49th week of 2013 patent applcation highlights part 74 |
Patent application number | Title | Published |
20130325979 | LOCATION-BASED COMMUNICATIONS - A computer-implemented method includes generating a communication to be sent from a sender to a recipient who are related to one another by blood or employment; and scheduling delivery of the communication to the recipient based on a future location of the recipient. The content of the communication and the future location of the recipient are determined from an analysis of electronically-accessible resources by or about the sender, the recipient, or both. | 2013-12-05 |
20130325980 | SYSTEM AND METHOD FOR CREATING AND DELIVERING COMPLEX GRAPHIC EMAILS WHICH AUTOMATICALLY ADAPT TO FIT A VARIETY OF DIFFERENT RECIPIENT DEVICES - A method and system for providing an email that is configured to be displayed based on a type of email platform upon which the email is displayed, the method including: (a) obtaining a plurality of sets of image files, each of the set of image files adapted for display on a respective email platform; (b) sending a multi-view email to a recipient email platform; (c) receiving an image request from the recipient email platform; (d) sending a set of image files adapted for display on an email platform similar to the recipient email platform. | 2013-12-05 |
20130325981 | METHOD FOR SUPERVISING A CHAT CONNECTION - A method for supervising a chat connection between at least two terminals is provided. The method includes verification of first conditions, including a camera at each terminal is operated, video streams of each camera are live streams, and/or each video stream contains images of a live person. The connection is allowed if all of the first conditions are met and if one second condition is met. A second condition can include one first subset of the persons is identified as belonging to one defined restricted group and an identity of a second subset of the persons is determined at least on the basis of facial and/or body features and the identified second person is classified as an allowed exception. The method also includes a pre-defined reaction if any of the first conditions and/or all of the second conditions are not met. | 2013-12-05 |
20130325982 | CHAT ROOM VIEWING - A system and method allows a user to view communications exchanged between other participants within an online chat room without the user becoming a participant within the online chat room. The online chat room enables ongoing exchanges of electronic communications between two or more participants whose participation within the chat room are mutually revealed to each other. A user is enabled to perceive the existence of the online chat room without the user becoming a participant within the online chat room. Selection of the online chat room by the user is received. Responsive to user selection of the online chat room and without the user becoming a participant within the online chat room, at least some of the communications exchanged between the participants within the online chat room are made perceivable to the user as the communications are exchanged. | 2013-12-05 |
20130325983 | System and Method for Communicating in a Telecommunication Network via Common Key Routing and Proxies - A combination of a common key routing (CKR) method and data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber via a database application programming interface (API) and the common key, store the first communication message in the first database memory included in the first logical scalable unit, and receive a second communication message in response to storing the first communication message in the first database memory and routing the second communication message to another component the telecommunication network. | 2013-12-05 |
20130325984 | System and Methods for Communicating in a Telecommunication Network Using Common Key Routing and Data Locality Tables - A combination of a common key routing (CKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor in a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a common key based on the subscriber identifiers included in the first communication message, and identify a first logical scalable unit that includes a first database memory that stores subscriber data relating to the subscriber by querying a data locality table with the common key. The processor may also identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit and send the first communication message to the first application processor. | 2013-12-05 |
20130325985 | System and Method for Communicating in a Telecommunication Network via Independent Key Routing and Data Locality Tables - A combination of an independent key routing (IKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor a multiprocessor computing system may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types based on the subscriber identifiers, identify a first logical scalable unit that includes a first database memory that stores a first type of data relating to the subscriber by using a first key of the plurality of keys to query a data locality table, identify a first application processor in the multiprocessor computing system that is part of the first logical scalable unit, and send the first communication message and the plurality of keys to the first application processor. | 2013-12-05 |
20130325986 | System and Methods for Communicating in a Telecommunication Network via Independent Key Routing and Proxies - A combination of an independent key routing (IKR) method and a data proxy architecture (DPA) method may be used to route communication messages in a telecommunication network to achieve improved data locality and reduce secondary key lookups. A processor may receive a first communication message that includes subscriber identifiers that uniquely identify a subscriber, generate a plurality of keys for a plurality of message types, identify a first logical scalable unit (LSU) that includes a first memory that stores a first type of data via a database API and a first key, identify a second LSU that includes a second memory that stores a second type of data relating to the subscriber via the database API and a second key of the plurality of keys, store the first communication message and the first key in the first database memory, and store the first key in the second database memory. | 2013-12-05 |
20130325987 | METHOD AND APPARATUS FOR PROVIDING SCHEDULING SERVICE BASED ON MOBILE MESSAGING APPLICATION - Provided are a method and an apparatus for providing a scheduling service based on a mobile messaging application. The method for providing the scheduling service includes, in an electronic device including a messaging application, the messaging application generating schedule information by receiving at least one of a candidate time and a candidate location for an event and receiving a selection of a user to be invited to the event among users registered in the messaging application, and transmitting the schedule information to the invited user so that the invited user votes on at least one of a possible time and a possible location for attending the event. | 2013-12-05 |
20130325988 | PROFILE-BASED MESSAGE FILTERING AND DISTRIBUTION SYSTEM - A server-based system filters and distributes messages based on a user-supplied profile. The server receives data messages from registered users and stores the data messages on data storage. Each data message is tagged with a profile identifier. The data storage also stores a user profile for each of the registered users. The server's processor selects ones of the data messages for distribution to selected ones of the registered users based on a correspondence between the data message's profile identifier and the stored user profiles. | 2013-12-05 |
20130325989 | System And Method For Content-Based Message Distribution - A system and method for content-based message distribution are provided. An incoming message with a recipient address and a tag address including at least one content tag associated with one or more users is received. The content tag within the tag address and a recipient associated with the recipient address are identified. The recipient is added to the content tag as one of the users. The incoming message is displayed to at least one of the users associated with the content tag. | 2013-12-05 |
20130325990 | SYSTEM AND METHOD FOR PRIORITIZING AND DISPLAYING MESSAGES - A device and method for displaying received messages, such as email, SMS, IM, multimedia, and voicemail, are provided. Each of a plurality of received messages, initially unread, is associated with a value. The device concurrently displays a first message listing and a second message listing, the first message listing comprising entries for messages of the plurality of received messages associated with a value meeting a specified threshold, and the second message listing comprising entries for other messages of the plurality of received messages. When a message associated with a value meeting the specified threshold and having an entry in the first message listing is marked read, the displayed message listings are updated to remove the entry for the message from the first message listing and to include an entry for the message in the second message listing. | 2013-12-05 |
20130325991 | Filtering Unsolicited Emails - A method for filtering unsolicited emails may comprise dynamically aggregating historical email data associated with a user or a group of users and dynamically determining one or more trusted trends criteria associated with the historical email data. The method may further comprise receiving a new email addressed to the user or the group of users, calculating a score associated with the new email based on the one or more trusted trends criteria, determining that the score is above a predetermined threshold score, and, based on the determination, selectively filtering the new email. | 2013-12-05 |
20130325992 | METHODS AND APPARATUS FOR DETERMINING OUTCOMES OF ON-LINE CONVERSATIONS AND SIMILAR DISCOURSES THROUGH ANALYSIS OF EXPRESSIONS OF SENTIMENT DURING THE CONVERSATIONS - Systems and methods for automatically analyzing on-line conversations or similar discourses among individuals and determining through such analyses outcomes of the conversations as evidenced, for example, by expressions of sentiment during the conversation. Sentiments are derived from analyses of intentions of a user as expressed in an on-line conversation or other user generated content (UGC). These intentions are identified and subsequently acted upon, for example by making others aware of the conversation and suggesting possible responses to the UGC. The intention signals derived from the UGC may also be used to fashion or update a user profile or inform a broader view of the individual associated with the UGC. | 2013-12-05 |
20130325993 | GROUP BASED COMMUNICATION IN A SOCIAL NETWORKING SPACE - The present invention provides a method and system for enabling group based communication in a social networking space. In one embodiment, a method includes creating an online event associated with a context by a source group device of an originator of a source group and privately publishing the online event to publishers of target groups via the Internet so that the online event is privately distributed to one or more members of the target groups and one or more groups associated with the target groups. The method further includes tracking status of participation of the one or more members of the target groups, and the one or more associated groups in the online event using the source group device. Moreover, the method includes automatically sending reminders to one or more members who have not yet participated in the online event till a preset threshold limit is reached. | 2013-12-05 |
20130325994 | ETHERNET COMMUNICATION SYSTEM AND METHOD BASED ON MMC/SD INTERFACE - The present invention is directed to an Ethernet communication method and system which are based on the MMC/SD interface. In the invention, the communication system includes at least one master device and at least one slave device, the at least one master device and the at least one slave device are connected via MMC/SD interface and communicate with each other on the Ethernet. The Ethernet communication method and system disclosed herein enables the device with the MMC/SD interface to act as a node in the network, and thus greatly expanding the application domain of such devices. | 2013-12-05 |
20130325995 | NETWORK PRESENCE OFFLOAD - Devices having corresponding methods and computer-readable media comprise: a host processor, wherein the host processor is configured to execute a host client while the device is in an awake mode, and wherein the host client maintains a network connection while executing; and a network interface controller comprising an embedded processor, wherein the embedded processor is configured to execute an embedded client while the device is in a sleep mode, wherein the embedded client is configured to maintain the network connection while executing. | 2013-12-05 |
20130325996 | Field Bus Network Having Two Main Users And At Least One Dependent User - The disclosure relates to a field bus network having two masters and at least one slave which are connected to one another in a dual ring comprising a first ring and a second ring and each of the two masters being configured for generator data packets and sending out a generated data packet on each of the rings at regular time intervals. The at least one slave being configured for receiving a data packet at an input and forwarding it at an output. Each of the two masters being configured for receiving a data packet coming from the other master in each case at an input and forwarding it at an output. | 2013-12-05 |
20130325997 | REMOTE ASSET CONTROL SYSTEMS AND METHODS - A remote asset control system for optimized asset performance under a variety of circumstances, such as network communication path failures, software maintenance, software faults, hardware faults, hardware maintenance, computer system maintenance, computer system failure, undetected data errors, configuration errors, human error, power outages, malicious network attacks, and the like, having a means to create, modify, and delete asset policies, an object oriented asset policy inheritance scheme that generates composite asset policies, an asset policy transference and caching scheme, condition driven asset policy enforcement, permission-based asset policy mechanism for throttling energy or water consumption, asset replacement simplification, query capability to enumerate actual asset deviance as compared to the currently enforced composite asset policy, real-time control asset policies, atomic activation and deactivation of asset policies, which are part of the policy inheritance hierarchy, ensuring composite policy integrity, and multi-tiered telemetry caching and transference. | 2013-12-05 |
20130325998 | System and Method for Providing Input/Output Functionality by an I/O Complex Switch - An input/output (I/O) device includes a management controller interface, a plurality of network switching interfaces, a storage interface, a component controller interface, and a plurality of multifunction modules. The multifunction modules further include a processing node interface, a first endpoint coupled to the management controller interface, a second endpoint coupled to one of the plurality of network switching interfaces, a third endpoint coupled to a remote direct memory access (RDMA) block, a fourth endpoint coupled to the storage interface, and a fifth endpoint coupled to the component controller interface. | 2013-12-05 |
20130325999 | INFORMATION-PROCESSING SYSTEM, INFORMATION-PROCESSING DEVICE, INFORMATION-PROCESSING METHOD, AND STORAGE MEDIUM - An exemplary information-processing system includes: a storage unit configured to store identification information of one or more other users; an execution unit configured to execute at least one of a plurality of programs including a first program for accessing an information sharing service and a second program that differs from the first program; a first registration unit configured to register, in the storage unit, identification information of another user, through execution of the first program by the execution unit; and a second registration unit configured to register, in the storage unit, identification information of another user, through execution of the second program by the execution unit. | 2013-12-05 |
20130326000 | NUMA-AWARE SCALING FOR NETWORK DEVICES - The present disclosure describes a method and apparatus for network traffic processing in a non-uniform memory access architecture system. The method includes allocating a Tx/Rx Queue pair for a node, the Tx/Rx Queue pair allocated in a local memory of the node. The method further includes routing network traffic to the allocated Tx/Rx Queue pair. The method may include designating a core in the node for network traffic processing. Of course, many alternatives, variations and modifications are possible without departing from this embodiment. | 2013-12-05 |
20130326001 | GENERIC PERSISTENCE IN A DIAMETER ROUTING AGENT - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a first Diameter message at the DRA; evaluating a first rule, including accessing data from a generic binding context object including: locating a record associated with a key specified by the first rule, and retrieving the data from the record; and transmitting a message based on the evaluation of the first rule. Various embodiments additionally relate to receiving a second Diameter message at the DRA; and evaluating a second rule, including accessing the generic binding context object, including storing the data in the record associated with the key. | 2013-12-05 |
20130326002 | Network Isolation - The present description proposes an interface, a method and a system for data transmission from a first data-processing system to at least one second data-processing system. The interface comprises a first application-specific connector, which can interchange data specific to a first application of the first data-processing system with said first application, at least one second application-specific connector, which can interchange data specific to a second application of at least one second data-processing system with said second application, and a data memory which can be accessed by the first connector and the second connector. | 2013-12-05 |
20130326003 | SYSTEM AND METHOD FOR AUTOMATED DESIGN ELEMENT TRANSLATION - The present invention generally relates to design element translation. In particular, embodiments of the invention are directed to systems and methods for automated design element translation for user defined customizations for one product to an entire suite of products. Preferred embodiments of the invention are accomplished through the use of one or more web-based computing devices. | 2013-12-05 |
20130326004 | USE OF REVERSED DNS RECORDS FOR DISTRIBUTED MAPPING OF ASYMMETRIC CRYPTOGRAPHIC KEYS TO CUSTOM DATA - A server sends a lookup request for a first domain name to a Domain Name System (DNS) in response to receiving data associated with a user. The first domain name includes the data associated with the user. The server receives, an Internet Protocol (IP) address corresponding to the first domain name from the DNS. In response to receiving a request for data, the server determines an Internet Protocol (IP) address, wherein the request comprises an identifier, and wherein the IP address is determined based on the identifier. The server sends a reversed domain name lookup request for the IP address to the DNS. The server receives a domain name in response to the reversed domain name lookup request from the DNS. The data is determined based on the received domain name. | 2013-12-05 |
20130326005 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR ENABLING MODIFICATION OF CONTENT DELIVERED TO MOBILE BROWSERS - An apparatus for enabling customization of content provided to a browser may include a processor and memory storing executable computer code causing the apparatus to at least perform operations including receiving a request for Web content from a communication device. The computer program code may further cause the apparatus to determine one or more add-ons assigned to an identified user of the communication device responsive to receipt of the request. The computer program code may further cause the apparatus to execute at least one of the add-ons, responsive to receipt of the Web content, which modifies the Web content on behalf of the communication device. The computer program code may further cause the apparatus to provide the modified Web content to a browser of the communication device. Corresponding methods and computer program products are also provided. | 2013-12-05 |
20130326006 | MANAGING LARGE DATA SETS THROUGH PAGE BASED INFORMATION TRACKING IN MULTI-MASTER ENVIRONMENTS - A data store receives a page cookie as a request for a page of records. The page cookie acts as a container to a record identifier of a last retrieved record and a timestamp of the last change to the record. The data store identifies retrieved pages to skip over according to a comparison of date, time and data instance name/write-master information for each record in the retrieved pages against the information in the page cookie. The data stamp contains information about the timestamp of last change to the record and data store instance name of the record. Subsequent to finding a matching record, the data store creates a new page cookie based on the page containing the record and transmits the new page cookie and the page to the requester. | 2013-12-05 |
20130326007 | REPACKAGING DEMOGRAPHIC DATA WITH ANONYMOUS IDENTIFIER - Using uniquely generated identifiers in a network-based ecosystem in which a plurality of client devices request media content and software applications from online distribution system and additionally request invitational content from invitational content providers. Separating users' demographic data from a device-specific identifier in favor of uniquely generated identifiers and using the client device to enforce the substation of uniquely generated identifiers in favor of a device identifier, thereby using the client device to serve as a proxy in creating a firewall to exclude system partners from access to a device identifier. | 2013-12-05 |
20130326008 | Systems and Methods for Delivering Tailored Content Based Upon a Consumer Profile - The present disclosure includes a system, method, and article of manufacture for aggregating a consumer profile, identifying tailored content (e.g., in response to a trigger event and/or based upon a consumer profile), and/or tailoring a digital destination. For example, the systems may receive direct data indicating an interest in receiving specific content, aggregate that data into a consumer profile, compare the consumer profile to content, and/or identify tailored content based upon the comparison. Further, the systems may communicate the tailored content to a web client associated with a consumer, receive a transaction request from a web client, and/or receive bids associated with tailored content. In addition, these systems may prioritize tailored content comprising a plurality of tailored offers and/or forecast a budget for an upcoming experience. | 2013-12-05 |
20130326009 | Systems and Methods for Delivering Tailored Content Based Upon a Consumer Profile - The present disclosure includes a system, method, and article of manufacture for aggregating a consumer profile, identifying tailored content (e.g., in response to a trigger event and/or based upon a consumer profile), and/or tailoring a digital destination. For example, the systems may receive direct data indicating an interest in receiving specific content, aggregate that data into a consumer profile, compare the consumer profile to content, and/or identify tailored content based upon the comparison. Further, the systems may communicate the tailored content to a web client associated with a consumer, receive a transaction request from a web client, and/or receive bids associated with tailored content. In addition, these systems may prioritize tailored content comprising a plurality of tailored offers and/or forecast a budget for an upcoming experience. | 2013-12-05 |
20130326010 | SYSTEM AND METHOD FOR MONITORING NETWORK CONNECTIONS - System and method for monitoring network connection are provided. The system includes at least one client device configured for providing a user access to a public network via a network connection and a network monitoring module coupled to the client device, the network monitoring module configured for monitoring the network connection based on an establishment of a transmission control protocol connection between the client device and the public network. The method includes steps of monitoring establishment of a transmission control protocol connection between a client device and a worldwide web server and generating network monitoring statistics on availability of network connection based on the information derived from monitoring. | 2013-12-05 |
20130326011 | POSTED INFORMATION SHARING SYSTEM, INFORMATION-PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, STORAGE MEDIUM, AND COMPUTER PLATFORM - An exemplary posted information sharing system includes: an information-processing system; and a server, wherein the information-processing device includes an executing unit that executes an application program, and an accessing unit that accesses an item of posted information depending on the application program that is being executed or whose execution is suspended, the posted information being stored on the server, and the server includes a providing unit that provides access to the posted information by the information-processing device, in response to a request from the accessing unit. | 2013-12-05 |
20130326012 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND STORAGE MEDIUM - When an instruction to access a web server of an external device connected via a local interface is acquired from a user, access destination information for accessing the web server via the local interface is acquired. Based on the acquired access destination information, communication is performed with the web server of the external device via the local interface. | 2013-12-05 |
20130326013 | METHOD FOR TRANSMISSION IN A MULTI-DESTINATION NETWORK - The invention relates to a method for transmission of messages from a sender node to multiple destination nodes in a network in which: | 2013-12-05 |
20130326014 | ADDRESS ALLOCATION PROCESSING METHOD, APPARATUS AND SYSTEM - The present invention provides an address allocation processing method, apparatus and system. The method includes: receiving, by a first BRAS, a DHCP relay packet sent by a second BRAS, wherein the DHCP relay packet includes a gateway IP address and source IP address-based response information; parsing, by the first BRAS, the DHCP relay packet, acquiring the gateway IP address, and allocating an idle IP address from an acquired address pool matching the gateway IP address; encapsulating, by the first BRAS, a source IP address in the DHCP relay packet into a destination IP address in a response packet according to the source IP address-based response information, and sending the idle IP address carried in the encapsulated response packet to the second BRAS. The present invention effectively solve a problem that an address waste phenomenon exists by using a built-in DHCP server in a dual-device hot backup scene. | 2013-12-05 |
20130326015 | AUTOMATED INTEGRATION OF CONTENT FROM MULTIPLE INFORMATION STORES USING A MOBILE COMMUNICATION DEVICE - A system, device and method are provided for merging information from a plurality of network sources using a mobile device capable. The mobile device receives data of a first type from a first network source, then merges the received data with data of a different type stored at the mobile device to create a merged data set, the merging including matching an identifier associated with the received data against an identifier associated with the stored data. The merged data set is then merged with a data record at a different network source, this merging including matching an identifier associated with the merged data set against an identifier associated with the data record. | 2013-12-05 |
20130326016 | APPARATUS AND METHOD FOR SYNCHRONIZING E-BOOK CONTENT WITH VIDEO CONTENT AND SYSTEM THEREOF - A method of synchronizing a first device capable of displaying video content and including the video content, and a second device capable of displaying E-book content associated with the video content and including the E-book content. The first device is connected to the second device according to a specific protocol. In response to a specific event for the video content or the E-book content occurring in one of the first and second devices, the device in which the specific event occurs generates event information about the specific event and transmits it to the other of the first and second devices, and performs the specific event according to the event information. Upon receiving the event information, the other of the first and second devices performs the specific event according to the received event information in synchronization with the device in which the specific event occurred, using synchronization information between the video content and the E-book content. | 2013-12-05 |
20130326017 | PROVIDING AND RECEIVING CONTENT FOR COMPUTER NETWORKS USING A GATEWAY AND SERVER - Providing and receiving content for nodes of a computer network. In one aspect, a method for receiving content for nodes on a network includes establishing a computer device as a gateway device that can communicate in a first network and communicate with a server in a second network. The gateway device makes a request for content to be provided to at least one destination node in the first network. The requested content is received at the gateway device and is then provided to the destination node, where the received content is based on stored settings for the at least one destination node. | 2013-12-05 |
20130326018 | Method for Providing Augmented Reality Service, Server and Computer-Readable Recording Medium - According some aspects of the present invention, there is provided a method for providing an augmented reality service, including (a) receiving an image through a camera, (b) performing image matching operation on the input image in an image matching server, (c) determining by an API server whether the image can be implemented as augmented reality using a result of the image matching if the image is matched to a specific image among previously stored images, (d) providing by an AR content server augmented reality content for implementing an augmented reality scenario, if it is determined that the image can be implemented as augmented reality and (e) implementing the augmented reality using the augmented reality content by a terminal. Various images input through a camera may be implemented as augmented reality by receiving only the data needed to implement a corresponding image into the augmented reality from a server by applying an image matching technique before implementing the augmented reality, without storing the data required for implementing the augmented reality in a limited memory space of a terminal. | 2013-12-05 |
20130326019 | Method and apparatus for data file transfer using destination linked directories - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 2013-12-05 |
20130326020 | PREVENTING PERSONAL INFORMATION FROM BEING POSTED TO AN INTERNET - A method of preventing personal information from being posted to an internet, comprising determining whether text within a post includes a pre-identified text pattern indicative of a first user's personal information, replacing any identified personal information with a number of trackback identifiers, and posting the text to the internet with the post including the number of trackback identifiers. A system for replacing personal information in an interact post with a number of trackback identifiers, the system comprising a processor, a discovery module, and a trackback generation module, in which the discovery module, when executed on the processor, searches through text within a post for any personal information associated with a first user, and in which the trackback generation module, when executed on the processor, replaces any identified personal information with the number of trackback identifiers before the information is posted to the internet. | 2013-12-05 |
20130326021 | AUTOMATED METHOD FOR GENERATING A WEB SERVICE COMPOSITION - The disclosed embodiments relate to creating a web service composition from a plurality of web services. For creating the web service composition, an augmented definition of the plurality of web services is created. Based on the augmented definition and a user request, a task listing the required inputs for the plurality of web services, the required outputs of the plurality of the web services, the mapping between the output of one service to the input of the second service is computed. The task of identifying the required inputs for the plurality of web services, the required outputs of the plurality of the web services, and the mapping between the output of one service to the input of the second service is crowd sourced to crowd workers who submit their responses to an online crowd sourcing platform. The collected responses are used to generate the desired web service composition. | 2013-12-05 |
20130326022 | CHRONOLOGICAL-PROGRESSION ACCESS PRIORITIZATION - In some embodiments of the invention, a system for serving dynamic content objects is provided. The system includes a request fulfiller that: receives a request for a webpage from an end-user system, retrieves a content file associated with the requested webpage, and transmits a modified content file to the end-user system. The system further includes a content-file modifier that generates the modified content file, the content-file modifier including: a dynamic-code detector that detects that the retrieved content file comprises or is associated with a dynamic code; and a reporting-code injector that injects a reporting code into the retrieved content file or an associated content file to produce the modified content file, the reporting code including instructions to report data identifying usage characteristics of one or more content objects. A high-priority content object is identified based on the reported data, and access to the high-priority content object is improved. | 2013-12-05 |
20130326023 | MECHANISM FOR LOCATION-AWARE WEB SERVICE-BASED APPLICATION SKINNING FOR WEB APPLICATIONS - A mechanism for location-aware web service-based application skinning for web applications is disclosed. A method includes identifying, by a server device, a locale of an originator of a request for a web page of a web application hosted by the server device, obtaining skinning files associated with a combination of the web application and the identified locale; and rendering, in response to the request, the web page comprising the skinning files, wherein the skinning files provide a language and style to a user interface (UI) of the web page based on the identified locale that is separate from a development of the web application. | 2013-12-05 |
20130326024 | ADAPTIVE HYPERTEXT TRANSFER PROTOCOL ("HTTP") MEDIA STREAMING SYSTEMS AND METHODS - An exemplary adaptive Hypertext Transfer Protocol (“HTTP”) media streaming system may be configured to stream a media program from an HTTP media streaming server subsystem to a client device during an adaptive HTTP media streaming session in which predefined segments of the media program are progressively downloaded from the HTTP media streaming server subsystem to the client device by way of a network connection. For each next predefined segment of the media program to be downloaded, the server subsystem may dynamically select, based on one or more of the exemplary factors disclosed herein, a version of the next predefined segment of the media program from a plurality of versions of the next predefined segment of the media program and download the selected version of the next predefined segment of the media program to the client device. Corresponding methods and systems are also disclosed. | 2013-12-05 |
20130326025 | System and Method for Differentiating and Calculating Royalties for Copyright-Protected Song Samples Used by Artists in New Works - A method is disclosed for calculating the value a “sample” of a copyright-protected work of art adds when included in a new work. The method is embodied in a computer program or series of computer programs, available from a web portal linked to a server, which stores relevant information about an owner's “samples;” allows the owner to assign specific value criteria to all “samples;” allows an artist to download specified “samples,” incorporate them into new works, and upload the new works to the web portal, where a series of calculations then derive the value each “sample” adds to the new work; and creates conditions obligating the artist to upload information regarding the distribution of the new work to the web portal so the value added by each “sample” can be distributed to the “sample” owners in proportion to the value each “sample” adds to the new work. | 2013-12-05 |
20130326026 | LOCAL CACHING DEVICE, SYSTEM AND METHOD FOR PROVIDING CONTENT CACHING SERVICE - The present disclosure relates to a local caching device, system and a method for providing a content caching service. The local caching device checks whether content having address information corresponding to content address information included in a content request message is stored in a storage unit. When the content corresponding to content address information is not stored in the storage unit, the local caching device receives content transmitted from a content providing device in response to the content request message and then checks whether content corresponding to at least part of the received content is stored in the storage unit. | 2013-12-05 |
20130326027 | INFORMATION PROCESSING APPARATUS, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - An information processing apparatus is connected to and communicates with a terminal connected to a first communication network and a second communication network based on a predetermined communication protocol. The first and the second communication network are operable using the predetermined communication protocol. The second communication network is a closed communication network. The information processing apparatus includes first and second communication units. The first communication unit communicates with the terminal via the first communication network based on the predetermined communication protocol. The second communication unit communicates with the terminal based on the predetermined communication protocol via a relay unit arranged in a communication line between the second communication network and the information processing apparatus. The first and the second communication units have the same IP address having an anycast relation as an IP address of the predetermined communication protocol. | 2013-12-05 |
20130326028 | SERVER MIGRATION - In one embodiment, the invention provides a method of configuring a migration from a plurality of distributed virtual servers to a system of blades, the method comprising: identifying among the plurality of distributed virtual servers a plurality of candidate virtual servers for inclusion in the migration; collecting performance data for each candidate virtual server; consolidating the performance data for each candidate virtual server into a usage profile; normalizing the usage profile to allow representation of a statistical measure of resource usage by the candidate virtual server; and constructing a configuration for the plurality of candidate virtual servers within the system of blades. | 2013-12-05 |
20130326029 | SYSTEM AND METHODS FOR CONFIGURATION MANAGEMENT - Aspects of the present disclosure describe systems and methods for automatically configuring, managing, updating, and/or monitoring the configuration of various computing resources and/or network devices within a communications network, such as a telecommunications network. Configuration code may be deployed to a repository for a cluster of computing resources and one or more layers may be defined describing configurable aspects of the cluster. Subsequently, a script may be identified and executed to configure the cluster based on the configuration code. | 2013-12-05 |
20130326030 | DISCOVERY OF ELECTRONIC DEVICES IN A COMBINED NETWORK - Embodiments of the invention are generally directed to discovery of electronic devices in a combined network. An embodiment of a method includes determining an identifier for a first device in a combined network according to a first network protocol, the combined network including a first network using the first network protocol and a second network using a second network protocol, where the identifier is determined based on a unique designation for the first device, and determining addressing information for the first device according to the second network protocol, where determining the addressing information includes establishing a physical address and a logical address for the first device. The method further includes broadcasting one or more messages containing identification information and capabilities of the first device to devices in the first network and to devices in the second network. The first device records and processes information from messages received by the first device, the messages being one or more messages under the first network protocol and one or more message under the second network protocol. | 2013-12-05 |
20130326031 | RESOURCE CONFIGURATION FOR A NETWORK DATA PROCESSING SYSTEM - A method and apparatus for managing a service is disclosed. A program system running on a computer system in a network data processing system identifies the service on the computer system and a set of resources used by the service. The program system collects information about the service and the set of resources used by the service. The program system uses the information collected to identify a change to a configuration for the service which will increase performance of the service. The program system then makes the identified change to the configuration for the service. | 2013-12-05 |
20130326032 | RESOURCE CONFIGURATION FOR A NETWORK DATA PROCESSING SYSTEM - A method for managing a service is disclosed. A program system running on a computer system in a network data processing system identifies the service on the computer system and a set of resources used by the service. The program system collects information about the service and the set of resources used by the service. The program system uses the information collected to identify a change to a configuration for the service which will increase performance of the service. The program system then makes the identified change to the configuration for the service. | 2013-12-05 |
20130326033 | SERVER MANAGEMENT CONNECTIONS - Systems, methods, and logic are provided for providing a server management network internal to a computing device. Providing a server management network internal to a computing device can include connecting each of a plurality of network interface controllers (NICs) in the computing device to a limited layer network device in the computing device via mutually isolated connections. Furthermore, providing a server management network internal to a computing device can include connecting the limited layer network device to a server management chip in the computing device via a connection isolated from the NICs. | 2013-12-05 |
20130326034 | PCRF RULE ROLLBACK DUE TO INSUFFICIENT RESOURCES ON A DOWNSTREAM NODE - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN) device. The method may include: establishing a first service data flow for an application function having a first Policy and Control Charging (PCC) rule including a first parameter within a session; receiving a request to upgrade the first parameter of the service data flow; generating a second PCC rule including an upgraded parameter; storing the first PCC rule in a cache; sending the second PCC rule to a Policy and Charging Enforcement Node (PCEN); receiving acknowledgement that the second PCC rule has been installed at the PCEN; receiving an indication that the second PCC rule failed at a downstream node; and sending the first PCC rule stored in the cache to the PCEN. | 2013-12-05 |
20130326035 | CENTRALIZED ENTERPRISE LEVEL INFRASTRUCTURE MANAGEMENT - An approach is provided for managing an enterprise computer system. Management functions are coordinated from a central control point. The central control point can direct one or more agents to be deployed to establish a connection to an element in its unmodified form within the enterprise system. Agents can be directed by the central control point to establish this connection in accordance with a profile that corresponds to the element. Once the connection has been established, the agent can perform a management task with respect to the element. | 2013-12-05 |
20130326036 | BALANCING MANAGEMENT DUTIES IN A CLOUD SYSTEM - A method for balancing management duties in a cloud system can include determining a relationship between a number of configuration items (CI) in a cloud system. The number of CIs are grouped into a number of cluster levels based on the relationship of the number of CIs. To balance management duties in the cloud system, one of the number of cluster levels is assigned to a management cloud server based on a capacity of the management cloud server. | 2013-12-05 |
20130326037 | CONSISTENT ASSOCIATION OF A USER ID WITH A USER - Disclosed herein are systems, methods, and computer-readable storage media for consistently associating a user ID with a user. In one aspect, a method may comprise receiving a data request at a transceiver accessible by a server computing device, wherein, in response to receiving the data request, the server computing device is configured to: access, by one or more processors coupled to the transceiver, a first value embedded in a first cookie associated with a first expiration time; set a second cookie embedded with a second value; and reset the first cookie responsive to receiving an indication that the first cookie is expiring, wherein to reset the first cookie comprises replacing the first cookie with a third cookie set with a value equal to the first value and a third expiration time later than the first expiration time. Other embodiments are disclosed and claimed. | 2013-12-05 |
20130326038 | MANAGEMENT OF DATACENTERS FOR FAULT TOLERANCE AND BANDWIDTH - Upon receiving a request to improve one or more conditions of a datacenter network, a fault management system may analyze information of the datacenter network including communication patterns among services provided in the network. The fault management system determines one or more logical machines associated with one or more services to be moved from one or more devices to one or more other devices of the network. The fault management system may select these one or more logical machines for migration based on a cost function including factors for fault tolerance, bandwidth usage, number of moves and/or response time latency. The fault management system may improve the fault tolerance of the network without significantly affecting the bandwidth usage of the network. | 2013-12-05 |
20130326039 | Network Controller With Integrated Management Controller - An network controller provides both network controller and management controller functionality. Accordingly, the system host sees, in a single device, both network functionality as well as management functionality. The integration may reduce chip count and provide a more cost effective as well as power efficient platform solution for the network and management functions in a larger system, such as a server with multiple network controllers and multiple network ports. | 2013-12-05 |
20130326040 | SYSTEM AND METHOD FOR DISAMBIGUATING COOKIES - A system and method for storing a cookie of a web page are provided. An initial cookie value corresponding to a web page is received, and a domain depth of a uniform resource locator (URL) of the web page is identified. Cookie data including a name-value pair is generated for the web page. The name-value pair includes the initial cookie value and the identified domain depth. The generated cookie data is stored corresponding to a domain of the web page. | 2013-12-05 |
20130326041 | CONCURRENT MEDIA DELIVERY - Various embodiments relating to managing media delivery are disclosed. In one embodiment, a first request is received from a first device associated with a first account to obtain a first media content item. The first request may include an identifier indicating that the first request is an automatic request or a manual request. Information for obtaining the first media content item is sent to the first device. A second request is received from a second device associated with the first account to obtain a second media content item. The second request may include an identifier indicating that the second request is a manual request. Information for obtaining the second media content item is sent to the second device, such that obtaining the first media content item on the first device temporally overlaps obtaining the second media content item on the second device. | 2013-12-05 |
20130326042 | MAINTAINING SESSION INITIATION PROTOCOL APPLICATION SESSION AFFINITY IN SIP CONTAINER CLUSTER ENVIRONMENTS - A system for maintaining SIP application session affinity, the system including a destination inspector configured to inspect a SIP request to determine whether the SIP request indicates as its destination a logical name of a SIP container, a request router configured to route the SIP request to the SIP container that is identified by the logical name if the SIP request indicates as its destination the logical name of the SIP container, and a destination assignor configured to assign the SIP request to a SIP container in accordance with a predefined assignment protocol if the SIP request does not indicate as its destination the logical name of a SIP container. | 2013-12-05 |
20130326043 | CROSS-DOMAIN EXCHANGE SYSTEM OF EQUIPMENT LISTS AND METHOD - The invention provides a CDeX system of equipment lists and a method thereof, the method includes following steps: scanning electronic devices in the first LAN conformable to the UPnP protocol by the first OTT-box to thereby establish a first equipment list; when the first router is capable of communicate with a second LAN through a wireless network tunnel, delivering the first equipment list to the first router by the first OTT-box; accessing a second identifier of the second router by the first OTT-box; delivering the first equipment list to the second router in the second LAN by the first router according to the second identifier; and delivering a second equipment list provided by the second OTT-box to the first router by the second router, in which the second equipment list is corresponding to electronic devices in the second LAN conformable to the UPnP protocol. | 2013-12-05 |
20130326044 | CONTINUOUS UPGRADING OF COMPUTERS IN A LOAD BALANCED ENVIRONMENT - The present invention is directed towards methods and systems for performing maintenance on computers included in a group of load balanced computer. A maintenance agent identifies a computers in the group as requiring maintenance, and a second computer as having up-to-date maintenance and a load level below a limit. The load balancer may assign a request to the second computer responsive to the identification. Responsive to a determination that spare capacity from the plurality of computers available to receive requests is above the threshold and that the first computer is idle, the maintenance agent may remove, for maintenance, the first computer from the plurality of computers available to receive requests. The maintenance agent may identify the first computer as having up-to-date maintenance responsive to the maintenance. | 2013-12-05 |
20130326045 | LINKAGE POLICY IMPLEMENTATION METHOD AND APPARATUS, OPEN PLATFORM BOARD, AND DEVICE - Embodiments of the present invention disclose a linkage policy implementation method, which includes: receiving, by a linkage proxy module, a linkage policy request delivered by a third-party application service; calling a corresponding protocol converter according to a protocol identifier in the linkage policy request, and performing protocol conversion for the linkage policy request to convert it into a linkage policy request in a set protocol format; and sending the protocol-converted linkage policy request to a linkage client to instruct the linkage client to parse the linkage policy request based on the set protocol and execute linkage policy configuration. With the present invention, a linkage proxy is set to execute protocol conversion of various protocols. Therefore, the cost of the linkage client would not be increased for supporting multiple protocols; and when third-party applications are increased or decreased, it is unnecessary to reconfigure the linkage client. | 2013-12-05 |
20130326046 | SYSTEMS, METHODS AND MEDIA FOR PROVIDING CLIENT-SIDE INTERPORTLET COMMUNICATION - A method for providing client-side interportlet communication includes: executing an even manager, generated at a portal server, on a client device hosting a portal page for providing interportlet communication to portlets contained in the portal page; receiving at the event manager running on a client device a registration request from each of the portlets when the portal page containing the portlets is loaded; and receiving at the event manager an event set off by one of the portlets wherein the event is defined by a token published by the one of the portlets. If the token defining the event matches the published token defined in a behavior of the portal page, the method also includes invoking at the event manager callback functions of one or more of the portlets having at least one subscription token that matches the corresponding subscribed token defined in the behavior. | 2013-12-05 |
20130326047 | ROUTER AND PERSONAL DEVICE FOR MONITORING AND CONTROLLING DATA TRANSFER RATES ON A LOCAL AREA NETWORK - A router configured to monitor data transfer to devices on a local area network can include computer instructions for identifying the devices on the local area network, monitoring the data transfer rates for each of the devices, controlling the data transfer rates for each of the devices, and for communicating with a personal device. The personal device can be configured to display the monitored data transfer rates to a user and allow the user to control the data transfer rates for each device. | 2013-12-05 |
20130326048 | CONTEXTUAL NETWORK ACCESS OPTIMIZER - A method and apparatus for optimizing access to a contextual network are described. The apparatus has a registration manager module, a configuration manager module, an access manager module, and an access optimizer module. The registration manager module registers business applications operating in the contextual network of a server with registration data having a set of parameters to define the business applications. The configuration manager module determines initial configuration settings for the business applications to identify parts of the contextual network relevant to the business applications. The access manager module provides the business applications with access to contextual network data based on distances between nodes in a contextual network graph of the contextual network data. The access optimizer module collects measurements of the access of the business applications to the contextual network data, and computes future optimal configuration settings for the business applications. | 2013-12-05 |
20130326049 | SYSTEM AND METHOD FOR SEQUENCING PER-HOP DATA IN PERFORMANCE-MONITORED NETWORK ENVIRONMENTS - A method includes asynchronously collecting performance data from distributed devices. The performance data includes information associated with a particular data stream that transits each of the distributed devices. The method further includes ordering the performance data in accordance with a specific metric included in the performance data. The method further includes generating a per-hop perspective of the ordered performance data. | 2013-12-05 |
20130326050 | Method of Organic Cloud Discovery and Transformation of Network Assets - A technology method that comprises the steps, methods and business rules of discovering network assets organically, decomposing the network into distinct layers and providing demarcation lines by normalizing the network assets into distinct cells, then mashing up the cells utilizing a Network Rules Engine to produce pre-packaged service capabilities by way of a graphical user interface and exposing these capabilities to the cloud. | 2013-12-05 |
20130326051 | PERFORMANCE ANALYSIS USING ANONYMOUS AGGREGATED DATA - An approach to improving performance of a target system is disclosed. The approach may involve determining how similar a target system being considered is to other systems in use by other clients. For each of these other separate systems, the approach may involve determining the differences between the performance of the target system and the performance of the separate system, accounting for the level of similarity. A report can be generated that identifies performance values of the target system that are outside an acceptable range, which is based on the performance of the other separate systems. Based on this report, the administrator of the target system can consider configuration changes and upgrades to improve performance of the target system. | 2013-12-05 |
20130326052 | SYSTEM FOR REAL TRAFFIC REPLAY OVER WIRELESS NETWORKS - A real traffic replay over wireless networks with environment emulation and an event-driven automata-synchronized replay method are disclosed. The system includes a first traffic capture module configured to capture packet traces and environment effects in a real environment, a first event transform module configured to transform the packet traces into a sequence of events, and a reproduce module configured to receive the environment effects from the first traffic capture module and the sequence of events from the first event transform module such as to control a replay of the environment effects in the real environment and the sequence of events coordinately by means of automata. | 2013-12-05 |
20130326053 | Method And Apparatus For Single Point Of Failure Elimination For Cloud-Based Applications - Various embodiments provide a method and apparatus of providing SPOF elimination for cloud-based applications that provides rules that support rapid elasticity, infrastructure maintenance such as, for example, software/firmware/hardware upgrades, updates, retrofit, and growth, and preventative maintenance such as, for example, cleaning fan filters and replacing failed hardware components. In particular, the SPOF elimination provided by the method and apparatus is based on network architecture and persistent storage considerations in addition to VM to host instance mappings. | 2013-12-05 |
20130326054 | Performance Estimator for Network Devices - Techniques for estimating the performance of a network device. In one set of embodiments, a network device can determine one or more performance metrics associated with a feature of the network device that is customizable by a user. An example of such a feature is a user-defined script that is executed via a scripting engine of the network device. The network device can then generate a performance estimate based on the one or more performance metrics. The performance estimate can indicate the likely performance of the network device with the feature enabled. | 2013-12-05 |
20130326055 | Method and System for Network Transaction Monitoring Using Transaction Flow Signatures - A method and system for monitoring performance of network transactions is described herein. According to the present invention, in a testing environment, transaction flow signatures representing a hierarchical flow of sub-transactions constituting the said network transactions are generated and stored for monitoring and analysis of the network transactions. In a real-time environment, the sub-transactions are identified through the stored transaction flow signatures for a particular network transaction and the identified sub-transactions are then monitored by metrics analysis engine to determine the performance of the network. | 2013-12-05 |
20130326056 | NETWORK FLOW ABNORMALITY DETECTION SYSTEM AND A METHOD OF THE SAME - A network flow abnormality detection system and method for detecting at least one network packet to determine whether a flow condition of the network packet is abnormal. The network packet includes L bit data element values. The method is fetching M data element values in above-mentioned L bit data element values by data element value fetch unit, wherein M is an odd number and larger than 1; N parallel processing units receive and process above-mentioned M data element values; comparison module compares above-mentioned M data element values and a standard threshold to generate M comparison result values; sum unit sums above-mentioned M comparison result values to obtain a comparison sum value; determination unit compares the comparison sum value and an abnormality threshold, wherein when the comparison sum value is larger than the abnormality threshold, the determination unit determines the flow condition is abnormal. | 2013-12-05 |
20130326057 | INTERNET PROTOCOL (IP) NETWORK DEVICE, NETWORK SYSTEM, METHOD THEREOF - An internet protocol (IP) network device is provided including a detector adapted to detect an event in the internet protocol (IP) network device. The network device also includes a generator adapted to generate a trap message including event information having information about the detected event. The network device also includes a transmitter adapted to transmit, to an internet protocol (IP) network management device, the trap message including the event information and a first sequence indicator. The network device also includes a timer adapted to measure a time period from a time at which the transmitter transmits the trap information. If the measured time period is equal to or longer than a predetermined time, the generator generates an empty trap message and the transmitter transmits, to the network management device, the empty trap message and a second sequence indicator. | 2013-12-05 |
20130326058 | System and Method for Seamless Horizontal Scaling using Logical Scalable Units - The performance of a scalable computing environment in a telecommunication network may be improved by configuring a server computing system to monitor a level of traffic throughput within the telecommunication network to determine whether an increase in throughput capacity is needed or a decrease in throughput capacity is acceptable, and increasing a throughput capacity of the telecommunication network when an increase in throughput capacity is needed by adding a logical scalable unit to the telecommunication network. The logical scalable unit may including a minimum combination of logical components required to provide in a single multiprocessor system a complete set of telecommunication functionalities for a subset of users in the telecommunication network. | 2013-12-05 |
20130326059 | Network Accessibility to any Network Attached Device During Reboot and Power Loss - A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a “boot once” connectivity manager processor (CMP). The CMP receives its power over the DCN rather than from the power applied to the network devices. The CMP can execute special operating system code and maintain network connectivity even if the network device itself is powered off, is being booted or is otherwise non-functional. The CMP is also coupled to the network device's memory so that it may respond to out-of-band polling requests for device status information from network management tools. With CMP, network administrators can monitor the boot process of network devices, determine that a network device is non-functional due to power loss and can maintain an accurate inventory status of spare network devices that are stored un-powered in a spares closet. | 2013-12-05 |
20130326060 | Population Category Hierarchies - Developing a population category hierarchy can include providing a candidate category hierarchy, including a number of candidate categories, and a mapping between a number of reference pages and the number of candidate categories, including a number of mapped reference pages ( | 2013-12-05 |
20130326061 | METHOD AND APPARATUS OF DETERMINING POLICY AND CHARGING RULES BASED ON NETWORK RESOURCE UTILIZATION INFORMATION - The present invention provides a solution for determining a QoS policy and/or charging policy based on network resource utilization information in an LTE network. As compared to the current 3GPP policy and charging control architecture, the solution of the present invention determines a QoS policy and/or charging policy based on network resource utilization information in combination with existing input information, thereby making policy and charging control more flexible. | 2013-12-05 |
20130326062 | Systems and Methods for Dynamic Session License Control - A method for controlling session access within a network license zone (NLZ) includes receiving periodically, by the first network node, a first network access message from a second network node within the NLZ. The first network access message includes a number of active sessions enumerated by service type currently processed by the second network node. The method further includes determining, by the first network node, a first summation of active sessions within the NLZ based in part on the first network access message and a number of active sessions currently processed by the first network node. The method further includes enforcing, by the first network node, a total number of active sessions within NLZ. The first network node is configured to reject new session requests received at the first network node when the total number of active sessions within the NLZ exceeds a predetermined number of active sessions. | 2013-12-05 |
20130326063 | TECHNIQUES FOR WORKLOAD DISCOVERY AND ORGANIZATION - Techniques for workload discovery and organization are presented. A workload when initiated on a network self-inspects the network for other workloads processing as a collection over the network. Shared communication information is used by the workload to dynamically join the collection. A network address for the initiated workload is then added to a shared Domain Name System (DNS) database being maintained for the network and the collection. | 2013-12-05 |
20130326064 | DISTRIBUTED DEMAND-BASED STORAGE QUALITY OF SERVICE MANAGEMENT USING RESOURCE POOLING - A system and method for providing quality of service (QoS) for clients running on host computers to access a common resource uses a resource pool module and a local scheduler in at least one of the host computers. The resource pool module operates to compute an entitlement of each client for the common resource based on a current capacity for the common resource and demands of the clients for the common resource. In addition, the resource pool module operates to assign a portion of the computed current capacity for the common resource to a particular host computer using the computed entitlement of each client running on the particular host computer. The local scheduler operates to allocate the portion of the computed current capacity among the clients running on the particular host computer. | 2013-12-05 |
20130326065 | WORKLOAD BALANCING BETWEEN NODES IN A CLUSTER AS REQUIRED BY ALLOCATIONS OF IP ADDRESSES WITHIN A CLUSTER - Balancing workload distributed between nodes in a cluster through allocations of IP addresses by determining, for each node, an imbalance metric for each possible pairing of the plurality of an IP address assignable to the node based upon the distances between the IP addresses in each pairing and selectively distributing a plurality of IP addresses between the nodes in a cluster based upon minimizing the sum of the imbalance metrics of the 1P addresses for each of the nodes in the cluster resulting from the selected distribution. | 2013-12-05 |
20130326066 | WORKLOAD BALANCING BETWEEN NODES IN A CLUSTER AS REQUIRED BY ALLOCATIONS OF IP ADDRESSES WITHIN A CLUSTER - Balancing workload distributed between nodes in a cluster through allocations of IP addresses by determining, for each node, an imbalance metric for each possible pairing of the plurality of an IP address assignable to the node based upon the distances between the IP addresses in each pairing and selectively distributing a plurality of IP addresses between the nodes in a cluster based upon minimizing the sum of the imbalance metrics of the IP addresses for each of the nodes in the cluster resulting from the selected distribution. | 2013-12-05 |
20130326067 | DECENTRALIZED RESOURCE ALLOCATION - The disclosure is directed to routing service requests over a network ( | 2013-12-05 |
20130326068 | Method and System for Reduction of Delay and Bandwidth Requirements in Internet Data Transfer - Techniques for efficiently and economically providing data transfer through data networks are disclosed. The techniques are particularly suitable for Internet data transfers. In one aspect, delayed response processing is utilized. Requests for common content are initially queued. After a short period of time, the queued requests are processed as a group so as to better utilize available bandwidth, particularly in times where traffic or congestion is high. In another aspect, multiple-destination data packets are utilized. | 2013-12-05 |
20130326069 | Configuring Wireless Devices Over a Wireless Connection - Approaches for a network attached device and method for establishing a wireless network are described. A client device connects to the wireless network in a session and sends configuration data relating to the wireless network over the wireless network. The configuration data is received and the wireless network is reconfigured. Without interrupting the session, the client device automatically attempts to contact the reconfigured wireless network. | 2013-12-05 |
20130326070 | CASCADING ARCHITECTURE FOR AUDIO AND VIDEO STREAMS - An approach to supplying a data stream, for e.g., an internet-based video conference, to multiple client devices in a network, including attempting, at a first client device, to join an Internet Protocol (IP) multicast session in a network in which the first client device is operating and, if unsuccessful to attempt to join a unicast transmission of the data stream from a network node other than the meeting server and that is in a same subnet as the first client device, and if the unicast join within the same subnet is unsuccessful, registering the first client device with the meeting server to obtain at least one candidate node from which to receive the data stream. | 2013-12-05 |
20130326071 | Maintaining Session Initiation Protocol Application Session Affinity in SIP Container Cluster Environments - A system for maintaining SIP application session affinity, the system including a destination inspector configured to inspect a SIP request to determine whether the SIP request indicates as its destination a logical name of a SIP container, a request router configured to route the SIP request to the SIP container that is identified by the logical name if the SIP request indicates as its destination the logical name of the SIP container, and a destination assignor configured to assign the SIP request to a SIP container in accordance with a predefined assignment protocol if the SIP request does not indicate as its destination the logical name of a SIP container. | 2013-12-05 |
20130326072 | Seamless Hand-Off of Combined Unified Communications and Virtual Desktop Infrastructure Sessions - A host device receives from a user at a first client device a first login request for hosted virtual desktop (HVD) services. A first virtual desktop infrastructure (VDI) session is started upon receiving a valid first login request. A first unified communications (UC) session is established between the first client device and an endpoint device. A second login request is received from the user at a second client device, the second login request configured to request HVD services. A second VDI session is started to mediate an HVD session for the user upon receiving a valid second login request. A second UC session is established between the second client device and the endpoint device. A media communication session associated with the first UC session is transferred from the first client device to the second client device after the second VDI session is started and the second UC session is established. | 2013-12-05 |
20130326073 | DISTRIBUTED SYNCHRONOUS BATCH RECONFIGURATION OF A NETWORK - A novel alternative concept for handling dynamic provisioning changes and ongoing network reconfiguration and incremental reoptimization in general. A prime motivation is concern about the dependency of existing concepts for dynamic provisioning on the real-time coherence of databases of network state at diverse geographic locations. Not only is the continual updating of such global state everywhere in the network an intensive real-time load, but inevitable incoherencies pose hazards in network operation. The alternative proposal is a framework that makes use precise time synchronization and the computational power of network nodes to solve identical local instances of incremental reoptimization problems in situ. The new scheme removes the database coherency hazard, reduces signaling volumes, and increases resource efficiencies in service provisioning. It also provides a framework in general for continually ongoing incremental or (if desired) total reoptimization of network configuration. | 2013-12-05 |
20130326074 | MOBILE NETWORK APPLICATION TEST - Embodiments relate to a method, system, and computer program product for testing a mobile network application. An aspect includes a method that receives a test request for a mobile network application and activating a test session window on a browser of a mobile device according to the test request. The method also includes obtaining a request in hypertext markup language (HTTP) that corresponds to the test request such that the HTTP request contains session information for the test session window and sending the HTTP request to the mobile network application. An HTTP response containing session information is then received from the mobile network application. | 2013-12-05 |
20130326075 | Handling of a Communication Session - Embodiments describe handling a communication session at a device, by executing a communication session handling program at the device, the communication session handling program comprising a communication session handling part for handling the communication session and an interfacing part for linking with a communication session control interface. An application executed at the device provides, to a user of the device, a communication session control interface for the communication session handled by the communication session handling part of the communication session handling program, the application linking with the interfacing part of the communication session handling program. On detecting that the application has ceased to provide the communication session control interface, the interfacing part of the communication session handling program links, without dropping the communication session, to a further communication session control interface provided at the device for continuation of the communication session handled by the communication session handling part. | 2013-12-05 |
20130326076 | PER FLOW AND PER SESSION METERING LIMIT APPLICATION - Various exemplary embodiments relate to a method performed by a policy and charging rules node (PCRN), the method including: receiving a metering limit associated with a user; defining a session key associated with the metering limit; defining a flow key associated with the metering limit; dynamically selecting the session key; commanding a policy and charging enforcement node to apply the dynamically selected session key to a session of the user; dynamically selecting the flow key; and commanding a policy and charging enforcement node to uninstall the session key and to apply the dynamically selected flow key to a flow of the user. | 2013-12-05 |
20130326077 | METHOD FOR CONNECTING A REMOTE NETWORK AND SYSTEM FOR CONNECTING A REMOTE NETWORK - Disclosed is a remote network connection method of easily establishing network connection between an information processing apparatus and a terminal device. The remote network connection method includes connecting to a gateway, transmitting connection information including at least one of gateway connection information and information processing apparatus identification information to a server, and setting network connection to a terminal device connected to the gateway on the basis of the connection information through the gateway. Accordingly, it is possible to easily establish the remote network connection between the information processing apparatus and the terminal device through a mobile communication network using a push message function of the server, without a separate network connection setup between the information processing apparatus and the terminal device. It is also possible to reduce the network maintenance cost. | 2013-12-05 |
20130326078 | Access to a Computer Network - A method of mediating access to a computer network comprises the steps of identifying a user who wishes to access the computer network, obtaining quality of service data specific to the user, generating a token comprising the quality of service data and providing an output derived from the token to the user. Optionally, the method can further comprise receiving a request from the user for access to the computer network and providing access to the computer network to the user according to the token. | 2013-12-05 |