval between adjacent time bands in which the exceeding requests are present is calculated to determine a periodical tendency of occurrence of exceeding. An alert having a level depending on the tendency is output. | 03-17-2016 |
20160080230 | METHODS AND SYSTEMS FOR DETECTION OF ASYMMETRIC NETWORK DATA TRAFFIC AND ASSOCIATED NETWORK DEVICES - A method includes monitoring a plurality of network devices to collect network performance data comprising data flow records of each device on the network and to create a network topology database, accessing the network topology database comprising information on an entry and exit point of each device, the manner in which the devices are connected and a plurality of data flow records on a single data flow from multiple devices on the network and utilizing the network topology database to perform an asymmetric detection algorithm to identify one or more data flows that exited a device via a first path and returned to the device via a different second path. | 03-17-2016 |
20160080231 | Network Monitoring Device - A network monitoring device for improved filtering of access, from a secure internal network, to an unsecured network is provided. The network monitoring device may identify keywords associated with network addresses to which access should not be granted to users of a secure network internal to a business enterprise. In turn, the network monitoring device may attempt to access URLs associated with the identified keywords, and if access is granted, execute processes to update access permissions to unsecured network locations. | 03-17-2016 |
20160080232 | REMOTE MONITORING AND CONTROLLING OF NETWORK UTILIZATION - A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management computer, receiving, from a gateway located in a managed network, device information about devices in the managed network; for a particular device: determining a match between the device capabilities of the particular device and features of a particular network software application configured to control the particular device, and determining a particular protocol endpoint configured to communicate control instructions from the particular network software application to the particular device; receiving, from the gateway, aggregated data that reflects network utilization by the devices located in the managed network; for the particular device: based at least in part on the aggregated data, using the particular network software application, determining control instructions for the particular device; causing the particular protocol endpoint to transmit the control instructions for the particular device to the device. | 03-17-2016 |
20160080233 | Methods and Computer Program Products for Transaction Analysis of Network Traffic in a Network Device - Provided are methods and computer program products for analyzing and tracing the contents of network traffic in a network device and to help identify network performance issues. Methods for analyzing traffic include identifying thread identifiers associated with transactions, determining related events, and associating similar transactions and events into an aggregated list of transactions. Methods of tracing transactions include identifying thread identifiers associated with transactions and related events and serializing events into a serialized list of events to facilitate tracing single transactions. | 03-17-2016 |
20160080236 | Detecting Network Services Based On Network Flow Data - Detecting network services based on network flow data is disclosed. Using a networking device, network flow data is obtained for a plurality of endpoints of a telecommunications network. Each endpoint of the plurality of endpoints is uniquely described by data comprising an IP address, a port, and a communication protocol. For each endpoint of a set of at least one endpoint selected from the plurality of endpoints, a plurality of peers of the endpoint is determined by detecting communication between the endpoint and the plurality of peers based on the network flow data. For each peer of a set of peers selected from the plurality of peers, a difference between a number of peers of the endpoint and a number of peers of said each peer is determined based on the network flow data. It is determined if the endpoint is a service based on the difference determined for each peer of the set of peers. Network management is performed based on the determination of whether the endpoint is a service. | 03-17-2016 |
20160080237 | ADAPTIVE BIT RATE MEDIA STREAMING BASED ON NETWORK CONDITIONS RECEIVED VIA A NETWORK MONITOR - A method includes receiving, at a device from a content source, a portion of a particular chunk of media content a particular quality level. The method includes receiving, at the device, network data about network conditions associated with the device in response to receipt of the portion. The method includes making, at the device, a determination based on the network data whether to download the particular chunk at a first quality level that is higher than the particular quality level based on the particular quality level and the data. The method includes, in response to the determination indicating to download the particular chunk at the first quality level: sending, to the content source from the device, a request for the particular chunk at the first quality level, and replacing the portion with the particular chunk at the first quality level. | 03-17-2016 |
20160080238 | BIT-RATE EXTRACTION FOR ENCRYPTED VIDEO - A method includes monitoring a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts. Respective data volumes of one or more traffic bursts of the sequence are estimated, and the given media bit-rate is derived from the estimated data volumes. | 03-17-2016 |
20160080239 | REAL-TIME, LOW MEMORY ESTIMATION OF UNIQUE CLIENT COMPUTERS COMMUNICATING WITH A SERVER COMPUTER - Computer systems and methods for estimating the number of client computers actively coupled to a server computer system in real-time are discussed herein. Specifically, systems and methods are discussed for a server computer system receiving heartbeat messages from a plurality of client computers and generating an estimate of the number of client computers actively coupled to the server computer system in real-time without locks, such as a database table lock. A heartbeat message from a client computer need not include a client or user identifier. In an embodiment, the memory footprint/overhead is O(l), and may be a single whole number greater than zero, such as a 64-bit unsigned integer. Systems and methods are also discussed herein to calculate and reduce the expected error of the estimated number of active clients. | 03-17-2016 |
20160080248 | NETWORK SERVICE RESTORATION-ON-DEMAND - A method of establishing a first network connection of a wired network with a customer premise equipment (CPE) installed at a customer premise (CP). The method monitors the first network connection and detects an outage of the first network connection. The method provides an option of using a second network connection of a wireless network, for delivery of services during the first outage of the first network connection. The method receives a response, and switches the delivery of services, via a machine to machine (M2M) interface in the CPE, to the second network connection. | 03-17-2016 |
20160080267 | MONITORING DEVICE, SERVER, MONITORING SYSTEM, MONITORING METHOD AND PROGRAM RECORDING MEDIUM - Disclosed is a monitoring device etc. which can carry out server load control in the light of the relationship between contents and load fluctuation, configured to monitor one or more servers which perform a processing in response to a request from a client, and transmit a reply to the client, the monitoring device including an operating plan unit which generates an operating plan of carrying out server load control depending on matter-of-interest information or depending on time information, based on access information related to the request and based on a request analysis result obtained by analyzing the request, the access information and the request analysis result being collected from the server, and a control unit which carries out the server load control based on the operating plan when the matter-of-interest information or the time information satisfies an execution condition included in the operating plan. | 03-17-2016 |
20160080273 | SYSTEMS AND TECHNIQUES FOR UTILIZING RESOURCE AWARE QUEUES AND/OR SERVICE SHARING IN A MULTI-SERVER ENVIRONMENT - Systems and techniques for utilizing resource aware queues and/or service sharing in a multi-server environment. Requests directed to an application server are received into one or more queues in front of the application server. An acknowledgement of the requests is provided in response to the requests being received by the one or more queues. Metadata associated with the requests is utilized to manage the one or more queues. The requests from the one or more queues are processed based on the metadata. | 03-17-2016 |
20160080275 | User Prioritization in a Congested Network - A behavior investigating device of a system investigating arrangement in a communication network continuously obtains statistical network usage data of users, analyzes the statistical network usage data with regard to the pattern of behavior of the users, prioritizes the users based on the analysis and informs a traffic prioritizing function about the priority of at least one of the users. The traffic prioritizing function, which may be provided in the traffic prioritizing node, determines that there is network congestion, identifies a communication session of a user in the communication network, obtains a priority of the user from a behavior investigating device and determine whether the user is to be allowed to use the communication network based on the priority and the congestion determination. | 03-17-2016 |
20160080460 | VIDEO STREAMING DIAGNOSTICS - A video stream DSL analyzer receives at least non-physical layer management data and physical layer management data and in response generates metric information. The generated metric information is used to characterize the performance of the video stream information and diagnose any problems if necessary. In response to the metric information, the video stream DSL analyzer changes one or more DSL configuration(s) in order to improve performance. | 03-17-2016 |
20160080495 | Tiered Heterogeneous Fast Layer Shared Storage Substrate Apparatuses, Methods, and Systems - A storage system for organizing and maintaining metadata in a distributed network. The system includes: a network; a plurality of distributed nodes configured to communicate through the network; a plurality of block devices configured to communicate with the plurality of distributed nodes through the network; and a management server configured to communicate with each of the plurality of distributed nodes and block devices and further configured to arbitrarily associate metadata and data to any of the plurality of distributed nodes such that a global copy of the metadata does not exist in one or more fixed locations known to all distributed nodes. | 03-17-2016 |
20160080498 | Scalable Charging System Based On Service-Oriented Architecture - An Event Collection service for a oneM2M SOA charging system can provide service capabilities to enable configuration of charging policies, i.e. the common rules for event collection; can provide service capabilities to enable configuration of event collection triggers, i.e. at what specific event it will trigger the collection operation; can define a system which can scale up with increases of services, devices and applications and can define a system that can interact and integrate with the oneM2M ROA charging system. | 03-17-2016 |
20160087838 | RETAIL TRIGGERED DEVICE CONFIGURATION SETUP - The present disclosure relates to retail triggered device configuration setup. Specifically, various techniques and systems are provided for efficient setup of a purchased device on a network using information generated by a retailer at the point of sale. More specifically, exemplary embodiments of the present invention include methods and systems for receiving, at a computing device connected to an established network device on a network, a transaction communication including an indication that a new network device has been acquired; transmitting data to the established network device, wherein the data includes identification information associated with the new network device; receiving a join query, wherein the join query includes a request to authorize the new network device to join a network; and transmitting a response to the join query, wherein the response includes an authorization for the new network device to join the network. | 03-24-2016 |
20160087847 | MECHANISM FOR MANAGEMENT CONTROLLERS TO LEARN THE CONTROL PLANE HIERARCHY IN A DATA CENTER ENVIRONMENT - Mechanisms to enable management controllers to learn the control plane hierarchy in data center environments. The data center is configured in a physical hierarchy including multiple pods, racks, trays, and sleds and associated switches. Management controllers at various levels in a control plane hierarchy and associated with switches in the physical hierarchy are configured to add their IP addresses to DHCP (Dynamic Host Control Protocol) responses that are generated by a DCHP server in response to DCHP requests for IP address requests initiated by DHCP clients including manageability controllers, compute nodes and storage nodes in the data center. As the DCHP response traverses each of multiple switches along a forwarding path from the DCHP server to the DHCP client, an IP address of the manageability controller associated with the switch is inserted. Upon receipt at the DHCP client, the inserted IP addresses are extracted and used to automate learning of the control plane hierarchy. | 03-24-2016 |
20160087851 | REAL-TIME NETWORK DATA MANAGEMENT SYSTEM AND METHOD - One or more techniques and/or systems are disclosed for real-time data management on a computing network. A user can be provided with an ability to identify information about data, and updates to data, disposed on a network, such as a location of the data, a type of data, and a state of the data, in real-time. A processor component may be able to locally identify target records, and a monitor component can track the target records disposed in files on one or more devices in the network. Metadata about identified records can be indexed and stored in data management component. State changes on the targeted devices in the network can be identified in real-time and the appropriate updates can be provided to a user. A display component can provide a user with real-time information about target records as well as desired classifications and risk scores for targeted data and/or devices. | 03-24-2016 |
20160087854 | MANAGING CHANGE EVENTS FOR DEVICES IN AN ENTERPRISE SYSTEM - Techniques are disclosed for communicating to remote devices information about change events related to changes in access to an enterprise system. A device access management system may facilitate communication about a change event to the remote devices. Information about a change event may be stored in a change event object based on the type of change event (e.g., a policy change, an application change, and a settings change). A change event queue may persistently store information corresponding to change events. One or more computing nodes may be scheduled to execute an action process for each change event based on the type of the change event. A computing node may communicate information (e.g., an instruction to implement adjust access) about a change event to remote devices. A change event may persist on the queue until all remote devices are notified about the change event. | 03-24-2016 |
20160087857 | METHODS, NETWORK NODES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING COST-INFORMATION FROM MULTIPLE BALANCES - A method performed in a first network node, includes the first network node receiving, from a second network node, a request specifying a user account and a media content. The method further includes the first network node retrieving, from a database, a database object associated with the user account, the database object including a first parameter associated with a non-monetary balance. The method further includes the first network node retrieving, from the database, at least one predefined rule associated with the media content. The method further includes the first network node determining an advice of charge using the database object and the at least one predefined rule, the advice of charge specifying a deduction from the non-monetary balance for downloading the media content. The method also includes the first network node transmitting the advice of charge to the second network node. | 03-24-2016 |
20160087861 | INFRASTRUCTURE PERFORMANCE MONITORING - A method and apparatus for infrastructure performance monitoring are described. In one embodiment, the method comprises monitoring virtual application performance, identifying degradation in the application performance, and correlating the degradation to one or more of virtual and physical infrastructure components. | 03-24-2016 |
20160087863 | Infering Management State via Secondary State - Determining whether or not a device is managed. A method includes, as part of running a particular application, determining whether or not certain state and/or data (such as a particular specialized font, a particular certificate chain, or particular xml policy setting) is present on the device. When the certain state and/or data is present on the device, the method includes determining that the device is managed, otherwise, determining that the device is not managed. | 03-24-2016 |
20160087868 | Injecting Custom Classes In Application Code To Facilitate Network Traffic Monitoring - Various methods and systems for facilitating network traffic monitoring in association with an application running on a client device are provided. In this regard, aspects of the invention facilitate monitoring network traffic being transmitted to and/or from a client device, such as a mobile device, so that network performance can be analyzed. In various implementations, one or more default classes associated with an application on a device are replaced with one or more custom monitoring classes designed to facilitate monitoring data packets being communicated to or from the application. The custom monitoring classes can then be utilized to facilitate monitoring a plurality of data packets communicated to or from the application. | 03-24-2016 |
20160088087 | WIRELESS MANAGEMENT AND COMMUNICATION NETWORK SYSTEM FOR MULTI-ZONES AND MANAGING METHOD FOR THE NETWORK SYSTEM - A network system in multi-zones comprises a plurality of smart nodes (SNs) and a plurality of zone controllers (ZCs). Each of the plurality of SNs is electrically connected with one of the plurality of ZCs respectively, and arranged in different zones of a building. Each of the plurality of ZCs is connected wirelessly with zone apparatuses in same arrangement zone through a self-organized network, so as to control the zone apparatuses and receive feedback information from the zone apparatuses of the arrangement zone. Each SN extracts the feedback information from the ZC connected thereto to execute analyses and calculations, so as to optimize the environment of the arrangement zone. | 03-24-2016 |
20160088094 | CONTROL DEVICE AND CONTROL METHOD - A control device includes: a memory; and a processor coupled to the memory and configured to: when detecting a new access from a communication device, based on session information including times of past accesses, compute a time period of a difference between a first time at which the new access is detected and a second time of a last access among the past accesses, and when the time period exceeds a given time interval, determine whether a session established with the communication device is valid for the new access in accordance with another time period over which the communication device is in locked state from the second time to the first time, the locked state not accepting an operation by a user. | 03-24-2016 |
20160088101 | SYSTEM AND METHOD FOR MONITORING VIEWED CONTENT - A system and method for monitoring viewed content is provided. The method includes: monitoring for loading of electronic content on a user device; receiving periodic updates at a network device from the user device related to user actions associated with the electronic content; and monitoring a viewed status of the electronic content based on the user actions. The system includes: a content module configured to monitor for loading of electronic content on a user device; a tracking module configured to receive periodic updates from the user device related to user actions associated with the electronic content; and a status module configured to monitor a viewed status of the electronic content based on the user actions. | 03-24-2016 |
20160092140 | STORAGE DEVICE MANAGEMENT IN COMPUTING SYSTEMS - Various techniques of managing storage devices in a computing system are described in this application. In one embodiment, a method includes receiving an input containing consumption data representing consumption of a storage device in one of the processing units and determining if the storage device in one of the processing units is consumed excessively. In response to determining that the storage device is consumed excessively, an indicator may be generated to indicate a potential program migration from the one of the processing units to another one of the processing units in the computing system. | 03-31-2016 |
20160093203 | NETWORK DIAGNOSTIC TOOL FOR TESTING AND COMMISSIONING BUILDING SYSTEMS - A method for a building system and corresponding data processing system. A method includes receiving, by a data processing system, a building system diagnostics configuration. The method includes receiving diagnostic data corresponding to the building system diagnostics configuration and processing the diagnostic data. The method includes generating a report based on the processed diagnostic data and storing or displaying the report. | 03-31-2016 |
20160094359 | EVENT NOTIFICATIONS IN A SHARED INFRASTRUCTURE ENVIRONMENT - A shared infrastructure environment system is provided that includes a capability to notify individual nodes of notifications, events, and alerts. The system receives, via a management fabric, a subscription from an event client module for information associated with a component. The system also receives a component update associated with the component. The system identifies if any event client module operating on any node has subscribed to receive component updates associated with the component, and sends the component update, via the management fabric, to the identified event client modules. | 03-31-2016 |
20160094403 | SYSTEM AND METHOD FOR PROVIDING DATA SOURCES FOR USE IN A MULTITENANT APPLICATION SERVER ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for providing data sources in a multitenant application server environment. The system includes a an application server environment with a plurality of partitions and a resource group template referenced by a resource group in one or more of the plurality of partitions; and a data source configuration defined as part of the resource group template. The data source configuration can be overridden with attributes specific to a particular referencing partition. A data source subsystem can create a data source object in accordance with the overridden data source configuration, for use in creating connections to a database associated with the particular referencing partition, monitoring and diagnosing the data source object. | 03-31-2016 |
20160094411 | SYSTEM AND METHOD FOR OPTIMIZING PERFORMANCE OF AGENTS IN AN ENTERPRISE - An optimization computer system for optimizing performance of at least one agent in an enterprise is disclosed. The system includes a monitoring module configured to monitor one or more performance parameters of the at least one agent, wherein the at least one agent is managing one or more work requests. The optimization system further includes a computing module configured to compute at least one score for each of the one or more performance parameters and compare the at least one score with one or more predefined thresholds associated with the one or more performance parameters. The optimization system further includes a work management module configured to manage the one or more work requests assigned to the at least one agent based on comparison of the at least one score with the one or more predefined thresholds. | 03-31-2016 |
20160094412 | Close Control Loops for Data Centers - Concepts and technologies are disclosed herein for providing a closed control loop for data centers. The data centers can receive monitoring data that can include congestion data and class of service data. The data centers can store the monitoring data in a data storage device, analyze the monitoring data, and determine that a performance threshold is satisfied. In response to a determination that the performance threshold is met, the data centers can determine that a time-based threshold is met. In response to a determination that the time-based threshold is met, the data centers can adjust execution of a hosted service. | 03-31-2016 |
20160094420 | NETWORK EMBEDDED FRAMEWORK FOR DISTRIBUTED NETWORK ANALYTICS - A network analytics controller is established in a network. The network includes a plurality of nodes. A plurality of network analytics agents is established; each agent at a node of the network. Network analytics configuration parameters, including a network analytics scope, are received at the networks analytics controller. A task is assigned to each agent at a node determined to be within the network analytics scope, the task comprising that portion of the network analytics specified in the network analytics configuration parameters relevant to the corresponding node. The assigned task is performed at each agent assigned a task. The networks analytics controller receives the results of each performed task, and aggregates the received results. | 03-31-2016 |
20160094422 | STATISTICAL PATTERN CORRELATION OF EVENTS IN CLOUD DEPLOYMENTS USING CODEBOOK APPROACH - Correlations between patterns of events generated by various separate components within a cloud deployment are statistically determined. The determinations of the correlations can be based on dependencies between the components as indicated by a system topology graph including the components. The patterns correlated can be patterns of events from event streams generated by monitoring systems that monitor the components. The events in the event streams can represent changes over time in component state, behavior, or problem occurrence. Because the quantity of components within such a cloud deployment can be enormous, the quantity of events generated by the monitoring systems over a significant period of time can be voluminous. | 03-31-2016 |
20160094423 | Systems and Methods for Detecting Device Identity at a Proxy Background - A system and method is provided for determining a client device identity. In one implementation, a method is provided that can include receiving a request from a client device. The method can also include determining, based on the client device request, a subscriber identification. After determining the subscriber identification, the method can include acquiring, from a transactional history database, transactional device data associated with the subscriber identification. In some embodiments, the transactional device data can include one or more counts associated with one or more device types. The method can also include determining, based on the transactional device data, the client device identity. In some embodiments, the determination of the client device identity can include selecting a device type of the one or more device types with the maximum count and setting the client device identity to the selected device type. | 03-31-2016 |
20160094424 | Virtual Machine Processor & Memory Resource Coordinator - A network monitor is used to determine resource (e.g., CPU, memory, storage, or network) utilization of one or more virtual machines on one or more corresponding servers. Using resource utilization data for an original configuration of the virtual machines on the servers, the described system and methods simulate reconfigurations of various VMs on servers, determines resource utilization of the simulated reconfigurations, and proposes a reconfiguration that results in lower resource utilization across the one or more corresponding servers. | 03-31-2016 |
20160094425 | TELEMATICS BEHAVIOR CONFIGURATION SYSTEMS AND METHODS - Systems and methods are disclosed for configuring telematics behavior. The system includes a machine. The machine includes at least one communication module for communication to and from the machine over a network. The machine also includes a memory. The machine further includes a processor configured to receive a telematics behavior configuration file associated with a subscription number, the telematics behavior configuration file comprising at least a file transfer rule for communication over the network. The processor is also configured to store the telematics behavior configuration file in the memory. The processor is further configured to determine whether the network is available and, in response to a determination that the network is available, transfer and receive data over the network according to the telematics behavior configuration file. | 03-31-2016 |
20160094426 | MONITORING OF SHARED SERVER SET POWER SUPPLY UNITS - Power monitoring in a server set that has a shared power supply system that includes multiple power supply unit sets that each provide power to the server set. A controller monitors power usage of the server set, and evaluates the monitored power usage against the power supply capability of each of the power supply unit sets. Based on the evaluation, the controller can detect when a particular power supply unit set is no longer capable of solely providing all of the power that the server set is consuming or anticipated to consume, and then reduce power accordingly so that the particular power supply unit set could provide such power. | 03-31-2016 |
20160094429 | MOBILE PAYMENT VERIFICATION SYSTEM FOR SOCIALLY ENGINEERED FRAUD - A mirrored live-data flow of the live-data flow passing through a selected point within a network is monitored at a first processing node. The live-data flow comprises data that is in active transmission between endpoints in the network and prior to exit from the network and onward storage of the data in a database. Each packet within the mirrored data flow is decoded at the first processing node according to each protocol associated with a packet. Packets having a plurality of protocols associated therewith are decoded in parallel with each other. Each of the decoded packets are compared at the first processing node to a set of predetermined or deduced conditions. A predetermined or deduced response is executed based upon detection of a predetermined or deduced condition within the decoded packets. At least a portion of the decoded packets of the live-data flow causing execution of the predetermined or deduced response are processed at a second processing node to determine a manner for controlling an operation of the network at a same time the live-data flow is in active transmission between the endpoints in the network. The operation of the network is controlled in response to the processing step. | 03-31-2016 |
20160094431 | Service Analyzer Interface - Provided are systems and methods for determining and displaying service performance information via a graphical user interface. In one embodiment, a system can provide, for each of one or more machines associated with a service: obtaining performance data for the machine; and comparing the performance data for the machine to one or more predefined performance thresholds for the machine to determine a health status for the machine; and determining a health status for the service based at least in part on the health status of at least one of the one or more machines associated with the service. | 03-31-2016 |
20160094662 | Providing Simultaneous Data Calls for Client Devices on a Plurality of Subscriptions of a Multi-SIM Computing Device Configured with Software-Enabled Access Point Functionality - Methods, devices, non-transitory process-readable storage media for mapping different local area network (LAN) connections to different data subscriptions of a software-enabled access point (softAP) computing device. A method executed by a softAP computing device processor may include storing a mapping that associates each in a plurality of LAN connections for the LAN established by the softAP computing device with one of a plurality of wide area network (WAN) connections, connecting a client device to the LAN via one of the plurality of LAN connections, routing data traffic received from the client device to one of the plurality of WAN connections based on the stored mapping, and routing data traffic received via one of the plurality of WAN connections to the client device based on the stored mapping. The softAP computing device may also perform re-routing of data traffic based on whether WAN connections are out-of-service or have bandwidth availability. | 03-31-2016 |
20160094688 | METHODS FOR EXCHANGING NETWORK MANAGEMENT MESSAGES USING UDP OVER HTTP PROTOCOL - A network access device (NAD) receives a UDP packet from a client to be transmitted to a management server over Internet, the UDP packet including a management message. The NAD is one of NADs managed by the management server. The NAD determines whether the management server is reachable using a UDP protocol. The NAD transmits the UDP packet to the management server using the UDP protocol over the Internet if it is determined that the management server is reachable using the UDP protocol. Otherwise, the NAD extracts a UDP payload from the UDP packet, encapsulates the UDP payload within an HTTP POST request, and transmits the HTTP POST request having the UDP payload encapsulated therein to the management server using a HTTP protocol over the Internet. | 03-31-2016 |
20160094945 | VARIABLE INTERVAL FOR PERIODIC FIX REQUESTS OF MULTIPLE CLIENTS - A hub can service data requests for various different clients having different periodic fix intervals. The sensor hub detects a specified value on a timer, and adjusts a count associated with each client by the specified value. The adjustment can be either to increment or decrement, depending on the implementation. If the adjustment to any count causes the count associated with the client to reach the periodic fixed interval associated with the client, the sensor hub notifies the client. For counts that have not reached the respective fixed periodic request interval, the sensor hub iterates for the next specified value for the timer. | 03-31-2016 |
20160095057 | SYSTEMS AND METHODS FOR DISTRIBUTING OFFLOAD SERVICE PROCESSING - The present disclosure relates to computer-implemented systems and methods for transmitting and receiving audio and video data. A method may include receiving, by a device including one or more processors and a radio transceiver, an indication that the device is a short-range communication second device. The method may also include determining, by a computer including one or more processors, that processing of a job associated with a first service is to be offloaded from the one or more processors. Furthermore, the method may include identifying a first device including a first offload processing component and a second device including a second offload processing component. Additionally, the method may include determining, based at least in part on first offload capability information and second offload capability information, whether to process the job via the first offload processing component or via the second offload processing component. | 03-31-2016 |
20160099848 | SYSTEMS AND METHODS OF CLASSIFYING SESSIONS - Systems and methods of classifying sessions are disclosed. A particular method monitors user activity at one or more servers accessible via a network and capturing event entries in an activity log for user activity that is detected. The event entries include descriptive information regarding a user action, a client identifier and a session identifier. The method also includes attempting to classify sessions associated with a plurality of event entries of the activity log as legitimate use or illegitimate use of resources of the one or more servers. The method further includes identifying unclassified sessions. The method also includes determining a count of a number of unclassified sessions associated with a particular client identifier and determining a total number of sessions associated with the particular client identifier. The method further includes classifying the unclassified sessions as legitimate use or illegitimate use of the resources of the one or more servers. | 04-07-2016 |
20160099850 | ABSTRACT ACTIVITY COUNTER - In order to provide a more realistic system activity score, an activity monitor gathers activity scores from a plurality of processes on one or more communication systems. An activity score defines an activity level of a particular process. For example, how many cache hits per second are occurring in a communication system or how may a HTTP sessions a web server is handling per second. Because the activity scores are gathered from individual processes within the communication system(s), a more realistic understanding of the overall activity of the communication system(s) can be determined. The gathered activity scores are summed to produce a system activity score. The system activity score is then sent to a user. The user can then utilize the system activity score to better manage the communication system(s). | 04-07-2016 |
20160099852 | Apparatus and Method for Identifying Domain Name System Tunneling, Exfiltration and Infiltration - A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to preserve a second level domain, track requests for subdomains of the second level domain, determine the size of encoded subdomain data and determine the size of response data for subdomain requests. When the ratio of the number of unique subdomains versus the number of subdomain requests is over a first threshold a first satisfied condition is established. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds a second threshold and the size of response data exceeds a third threshold to establish a second satisfied condition corresponding to deemed domain name system tunnel activity. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds the second threshold to establish a third satisfied condition corresponding to deemed domain name system data exfiltration activity. | 04-07-2016 |
20160099854 | DIGITAL CONTENT CONSUMPTION ANALYSIS - Content consumption session progress is predicted based on historical observations of how users have interacted with a repository of digital content. This is approached as a matrix completion problem. Information extracted from tracking logs maintained by one or more content providers is used to estimate the extent to which various content items are consumed. The extracted session progress data is used to populate a session progress matrix in which each matrix element represents a session progress for a particular user consuming a particular content item. This matrix, which in principle will be highly (≳95%) sparse, can be completed using a collaborative filtering matrix completion technique. The values obtained as a result of completing the session progress matrix represent predictions with respect to how much of a given content item will be consumed by a given user. | 04-07-2016 |
20160099855 | HYBRID CONTENT DELIVERY SYSTEM - Methods and systems for delivering content are generally described. In an example, a processor may receive a first request from a first device. The first request may be a request for the content. The processor may further send at least a first chunk of content data to the first device. The content data may be associated with the content. The processor may further receive a second request from a second device. The second request may be for the content. The processor may further send an identification of the first device to the second device. The processor may further send an instruction to the second device. The instruction may be effective to establish a communication channel between the first device and the second device in order for a second chunk of the content data to be sent from the first device to the second device through the communication channel. | 04-07-2016 |
20160100018 | CROSS CHANNEL IN-VEHICLE MEDIA CONSUMPTION MEASUREMENT AND ANALYSIS - The invention provides a novel and unique system and method for cross channel in-vehicle media consumption measurement and analysis. Real-time measurement and analysis of all applicable forms of media that a driver or passenger may consume inside of an automobile can be achieved. This includes AM/FM radio, Satellite Digital Audio Radio Service (SDARS), stored media such as CDs, MP3s & DVDs, streaming media, internet radio, audio books, podcasts, text-to-speech content, use of hands-free calling and other forms of audio, including content routed to the In Vehicle Entertainment (IVE) system through integration with a smartphone, media player or other similar external Consumer Electronic (CE) device via wired or wireless connectivity, including but not limited to USB, Bluetooth, Wi-Fi, and the like, and also including integration platforms such as Apple CarPlay, Google Android Auto, Harman Aha Radio, Panasonic Aupeo, Pioneer Zypr, Ford Sync, MirrorLink, Airbiquity Choreo, and the like). | 04-07-2016 |
20160100029 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION ACTIVITIES OF A COMMUNICATION DEVICE - Aspects of the subject disclosure include, for example, selecting a first communication device of the plurality of communication devices to analyze activities of the first communication device, presenting at a device activity information associated with the activities of the first communication device, facilitating an exchange of messages between the device and the first communication device, receiving a request from the device to transfer control of the first communication device to the device responsive to the device receiving an unsatisfactory response from the first communication device, and receiving control information from the device to adjust an operational aspect of the first communication device. Other embodiments are disclosed. | 04-07-2016 |
20160105323 | NODE IDENTIFICATION USING CLUSTERS - During an initialization phase, some nodes of a network form clusters. The nodes in a cluster share information with a leader node, which knows all of the nodes that each of the nodes in the cluster is aware of. During a growth phase, clusters are randomly activated or deactivated. The nodes of the activated clusters message randomly selected known nodes, asking the nodes to merge with the cluster. The nodes of deactivated clusters determine which activated cluster to join based on received messages. After the growth phase ends, the remaining clusters may merge to form a single cluster, and the list of nodes known to the leader of the single cluster may be shared as the list of all nodes on the network. | 04-14-2016 |
20160105335 | SERVICE MONITORING INTERFACE - Services in an operating environment are represented by stored service definitions that identify entities that perform the service. Entity definitions identify machine data pertaining to the entity. A key performance indicator (KPI) of the service characterizes the service on the whole or some aspect of it. Each KPI is defined by a search query that derives a value from machine data identified in the entity definitions. Processing devices cause display of a service-monitoring page having a services summary region and a services aspects region. The summary region displays interactive summary tiles that each correspond to a service and present information about an aggregate KPI that characterizes the service. The aspects region displays interactive aspect tiles that each correspond to a KPI characterizing some aspect of an associated service. Additional information may be included in the service-monitoring page and interaction features enable a user to navigate to enhanced information displays. | 04-14-2016 |
20160105336 | SGT Feature Trace Using Netflow - Tracing of networking feature data may be provided for networking features running on network devices such as routers and switches. Examples of this feature tracing include “SGT tracing”, “Access Control Entry (‘ACE’) tracing”, and “Equal Cost Multipath (‘ECMP’) tracing.” In ACE tracing, a network administrator may desire to trace all the ACEs of Access Control Lists (“ACLs”) a particular packet is subject to. In ECMP, tracing information may be collected as to the ECMP links a particular packet is sent through at each of a plurality of network devices. | 04-14-2016 |
20160105337 | APPARATUS AND METHOD FOR ANALYZING A CONTROL NETWORK - Aspects of the present invention provide isolating and applying a common protocol which may be used by multiple devices across multiple network levels to analyze an entire system of control networks. A generic message may be sent individually to targeted addresses across a network level. If a response is received from a device at a targeted address, such as within a timeout period, a specific message customized to the individual device may be sent to extract further detail about the device, including its connectivity to other devices and networks. The system may continue automatically until resource utilization of the entire system is determined to thereby provide diagnostic and reliability services. | 04-14-2016 |
20160105338 | GRAPHICAL USER INTERFACE FOR ADJUSTING WEIGHTS OF KEY PERFORMANCE INDICATORS - Techniques are disclosed for providing an aggregate key performance indicator (KPI) that spans multiple services and for providing user adjustment to KPI factors via a GUI that enables a user to configure an aggregate KPI with feedback that better characterizes the performance of the services. The GUI may enable a user to select KPIs and to adjust weights (e.g., importance) associated with the KPIs. The weight of a KPI may affect the influence a value of the KPI has on the calculation of an aggregate KPI value (e.g., score). The GUI may provide near real-time feedback concerning the effect the weights have on the aggregate KPI value by displaying the aggregate KPI value (e.g., score) and updating the aggregate KPI value as the user adjusts the weights. | 04-14-2016 |
20160105339 | LOCALE PROFILE FOR A FABRIC NETWORK - Methods and systems for conveying locale information for an electronic device includes receiving, from a remote device and via a network interface of at least one network interfaces, a request for active or available locales for the electronic device. Conveying the locale information also includes sending, to the remote device and via the network interface, a message in a locale profile format including a list of available locales. The message includes a version field that indicates a version of schema used to transmit the list of available locales, an active local field that indicates a locale currently being used by the electronic device, and an available locales field that indicates which locales are available for use by the electronic device. | 04-14-2016 |
20160105342 | INTELLIGENTLY MANAGING PATTERN CONTENTS ACROSS MULTIPLE RACKS BASED ON WORKLOAD AND HUMAN INTERACTION USAGE PATTERNS - A method, system and computer program product for managing pattern contents across multiple racks. The workload usage characteristics of the pattern contents on a primary rack in a domain of racks are collected based on monitoring the workload usage of the pattern contents in the pattern definition and in the deployed pattern. Furthermore, information regarding use of the pattern definition, the deployed pattern and the pattern contents by users (“human interaction usage patterns”) is collected based on monitoring the human interaction usage patterns. The pattern contents are then ranked based on analyzing the collected workload usage characteristics and analyzing the collected information regarding human interaction usage patterns. Once the pattern contents are ranked, those contents that are highly ranked are deemed to be more likely to be utilized in the pattern and therefore are the contents that are copied from the primary rack to the other racks of the domain. | 04-14-2016 |
20160105344 | MESH NETWORK TRANSMISSION DECISIONS BASED ON NODE PERFORMANCE METRICS - Systems and methods for transmission of data through mesh networks are disclosed. Specifically, various techniques and systems are provided for using performance metrics of nodes in a mesh network to make data transmission decisions. Exemplary embodiments of the present invention include a computer-implemented method. The method comprises receiving, at a network device on a network, performance metrics associated with an additional network device on the network; generating performance metrics associated with the network device; storing the performance metrics associated with the network device and the performance metrics associated with the additional network device; and transmitting the performance metrics associated with the network device and the performance metrics associated with an additional network device, wherein when the performance metrics are received, the performance metrics are used to determine whether data will be transmitted to the network device. | 04-14-2016 |
20160105345 | MESH NETWORK TRANSMISSION DECISIONS BASED ON NODE PERFORMANCE METRICS - Systems and methods for transmission of data through mesh networks are disclosed. Specifically, various techniques and systems are provided for using performance metrics of nodes in a mesh network to make data transmission decisions. Exemplary embodiments of the present invention include a computer-implemented method. The method comprises receiving, at a network device on a network, performance metrics associated with an additional network device on the network; generating performance metrics associated with the network device; storing the performance metrics associated with the network device and the performance metrics associated with the additional network device; and transmitting the performance metrics associated with the network device and the performance metrics associated with an additional network device, wherein when the performance metrics are received, the performance metrics are used to determine whether data will be transmitted to the network device. | 04-14-2016 |
20160105347 | METHOD OF TRACING A TRANSACTION IN A NETWORK - A method is provided for tracking a transaction communicated in a network through nodes connected using sockets, wherein socket data is stored in one or more memory devices. The method includes identifying a start node and a trace-out socket on that node, and for i from 1 to N: by using the socket data, identifying an i | 04-14-2016 |
20160105350 | Method And System For Real-time Modeling Of Communication, Virtualization And Transaction Execution Related Topological Aspects Of Monitored Software Applications And Hardware Entities - A system and method for real-time discovery and monitoring of multidimensional topology models describing structural aspects of applications and of computing infrastructure used to execute those applications is disclosed. Different types of agents are deployed to the monitored application execution infrastructure dedicated to capture specific topological aspects of the monitored system. Virtualization agents detect and monitor the virtualization structure of virtualized hardware used in the execution infrastructure, operating system agents deployed to individual operating systems monitor resource utilization, performance and communication of processes executed by the operating system and transaction agents deployed to processes participating in the execution of transactions, providing end-to-end transaction trace and monitoring data describing individual transaction executions. The monitoring and tracing data of the deployed agents contains correlation data that allows to create a topology model of the monitored system that integrates transaction execution, process execution and communication and virtualization related aspects. | 04-14-2016 |
20160105351 | APPLICATION TESTING - The claimed subject matter includes techniques for providing an application testing service. An example method includes receiving context information from a client system, the context information comprising parameters that describe details of a user interaction with an application under test (AUT). The method also includes receiving a set of potential actions from the client system. The method also includes identifying a selected action from the set of potential actions and sending the selected action to the client system, wherein the AUT is customized based on the selected action. The method also includes receiving reward data from the client system based on a user's interaction with the AUT. The method also includes storing the context information, the selected action, and the reward data to a log of application test data. | 04-14-2016 |
20160105352 | FILE SYSTEM, CONTROL PROGRAM OF FILE SYSTEM MANAGEMENT DEVICE, AND METHOD OF CONTROLLING FILE SYSTEM - A file system includes a plurality of information-processing-devices, a plurality of storage devices and a management device, each connected to a communications network, wherein each information processing devices includes a transmission unit for transmitting state information indicating utilization state of the communications network by the information-processing-device to the management device, and the management device includes a determination unit for determining an information-processing-device to execute an inputted job, and a first storage device, and further determine a first path in the communications network for the information-processing-device to access to the first storage device, a collection unit for collecting the state information, and an alteration unit configured to identify, based on the collected state information, a second storage device enhancing access efficiency and a second path in the communications network enhancing access efficiency, and alter the first storage device and the first path to the second storage device and the second path. | 04-14-2016 |
20160105376 | Network Virtualization and Resource Allocation For the Internet of Things - A system and method for network virtualization and resource allocation, including storing one or more received network requests in a request table, and updating at least one of a flow table, a waiting list table, or a candidate group map based on the one or more received network requests. The updating includes monitoring a transmission progress of each of one or more flows in a network of interconnected computing devices and moving completed flows from the flow table to a success list, moving requests in the waiting list table which have reached an attempt threshold from the flow table to a fail list, and compiling any residual requests in the waiting list with new requests to generate a new request table. A deterministic request allocation and/or an optimizing request allocation is performed based on the new request table. | 04-14-2016 |
20160105456 | VIRTUAL MACHINE COMPLIANCE CHECKING IN CLOUD ENVIRONMENTS - One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes: establishing connection between a first resource in the virtualized computing system and a second resource in the cloud computing system to transfer files that implement the virtual machine from the first resource to the second resource; accessing, for transmission over the connection, data blocks on a storage device in the virtualized computing system that include the files; executing at least one compliance check on each of the data blocks using at least one compliance checker; and preventing each of the data blocks that fails a compliance check from being maintained in the cloud computing system. | 04-14-2016 |
20160105498 | INTELLIGENTLY MANAGING PATTERN CONTENTS ACROSS MULTIPLE RACKS BASED ON WORKLOAD AND HUMAN INTERACTION USAGE PATTERNS - A method, system and computer program product for managing pattern contents across multiple racks. The workload usage characteristics of the pattern contents on a primary rack in a domain of racks are collected based on monitoring the workload usage of the pattern contents in the pattern definition and in the deployed pattern. Furthermore, information regarding use of the pattern definition, the deployed pattern and the pattern contents by users (“human interaction usage patterns”) is collected based on monitoring the human interaction usage patterns. The pattern contents are then ranked based on analyzing the collected workload usage characteristics and analyzing the collected information regarding human interaction usage patterns. Once the pattern contents are ranked, those contents that are highly ranked are deemed to be more likely to be utilized in the pattern and therefore are the contents that are copied from the primary rack to the other racks of the domain. | 04-14-2016 |
20160105512 | DISTRIBUTED METERING AND MONITORING SYSTEM - The distributed metering and monitoring service (DMMS) system provides a way to gather and maintain metrics data which remains distributed, until requested. The DMMS system uses messaging queues to scale the number of servers that may be monitored and metered to a hyperscale of greater than 10,000 servers. The DMMS system determines how many servers (nodes) to assign to a cluster, and uses a metric aggregator to collect and store metrics data for the nodes. The DMMS system creates message queues for the instances, injects instance identifiers into the cluster state data and metrics data, listens for request messages for metering information for instances, retrieves the metrics data for users identified by the instance identifiers stored locally at the nodes, and calculates the metering information for the instance. | 04-14-2016 |
20160112244 | PRIORITIZING EVENT NOTICES UTILIZING PAST-PREFERENCE PAIRINGS - In one example of the disclosure, event notices are received, notice indicative of degradation of a configuration item. Configuration iter past-preference pairings are accessed. Each pairing includes a count of operator-exhibited preferences for event notices associated with a first configuration item relative to event notices associated with a second configuration item. A prioritized ordering of the received event notices is created utilizing the past-preference pairings. | 04-21-2016 |
20160112269 | IDENTIFYING CONFIGURATION INCONSISTENCY IN EDGE-BASED SOFTWARE DEFINED NETWORKS (SDN) - Identifying state inconsistency in edge-based software defined networks is disclosed. A verification server may receive controller network configuration data from a controller of an edge-based software defined network (SDN) and end-host network configuration data from at least one end-host of the SDN. The verification server may parse the controller network configuration data into a network state representation and the end-host network configuration data into the network state representation. The network state representation of the controller network configuration data and the end-host network configuration data may be compared to identify state inconsistency in the SDN. Responsive to identifying the state inconsistency, an alert and/or a report may be generated and transmitted to an administrator user interface. | 04-21-2016 |
20160112275 | AUTOMATIC DETECTION AND PREVENTION OF NETWORK OVERLOAD CONDITIONS USING SDN - A controller node in a network implementing software defined networking (SDN) proactively detects network overload conditions in a target node and subsequently prevents the conditions from developing by launching a new virtual network node. The detection and prevention are based on the determination of a probability of failure of the target node as a weighted function of information from the target node and probabilities of failure of related nodes. | 04-21-2016 |
20160112283 | REMOTE INDUSTRIAL MONITORING AND ANALYTICS USING A CLOUD INFRASTRUCTURE - A cloud-based infrastructure facilitates gathering, transmitting, and remote storage of control and automation data using an agent-based communication channel. The infrastructure collects the industrial data from an industrial enterprise and intelligently sorts and organizes the acquired data based on selected criteria. Message queues can be configured on the cloud platform to segregate the industrial data according to priority, data type, or other criteria. Behavior assemblies stored in customer-specific manifests on the cloud platform define customer-specific preferences for processing data stored in the respective message queues. An agent-based analytics framework in the cloud platform performs desired analytics on the data using distributed parallel processing. | 04-21-2016 |
20160112284 | SYSTEM AND METHOD OF IDENTIFYING INTERNET-FACING ASSETS - A method includes receiving a seed at a computing device. The method further includes identifying, based on first domain name system (DNS) data, first border gateway protocol (BGP) data, first whois data, or a combination thereof, a plurality of first internet-facing assets related to the seed. The method further includes identifying, based on second DNS data, second BGP data, second whois data, or a combination thereof, a plurality of second internet-facing assets related to at least one of the first internet-facing assets. The method further includes generating a graphical user interface (GUI) that includes a list of internet-facing assets related to the seed, where the list includes the plurality of first internet-facing assets and the plurality of second internet-facing assets. | 04-21-2016 |
20160112285 | APPARATUS AND METHOD FOR DETECTING ABNORMAL CONNECTION - Disclosed are an apparatus and method for detecting an abnormal connection. The apparatus for detecting an abnormal connection includes a log pattern identifier configured to identify a plurality of connection patterns each indicating connection stages from log data regarding a system connection; and a log analyzer configured to perform at least one of a first log analysis for detecting an abnormal connection stage pair indicated by a specific connection pattern among the plurality of connection patterns and a second log analysis for detecting an abnormal connection pattern indicating a specific connection stage pair among the plurality of connection patterns. | 04-21-2016 |
20160112286 | METHOD AND SYSTEM FOR DETECTING USE OF WRONG INTERNET PROTOCOL ADDRESS - The present disclosure discloses a method and a network device for detecting use of wrong IP addresses by wireless client devices. Specifically, the network device maintains a range of valid IP addresses for a particular IP subnet. Also, the network device receives a message from a wireless client device by an access point on the particular IP subnet. The network device then determines a source IP address in the message received on the particular IP subnet. Further, the network device determines that the source IP address does not match the range of valid IP addresses for the particular IP subnet. Responsive at least to determining that the source IP address does not match the range of valid IP addresses for the particular IP subnet, the network device transmits at least one message that causes the wireless client device to request a new IP address. | 04-21-2016 |
20160112287 | STORING AND ANALYZING NETWORK TRAFFIC DATA - An improved mechanism is provided for storage, recovery, and analysis of network traffic data, without requiring prohibitive amounts of storage space. Network traffic data is recorded in a sliding buffer. In normal operation, after some period of time, the oldest data in the buffer is deleted, yielding more storage space for more recent data. In response to a trigger event, such as any detected problem, attack, or similar incident, relevant pre-event and post-event data is retained for analysis. | 04-21-2016 |
20160112291 | GEOGRAPHIC SEGMENTATION SYSTEMS AND METHODS - Methods and systems for segmenting traffic based on geography include assigning coordinate location data received with respect to members of a plurality of computing devices to analytics data associated with a plurality of requests for content received from respective ones of the plurality of computing devices. A geographical location of interest is defined. The defining the geographical location of interest includes designating a plurality of points defining boundaries of the geographical location of interest. Respective ones of a plurality of traffic segments are assigned to the plurality of requests for content based in part upon a comparison of the geographical location of interest to coordinate location data assigned to respective ones of the plurality of requests for content. Network traffic metrics are generated for ones of the plurality of traffic segments. The request traffic metrics describe request behavior associated with particular segments of the plurality of traffic segments. | 04-21-2016 |
20160112293 | USING AN RPC FRAMEWORK TO FACILITATE OUT-OF-BAND DATA TRANSFERS - A system that stores sets of data blocks in extents located in storage devices is described. During operation, a receiving device receives, through an RPC framework, a first call asking to transfer an extent from a sending device to the receiving device. In response, the receiving device opens a port for a data connection that operates outside the RPC framework. The receiving device makes a second call, to the sending device through the RPC framework, asking to stream the extent to the port. The receiving device subsequently receives the extent from the sending device through the port and computes a checksum for the extent. The receiving device also receives a return from the second call, including a checksum for the extent computed by the sending device. If the computed checksum matches the received checksum, the receiving device returns the first call to indicate the transfer operation completed successfully. | 04-21-2016 |
20160112295 | BROADCAST READINESS TESTING IN DISTRIBUTED CONTENT DELIVERY NETWORKS - The disclosed embodiments provide a system that facilitates content distribution. During operation, the system obtains, at a node in a content delivery network, configuration information for a test of broadcast readiness in the content delivery network from a configuration server in the distributed content delivery network. Next, the system uses the configuration information to configure the node to participate in the test, wherein the test includes using a media delivery application on the node to play content received from the content delivery network without requiring user input to perform the test. During the test, the system uses the node to periodically provide status information associated with the node to a collection server in the content delivery network. | 04-21-2016 |
20160112483 | ADAPTIVE BIT RATES DURING BROADCAST TRANSMISSION IN DISTRIBUTED CONTENT DELIVERY NETWORKS - The disclosed embodiments provide a system that facilitates broadcast transmission in a distributed content delivery network. The system includes a node in the distributed content delivery network that plays a content stream received over the distributed content delivery network. The node includes a leadership-management apparatus that identifies the node as a peer leader in a local network of the distributed content delivery network. The node also includes a broadcasting apparatus. Upon identification of the node as the peer leader, the broadcasting apparatus obtains the content stream from a content source, broadcasts the content stream to other nodes in the local network, and adjusts a bit rate of the content stream based on one or more attributes associated with obtaining the content stream from the content source. | 04-21-2016 |
20160112504 | PROPOSED STORAGE SYSTEM SOLUTION SELECTION FOR SERVICE LEVEL OBJECTIVE MANAGEMENT - Described herein is a system and method for dynamically managing service-level objectives (SLOs) for workloads of a cluster storage system. Proposed states/solutions of the cluster may be produced and evaluated to select one that achieves the SLOs for each workload. A planner engine may produce a state tree comprising nodes, each node representing a proposed state/solution. New nodes may be added to the state tree based on new solution types that are permitted, or nodes may be removed based on a received time constraint for executing a proposed solution or a client certification of a solution. The planner engine may call an evaluation engine to evaluate proposed states, the evaluation engine using an evaluation function that considers SLO, cost, and optimization goal characteristics to produce a single evaluation value for each proposed state. The planner engine may call a modeler engine that is trained using machine learning techniques. | 04-21-2016 |
20160112522 | METHODS AND APPARATUS TO CORRELATE A DEMOGRAPHIC SEGMENT WITH A FIXED DEVICE - Methods, apparatus, systems, and articles of manufacture to correlate a demographic segment with a fixed device are disclosed. An example method includes accessing a record indicating a public Internet Protocol (IP) address used by a fixed device. A monitoring data record received from a mobile device is accessed. A demographic segment of a user of the mobile device is determined. The mobile device is associated with the fixed device when an IP address of the mobile device from the monitoring data record matches the public IP address used by the fixed device. The demographic segment of the user of the mobile device is associated with the fixed device based on the association of the fixed device and the mobile device. | 04-21-2016 |
20160119190 | TRANSPARENT MIDDLEBOX GRACEFUL ENTRY AND EXIT - Middleboxes include a processor configured to determine that a network connection between a client device and a server device is idle. A connection table is configured to create a first connection entry at the middlebox for the client device and a second connection entry at the middlebox for the server device. The first and second connection entries are initialized after determining that the network connection between the client device and the server device is idle. A network control module is configured to activate redirection of the network connection between the client device and the server device to the middlebox after determining that the network connection between the client device and the server device is idle. | 04-28-2016 |
20160119193 | METHOD AND SYSTEM FOR DETECTING PROXY INTERNET ACCESS - A method for detecting proxy internet access includes intercepting an access request from a proxied terminal of a same internet account; and sending a redirection packet to the proxied terminal sending the access request. The redirection packet carries a first timestamp indicating when the redirection packet is sent. The method also includes receiving a reported timestamp difference between the first timestamp and a second timestamp. The second timestamp is a system time of the proxied terminal acquired after the proxied terminal receives the redirection packet. Further, the method includes executing a clustering process on the reported timestamp difference to obtain a clustering result; and based on the clustering result, detecting whether the same internet account is a proxy account. | 04-28-2016 |
20160119198 | Deep Packet Inspection Method and Device, and Coprocessor - A deep packet inspection method and device, and a coprocessor. The deep packet inspection method includes receiving, by a transceiver module of the coprocessor, an original data packet sent by a general processor, and sending the original data packet to a processor core of the coprocessor; invoking, by the processor core, a sub-coprocessor of the coprocessor to perform application layer parsing on the original data packet so as to obtain an application layer parsing result; and sending, by the processor core, the parsing result to the general processor so that the general processor processes the original data packet according to the parsing result. The deep packet inspection method and device provided by the embodiments of the present disclosure reduce resource occupation of a general processor and increase a running speed. | 04-28-2016 |
20160119199 | REPORTING PAGE COMPOSITION DATA - Distributed applications are monitored and page composition metrics are reported in terms of a plurality of phases of a page loading lifecycle. The phases may include first byte received, page rendering time, onload time, post page load time, and other phases. For each phase, data regarding different types of requests may be reported. Data regarding AJAX and iFrame requests may be reported for each phase in a page load, providing more information regarding what is loaded and when. The data may be provided in a graphical ‘cascade’ format based on the phase. Information for AJAX, iFrame and other requests may include the number of such requests occurring in each phase, the average execution time of the requests, and other data. The requests and phases can be determined for multiple types of browsers based on data collection techniques compatible for each particular browser. | 04-28-2016 |
20160119200 | SYSTEMS AND METHODS FOR PROVIDING USER ANALYTICS - Systems and methods are provided for capturing user analytics for user experiences on, for example, a website, mobile application, and/or at an offline location, venue and/or event without requiring a programmer to provide specialized code in each instance. When a user event occurs, such as a click or other selection of an object and/or user action, a user analytics system captures and stores information about the event. The captured information is such that an administrator or other user is capable of identifying the object and associated analytics by viewing the captured information and/or graphical representations thereof. In addition, a user may define a model flow for comparison to actual user flows by simply navigating through a website, mobile application, and/or at an offline location, venue and/or event in a manner that the user believes is similar to how other users will navigate through the website, mobile application, and/or at an offline location, venue and/or event. The system identifies the sequence of objects selected by the user to define the model flow. | 04-28-2016 |
20160119203 | Error Detection in Critical Repeating Data in a Wireless Sensor System - Provided are methods, systems, and apparatus for error detection of bits of a data packet received at a receiver unit by detecting corrupted data bits. | 04-28-2016 |
20160119205 | Computer System and Computer-Implemented Method for Load Testing A Service-Oriented Architecture Service - A computer system for use in load testing a service-oriented architecture (SOA) service has a testing processor and a memory storage device in communication with the processor. The testing processor is adapted to receive an XML message, an address for a service to be tested, an action compliant with a protocol for exchanging structured information in a decentralized, distributed environment and associated with the service; create and store in memory a template message package compliant with the protocol; create a populated message package compliant with the protocol by incorporating in the template message package the XML message, the address and the action; establish a connection to the service and furnish one or more documents to the service; and receive a response from the service. | 04-28-2016 |
20160119207 | PROGRESSIVE DEPLOYMENT AND TERMINATION OF CANARY INSTANCES FOR SOFTWARE ANALYSIS - A data processing method, comprising: using computing apparatus, causing instantiating a plurality of baseline application instances that are running a first version of software, and one or more canary application instances that are running a second version of the software; using computing apparatus including a load balancer, causing selectively routing a first proportion of incoming requests to the baseline instances, and routing a second proportion of the incoming requests to the canary instances; monitoring the plurality of canary instances to collect performance data for performance metrics; determining that the performance data indicates a negative performance issue, and in response thereto: using computing apparatus, automatically updating the first proportion to be larger and updating the second proportion to be smaller, and then reconfiguring the load balancer based upon the first proportion and the second proportion; terminating one or more of the canary application instances. | 04-28-2016 |
20160119208 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - A method for tracking provenance information includes catching and logging data events performed by an instrumented application at a provenance layer. Overwritten library call instructions provide library calls to one or more instrumented libraries that invoke the provenance layer to track data operations. A provenance log is created that includes the logged data events. | 04-28-2016 |
20160119209 | SELECTIVELY RE-HOMING DATA PROCESSING TASKS BASED ON DATA COMPLEXITY AND CANDIDATE SYSTEM PERFORMANCE CHARACTERISTICS - Techniques are disclosed for selectively re-homing data processing tasks based on data complexity and candidate system performance characteristics. A server system obtains performance capabilities of a target system such that the server can decide whether to send program code and data to the target system for execution, based in part on the complexity of the data and code used in performing the request. In cases where a client system sending a request is capable of executing code and where other constraints are satisfied, e.g., bandwidth, throughput, and data volume, then the server can decide to re-home both the data and the program code to the client for execution. | 04-28-2016 |
20160119212 | Physical Resource Management - A method and system for resource management is provided. The method includes generating a physical server pool. Resources of the physical server pool and additional resources of additional physical server are monitored and monitored data is retrieved during the monitoring. A utilization rate of the additional physical server pools is determined to be less than a threshold value. In response a group of physical servers is migrated to a free server pool. The physical server pool is determined to need an additional server and each physical server pool is rated based on a calculated chance for required usage. A first physical server is allocated to the physical server pool. | 04-28-2016 |
20160119213 | Mapping Network Service Dependencies - A method and apparatus for discovering service dependencies. A plurality of connections is identified between nodes in a data network. A set of connection pairs is identified based on the plurality of connections identified. A set of time series is created for the set of connection pairs using monitoring data received from a plurality of sensors monitoring the data network. Service dependencies may be discovered using the set of time series. | 04-28-2016 |
20160119215 | MONITORING NETWORK PERFORMANCE OF ENCRYPTED COMMUNICATIONS - According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information. | 04-28-2016 |
20160119217 | HARDWARE TRIGGER GENERATION FROM A DECLARATIVE PROTOCOL DESCRIPTION - A test-and-measurement instrument is described. A state machine, corresponding to a regular expression, can be stored in the test-and-measurement instrument. The state machine can be modified to reflect a trigger condition received from a user. The modified state machine can then be used to invoke a trigger when the condition is met in the bits of a bit stream. | 04-28-2016 |
20160119238 | System and Method for Optimizing Transportation Over Networks - A system and method for efficient transfer of data over a network. A data source and a destination are coupled to one another via a network. The data source is configured to transmit data to the destination and determine a network latency associated with the transmission. In response to determining a first transmission parameter may not be optimized, the source is configured to modify the first transmission parameter and evaluate its effect on data throughput. The source may repeat such modifications as long as throughput is increased. Once the first transmission parameter is deemed optimized, the source may perform a similar procedure for a second transmission parameter. In various embodiments, the first transmission parameter may correspond to a packet size and the second transmission parameter may correspond to a number of streams being processed by the source. | 04-28-2016 |
20160119251 | SYSTEM AND METHOD FOR CREATING VIRTUAL INTERFACES BASED ON NETWORK CHARACTERISTICS - A network-configuring system creates stable virtual interfaces for groups of neighboring network nodes. During operation, the system can obtain network-neighborhood information from one or more network neighbors. This network-neighborhood information includes duplex-neighborhood information that indicates at least a set of neighboring devices to the network neighbor, and a set of remote network nodes which are accessible via a respective neighbor. The system can use the network-neighborhood information to determine one or more groups of network neighbors with common network characteristics, such that a respective group includes one or more mutually-connected network peers. The system can then define a virtual interface for a respective group of stable network neighbors, such that the virtual interface's member nodes include the local network node and the respective group's mutually-connected network peers. | 04-28-2016 |
20160119394 | System and Methods of Broadcasting Events Between Multiple Applications - A system and methods of broadcasting events includes receiving, at an application running on a computing device, an event from a first embedded application running on the device; triggering the event on an event aggregator of the application; and broadcasting the event to a subscriber of the application. | 04-28-2016 |
20160119433 | METHODS AND APPARATUS TO IDENTIFY SESSION USERS WITH COOKIE INFORMATION - Methods and apparatus are disclosed to identify session users with cookie information. An example method includes identifying a most recently used cookie based on a comparison of timestamps associated with a plurality of cookies, comparing an identifier of the most recently used cookie to a cookie table, the cookie table associating cookies with the plurality of different users, and when the identifier of the most recently used cookie is associated with one of the plurality of different users, associating subsequent usage activity of the computing device with the one of the plurality of different users. | 04-28-2016 |
20160119437 | Mapping Network Service Dependencies - A method and apparatus for discovering a service dependency chain. Service dependencies are discovered. A potential service dependency chain is identified based on at least a portion of the service dependencies. A number of data paths are built for the potential service dependency chain. A chain transfer entropy is computed for the potential service dependency chain based on the number of data paths. A determination is made as to whether the potential service dependency chain is the service dependency chain based on the chain transfer entropy. | 04-28-2016 |
20160119450 | METHOD AND SYSTEM FOR VIRTUALIZED NETWORK ENTITY (VNE) BASED NETWORK OPERATIONS SUPPORT SYSTEMS (NOSS) - The disclosure relates to a method and system for virtualized network entity (VNE) based network operations and support system (NOSS). The fundamental entity of network operations is VNE. Each VNE provides the necessary computing, storage, and networking features/functions that are desired by the applications (apps) or services. The apps and services provide initial, normal/nominal and overload scenario(s) based VNE configuration request to the NOSS, and the NOSS offers one or more VNE based apps/services support configuration that can be activated flexibly based on the dynamic demands. The requirements and sample operations of the NOSS, for example, attachment of virtualized layer- | 04-28-2016 |
20160127152 | NETWORK CONNECTIVITY METHODS AND SYSTEMS - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers. | 05-05-2016 |
20160127191 | Method, Apparatus And System For Automatically Discovering Nodes And Resources In A Multi-Node System - In one embodiment, a system comprises: a plurality of compute nodes having a first core, a first memory, and a first fabric; a plurality of input/output (I/O) nodes having a second core, a second memory, and a second fabric and to couple to one or more I/O devices; at least one management node to receive discovery information responsive to execution of a discovery process by the plurality of compute nodes and the plurality of I/O nodes. The discovery information may include resource request information from the plurality of compute nodes and resource availability information from the plurality of I/O nodes. The at least one management node may configure the plurality of compute nodes and the plurality of I/O nodes based thereon. The system may further include an interconnection fabric to couple the plurality of compute nodes, the plurality of I/O nodes, and the at least one management node, where the at least one management node is to enable the one or more I/O devices to be shared between at least some of the plurality of compute nodes based on the discovery information. Other embodiments are described and claimed. | 05-05-2016 |
20160127192 | LOOP-FREE CONVERGENCE IN COMMUNICATION NETWORKS - In one embodiment, a method includes identifying a change in network topology at a network device, transmitting a test packet from the network device to determine if an adjacent network device located in a backup path has converged following the network topology change, and updating a forwarding information base at the network device in response to the network topology change if a response to the test packet indicates that the adjacent network device has converged. An apparatus and logic are also disclosed herein. | 05-05-2016 |
20160127195 | COMBINING NETWORK ANALYSIS AND PREDICTIVE ANALYTICS - Records are obtained from sources and typed datasets are assembled based on the obtained records. Relationships are identified among the typed datasets and at least one network comprising nodes and edges are assembled based on the identified relationships. A network analyzer assembles a vector and the vector is passed to analytics. The analytics then generate an output that is provided to a user or other device in the form of data. | 05-05-2016 |
20160127197 | NETWORK DISCOVERY OPTIMIZATION USING SUPPLEMENTAL INFORMATION PUBLISHED BY DEVICES - Methods, systems and computer readable media for optimizing (or improving) network discovery using supplemental information published by devices and available on their neighbor devices are described. In some implementations, the method can include obtaining, at a network management computer system, a list of one or more seed devices. The method can also include retrieving a device identifier of a corresponding seed device from the list of one or more seed devices. The method can further include querying, at the network management computer system, the corresponding seed device to obtain neighboring device connectivity information of the seed device and supplemental information for each neighboring device. | 05-05-2016 |
20160127198 | METHOD AND ARCHITECTURE FOR DISTRIBUTED CLOUD DOMAINS - An application, interface, device and method for coordinating a parameter across cloud domains of various distributed data centers. The method includes using an infrastructure service for generating one or more values of the parameter so that the values are different from each other; and providing the values to the respective cloud domains. | 05-05-2016 |
20160127200 | DYNAMIC SCALING OF STORAGE VOLUMES FOR STORAGE CLIENT FILE SYSTEMS - A network-based data store maintaining storage volumes for file systems at storage clients may implement dynamic storage volume scaling. A scaling event may be detected according to a specified scaling policy for a storage volume maintained at a network-based data store that is mounted at a storage client and configured for a file system. In a least some embodiments, the scaling policy for the storage volume may be received from the storage client. In response to detecting the storage event, storage maintaining the storage volume may be modified according to the scaling policy to scale the storage volume. An indication of the scaling event may be sent to the storage client in order to update the file system at the storage client so that the file system may utilize the scaled storage volume. | 05-05-2016 |
20160127204 | PERFORMANCE EVALUATION METHOD AND INFORMATION PROCESSING DEVICE - In performance estimation when the configuration of a computer system is changed, the influence, on performance, of a temporary increase in load to a computer system due to reallocation of a process request allocated to a degenerated server to another server as a result of server degeneration is taken into consideration. In an embodiment, an information processing device which evaluates the performance of the computer system estimates the performance of the computer system when operation of a server included in the computer system is stopped based on the throughput required for the server at the time of operation stop and outputs the estimated performance of the computer system. | 05-05-2016 |
20160127206 | RACK AWARENESS DATA STORAGE IN A CLUSTER OF HOST COMPUTING DEVICES - A method receives physical location information for racks in which application running environments are located. Each rack includes multiple host computing devices in a cluster of host computing devices. Application running environment-rack associations are generated using the physical location information for the cluster where an application running environment-rack association maps an application running environment to a rack. The application running environment-rack associations are provided to the cluster. Then, the method provides a data set for storing in the cluster of hosts where the data set is associated with a placement strategy. The cluster uses the placement strategy to store a data block in the data set for a first application running environment and store a replica data block for a second application running environment at a location in the cluster based on the first application running environment being associated with a first rack from the application running environment-rack associations. | 05-05-2016 |
20160127207 | System for Analyzing an Industrial Control Network - A system may be provided in which an industrial control network may be discovered and characterized such that useful networking data may be presented to a user and/or monitored for events. By configuring an interrogator device to send a “generic” message to ranges of network locations, presences of devices at particular locations may be determined. The generic message may direct any of numerous devices types to provide a response including multiple parameters. The interrogator may store such parameters in “data records,” and may advantageously send periodic collections of data records, or “data sets,” to a processing manager. The processing manager, in turn, may communicate with one or more data structures to format, enrich and/or monitor the networking data to more conveniently and reliably capture and maintain networks and connected devices. | 05-05-2016 |
20160127208 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 05-05-2016 |
20160127211 | Systems and Methods for Queuing Access to Network Resources - One embodiment of the present invention provides apparatus and methods for queuing access by large numbers of Internet or other network-based users to networked systems and resources with limited capacity. In one example embodiment, a queuing system provides user access to network resources, such as that of a ticketing system. A ticket queue queues a request received from a client system. A request processing module causes the client system to repeatedly transmit messages to the system during a first period, and in response to determining that the client system has ceased transmitting messages during the first period, the request is remove from the queue and/or cause the request goes unfulfilled. | 05-05-2016 |
20160127212 | DYNAMIC MANAGEMENT OF INTEGRATION PROTOCOLS - An illustrative embodiment of a computer-implemented process for dynamic management of integration protocols connects a set of applications to a communication fabric to form a set of connections, which are monitored to collect a set of performance metrics. In response to a determination the predetermined performance metric is not within the predetermined tolerance associated with the particular application in the set of applications an integration path in the set of connections for the particular application in the set of applications is adjusted by programmatically using a set of rules wherein each rule in the set of rules is a performance driven rule. | 05-05-2016 |
20160127219 | System and Method for Data Path Validation and Verification - A method for operating a source node includes receiving a data path validation request command requesting validation of a path associated with a traffic flow identified in the data path validation request command, and determining a first hop sequence in accordance with the path being validated, wherein the first hop sequence is identical to a second hop sequence associated with a non-validation request packet associated with the path being validated. The method also includes generating, by the source node, a validation request packet in accordance with the data path validation request command, the validation request packet comprises route information associated with the first hop sequence, an alert flag set to a specified value, and a path validation header specifying processing performed by nodes receiving the validation request packet, and transmitting, by the source node, the validation request packet in accordance with the route information. | 05-05-2016 |
20160127238 | CONGESTION MONITORING - A method, system and computer program for congestion monitoring in a data network. The method comprises: determining, at a server in the data network, that a user device has initiated a data session with the data network; monitoring, at the server, a plurality of data flows associated with the data session to determine an average bandwidth of the plurality of data flows; and determining a congestion status of the data session based on the average bandwidth and one or more criteria. | 05-05-2016 |
20160127276 | PACKET CAPTURE ENGINE FOR COMMODITY NETWORK INTERFACE CARDS IN HIGH-SPEED NETWORKS - A method, systems for a packet capture engine for commodity network interface cards (NICs) in high-speed networks that provides lossless zero-copy packet capture and delivery services by exploiting multi-queue NICs and multicore architectures. The methods, systems include a ring-buffer-pool mechanism and a buddy-group based offloading mechanism. | 05-05-2016 |
20160127290 | Method and system for detecting spam bot and computer readable storage medium - Disclosed is a method for detecting a spam bot, including: each mail sent by a monitored host in a network is scored, and it is determined whether the each mail is a normal mail or a junk mail according to comparison between a score of the each mail and a preset classification threshold; it is determined whether the monitored host is a spam bot according to a determination result of the each mail sent by the monitored host. Further disclosed are a system for detecting a spam bot and a computer readable storage medium. | 05-05-2016 |
20160127310 | DISTRIBUTED INDUSTRIAL CONTROL MONITORING AND MANAGEMENT - An industrial control system provides for a bottom-up configuration and incremental growth in size and complexity without requiring system-specific programming at a central control or display point. XML packets are transmitted from the controllers upon event occurrences and controllers are assigned human meaningful names and group names. By knowing the addressing information for a single controller in a named group of controllers, the identity, addressing and basic status for other members of the group are provided graphically. This can allow operation in a low-bandwidth environment, including LTE cellular communications. | 05-05-2016 |
20160127484 | PERSONAL MONITORING USING A REMOTE TIMER - Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes logging in, through a network accessible device, a geo position of a subject to initiate a monitored session associated with the subject. A countdown timer of a remote server is initiated to denote a monitored time interval, the remote server in communication with the network accessible device over a network. A notification is generated and transmitted across the network to a monitoring device responsive to a conclusion of the monitored time interval. | 05-05-2016 |
20160127487 | SYSTEMS AND METHODS FOR GENERATING A UNIQUE FINGERPRINT AGGREGATING SET OF UNIQUE TRACKING IDENTIFIERS THROUGHOUT REQUEST/RESPONSE PROCESSING - Systems and methods for generating a fingerprint including multiple tracking identifiers. Control circuitry receives a first tracking identifier from a first component of a network. The first tracking identifier is associated with a data request sent to the first component. The control circuitry identifies parameters based on a configuration of the first component. The control circuitry transmits an application programming interface (API) request for information related to the parameters from the first component. The control circuitry receives information related to the parameters for the first component in response to the API request. The control circuitry determines a second tracking identifier based on the first tracking identifier and the information related to the parameters for the first component. The control circuitry transmits the second tracking identifier to the first component. The first tracking identifier and the second tracking identifier are combined to generate a fingerprint in connection with the data request. | 05-05-2016 |
20160127488 | METHODS AND APPARATUS TO IMPROVE USAGE CREDITING IN MOBILE DEVICES - Methods, apparatus, systems and articles of manufacture are disclosed to identify a first request having a first source port number, from a device. Examples disclosed herein determine whether a second request, having a second source port number, is within a threshold number of ports from the first source port number. Examples disclosed herein group the first and the second requests as a first session when the second source port number is within the threshold number of ports from the first source port number, and identify an application associated with the first session. | 05-05-2016 |
20160127499 | DETERMINING A VISITATION PROFILE FOR A USER - A method, non-transitory computer-readable storage device, and apparatus for determining a visitation profile for a user are disclosed. For example, the method gathers uniform resource locator visitation data from each user endpoint device of a plurality of user endpoint devices associated with the user, aggregates the uniform resource locator visitation data that is gathered from the plurality of user endpoint devices associated with the user, and determines the visitation profile for the user, wherein the visitation profile indicates a trend of the uniform resource locator visitation data over a time period. | 05-05-2016 |
20160134468 | OPTIMIZING INTER-PAN TRAFFIC - In one embodiment, a device identifies inter-personal area network (PAN) traffic between a first PAN and a second PAN. The device identifies a network node in the first PAN associated with the inter-PAN traffic and determines that the network node should join the second PAN. The device causes the network node to join the second PAN, in response to determining that the network node should join the second PAN. | 05-12-2016 |
20160134481 | MULTI-PATH AWARE TRACING AND PROBING FUNCTIONALITY AT SERVICE TOPOLOGY LAYER - In one embodiment, a system and method are disclosed for sending a request and receiving a reply. The request contains a network service header including a flow label field and a target index field. The flow label field contains a set of available flow labels. The target index field includes a value indicating a target node. The reply contains information indicating which of the flow labels can be used to route a packet to each of the next hop nodes downstream from the device that sent the reply. This process can be repeated for other nodes on a path, and other paths in a service topology layer. The information determined by this process can be used to perform other necessary functionalities at the service topology layer. | 05-12-2016 |
20160134491 | SELF CONFIGURING NETWORK MANAGEMENT SYSTEM - Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device on the network. In another example, information related to at least one aspect of the network is obtained by a network management device, and at least one applicable management policy is identified by the device; and the identified policy is used to manage at least one aspect of the network's operation. | 05-12-2016 |
20160134493 | Determining I/O Performance Headroom - A system and method for determining I/O performance headroom that accounts for a real-world workload is provided. In some embodiments, a computing device is provided that is operable to identify a data transaction received by a storage system and directed to a storage device. The computing system identifies an attribute of the data transaction relating to a performance cost of the data transaction and queries a performance profile to determine a benchmark performance level for the storage device. The computing system determines a benchmark performance level for the storage system based on the benchmark performance level for the storage device and compares a metric of the performance of the data transaction with the storage system benchmark performance level to determine remaining headroom of the storage system. | 05-12-2016 |
20160134494 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - Systems for enabling an application to track provenance include an instrumented application binary on a client device. Overwritten library call instructions provide library calls to one or more instrumented libraries that invoke a provenance layer to track data operations. The provenance layer is configured to catch and log data events performed by the instrumented application. | 05-12-2016 |
20160134495 | LOGGING DEVICE AND LOG AGGREGATION DEVICE - A logging device ( | 05-12-2016 |
20160134496 | Traffic Statistics Collection Method and Device - Provided by the present disclosure are a traffic statistics collection method and device. In the method, one and the same counter is adopted to set an input control parameter for each type of message in N types of messages respectively; N count values are acquired from the counter when a first preset moment is reached, wherein the N count values include: a total number count of the N types of messages and N−1 input control parameter counts, which are received by a preset port at the first preset moment; and statistics are collected for traffic, at the first preset moment, of the each type of message in the N types of messages through the N input control parameters and the N count values respectively, thereby saving counter resources. | 05-12-2016 |
20160134498 | NON-DISRUPTIVE INTEGRATED NETWORK INFRASTRUCTURE TESTING - Non-disruptive integrated testing of network infrastructure in which one or more processors of a first network interface device (NID) performs tests on a network cable connected to a first NID of a host system, and connected to a second NID. Tests verify connectivity of the cable, a bandwidth capacity baseline, and a maximum bandwidth of the network cable. A self-test determines the host operating system, host status, and operational status of the host NID, and responsive to changed conditions, NID settings are reverted to a pre-validated condition state, and confirmation of reverting is sent to the host. Network activity is suspended if received by the host ID during scheduled network cable tests. Upon completion of tests and storing of test results in NID memory network activity resumes. Results of the tests are transferred from memory of the first NID to persistent storage of the host system. | 05-12-2016 |
20160134503 | PERFORMANCE ENHANCEMENTS FOR FINDING TOP TRAFFIC PATTERNS - A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic clusters are generated based on the acquired data. A Bloom filter is populated with the acquired flow data records. Clusters of interest are identified from the generated unidimensional traffic clusters. The identified clusters of interest are compressed into a compressed set. A determination is made whether a multidimensional processing of the acquired flow data needs to be performed based on a priority associated with the alert signature. A multidimensional lattice corresponding to the unidimensional traffic clusters is generated. The multidimensional lattice is traversed and for each multidimensional node under consideration a determination is made if the Bloom filter contains flow records matching the multidimensional node under consideration. A determination is made if the unidimensional node corresponding to the multidimentional node is included in the compressed set of unidimensional nodes. | 05-12-2016 |
20160134504 | SYSTEM MANAGEMENT AND MAINTENANCE IN A DISTRIBUTED COMPUTING ENVIRONMENT - Technology for monitoring all resources and services of a distributed computing environment to collect and store information technology (IT) infrastructure resources, task resource usage metrics, and idle times of the environment. A system management task, both manually created by administrators and automatically scheduled, is queued on a management queue to be processed at a later time. When the system management task is removed from the queue, resources required to execute the activity of the distributed computing environment are then requested. The task is authorized to execute if the requested resources and time to complete the activity are available. The resources are then secured and the system management task executed in the distributed computing environment. | 05-12-2016 |
20160134505 | SYSTEM MANAGEMENT AND MAINTENANCE IN A DISTRIBUTED COMPUTING ENVIRONMENT - Technology for monitoring all resources and services of a distributed computing environment to collect and store information technology (IT) infrastructure resources, task resource usage metrics, and idle times of the environment. A system management task, both manually created by administrators and automatically scheduled, is queued on a management queue to be processed at a later time. When the system management task is removed from the queue, resources required to execute the activity of the distributed computing environment are then requested. The task is authorized to execute if the requested resources and time to complete the activity are available. The resources are then secured and the system management task executed in the distributed computing environment. | 05-12-2016 |
20160134508 | NON-DISRUPTIVE INTEGRATED NETWORK INFRASTRUCTURE TESTING - A method, computer program product, and system for non-disruptive integrated testing of network infrastructure is provided. A computer processor on a first network interface device that performs a set of tests on a network cable of a network infrastructure, a first end of the network cable is connected to the first network interface device of a host system, and a second end of the network cable is connected to a second network interface device. The computer processor suspends performance of the set of tests, in response to network activity requests received by the first network interface device. The computer processor resumes performance of the set of tests, in response to completion of the network activity. The computer processor stores results of the set of tests in compartmentalized memory, and the computer processor generates a report including the results of the set of tests. | 05-12-2016 |
20160134713 | SYSTEM AND METHOD FOR TRACKING AND ILLUSTRATING USER ACTIVITY IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes detecting actions taken by users in a computer-implemented matching system and, for each of the detected actions, storing data indicative of the detected action. The method further includes filtering the stored data in accordance with at least one filter selected by an administrator of the computer-implemented matching system and creating a user action log from the filtered stored data. The user action log includes all of the stored data that matches the selected at least one filter. The at least one filter may include log start time, log end time, type of action, user ID, target user ID, and/or site type. The detected action may include viewing another user's profile, changing the user's own profile, sending a message to another user via the computer-implemented matching system, and/or performing a matching search using the computer-implemented matching system. | 05-12-2016 |
20160134716 | METHOD AND SYSTEM FOR COLLECTING AND PROVIDING APPLICATION USAGE ANALYTICS - Methods and systems for collecting and analyzing application usage are disclosed. A usage analytics module is integrated within an application. The application is deployed to a device. Usage analytics are received, at a server, in response to usage of the application at the device. The usage analytics are provided to the developer, wherein the usage analytics includes at least one of: information identifying a user of the application or information linking the usage analytics to an existing user identity. | 05-12-2016 |
20160142262 | MONITORING A COMPUTING NETWORK - A computer-implemented method of monitoring a computing network includes identifying a topology pattern in a computing network. The method also includes assigning a management template for a configuration item type of the topology-pattern. The method further includes applying the management template to a configuration item instance of the configuration item type. | 05-19-2016 |
20160142269 | Inline Packet Tracing in Data Center Fabric Networks - Presented herein are embodiments for tracing paths of packet flows in a data center fabric network. Filters are configured on nodes (e.g., switches) in the data center fabric network for a particular packet flow. Numerous such filters can be configured on each of the switches, each filter for a different packet flow. When a filter detects a match, it sends a log of such occurrence to a network controller. The network controller uses log data sent from nodes as well as knowledge of the network topology (updated as changes occur in the network) to determine the path for a particular packet flow in the data center fabric network. This technique works inline on the actual packet flow and does not need additional debug packets to be injected. This technique can also quickly point out the problem node in case of traffic drop. | 05-19-2016 |
20160142270 | ANALYZING DATA SOURCES FOR INACTIVE DATA - According to embodiments of the present invention, machines, systems, methods and computer program products for analyzing data sources for inactive data are presented. Data accesses within one or more data sources are monitored, and data access information is generated based on the monitored data accesses, wherein the data access information indicates accessed and non-accessed data within the one or more data sources. The data access information is applied to a profile to identify inactive data within the one or more data sources, wherein the profile includes one or more criteria for determining inactive data including a time interval for data access. Notifications of the identified inactive data within the one or more data sources are generated. | 05-19-2016 |
20160142271 | Predicting Performance by Analytically Solving a Queueing Network Model - An approach is provided for predicting system performance. The approach operates by identifying a Queuing Network Model (QNM) corresponding to an information technology (IT) environment that includes a number of servers that perform a plurality of parallel services. The QNM is transformed to a linear model by serializing the parallel services as sequential services. Hardware based service demands are retrieved from the system. Software-based service demands are inferred from the hardware-based service demands. Predicted performance results of the IT environment are calculated based on the hardware-based service demands, the software-based service demands inferred from the hardware-based service demands, and the system transaction rate of the system. | 05-19-2016 |
20160142272 | NON-COMMITTAL VISITOR STITCHING - Techniques are provided for transforming information about unique visits to a website or interactions with a mobile application by a single individual on different devices into unified analytical data representing these visits. One or more visitor stitching models can be used to quantify unique visits as belonging to the same person with a certain level of confidence. In addition to maintaining separate records for each unique visit, a unified record is generated, which represents a combination of the unique visits by the same person. Various analytics can then be performed on the unique and unified records. The unified records are favored over the separate data records wherever the stitching model corresponding to the unified record provides a certainty that meets or exceeds a user-specified confidence level. The visitor stitching model used for the analytics is considered non-committal because different models can be employed or none at all, depending on user preferences. | 05-19-2016 |
20160142273 | SYSTEMS AND METHODS FOR EXTRACTING MEDIA FROM NETWORK TRAFFIC HAVING UNKNOWN PROTOCOLS - Methods and systems for analyzing network traffic. An analysis system receives network traffic, which complies with a certain protocol. The received network traffic carries a data item, which may be of value to an analyst. In order to access the data item in question, the analysis system automatically identifies the media type of the data item, by processing the network traffic without decoding the protocol. The analysis system identifies the media type irrespective of the protocol in order to avoid the computational complexity involved in decoding the protocol. | 05-19-2016 |
20160142274 | CIRCUIT-AWARE LOAD BALANCING WITH DYNAMIC QUALITY OF SERVICE - Monitoring packets can be sent periodically across IP network tunnels that traverse internet connections to a customer location, and the monitoring packets used to determine current packet-loss, latency, and jitter metrics in each direction for each available circuit. Circuits may be assigned to circuit sets, each most appropriate to various classes of user traffic, and user traffic assigned to circuit sets based on traffic class. If monitored metrics change beyond set thresholds, a determination is made as to whether the changes are due to circuit saturation or some other cause. If saturation is the problem, logic at either or both tunnel endpoints dynamically adjusts QOS rate limits to optimum values (the highest rate that does not cause threshold violations) in near-real time. | 05-19-2016 |
20160142275 | METHOD, SYSTEM AND APPARATUS FOR DETECTING INSTANT MESSAGE SPAM - A system including a metrics server and a messaging server is provided. The metrics server receives traffic data describing instant messages sent via the messaging server, and from the traffic data generates and updates suspicion indices corresponding to the computing devices that sent the messages. The suspicion indices are passed to the messaging server, which can modify its handling of subsequent messages based on the suspicion indices of the senders. | 05-19-2016 |
20160142276 | COMMUNICATION SYSTEM, MANAGMENT SERVER, AND MONITORING APPARATUS - It is provided a communication system comprising: a first monitoring apparatus configured to monitor a control signal related to a connection request between a network and a terminal, and generate a reception log; a second monitoring apparatus configured to monitor a packet inputted/outputted to/from a gateway apparatus configured to transfer user data, sort the packet for each session, identify a type of an application which generates the session, and generate a session log including the type of an application; and a traffic management server configured to acquire the reception log generated by the first monitoring apparatus and the session log generated by the second monitoring apparatus, correlate the reception log with the session log by using an occurrence time of the reception log, an occurrence time of the session log, and an identifier of the terminal, and identify an application related to a session which generated the control signal. | 05-19-2016 |
20160142277 | NETWORK DEVICE, CONTROL METHOD, AND STORAGE MEDIUM - The present invention relates to a network device that is connected to a network and able to perform communication with a monitoring server via the network, a control method of a network device, and a storage medium that stores a program of implementing the control method. A network device according to the present embodiment generates first transmission data including setting information of the network device and generates second transmission data in the same structure as the first transmission data with lower processing load than the first transmission data. The network device transmits the generated second transmission data to the monitoring server using a command for executing a process different from a communication acknowledgement process. The network device suppresses transmission of the first transmission data in a case where a predetermined response to transmission of the second transmission data from the monitoring server is not received. | 05-19-2016 |
20160142279 | SYSTEMS AND METHODS FOR TRAP MONITORING IN MULTI-CORE AND CLUSTER SYSTEMS - In a multi-core device or clustered system, instead of snmpd polling for configured monitoring values of an entity to determine if reached a threshold, each core in a multi-core system or node in a clustered system triggers information to the snmpd about entities that may be or are generating SNMP traps. A configured threshold T is distributed among the cores or nodes, as the case may be, based on the number of cores or nodes. If there are ‘n’ cores in a multi-core device, and the configured threshold is ‘T’, then each core checks for a per-core threshold value ‘T/n’. If there are ‘n’ nodes in a clustered system, and the configured threshold is ‘T’, then each node checks for a per-node threshold value ‘T/n’. According to the pigeonhole principle, if an entity has reached or exceeded the threshold ‘T’, then the entity must have reached or exceeded a value of ‘T/n’ on at least one core or node. Upon the entity crossing a ‘T/n’ value on any core or node, the core or node informs snmpd about this entity. Snmpd then gathers information about this entity from all the cores and checks for the threshold ‘T’. | 05-19-2016 |
20160142486 | DATA-ACCESS SYSTEM AND METHOD FOR STORING DATA AND READING DATA - A data-access system, adapted to a plurality of Cloud storage providers, including a processing module, an access module and a storage module. The processing module receives a file, and obtains a dismantling rule according to file information. The processing module further dismantles the file into a plurality of sub-files according to a storage signal and the dismantling rule. The access module respectively detects the status of the connection of the Cloud storage providers, and the sub-files are stored to at least two of the Cloud storage providers according to the connections statuses. The storage module stores the dismantling rule and the storage records correspond to the sub-files. | 05-19-2016 |
20160142499 | CLICK THROUGH RATE ESTIMATION IN VARYING DISPLAY SITUATIONS - The presently disclosed subject matter includes at least a method, system and a program storage device of estimating click through rate (CTR) of a pair of source and recommendation, the source comprising a plurality of slots, each slot configured to present a served recommendation. The CTR estimation is performed by first determining an estimated calibration CTR coefficient for each slot and then using this information for calculating an estimated CTR of a given slot when served with a given recommendation in a given source. | 05-19-2016 |
20160142504 | Unified Tracking Data Management - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 05-19-2016 |
20160149763 | Systems and Methods for Providing an Administrative Framework in a Cloud Architecture - The invention is an eighth layer cloud administrative framework that provides for both monitoring users and providing needed software. The cloud framework guides software tool implementation so that users can accomplish business tasks efficiently. | 05-26-2016 |
20160149768 | AUTOMATIC COMPLETION OF FAILED SELF-CARE RESOLUTION ATTEMPT FOR INTERACTIVE SYSTEMS - A system receives a communication from a user via a first communication channel used by users to automatically resolve an issue. The system monitors, using a processor of a computer, interaction between the user and the system during the communication. Then, as a result of the monitoring, a failed attempt by the user to resolve an issue is identified. The failed attempt is categorized into one of a plurality of categories for each of which a different option for establishing a second communication to resolve the issue is provided. A second communication is then established with the user via a second communication channel distinct from the first communication channel, in accordance with the categorizing, to resolve the failed attempt. | 05-26-2016 |
20160149775 | DETERMINING PHYSICAL LOCATION OF A NETWORKED COMPUTING DEVICE - Techniques for determining location of a networked computing device are presented herein. An association module may be configured to associate two or more co-located computing devices based on an association selected from the group consisting of a common user, network address similarities, local communications between the two or more co-located computing devices, and co-location patterns. A location module may be configured to determine the location for the one of the two or more co-located computing devices, at least in part, based on a location of an associated computing device. | 05-26-2016 |
20160149776 | ANOMALY DETECTION IN PROTOCOL PROCESSES - Systems, methods and transitory computer-readable storage media for constructing a loop free multicast tree. The methods include collecting data sample points to form a first data set, each of the data sample points representing a network feature variable, each network feature variable associated with a corresponding network feature, calculating a standard deviation and a mean value of the network feature variables for each network feature, performing normalization of the network feature variables to obtain normalized network feature variables, calculating, using the standard deviation and the mean value for each network feature, a probability value (p-value) for each normalized network feature variable, and determining if an anomaly exists with respect to each network feature based at least upon the p-value for each normalized network feature variable. | 05-26-2016 |
20160149777 | SYSTEM FOR UTILITY USAGE TRIGGERING ACTION - The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems are provided for measuring usage or measurements, using sensors, of utilities or other environmental factors, generating profiles based on the usage or measurements, and triggering actions within a network device based on the usage, measurements and profiles. Embodiments of the present invention may include, for example, compiling historical usage based on the use or measurements detected by a network device and generating a usage profile based on that use or measurements. The normal usage profile may be compared with the usage over a certain predetermined period of time to detect any abnormal use or measurements from the network device, and an action may be taken as a result of an abnormality. | 05-26-2016 |
20160149782 | METHOD OF DETERMINING STATUS OF SERVING NODES - A method of determining the status of serving nodes suited for a parallel data computing architecture is disclosed herein. The method comprises the following steps: sending a first connection request from the first serving node to the second serving node through a first data communication interface; determining a first connection signal fed from the second serving node by the first serving node; sending a second connection request from the first serving node to the second serving node through a second data communication interface by the first serving node while the first connection signal shows that a connection between the serving nodes is unable to be built; determining the second connection signal fed from the second serving node by the first serving node so as to decide a status of the second serving node to process a status response procedure, thereby avoiding a huge amount time-consuming waiting. | 05-26-2016 |
20160149785 | SCALABLE ELASTIC CLOUD-BASED IMS SYSTEM, METHOD AND PACKAGE - The present invention is related to a scalable elastic cloud-based IMS system and method. According to the invention, a controller is used for maintaining a consistent view of the status of instantiated logical entities and for determining a state of overall availability of networked computing resources. The controller is further configured to deploy code from a function code repository and/or service code repository on an un-instantiated programmable logical entity or to terminate and release an instantiated programmable logical entity. | 05-26-2016 |
20160149786 | Flexible and Safe Monitoring of Computers - Described is a server monitoring technology that is scalable to large numbers of servers, e.g., in a datacenter. Agents on servers run queries to monitor data sources for that server, such as performance counters and other events. The agents monitor their resource usage and those of monitored events to stay within an administrator-specified resource budget (policy), e.g., by modifying the running queries and/or monitoring parameters. A controller receives results of the monitoring, analyzes the results, and takes action as needed with respect to server operation and monitoring. The controller may dynamically update an agent's queries, monitoring parameters and/or monitored data post-processing operations. The controller may issue alerts and reports, including alerts indicative of inter-server problems between two or more servers. | 05-26-2016 |
20160149787 | DATA TRANSMISSION SYSTEM, DATA TRANSMISSION MONITORING METHOD, AND COMPUTER-READABLE MEDIUM - A method of monitoring data transmission is applied to a data transmission system which includes at least one server device and a client device, each of which is linked to a telecommunications network. The at least one server device is used for generating a data stream and a data generation rate relative to the data stream. The data stream and the data generation rate are transmitted to the client device over the telecommunications network. The client device calculates a data receiving rate of data received from the data stream by the client device, and determines whether a comparison result of the data receiving rate with the data generation rate meets a predetermined condition. If YES, the client device generates a warming signal. | 05-26-2016 |
20160149788 | Passive Performance Measurement for Inline Service Chaining - A method is implemented by a network device to monitor the performance of packet processing in an in-line service chain, the network device one of a plurality of network devices forming a software defined network (SDN) and the in-line service chain. The SDN includes a controller to configure the plurality of network devices. The method includes receiving a sequence of packets of a data flow traversing the in-line service chain, applying a hash function to the sequence of packets of the data flow to generate a set of hash values for the sequence of packets, and sending the set of hash values and a set of timestamps for the sequence of packets to the controller to determine delay and loss across a service of the in-line service chain. | 05-26-2016 |
20160149790 | NON-INTRUSIVE IT DEVICE MONITORING AND PERFORMING ACTION BASED ON IT DEVICE STATE - Infrastructure management device(s) may monitor IT device(s) communicatively connected over a network. IT device state(s) may be determined for at least one of the IT device(s). Action(s) may be performed on one or more IT device(s), determined at least in part, by the state of the IT device(s). | 05-26-2016 |
20160149792 | APPLICATION CONTROL - Systems and methods for controlling applications on a network are provided. According to one embodiment, a network security device intercepts network traffic and conducts a heuristic detection of an application protocol used in the network traffic by multiple application protocol identifying engines defined in a heuristic rule. According to another embodiment, the network security device confirms a suspect application protocol as an actual application protocol used in the network traffic by sending a probing request to the destination peer of the network traffic based on the suspect application protocol. The suspect application protocol is confirmed if an appropriate response is received from the destination peer. | 05-26-2016 |
20160149793 | SYSTEM FOR EVALUATING A COMPUTER NETWORK'S OPERATION CONTINUITY - The invention is directed to determining a readiness of a computer network to operate under adverse conditions. Once an adverse condition scenario is selected and location(s) within the computing network computing resources associated with the location(s) are determined, the system determines (i) whether a continuity operation(s), which are associated with the computing resources, is available to be triggered and (ii) whether the computing resource(s) is affected by occurrence of the at least one adverse condition scenario. | 05-26-2016 |
20160150013 | PROVISIONAL EXECUTION OF DYNAMIC CONTENT COMPONENT - Expediting content delivery is disclosed. A request for content is received from a requestor. A cached component of the requested content that includes at least some cached executable content is identified. The cached component of the requested content is provided to the requestor for provisional execution. It is determined whether a change, if any, in the requested content may invalidate the provisional execution; and | 05-26-2016 |
20160150038 | Efficiently Discovering and Surfacing Content Attributes - Systems, computing devices, and methods for efficiently surfacing information relating to an item of content to a user are presented. A process executing on a user's computing device monitors for a user indication to obtain related information regarding an item of content. Upon receiving the indication, the process formulates a request for the related information and submits the request to a content aggregation service. The content aggregation service identifies the content and extracts a plurality of attribute/value pairs from an aggregated content store regarding the subject matter of the item of content. The extracted information is returned to the requesting process as the related information, which is then presented to the user. | 05-26-2016 |
20160156501 | NETWORK APPARATUS WITH INSERTED MANAGEMENT MECHANISM, SYSTEM, AND METHOD FOR MANAGEMENT AND SUPERVISION | 06-02-2016 |
20160156522 | DATACENTER TOPOLOGY DEFINITION SCHEMA | 06-02-2016 |
20160156532 | SERVER SYSTEM FOR MONITORING WORKING INFORMATION | 06-02-2016 |
20160156535 | METHODS AND APPARATUS TO CAPTURE DATA PLANE INFORMATION | 06-02-2016 |
20160156536 | SYSTEM AND METHOD FOR DETECTING ACTIVE STREAMS USING A HEARTBEAT AND SECURE STOP MECHANISM | 06-02-2016 |
20160156537 | METHOD AND NETWORK MONITORING DEVICE FOR ESTIMATING WEB PAGE DOWNLOAD TIME ON A USER DEVICE | 06-02-2016 |
20160156538 | WORK CONSERVING BANDWIDTH GUARANTEES USING PRIORITY | 06-02-2016 |
20160156542 | MAINTENANCE METHOD FOR NETWORK CONNECTION AND COMPUTER SYSTEM | 06-02-2016 |
20160156727 | USER PRESENCE AGGREGATION AT A SERVER | 06-02-2016 |
20160164714 | ALERT MANAGEMENT SYSTEM FOR ENTERPRISES - A method for managing alerts generated in an enterprise environment is described. The method comprises discarding, by a processor, one or more duplicate alerts based on one or more predetermined rules, wherein a duplicate alert is an instance of an alert occurring within a duplicate alert arrival time associated with the alert. The method further comprises obtaining an alert correlation signature associated with the alert from a database, wherein the alert correlation signature comprises information associated with one or more alerts correlated to the alert. The method further comprises, obtaining, from the database, a temporal signature associated with the alert, wherein the temporal signature indicates a probable time of occurrence of the alert. Further, the alert, the alert correlation signature, and the temporal signature are transmitted to a computing device of a user of the enterprise environment. | 06-09-2016 |
20160164721 | ANOMALY DETECTION IN TIME SERIES DATA USING POST-PROCESSING - Described herein are systems, mediums, and methods for detecting anomalies in a signal by applying two analysis algorithms in parallel to the signal. The results of the two algorithms are combined during a post-processing step. The first analysis algorithm detects a first set of anomalies using amplitude-based anomaly detection method. The first set of anomalies includes large dips/spikes with short duration and large week-by-week variations with long duration. The second analysis algorithm detects a second set of anomalies using statistics-based anomaly detection method. The second set of anomalies includes subtle changes with sharp edges and medium duration. The first set of anomalies and the second set of anomalies are merged in a post-processing step. All spikes and all changes that satisfy a pre-determined criteria are removed from the merged data. Adjacent anomalies are concatenated. The resulting set of anomalies is used to determine service outage at a network server. | 06-09-2016 |
20160164738 | Vertical Scaling Of Computing Instances - Technology for scaling computing instances is provided. In one example, a method may include identifying vertical scaling rules defining a criterion for vertically scaling a computing instance from a first instance type to a second instance type. The method may further include monitoring usage of the computing instance and vertically scaling the computing instance from the first instance type to the second instance type based on the usage as compared to the vertical scaling rules. | 06-09-2016 |
20160164742 | SYSTEMS AND METHODS OF DISCOVERING AND CONTROLLING DEVICES WITHOUT EXPLICIT ADDRESSING - A method of discovering a device in a communication network having multiple interconnected nodes includes continuously monitoring, by a device to be discovered, any IP packets sent by a discoverer. The method further includes transmitting, by the discoverer, an IP packet destined for a downstream device and receiving, by the device to be discovered, the IP packet. The method further includes determining, by the device to be discovered, whether the IP packet is intended for the device to be discovered. If the IP packet is not intended for the device to be discovered, retransmitting, by the device to be discovered, the IP packet to the downstream device via an egress port of the device to be discovered. | 06-09-2016 |
20160164754 | MONITORING USER TERMINAL APPLICATIONS USING PERFORMANCE STATISTICS FOR COMBINATIONS OF DIFFERENT REPORTED CHARACTERISTIC DIMENSIONS AND VALUES - An application analysis computer receives reports from user terminals which contain application performance metrics and dimensions having values characterizing the applications and the user terminals. Statistics for each different one of the performance metrics across the reports are generated for repeating time intervals. One of the statistics that has changed between two of the time intervals by an amount that satisfies a defined rule is identified, and the associated performance metric is selected for analysis. For each combination of a different one of the dimensions and a different one of the values occurring for the dimension, a statistic is generated for the selected performance metric associated with the combination, and a counter is incremented that tracks a number of occurrences of the combination among the reports. Sets of the statistic and the counter for particular ones of the combinations that satisfy an action rule are identified. | 06-09-2016 |
20160164755 | Reducing the Impact of Noisy Neighbors via Pro-Active Log Offloading in Shared Storage Environment - Methods and systems may provide for reducing workloads of neighboring virtual machine tenants in a cloud environment with shared storage using pro-active log offloading. Additionally, logging activity may be redirected to reduce input/output resource consumption. Trends in future input/output activities may be determined and preemptive action may be implemented to reduce performance impact of the neighboring tenants. | 06-09-2016 |
20160164757 | BROWSER PROVIDED WEBSITE STATISTICS - Browser provided website statistics is described. In one or more implementations, usage data corresponding to navigation to websites using a web platform (e.g., web browser) is collected at computing devices which implement the web platform. The usage data is communicated to a centralized analytics service which aggregates usage data received from web platforms implemented at multiple different computing devices. At the analytics service, the usage data is correlated with individual websites and analyzed to generate website statistics for each individual website. The website statistics can then be exposed to a user associated with the website (e.g., the owner or the developer of the website) to enable access to the website statistics without the need to modify the code of the website to include an analytics tracker or a customized tracking solution. | 06-09-2016 |
20160164758 | METHOD FOR AUTOMATIC TRACKING OF HYBRID FIBER COAXIAL UPSTREAM SERVICE UPGRADES - A method implemented in a computer system for determining upstream transmission capability in an area of a hybrid fiber-coaxial (HFC) cable plant network, the area including network components, and customer premises equipment (CPE) devices. The method configures a downstream transmission that includes a marker channel, and initiates the downstream transmission to each CPE device. The method sends a query to each CPE device to request a status of the marker channel at the CPE device. The method receives a response to the query from at least one CPE device, and determines a status of each network component based on the response to the query from said at least one CPE device subtending from the network component. | 06-09-2016 |
20160164759 | TRANSMISSION DEVICE, RECEIVING DEVICE, AND RELAY DEVICE - Provided are a transmission device, a receiving device, and a relay device, whereby it is possible to achieve low latency voice communication, and to prevent deterioration in voice data. The transmission device comprises: a data distribution means ( | 06-09-2016 |
20160164763 | IN-VEHICLE SERVICES THROUGH ATTENDANT DEVICES, USER-PROVIDED DEVICES, AND/OR AN IN-VEHICLE COMPUTER SYSTEM - An approach to facilitating in-vehicle services through attendant devices, user-provided devices, and/or an in-vehicle computer system is provided. In one implementation, one or more communication sessions with the in-vehicle computer system may be facilitated by an attendant device. Passenger information relating to one or more passengers of a vehicle and service information relating to one or more services to be provided to the one or more passengers may be obtained by the attendant device from the in-vehicle computer system via the one or more communication sessions. The passenger information and the service information may be provided by the attendant device. An indication that at least one service is in progress or is complete is received by the attendant device. | 06-09-2016 |
20160164764 | CLUSTER ARCHITECTURE FOR NETWORK SECURITY PROCESSING - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 06-09-2016 |
20160164765 | METHODS AND APPARATUS FOR TRACKING DATA FLOW BASED ON FLOW STATE VALUES - In one embodiment, a processor-readable medium storing code representing instructions that when executed by a processor cause the processor to update, at a memory location, a first flow state value associated with a data flow to a second flow state value when at least one of a packet from the data flow is received or the memory location is selected after a time period has expired. At least a portion of the packet is analyzed when the second flow state value represents a flow rate of a network data flow anomaly. | 06-09-2016 |
20160164766 | DATA POLLING SYSTEM AND METHOD FOR HANDHELD DEVICE - A data polling system and method for a handheld device are provided, where a server is used to receive an execution instruction or an newly data and set a polling time according to the execution instruction or the newly data so that the polling time is dynamically adjusted according to different execution operations, in such a manner that the handheld device may perform a polling data updating by its application program so that resource consumption may be reduced and the updated data may be acquired on line with respect to the application program. | 06-09-2016 |
20160164769 | AUTOMATIC INCREASING OF CAPACITY OF A VIRTUAL SPACE IN A VIRTUAL WORLD - A system for automatically increasing a capacity of a virtual space in a virtual world may include a processor and a module operating on the processor for detecting an attempt by an avatar to enter a virtual space in a virtual world. The system may also include another module for determining if an allowable number of avatars is currently in the virtual space. The allowable number of avatars may be determined by at least a capacity of a server that is hosting the virtual space. Another module may be provided for increasing a capacity of the virtual space when the allowable number of avatars is currently in the virtual space. Increasing the capacity of the virtual space may include spawning a replicate new virtual space on a different server in response to the capacity of the server that is hosting the virtual space reaching the allowable number of avatars. | 06-09-2016 |
20160164771 | PARTNER DISCOVERY IN CONTROL CLUSTERS USING SHARED VLAN - At a first virtual device executing in a data processing system, a determination is made whether a partner list associated with the first virtual device includes a threshold number of partner virtual devices, the first virtual device participating in the control cluster. A first Live packet is unicast over the VLAN to each partner virtual device identified in the partner list. A unicast of a second Live packet from a second virtual device to the first virtual device is received over the VLAN, the second virtual device being identified in the partner list. A Hello packet is broadcast over the VLAN to cause the Hello packet to reach a third virtual device, wherein the Hello packet is configured to discover a new partner virtual device to add to the partner list, discovering the new partner enlarging the control cluster. | 06-09-2016 |
20160164984 | Determining Browsing Activities - Determining browsing activities is described. In one or more implementations, browsing history data, indicating navigation to websites using a web platform, is analyzed to determine a browsing activity, such as shopping, planning a trip, and so forth. The websites navigated to using the web platform as part of the browsing activity are then stored with the browsing activity to enable subsequent access to the websites. In one or more implementations, for each browsing activity, one or more suggested websites which are related to the browsing activity are determined and stored with the browsing activity to enable access to the suggested websites. | 06-09-2016 |
20160164989 | MEDIA EXPOSURE AND VERIFICATION UTILIZING INDUCTIVE COUPLING - Examples disclosed herein collect a cookie at a first device based on media accessed via a web page at the first device, obtain user information from a second device via communicative coupling between the first device and the second device, and in response to an instruction embedded in the media, send a hypertext transfer protocol (HTTP) request to a server, the HTTP request including the cookie, the user information, and information identifying exposure to the media. | 06-09-2016 |
20160165007 | QUALITY OF EXPERIENCE FOR COMMUNICATION SESSIONS - A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a participant focus metric for each of a plurality of participants of a communication session. The method may also include identifying one of the plurality of participants of the communication session as having sufficient capacity to support the communication session based upon, at least in part, the participant focus metric for each of the plurality of participants of the communication session. The method may also include selecting the one of the plurality of participants having a sufficient capacity to support the communication session as a selected focus for the communication session. The method may further include adaptively implementing a centralized communication session architecture utilizing the selected focus. | 06-09-2016 |
20160165009 | QUALITY OF EXPERIENCE FOR COMMUNICATION SESSIONS - A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a participant focus metric for each of a plurality of participants of a communication session. The method may also include identifying one of the plurality of participants of the communication session as having sufficient capacity to support the communication session based upon, at least in part, the participant focus metric for each of the plurality of participants of the communication session. The method may also include selecting the one of the plurality of participants having a sufficient capacity to support the communication session as a selected focus for the communication session. The method may further include adaptively implementing a centralized communication session architecture utilizing the selected focus. | 06-09-2016 |
20160171789 | TERMINAL MOUNTED IN VEHICLE, CONTROL METHOD THEREOF, DATA CENTER AND CONTROL METHOD THEREOF | 06-16-2016 |
20160173321 | MONITORING USER TERMINAL APPLICATIONS USING PERFORMANCE STATISTICS FOR COMBINATIONS OF DIFFERENT TYPES OF REPORTED CHARACTERISTIC DIMENSIONS AND VALUES | 06-16-2016 |
20160173346 | METHOD AND DEVICE TO UPDATE CONTACTS | 06-16-2016 |
20160173347 | SYSTEM AND METHOD FOR SYNCHRONOUS MEDIA RENDERING OVER WIRELESS NETWORKS WITH WIRELESS PERFORMANCE MONITORING | 06-16-2016 |
20160173348 | SELECTION OF MESSAGE PASSING COLLECTIVES IN PRESENCE OF SYSTEM NOISE | 06-16-2016 |
20160173349 | SIMULATOR FOR TESTING A GATEWAY DEVICE | 06-16-2016 |
20160173353 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD | 06-16-2016 |
20160173402 | SYSTEM WITH ON-DEMAND STATE FOR APPLICATIONS | 06-16-2016 |
20160173444 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR INITIATING AND EXECUTING PERFORMANCE TESTS OF A PRIVATE NETWORK AND/OR COMPONENTS THEREOF | 06-16-2016 |
20160173538 | PUSHING EVENTS TO WEB PAGES USED FOR INTERACTION WITH APPLICATIONS | 06-16-2016 |
20160173566 | Method and a Device thereof for Monitoring the File Uploading via an Instrument | 06-16-2016 |
20160173618 | METHOD AND APPARATUS OF PERFORMING PEER-TO-PEER COMMUNICATION ESTABLISHMENT AND CONNECTION CHANGE-OVER | 06-16-2016 |
20160173626 | EMBEDDABLE WEB ANALYTICS TRACKING VIA MOCK ENVIRONMENT | 06-16-2016 |
20160173641 | SYSTEM WITH ON-DEMAND STATE FOR APPLICATIONS | 06-16-2016 |
20160182274 | SYSTEM AND METHOD OF PRIORITIZING ALARMS WITHIN A NETWORK OR DATA CENTER | 06-23-2016 |
20160182296 | NETWORK NODE POLICY GENERATION AND IMPLEMENTATION | 06-23-2016 |
20160182297 | METHODS, NETWORK NODES, AND COMPUTER PROGRAM PRODUCTS FOR PRICE SIGNAL FEEDBACK FOR NETWORK OPTIMIZATION | 06-23-2016 |
20160182301 | METHOD AND SYSTEM FOR RESOURCE-AWARE DYNAMIC BANDWIDTH CONTROL | 06-23-2016 |
20160182309 | CLOUD-BASED EMULATION AND MODELING FOR AUTOMATION SYSTEMS | 06-23-2016 |
20160182318 | SYSTEM AND A METHOD FOR ADAPTIVE MANAGEMENT OF RESOURCES THROUGH ANALYSIS OF CHANGE | 06-23-2016 |
20160182320 | TECHNIQUES TO GENERATE A GRAPH MODEL FOR CLOUD INFRASTRUCTURE ELEMENTS | 06-23-2016 |
20160182321 | Active Waterfall Charts for Continuous, Real-Time Visualization of Website Performance Data | 06-23-2016 |
20160182322 | CONTROLLING REPORTING BY AN INSTRUMENT ENCAPSULATION MODULE ENCAPSULATING AN APPLICATION PROGRAM ON A USER TERMINAL | 06-23-2016 |
20160182323 | AUTOMATIC PROCESS DATA TRANSMISSION AND MONITORING FOR AN INDUSTRIAL PROCESS NETWORK | 06-23-2016 |
20160182324 | DYNAMIC BOUNDARY BASED MONITORING AND METERING | 06-23-2016 |
20160182326 | TECHNIQUES FOR DETERMINING QUEUE BACKLOGS, ACTIVE COUNTS, AND EXTERNAL SYSTEM INTERACTIONS IN ASYNCHRONOUS SYSTEMS | 06-23-2016 |
20160182328 | PERFORMANCE ANALYSIS AND BOTTLENECK DETECTION IN SERVICE-ORIENTED APPLICATIONS | 06-23-2016 |
20160182330 | COORDINATED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 06-23-2016 |
20160182331 | COORDINATED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 06-23-2016 |
20160182333 | MEASURING AFFINITY BANDS FOR PRO-ACTIVE PERFORMANCE MANAGEMENT | 06-23-2016 |
20160182334 | Integrated Metering of Service Usage for Hybrid Clouds | 06-23-2016 |
20160182335 | CLIENT-INDEPENDENT NETWORK SUPERVISION APPLICATION | 06-23-2016 |
20160182336 | HYBRID CLOUD NETWORK MONITORING SYSTEM FOR TENANT USE | 06-23-2016 |
20160182338 | SYSTEM AND METHOD FOR CONTROLLING AN INFORMATION HANDLING SYSTEM IN RESPONSE TO ENVIRONMENTAL EVENTS | 06-23-2016 |
20160182343 | TECHNOLOGIES FOR PROTOCOL EXECUTION WITH AGGREGATION AND CACHING | 06-23-2016 |
20160182345 | END-TO-END DATACENTER PERFORMANCE CONTROL | 06-23-2016 |
20160182347 | DETECTION OF END-TO-END TRANSPORT QUALITY | 06-23-2016 |
20160182658 | INFERRING USER IDENTITY ACROSS MULTIPLE APPLICATIONS AND USER DEVICES | 06-23-2016 |
20160182662 | Network User Usage Profiling | 06-23-2016 |
20160191319 | DYNAMICALLY LAUNCHING INTER-DEPENDENT APPLICATIONS BASED ON USER BEHAVIOR - A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage. | 06-30-2016 |
20160191329 | SYSTEMS AND METHODS FOR TOPOLOGY DISCOVERY AND APPLICATION IN A BORDER GATEWAY PROTOCOL BASED DATA CENTER - An information handling system is provided. The information handling system includes a network orchestration service running on a computer processor. The network orchestration service provides a Border Gateway Protocol (BGP) listener module and a topology builder module. The BGP listener module is configured to receive information from a plurality of spine devices configured as an autonomous system and the topology builder module is configured to use the information received by the BGP listener module to create a topology of a data center that includes the plurality of spine devices. Additionally, the network orchestration service is in communication with a memory that is used to store information received by the BGP listener module and the topology of the data center. Applications of the information handling system for better operating the data center are also provided. | 06-30-2016 |
20160191335 | Systems and Methods of Network Analysis and Characterization - Systems and methods for characterizing networks are disclosed. In several embodiments, a network analyzer applies a network analysis to a network that replaces components of the network in a model of the network with equivalent or bounding models. The network analyzer can then characterize the simplified model of the network and an assessment can be made concerning the accuracy of the characterization of the network. | 06-30-2016 |
20160191336 | NETWORK PERFORMANCE PREDICTION METHOD AND APPARATUS - The present application relates to a method and apparatus of predicting network performance, wherein the method includes: obtaining M performance parameter data of a link; calculating a cloud model digital feature of network performance of the link according to the M performance parameter data; calculating N predicted performance parameter data of the network performance of the link according to the cloud model digital feature; and raising a prediction alarm that the link has a risk of exceeding a limit if there is data exceeding a preset upper limit value in the N predicted performance parameter data, wherein M and N are preset positive integers. A change trend of network performance is analyzed according to real-time monitored data of the network performance of the link to predict future performance parameter data, and whether an alarm is raised and protection switching is performed is determined based on the prediction. | 06-30-2016 |
20160191348 | APPLICATION-AWARE NETWORK MANAGEMENT - In one implementation, an application-aware network control system determines that a network flow has been instantiated, derives network flow features associated with the network flow in response to determining the network flow has been instantiated, and provides the network flow features to an application identification module. In response to an application identification signal, the application-aware network control system ceases deriving the network flow features, and applies a flow action to the network flow based on an application identification report received from the application identification module. | 06-30-2016 |
20160191349 | STRESS TESTING AND MONITORING - Computer networks include multiple hardware and software devices, each working together to provide a favorable user experience to an operator. Many of these devices are built to standards that have been published by international standards organizations. These standards include functional test criteria that, when executed successfully, assure functionality of the device within a group of devices. The technology disclosed maintains libraries of canned tests based on these published standards. In addition, the technology disclosed can collect, adapt, and execute sets of predefined transactions to a target test network. This will validate that the target test network can scale up to a desired combination of transactions of different types. This is accomplished by manipulating example transaction sets captured from probes or routers that save network accounting records from a model network. | 06-30-2016 |
20160191352 | NETWORK ASSET INFORMATION MANAGEMENT - A network asset information management system ( | 06-30-2016 |
20160191356 | Multimodal content recognition and contextual advertising and content delivery - The present disclosure is directed to providing supplemental content to one or more client devices requesting multimedia content. The supplemental content may be determined or selected based on the availability of one or more device channels, such as a display, speakers, or other component of the one or more client devices capable of providing an output. The supplemental content may also be selected based on one or more characteristics of the requested multimedia content, such as a genre, subject matter, or duration. Furthermore, the supplemental content may be determined or selected based on the portions of the requested multimedia content that are the most prominent or significant, such as any audio content, any video content, and/or any textual content. The supplemental content may be provided to the one or more client devices such that it is displayed before, during, or after the display of the requested multimedia content. | 06-30-2016 |
20160191359 | REACTIVE DIAGNOSTICS IN STORAGE AREA NETWORKS - The present techniques relate to reactive diagnostics of a storage area network (SAN). In one implementation, the method for performing reactive diagnostics in the SAN comprises determining a topology of the SAN, wherein the SAN comprising devices and connecting elements to interconnect the devices. The method further comprises depicting the topology in a graph, wherein the graph designates the devices as nodes and the connecting elements as edges, and the graph comprises operations associated with at least one component of the nodes and edges. Thereafter, at least one parameter indicative of performance of the at least one component is monitored to ascertain degradation of the at least one component. The method further comprises performing reactive diagnostics for of the at least one component, to determine root cause of the degradation, based on the operations. | 06-30-2016 |
20160191360 | INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD - An information processing system includes: a communication device; and a management device configured to manage the communication device, wherein the management device: acquires traffic information on a port of the communication device at a plurality of time points from the communication device; calculates a plurality of autocorrelation coefficients based on the traffic information at the plurality of time points; calculates a plurality of weights based on the plurality of autocorrelation coefficients; and calculates a weighted average of traffic at the plurality of time points based on the plurality of weights and the traffic information at the plurality of time points. | 06-30-2016 |
20160191361 | SYSTEM FOR AGGREGATING STATISTICS ASSOCIATED WITH INTERFACES - Some embodiments provide a statistics collection framework that is used to aggregate statistic for interfaces such as logical ports and logical port pairs. Flows that are related with these interfaces are tagged with the identifier of the logical entities for which statistics are being collected. The interface statistics is periodically sent in the background to a statistics aggregator. The read queries for the interface statistics are directed to the statistics aggregator. The statistics aggregator, therefore, acts as a cumulative cache for the interface statistics. | 06-30-2016 |
20160191364 | Communication device, server device, communication method, and non-transitory computer readable medium - A communication device includes a computer including a processor. The computer controls the communication device to perform operations. The operations include establishing a first connection with a first external device and establishing a second connection with a second external device, via a communication network. The operations include transmitting a keep-alive packet to the first external device via the first connection at a first transmission cycle and receiving a response packet for the keep-alive packet. The operations include determining the first transmission cycle according to transmission cycle determination processing which transmits a measurement packet to the first external device via the first connection at a candidate time interval after the second connection is established or after another measurement packet is received via the second connection, and confirming whether the measurement packet transferred by the first external device to the second external device is received via the second connection. | 06-30-2016 |
20160191365 | DATA CENTER MIGRATION TRACKING TOOL - A system stored in a non-transitory medium executable by processor circuitry for tracking the migration of a plurality of servers between data centers is provided. In one embodiment, the system comprising a job scheduler tool that receives a list of migrating devices that are migrating from an origin data center to a destination data center. A migration database stores migration data for each migrating device, the migration data including information representing a current migration state and past migration states of each migrating device. One or more processors execute migration logic to identify destination information in the destination data center for each migrating device in the list of devices, and an analyze tool checks the current migration state of each migrating device and identifies errors during migration of each migrating device to the destination data center. | 06-30-2016 |
20160191366 | SYSTEM AND METHOD FOR TRIGGERING ON PLATFORM USAGE - A system and method for triggering on platform usage can include at a platform, receiving and storing a trigger configuration of an account; operating a platform comprising internally executing a process on behalf of an account and publishing at least one event when executing the process; at the platform, incrementing a counter in response to the at least one event and if the stored trigger configuration species a usage key associated with a category of counted events of the at least one event; monitoring counters in a context of an associated trigger; and processing the trigger upon the counter satisfying condition of an associated trigger. | 06-30-2016 |
20160191369 | MONITORING SUPPORT SYSTEM, MONITORING SUPPORT METHOD, AND RECORDING MEDIUM - The present invention relates to a monitoring support system for supporting monitoring of the migration of an IT resource. The monitoring support system includes: a virtualization control part for migrating an IT resource from a first monitoring system as a migration source to a second monitoring system as a migration destination; an IT resource management table update part for updating the migration source IT resource stored in an IT resource table in which the migration source IT resource or the migration destination IT resource is associated with the physical server to which the IT resource belongs; and a monitoring configuration migration part for migrating the monitoring configuration of the migration source IT resource, from the first monitoring system to the second monitoring system. | 06-30-2016 |
20160191376 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND COMMUNICATION DEVICE - An information processing apparatus including: an arithmetic processing unit; and a communication device configured to receive data from another information processing apparatus through a plurality of first lanes and to output the received data to the arithmetic processing unit, wherein the communication device includes a detection unit that detects a failure of the plurality of first lanes; and a control unit that performs a first degradation process of stopping use of any one of the plurality of first lanes, based on a degradation request, performs a restoration process of resuming use of a first lane for which use has been stopped, based on a restoration request, and performs a second degradation process of stopping use of a first lane for which use has been resumed, when the detection unit detects a failure of the first lane for which use has been resumed, in the restoration process. | 06-30-2016 |
20160191397 | I/O DRIVEN RATE ADAPTATION - Described is an I/O driven, feedback based rate control mechanism that allows a transfer session to self-adjust its transfer rate in response to the speed of the storage device at the destination. The described system may operate at the application layer, which makes cross-platform deployment an easier task | 06-30-2016 |
20160191632 | Apparatus and Method to Use PTP Timestamps for Two-Way Delay and Delay Variation Measurement in IP Networks - A method is implemented by a network device to establish a two-way active measurement protocol (TWAMP) test session that supports use of a Network Time Protocol (NTP) timestamp format and a Precision Time Protocol Version 2 (PTPv2) timestamp format. The network device acts as a server that communicates with a control-client to establish a TWAMP test session between a sender and a reflector. The method includes sending a server greeting message to the control-client indicating timestamp formats that the reflector can set, receiving a set-up-response message from the control-client indicating timestamp formats that the sender can interpret, checking whether the sender supports the multiple timestamp format extensions to TWAMP, configuring the reflector to set timestamps in a format that the reflector can set and the sender can interpret if the sender supports multiple timestamp format extensions to TWAMP, and sending a server-start message to the control-client. | 06-30-2016 |
20160197766 | SOFT REDUNDANCY PROTOCOL | 07-07-2016 |
20160197768 | METHOD AND SYSTEM TO IDENTIFY A SOURCE OF SIGNAL IMPAIRMENT | 07-07-2016 |
20160197788 | CALCULATING TRUST SCORES BASED ON SOCIAL GRAPH STATISTICS | 07-07-2016 |
20160197790 | LOG ANALYSIS SYSTEM | 07-07-2016 |
20160197795 | DISCOVERING AND MONITORING SERVER CLUSTERS | 07-07-2016 |
20160197796 | SYSTEM AND METHOD FOR EFFICIENT CLASSIFICATION AND PROCESSING OF NETWORK TRAFFIC | 07-07-2016 |
20160197801 | ELECTRONIC HEALTH AND WELFARE MONITORING OF NETWORK SERVER OPERATIONS | 07-07-2016 |
20160197803 | VIRTUAL SERVICE AUTOMATION | 07-07-2016 |
20160197809 | SERVER DOWNTIME METERING | 07-07-2016 |
20160197814 | METHOD AND APPARATUS FOR SOFTWARE DETECTION | 07-07-2016 |
20160197833 | TRAFFIC SHAPING BASED ON REQUEST RESOURCE USAGE | 07-07-2016 |
20160197848 | CONTENT DISTRIBUTION RESOURCE ALLOCATION | 07-07-2016 |
20160197989 | MANAGING TRAFFIC-OVERLOAD ON A SERVER | 07-07-2016 |
20160198010 | Workflow to Automatically Generate Reports for Different Component-Level Metadata After Interacting with Multiple Web Services | 07-07-2016 |
20160203069 | MECHANISM FOR PROVIDING REAL TIME REPLICATION STATUS INFORMATION IN A NETWORKED VIRTUALIZATION ENVIRONMENT FOR STORAGE MANAGEMENT | 07-14-2016 |
20160204975 | EVENT AND ALERT ANALYSIS IN A DISTRIBUTED PROCESSING SYSTEM | 07-14-2016 |
20160204992 | DYNAMIC TELEMETRY MESSAGE PROFILING AND ADJUSTMENT | 07-14-2016 |
20160204996 | SUBSCRIBER TRACING IN COMMUNICATIONS | 07-14-2016 |
20160204998 | METHOD OF CONSTRUCTING DATA COLLECTOR, SERVER PERFORMING THE SAME AND STORAGE MEDIUM FOR THE SAME | 07-14-2016 |
20160204999 | MONITORING APPARATUS AND INFORMATION PROCESSING SYSTEM | 07-14-2016 |
20160205000 | EXPLORATIVE VISUALIZATION OF COMPLEX NETWORKS IN CONSTRAINED SPACES | 07-14-2016 |
20160205002 | SYSTEMS AND METHODS FOR NETWORK DATA FLOW AGGREGATION | 07-14-2016 |
20160205003 | Method to provide inferred intentional data analysis to user(s), using IoT (Internet of Things) devices | 07-14-2016 |
20160205004 | Techniques for Monitoring Virtualized Network Functions or Network Functions Virtualization Infrastructure | 07-14-2016 |
20160205005 | METHOD OF PROCESSING TRAFFIC TO RECOVER SERVICE CHAIN PATH, SERVICE FUNCTION FORWARDING NODE USING THE SAME, AND NETWORK SYSTEM USING THE SAME | 07-14-2016 |
20160205007 | Multi-Application SaaS Metering Engine | 07-14-2016 |
20160205008 | DIAGNOSIS AND THROUGHPUT MEASUREMENT OF FIBRE CHANNEL PORTS IN A STORAGE AREA NETWORK ENVIRONMENT | 07-14-2016 |
20160205009 | COLLECTION OF PERFORMANCE DATA IN A COMMUNICATIONS NETWORK | 07-14-2016 |
20160205010 | ADAPTIVE SERVICE TIMEOUTS | 07-14-2016 |
20160205170 | METHOD OF TRANSMITTING DATA STRUCTURES FROM ONE COMPUTER TO ANOTHER COMPUTER | 07-14-2016 |
20160205207 | SYSTEMS AND METHODS FOR SMART PUBLISHING | 07-14-2016 |
20160205208 | COMPUTER-IMPLEMENTED METHOD, A NETWORK DEVICE AND COMPUTER PROGRAM PRODUCTS FOR TRACKING OPT-OUT USER PREFERENCES IN A GLOBAL COMMUNICATION NETWORK | 07-14-2016 |
20160254943 | MONITORING A CLOUD SERVICE MODELED AS A TOPOLOGY | 09-01-2016 |
20160254969 | SERVICE METRIC ANALYSIS FROM STRUCTURED LOGGING SCHEMA OF USAGE DATA | 09-01-2016 |
20160254970 | Tracking And Analyzing Mobile Application User Interactions | 09-01-2016 |
20160254975 | VIRTUAL PRIVATE NETWORK DEAD PEER DETECTION | 09-01-2016 |
20160254977 | NETWORK COMMUNICATION AND COST AWARENESS | 09-01-2016 |
20160254981 | MONITORING DEVICE INFORMATION ANALYZING DEVICE AND METHOD, AND NON-TRANSITORY STORAGE MEDIUM STORING PROGRAM | 09-01-2016 |
20160254982 | System Testing Framework | 09-01-2016 |
20160255146 | Detecting Anomalous Conditions in a Name Server Network | 09-01-2016 |
20160255160 | METHOD AND SYSTEM FOR DETERMINING PRINTER LOCATION ON A MAP | 09-01-2016 |
20160255163 | METHODS AND SYSTEMS FOR RECOMMENDING MEDIA CONTENT | 09-01-2016 |
20160380806 | IDENTIFYING PERFORMANCE-DEGRADING HARDWARE COMPONENTS IN COMPUTER STORAGE SYSTEMS - Performance-degrading hardware components in computer storage systems are identified. A timed-out input/output (I/O) operation is detected. Hardware components that include a plurality of types of hardware components involved with the timed-out I/O operation are identified. Involve counts of the hardware components are increased. A plurality of suspicious hardware components are identified based, at least in part, on a hardware hierarchy including one or more types of hardware components. There is at most one suspicious hardware component for each type of hardware component. A performance-degrading hardware component is identified from among the plurality of suspicious hardware components based, at least in part, on the involve counts and the hardware hierarchy. The performance-degrading hardware component is in a layer of the hardware hierarchy that is lower than layers including other suspicious hardware components. | 12-29-2016 |
20160380839 | EFFICIENT PARALLEL PROCESSING OF A NETWORK WITH CONFLICT CONSTRAINTS BETWEEN NODES - According to one exemplary embodiment, a method for parallel processing a network of nodes having at least one ordering constraint and at least one conflict constraint is provided. The method may include breaking a plurality of loops caused by the at least one ordering constraint. The method may also include determining a node order based on the at least one ordering constraint. The method may then include determining a conflict order based on the at least one conflict constraint, whereby no new loops are created in the network. The method may further include performing parallel processing of the network of nodes based on the node order and the conflict order. | 12-29-2016 |
20160380846 | METHOD FOR DETERMINING SYSTEM TOPOLOGY GRAPH CHANGES IN A DISTRIBUTED COMPUTING SYSTEM - A distributed computing system provides at least one service, and the service is provided by resources of the distributed computing system. Resources are represented by a topology graph including storage, application and database server nodes joined by edges indicative of relationships between nodes. Predefined parameters are monitored that are indicative of operating characteristics of the distributed computing system when providing the service. Values of the predefined parameters are compared with respective predetermined performance threshold values. The performance threshold values are determined based on a service level agreement (SLA). The SLA includes a service level objective (SLO). The performance threshold values are indicative of the respective operating characteristics prior to an event. Rules are provided for selecting a combination of application, storage and database server nodes to meet the SLO for each parameter of the parameter. Data associated with the set of rules are stored in the computing system. | 12-29-2016 |
20160380847 | SYSTEM, SERVICE DETERMINING METHOD, AND COMPUTER PROGRAM PRODUCT - A system includes a device and one or more information processing apparatuses. The device includes a device-information generator configured to generate device information on the device; and an analyzer determining unit configured to determine any one of the device and the one or more information processing apparatuses as an analyzer for the device information. The one determined as the analyzer includes an analysis unit configured to perform an analysis based on the device information; and a service determining unit configured to determine a service to the device based on a result of the analysis. | 12-29-2016 |
20160380849 | NETWORK SYSTEM, CONTROL METHOD OF A NETWORK SYSTEM AND CONTROL DEVICE - A POS terminal | 12-29-2016 |
20160380852 | Control Device, Network System, and Server - A POS terminal | 12-29-2016 |
20160380853 | REPORTING MEDIA CONSUMPTION BASED ON SERVICE AREA - An example client device for reporting consumption of media data includes one or more network interfaces configured to send and receive data via a network, and a middleware unit implemented from one or more hardware-based processors comprising digital logic circuitry, the middleware unit configured to determine a service area in which the client device was located when the client device received media data via the network interfaces, determine a reporting strategy for consumption of the media data based on the determined service area in which the client device was located when the client device received the media data, and report consumption of the media data according to the reporting strategy. | 12-29-2016 |
20160380854 | METHODS AND SYSTEMS FOR RESOURCE MANAGEMENT IN A NETWORKED STORAGE ENVIRONMENT - Methods and systems for managing resources in a storage system are provided. As an example, one method includes determining a maximum node utilization of a first node operating in a networked storage environment for storing information at a plurality of storage devices, where the maximum node utilization is based on a first factor that tracks utilization of a processor of the first node; comparing the maximum node utilization to a first threshold value; and triggering an event when the maximum node utilization has reached the first threshold value. | 12-29-2016 |
20160380855 | EFFICIENT REPLACEMENT OF CLIENTS RUNNING LARGE SCALE APPLICATIONS - A system and method for efficiently replacing clients running a large scale application uses a pool of clients, which includes a group of active clients running the large scale application and at least one standby client. When a particular active client is identified to be replaced, one of the at least one standby client is selected as a replacement client for the particular active client. The particular active client is replaced with the selected replacement client with respect to the running of the large scale application such that the particular client is removed from the group of active clients and the selected replacement client is added to the group of active clients. | 12-29-2016 |
20160380856 | SYSTEMS AND METHODS FOR TRACKING DEVICES STATUS AND MALFUNCTIONS IN MACHINE-TO-MACHINE NETWORKS - Disclosed are systems, methods, and apparatus for tracking devices status and malfunctions in a Machine-to-Machine (M2M) network. The system comprises: at least a controller module capable of tracking devices status and malfunctions, wherein the controller module having at least one of a processing module, a tracking module, and a database module; at least a device attached to a mobile or a static entity, wherein the device is having at least one of at least a sensor and at least a device communication module; at least a data profiles module capable of describing at least one of the device and at least the sensor; at least a device heartbeat profile and at least a data accuracy profile associated with the data profiles module; and at least a tracking module capable of tracking devices status and malfunctions. The device is capable of collecting the data records generated by the sensors and transmitting the collected data records to the controller module. | 12-29-2016 |
20160380858 | DISTRIBUTED REAL-TIME COMPUTER SYSTEM AND METHOD FOR FORCING FAIL-SILENT BEHAVIOR OF A DISTRIBUTED REAL-TIME COMPUTER SYSTEM - The invention relates to a method for forcing fail-silent behavior of a periodically functioning, distributed real-time computer system, which real-time computer system comprises at least two redundant NSCFCUs. At the beginning of a frame, the at least two redundant NSCFCUs ( | 12-29-2016 |
20160380860 | SYSTEMS AND METHODS FOR MEASURING ROUND TRIP TIME IN NETWORK DEVICES BETWEEN THE DEVICE AND AN ENDPOINT - The present disclosure is directed towards systems and methods for measuring round trip time (RTT) in network devices between the device and an endpoint. A network device may be deployed as an intermediary to provide many security and visibility functions. For measuring the server side RTT between the network device and host, the intermediary device identifies the packet that has been sent by the client when it initiated the RTT measurement. The network device remembers the moment T1 when it sees this packet. The host (e.g., the server) will respond to this with a packet that contains the response. The intermediary device remembers the moment T2 when it sees this response. Server side RTT is calculated by the network device as T2−T1. For measuring the client side RTT the network device and client, the intermediary device identifies the packet that the host sends to initiate measurement of RTT. As per the HDX protocol, the client will respond immediately with a new packet or with a bit set in any packet being sent to the host. Just as for server side RTT, the intermediary device can identify these packets and measure the times to calculate the client side RTT. | 12-29-2016 |
20160380861 | METHOD FOR ORDERING MONITORED PACKETS WITH TIGHTLY-COUPLED PROCESSING ELEMENTS - Transaction and session processing of packets within a network monitoring system may be distributed among tightly-coupled processing elements by marking each received packet with a time-ordering sequence reference. The marked packets are distributed among processing elements by any suitable process for transaction processing by the respective processing element to produce transaction metadata. Where a session-owning one of the processing elements has indicated ownership of the session to the remaining processing elements, the transaction-processed packet and transaction metadata are forwarded to the session owner. The session owner aggregates transaction-processed packets for the session, time-orders the aggregated packets, and performs session processing on the aggregated, time-ordered transaction-processed packets to generate session metadata with the benefit of context information. Where the session owner for a transaction-processed packet has not previously been indicated, the transaction-processed packet and transaction metadata are forwarded to an ordering authority of last resort, which assigns ownership of the session. | 12-29-2016 |
20160380862 | METHODS AND SYSTEMS TO EVALUATE DATA CENTER RESOURCE ALLOCATION COSTS - This disclosure is directed to methods and systems to evaluate resource allocation costs of a data center. Methods and systems compute resource allocation costs of a cloud computing industry to obtain industry benchmarks that are compared with the resource allocation costs of the data center. The comparisons enable IT managers to objectively identify computational resource shortages, resource over investments, and where future investment in computational resources should be made for the data center. | 12-29-2016 |
20160380865 | NETFLOW COLLECTION AND EXPORT OFFLOAD USING NETWORK SILICON - Methods and apparatus for collection of Netflow data and export offload using network silicon. In accordance with aspects of the embodiments, the Netflow export and collection functions are offloaded to the network silicon in the chipset, System on a Chip (SoC), backplane switch, disaggregated switch, virtual switch (vSwitch) accelerator, and Network Interface Card/Controller (NIC) level. For apparatus implementing virtualized environments, one or both of the collection and export functions are implemented at the Physical Function (PF) and/or Virtual Function (VF) layers of the apparatus. | 12-29-2016 |
20160380866 | ARCHITECTURE FOR METRICS AGGREGATION WITHOUT SERVICE PARTITIONING - A web server computer system receives a plurality of measurements for a metric from one or more computing resources associated with the web server computer system. Each measurement includes metadata for the measurement, which specifies attributes of the measurement. The web server computer system determines, for each measurement and based at least in part on the metadata, a fully qualified metric identifier for the measurement. The web server computer system uses the fully qualified metric identifier to partition the plurality of measurements into various partitions. Once completed, the web server computer system transmits a request to one or more aggregator sub-systems of a computing resource monitoring service to store the plurality of measurements. | 12-29-2016 |
20160380867 | Method and System for Detecting and Identifying Assets on a Computer Network - A computer-implemented method for identifying an asset of a computer machine performed using at least one processing unit for: capturing an update packet from a data path connected to the computer machine; extracting application layer data related to the asset to be identified from the update packet; identifying the asset using the extracted application data layer; and outputting the identification of the asset. | 12-29-2016 |
20160380916 | CONTAINER-AWARE APPLICATION DEPENDENCY IDENTIFICATION - Techniques disclosed herein provide an approach for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers. One embodiment provides a computer-implemented method that includes monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems. The method further includes monitoring network traffic at virtual bridges to which the OS-less containers are attached, and identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges. In addition, the method includes determining the application dependencies based on the identified network dependencies. | 12-29-2016 |
20160380960 | ENHANCED INTER-NETWORK MONITORING AND ADAPTIVE MANAGEMENT OF DNS TRAFFIC - Systems and methods for enhanced monitoring and adaptive management of inter-network Domain Name System (“DNS”) traffic include an information capture device in a monitored network. The information capture device receives a redirected connection request originated by a client machine in the monitored network in response to a modified DNS answer from a recursive name server outside of the monitored network, captures detailed information associated with the redirected connection request that is inaccessible to the recursive name server, and sends the captured information to a data storage accessible to the recursive name server for storage as augmented DNS data associated with the client machine and/or the redirected connection request. The information capture device further provides, in response to the redirected connection request, an adaptive answer generated based on the augmented DNS data to the client machine. | 12-29-2016 |
20160380965 | System and Method For Logging Communications - A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device. | 12-29-2016 |
20160381123 | Electronic Testing Device - Systems and methods for cabling verification may include one or more operations including, but not limited to: receiving floor plan data representing a floor plan of a premises; receiving at least one user input specifying a location of at least one cabling endpoint relative to the floor plan; receiving at least one user input selecting at least one cabling verification test for the at least one cabling endpoint; receiving one or more cabling verification test results for the at least one cabling endpoint obtained by at least one testing device; and updating at least one database element associated with the at least one cabling endpoint and maintained by the cloud-based server. | 12-29-2016 |
20160381134 | SELECTIVELY DISABLING OPERATION OF HARDWARE COMPONENTS BASED ON NETWORK CHANGES - Disclosed herein are systems and methods for selectively disabling operation of hardware components based on network changes. In some embodiments, the hardware component may cause a platform to perform network discovery to receive first network discovery data, cause the platform to perform network discovery to receive second network discovery data, determine that the differences between the first and second data exceed a network change threshold, and in response to the determination, cause disablement of operation of one or more functions of the hardware component. Other embodiments may be disclosed and/or claimed. | 12-29-2016 |
20160381160 | System and Computer Implemented Method of Personal Monitoring - A system and computer implemented method of personal monitoring is provided. The method includes allowing a user to engage in a number of on-line activities, determining, on a computer, if the user engaged in on-line activities, and if the determination is negative, then performing, on a computer, a number of responsive actions. The system and method further provide for an investigation of external modules; that is, the system and method investigate external sites such as, but not limited to, social networks, forums, weblogs (blogs), that are not associated with the personal monitoring module. The system and method further allow a proxy to respond for the user. | 12-29-2016 |
20160381575 | EXTENSIBLE KERNEL FOR ADAPTIVE APPLICATION ENHANCEMENT - Resource use by applications used by user equipment (UE) is adaptively controlled. A UE can comprise a modem-network kernel component that can be well partitioned from modem operations and can facilitate adaptively controlling use of functional blocks for applications of the UE, and enhancing use of network resources in connection with use of applications by the UE. The kernel component can operate in a protected area of the baseband and can utilize APIs and interfaces available to it by existing modem stacks and UE operating systems. The kernel component can interact with the communication network to adaptively present network enabler functions to other parts of the system. The kernel component can facilitate managing secure communication with the communication network to facilitate proper cross-layer optimization practices, including capabilities for compression and decompression, rate shaping, and event notification associated with the communication network and UE subsystems. | 12-29-2016 |
20170235707 | WEB-BASED DISTRIBUTED COMPUTING WITH BROWSER-EXECUTED CODE | 08-17-2017 |
20170236524 | AUDIO DATA PACKET STATUS DETERMINATION | 08-17-2017 |
20170237602 | COMPUTER SYSTEM MONITORING BASED ON ENTITY RELATIONSHIPS | 08-17-2017 |
20170237635 | PROCESSING AND VISUALIZATION OF SINGLE-PAGE APPLICATION PERFORMANCE METRICS | 08-17-2017 |
20170237636 | SEMICONDUCTOR DEVICE AND OPERATING METHOD THEREOF | 08-17-2017 |
20170237638 | TCP CONNECTIONS RESILIENCY SYSTEM FOR TESTING NETWORKS IN UNSTABLE ENVIRONMENTS | 08-17-2017 |
20170237640 | SYSTEM AND METHOD FOR CORRELATING CAPTURED NETWORK PACKET WITH METADATA | 08-17-2017 |
20170237641 | Supplementing Network Flow Analysis with Endpoint Information | 08-17-2017 |
20170237646 | Assigning a Computer to a Group of Computers in a Group Infrastructure | 08-17-2017 |
20170237647 | VIRTUAL NETWORK FUNCTION RESOURCE ALLOCATION AND MANAGEMENT SYSTEM | 08-17-2017 |
20170237799 | REAL USER MONITORING OF SINGLE-PAGE APPLICATIONS | 08-17-2017 |
20180025299 | AUTOMATED DATA CENTER MAINTENANCE | 01-25-2018 |
20180026843 | NETWORK NODE POLICY GENERATION AND IMPLEMENTATION | 01-25-2018 |
20180026848 | ISOLATION OF PROBLEMS IN A VIRTUAL ENVIRONMENT | 01-25-2018 |
20180026852 | SERVICE AVAILABILITY RISK | 01-25-2018 |
20180026853 | SYSTEM AND METHOD FOR DETERMINING RESOURCES UTILIZATION IN A VIRTUAL NETWORK | 01-25-2018 |
20180026856 | ORCHESTRATING MICRO-SERVICE DEPLOYMENT BASED ON NETWORK POLICY HEALTH | 01-25-2018 |
20180026862 | ESTIMATION DEVICE, ESTIMATION METHOD, AND RECORDING MEDIUM | 01-25-2018 |
20180026863 | INTEGRATED STORAGE/SAN MONITORING AND CONTROL SYSTEM | 01-25-2018 |
20180026865 | MONITORING INTER-SITE BANDWIDTH FOR REBUILDING | 01-25-2018 |
20180026866 | SYSTEMS AND METHODS FOR DYNAMICALLY SETTING A RATE LIMIT FOR A COMPUTING DEVICE | 01-25-2018 |
20180026867 | MONITORING OF REPLICATED DATA INSTANCES | 01-25-2018 |
20180026912 | METHODS AND APPARATUS FOR COMPOSITE NODE MALLEABILITY FOR DISAGGREGATED ARCHITECTURES | 01-25-2018 |
20180026939 | MONITORING DEVICE AND CARD REPLACING METHOD | 01-25-2018 |
20180027062 | TECHNOLOGIES FOR DYNAMICALLY MANAGING RESOURCES IN DISAGGREGATED ACCELERATORS | 01-25-2018 |
20180027064 | PROGRAM AND STATISTICAL PROCESSING SYSTEM | 01-25-2018 |
20180027080 | SCALING SERVICE DISCOVERY IN A MICRO-SERVICE ENVIRONMENT | 01-25-2018 |
20180027082 | DETERMINING RECOMMENDATIONS BASED ON USER INTENT | 01-25-2018 |
20180027084 | Network-Based Probabilistic Device Linking | 01-25-2018 |
20180027085 | SYSTEMS, DEVICES, ARTICLES AND METHODS FOR TRACKING USER REFERRAL ACTIONS | 01-25-2018 |
20180027088 | PERFORMANCE MONITORING TO PROVIDE REAL OR NEAR REAL TIME REMEDIATION FEEDBACK | 01-25-2018 |
20180027291 | INFORMATION INTERCEPTION PROCESSING METHOD, TERMINAL, AND COMPUTER STORAGE MEDIUM | 01-25-2018 |
20180027372 | PRECISE AND CUSTOM LOCATION BASED SERVICE DISCOVERY APPLICATION FOR WIRED AND WIRELESS DEVICES | 01-25-2018 |
20190149394 | HUMIDITY-VIBRATION-DUST-DETECTING SYSTEM | 05-16-2019 |
20190149395 | COMMUNICATION OF EVENT MESSAGES IN COMPUTING SYSTEMS | 05-16-2019 |
20190149396 | SYSTEM AND METHOD FOR NETWORK INCIDENT REMEDIATION RECOMMENDATIONS | 05-16-2019 |
20190149424 | CONTINUOUS MONITORING FOR PERFORMANCE EVALUATION OF SERVICE INTERFACES | 05-16-2019 |
20190149426 | DECREASING DOWNTIME OF COMPUTER SYSTEMS USING PREDICTIVE DETECTION | 05-16-2019 |
20190149435 | DISTRIBUTED MULTI-DATA SOURCE PERFORMANCE MANAGEMENT | 05-16-2019 |
20190149438 | Data Processing Method and Apparatus | 05-16-2019 |
20190149439 | NETWORK ENTITY FOR MONITORING A PLURALITY OF PROCESSES OF A COMMUNICATION SYSTEM | 05-16-2019 |
20190149442 | CLOUD COMPUTING ENVIRONMENT SYSTEM FOR AUTOMATICALLY DETERMINING OVER-THE-TOP APPLICATIONS AND SERVICES | 05-16-2019 |
20190149445 | AUTOMATICALLY DETERMINING OVER-THE-TOP APPLICATIONS AND SERVICES | 05-16-2019 |
20190149448 | NETWORK MONITORING APPARATUS AND NETWORK MONITORING METHOD | 05-16-2019 |
20190149479 | DISTRIBUTED CATALOG SERVICE FOR MULTI-CLUSTER DATA PROCESSING PLATFORM | 05-16-2019 |
20190149483 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | 05-16-2019 |
20190149622 | Application Resilience System and Method Thereof for Applications Deployed on Platform | 05-16-2019 |
20190149624 | LOW POWER WIDE AREA NETWORK SYSTEM | 05-16-2019 |
20190149625 | OPT-OUT COMPLIANCE | 05-16-2019 |
20190149627 | RESOURCE PROCESSING METHOD AND APPARATUS | 05-16-2019 |
20220138070 | USER INTERFACE AND HEALTH STATUS MONITORING FOR A MULTI SERVICE DOMAIN SYSTEM - A platform as a service (PaaS) manager hosted on a central computing system runtime information for a first instance of a service at a first service domain and a second instance of the service at a second service domain separate from the first service domain. A first health status is generated for the first instance of the service and a second health status is generated for the second instance of the service based on runtime information. A central user interface displays at least the first health status and the second health status. | 05-05-2022 |
20220138076 | IDENTIFYING A PROCESS AND GENERATING A PROCESS DIAGRAM - A device may receive activity data identifying activities of a process performed by users via user devices. The device may receive baseline data identifying baselines associated with the process and variant data identifying variants from the baselines. The device may apply a sequence alignment model, to the activity data and the baseline data, to determine first similar sequences associated with the activities and the baselines and may apply the sequence alignment model, to the activity data and the variant data, to determine second similar sequences associated with the activities and the variants. The device may determine, based on the first similar sequences, first label data identifying first labels for the activities and may determine, based on the second similar sequences, second label data identifying second labels for the activities. The device may generate a process diagram based on the activity data, the first label data, and the second label data. | 05-05-2022 |
20220141099 | System for Optimising Data Communication - According to a first aspect of the invention, there is provided a system for optimising data communication between devices connected to a network, the system including: a server configured to: measure application performance metrics of the data communication between the devices; compare the application performance metrics against performance requirements; detect, in response to the application performance metrics being below the performance requirements, nodes having untapped computing resources within the network; determine operation parameters achieving service at the performance requirements; command one or more of the nodes to function at the operation parameters; and migrate at least a portion of workload associated with the data communication amongst the one or more nodes commanded to function at the operation parameters. | 05-05-2022 |
20220141100 | DYNAMIC SCALING OF STORAGE VOLUMES FOR STORAGE CLIENT FILE SYSTEMS - A network-based data store maintaining storage volumes for file systems at storage clients may implement dynamic storage volume scaling. A scaling event may be detected according to a specified scaling policy for a storage volume maintained at a network-based data store that is mounted at a storage client and configured for a file system. In a least some embodiments, the scaling policy for the storage volume may be received from the storage client. In response to detecting the storage event, storage maintaining the storage volume may be modified according to the scaling policy to scale the storage volume. An indication of the scaling event may be sent to the storage client in order to update the file system at the storage client so that the file system may utilize the scaled storage volume. | 05-05-2022 |
20220141104 | Host Auto Role Classifier - A method includes receiving one or more characteristics associated with a server of a datacenter. The method further includes analyzing, by a processing device, the one or more characteristics to determine a classification of the server. The method further includes, in view of the determined classification of the server, modifying one or more configurations of the server to increase performance for one or more functionalities corresponding to the determined classification. | 05-05-2022 |
20220141105 | APPARATUS, METHOD, AND COMPUTER PROGRAM - An apparatus comprising: at least one processor; and at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to: determine ( | 05-05-2022 |
20220141107 | METHODS AND APPARATUS FOR DETERMINING LOW LATENCY NETWORK CONNECTIVITY IN COMPUTING SYSTEMS - An example apparatus comprises at least one memory, instructions in the apparatus, and at least one processor to execute the instructions to identify an agent identifier from a plurality of network command responses, the plurality of network command responses including a plurality of network parameters, apply weighted values to the plurality of network parameters, and determine a total weighted sum of the plurality of network parameters, the total weighted sum corresponding to a connectivity factor of an agent associated with the agent identifier. | 05-05-2022 |
20220141109 | DETERMINING AN END USER EXPERIENCE SCORE BASED ON CLIENT DEVICE, NETWORK, SERVER DEVICE, AND APPLICATION METRICS - A device may receive client delay metrics associated with a client device of a network, network delay metrics associated with the network, server delay metrics associated with a server device of the network, and application delay metrics associated with an application provided by the server device. The device may calculate passive and active client delay scores based on the client delay metrics and the application delay metrics, and may calculate passive and active network delay scores based on the network delay metrics. The device may calculate passive and active server delay scores based on the server delay metrics and the application delay metrics, and may calculate passive and active application delay scores based on the application delay metrics. The device may calculate an end user experience score based on the scores, and may perform actions based on the end user experience score. | 05-05-2022 |
20220141111 | MOBILITY NETWORK SLICE SELECTION - Core network slices that belong to a given operator community are efficiently tracked at the network control/user plane functions level, with rich data analytics in real-time based on their geographic instantiations. In one aspect, an enhanced vendor agnostic orchestration mechanism is utilized to connect a unified management layer with an integrated slice-components data analytics engine (SDAE), a slice performance engine (SPE), and a network slice selection function (NSSF) in a closed-loop feedback system with the serving network functions of one or more core network slices. The tight-knit orchestration mechanism provides economies of scale to mobile carriers in optimal deployment and utilization of their critical core network resources while serving their customers with superior quality. | 05-05-2022 |
20220141119 | CALIBRATING NETWORK ANALYZER DEVICES - A device receives network information from an analyzer device associated with a host device, a target device, and a link of a network, and compares the network information and historical equalizer calibration information to identify a set of equalizer calibration information. The historical equalizer calibration information is associated with multiple host devices, multiple target devices, and multiple links. The device ranks the set of equalizer calibration information, based on quality information associated with the historical equalizer calibration information, to generate a ranked set of equalizer calibration information. The device provides the ranked set of equalizer calibration information to the analyzer device to permit the analyzer device to identify selected equalizer calibration information of the ranked set of equalizer calibration information, and utilize the selected equalizer calibration information. | 05-05-2022 |
20220141135 | DATA COMPRESSION TRANSMISSION SYSTEM, INTERMEDIATE SERVER, METHOD, AND PROGRAM - A technique for compressing and transmitting data without hampering real-time performance can be offered. In a data compression transmission system for collecting data generated by a plurality of devices at a central server via a network, an intermediate server is arranged between the devices and the central server. Each of the devices includes a packet cache processing unit for converting the generated data to a hash value based on a cache. The intermediate server includes a packet cache processing unit for decoding the hash value to original data based on the cache, a buffering unit for aggregating the data and outputting the data as a long packet, and a compression encoding unit for compressing the data and generating encoded data. | 05-05-2022 |
20220141163 | MESSAGE SENDING METHOD AND MOBILE TERMINAL - A message sending method includes: receiving at least one first input; adding, in response to each first input, at least one message input box to a message editing interface corresponding to a target contact; receiving at least one second input; and sending message content in a first target input box to the target contact in response to each second input, where the first target input box is a message input box of message input boxes displayed in the message editing interface. | 05-05-2022 |
20220141286 | Relay Apparatus and Relay Method - To provide a relay apparatus and a relay method by which an app can be flexibly connected to a device and various apps can be connected to various devices to realize stable operation. The invention is a relay method for mediating a connection between an app and a device, and the relay method includes: when an input specification of data required for an app whose use is to be started is input, comparing an output specification held by each processing node provided in an existing data processing path with a data item included in the input specification; connecting an output of the data processing path to the app whose use is to be started if the existing processing node and the existing data processing path are able to satisfy the input specification; adding a new processing node and comparing an output specification of the new processing node with the input specification if the existing data processing path is not able to satisfy the input specification; and connecting an output of the new processing node to the app whose use is to be started if the new processing node is able to satisfy the input specification. | 05-05-2022 |
20220141297 | METHODS AND APPARATUSES FOR EXPANDING TARGETS OF CREATIVES BASED ON SIGNATURES - Aspects of the subject disclosure may include, for example, obtaining a first indication of a user of a communication device browsing a first website associated with a first vendor, obtaining a second indication of the user of the communication device browsing a second website associated with a second vendor that is different from the first vendor, determining, in accordance with the first indication and the second indication, that the first vendor and the second vendor operate in a common marketplace, responsive to the determining, obtaining an advertisement of the first vendor to provide to the communication device, and providing the advertisement to the communication device. Other embodiments are disclosed. | 05-05-2022 |
20220141298 | METHODS AND APPARATUS FOR ONLINE TEST TAKING - The techniques described herein relate to methods and systems for administering an online examination to a user. A pre-examination scan is performed based on first image data of an environment of the user that is received from a camera. Responsive to an indication from the pre-examination scan that the environment is appropriate for test taking, the online examination is initiated. The online examination is initiated by generating a user interface for display on an examination screen. Based on second image data of the user while using the user interface, one or more poses of the user may be estimated. It may be determined that the user pose is indicative of improper examination behavior based on the one or more poses of the user that are estimated. A warning can be generated and/or the online examination can be terminated based on an indication of improper examination behavior. | 05-05-2022 |
20220141305 | DERIVING AN OPERATING SYSTEM IDENTITY - Apparatuses, methods, and systems are disclosed for deriving an operating system identity. One method includes determining, at a remote unit, a type of operating system used by the remote unit. The method includes determining a domain name corresponding to the type of operating system. The method includes deriving an operating system identity by applying a hash function to the domain name and a predetermined value. The method includes transmitting a first message to a mobile communication network. In such embodiments, the first message includes the operating system identity. | 05-05-2022 |
20220141322 | INTERFACE CIRCUIT FOR PROVIDING EXTENSION PACKET AND PROCESSOR INCLUDING THE SAME - An interface circuit includes: a packet transmitter configured to generate a plurality of transmission packets based on a request, which is output from a core circuit, and output the plurality of transmission packets, the plurality of transmission packets including information indicative of being a packet to be merged; and a packet receiver configured to generate a merged packet by merging a plurality of extension packets from among a plurality of reception packets received from outside the interface circuit, the plurality of extension packets including information indicative of being a packet to be merged. | 05-05-2022 |