53rd week of 2009 patent applcation highlights part 73 |
Patent application number | Title | Published |
20090327381 | TRUE RANDOM NUMBER GENERATOR - The present invention relates to an apparatus for generating a true random number comprising: (a) one or more decoupled oscillator(s), for generating a first set of one or more random bit(s); (b) one or more clock sampler(s), for generating a second set of one or more random bit(s); (c) a logic gate for logically combining said first set of one or more random bit(s) and said second set of one or more random bit(s) into a single true random bit; (d) a synchronizing circuit for synchronizing said single true random bit to the clock domain of said apparatus; (e) an LFSR, synchronized with said clock domain, which receives said synchronized single true random bit, and logically combines at least one of its internal bit(s) with said synchronized single true random bit for generating a true random number represented by the internal bits of said LFSR; and (f) an output bus for communicating said true random number from said LFSR. | 2009-12-31 |
20090327382 | PSEUDO-RANDOM NUMBER GENERATION DEVICE, STREAM ENCRYPTION DEVICE AND PROGRAM - A pseudo-random number generation device having a resistance against attack methods that use the number of operations of an LFSR, a stream encryption device, and a program are provided. The stream encryption device has: means (delay means | 2009-12-31 |
20090327383 | SINUSOIDAL WAVE GENERATION CIRCUIT - There are provided a coefficient ROM | 2009-12-31 |
20090327384 | SYSTEM AND METHOD FOR ACTIVE DIPLEXERS - The present invention relates to methods and systems for signal filtering in electronic devices and more particularly, some embodiments related to methods and systems for filtering of radio frequency (RF) signals. In some embodiments, a filter circuit may comprise a down-converter, a filter, coupled to the down-converter and configured to filter the down-converted signal, and an up-converter, coupled to the filter. Various embodiments might also include a combining circuit, coupled to the up-converter and configured to combine the filtered, up-converted signal and the input signal. | 2009-12-31 |
20090327385 | Filter Structure and Method for Filtering an Input Signal - The invention relates to a method and filter structure for filtering an input signal, which is applied to an input ( | 2009-12-31 |
20090327386 | COMBINED DEBLOCKING AND DENOISING FILTER - An apparatus, a computer readable medium to instruct a process to implement a method, and a method of reducing blocking artifacts and/or noise in an image that has been compressed by a block-based encoding process. The method includes deblocking the image using overlapped forward directional transforms, the overlapped forward directional transforms including directional selecting to filter across horizontal and vertical boundaries, denoising the image, in one version edge detecting to classify individual pixels as to whether or not they belong to edge features, and generating output pixels by locally adapting to whether the pixels are in block boundaries, and/or include edge features. | 2009-12-31 |
20090327387 | DIGITAL GENERATION OF AN ACCELERATED OR DECELERATED CHAOTIC NUMERICAL SEQUENCE - A method for generating an accelerated and/or decelerated chaotic sequence. The method involves selecting a plurality of polynomial equations constructed from an acc-dec variable v. The method also involves selecting a value for the acc-dec variable v for advancing or stepping back a chaotic sequence generation by at least one cycle at a given time. The method further involves using residue number system (RNS) arithmetic operations to respectively determine solutions for the polynomial equations using the acc-dec variable v. The solutions iteratively computed and expressed as RNS residue values. The method involves determining a series of digits in a weighted number system based on the RNS residue values. | 2009-12-31 |
20090327388 | STATIC LOGIC LING ADDER - In general, in one aspect, the disclosure describes a prefix tree adder. The adder may be used to add two strings of bits or multiply a string of bits by 3. First group carry generate and propagate signals are calculated directly from inputs to the adder using Ling equations and static logic. The previously calculated group carry generate and propagate signals are propagated through the adder to calculate additional group carry generate and propagate signals. A conditional summer receives a plurality of inputs for the bits and calculates multiple sums for the bits. The conditional summer selects an appropriate sum for the bits based on carry signals utilized as control signals. The number of delay stages required to calculate the sum is LOG | 2009-12-31 |
20090327389 | Stateful Business Application Processing In An Otherwise Stateless Service-Oriented Architecture - Methods, apparatus, and products for stateful business application processing in an otherwise stateless service-oriented architecture (‘SOA’), the SOA including SOA services where each SOA service carrying out a processing step of the business application, where the stateful business application processing includes: configuring each service of the SOA to record state information describing the state of the service upon completion of a processing step in the business application and provide the state information to a subsequent service; and executing the business application in the SOA, including sending requests for data processing among the services, each such request including a specification of the state of the executing business application. | 2009-12-31 |
20090327390 | MANAGING DATA DELIVERY BASED ON DEVICE STATE - Managing power-consuming resources on a first computing device by adjusting data delivery from a plurality of second computing devices based on a state of the first computing device. The state of the first computing device is provided to the second computing devices to alter the data delivery. In some embodiments, the first computing device provides the second computing devices with actions or commands relating to data delivery based on the device state. For example, the second computing devices are instructed to store the data, forward the data, forward only high priority data, or perform other actions. Managing the data delivery from the second computing devices preserves battery life of the first computing device. | 2009-12-31 |
20090327391 | METHODS AND APPARATUS FOR SECURELY ADVERTISING IDENTIFICATION AND/OR DISCOVERY INFORMATION - Methods and apparatus related to a peer to peer wireless communications system supporting secure advertisement of identification and/or discovery information e.g., upper layer discovery information, are described. Air interface timing and/or other information received from a third device, e.g., a beacon or GPS transmitter is incorporated in the computation of identification/discovery information which is communicated from a first device to a second device. The second device stores some identification/discovery credentials corresponding to the first device, which have been communicated out of band from the first device to the second device. Upon receipt of a identifier from a first device, the second device determines if the stored information corresponds to the device that transmitted the identifier. Various embodiments facilitate secure advertisement of identification and/or discovery information and discovery, e.g., selective discovery by trusted peers. | 2009-12-31 |
20090327392 | METHOD AND SYSTEM FOR CREATING A VIRTUAL ROUTER IN A BLADE CHASSIS TO MAINTAIN CONNECTIVITY - A method for migrating a first virtual machine (VM), that includes transmitting, prior to migration, a first packet between the first VM on a first blade chassis and a second VM on a second blade chassis using a first virtual network interface card (VNIC) and a second VNIC. The method includes migrating the first VM and the first VNIC to the second blade, identifying a subnet of the first VM, identifying a subnet of the second VM, and creating a virtual router to execute on the second blade. The virtual router is associated with a third VNIC and a fourth VNIC. A first network address in the first VNIC's subnet is assigned to the third VNIC. A second network address in the second VNIC's subnet is assigned to the fourth VNIC. The method includes routing a second packet between the first VM and the second VM using the virtual router. | 2009-12-31 |
20090327393 | NETWORK AGGREGATION - Disclosed are example embodiments of methods and systems for increasing the bandwidth available to transmit content or data from a source, for example located at a central office or head end, to one or more computing platforms, such as notebook computers, located, for example, but not by way of limitation, on or near subscriber premises. Content is segmented and transmitted to a plurality of computing platforms, each platform receiving at least one different segment, using, for example, a first distribution network such as a digital subscriber loop (DSL) network. Using a second network, such as peer-to-peer wireless connections between the platforms, the platforms exchange the segmented content and reassemble the content to its un-segmented form, so that the distribution capacity of the first network can be aggregated. | 2009-12-31 |
20090327394 | INFORMATION PROVIDING SERVER, PROGRAM, INFORMATION PROVIDING METHOD, AND INFORMATION PROVIDING SYSTEM - Technology is provided for easily converting data for use with a plurality of receiving devices. The structure-specific message generator of an information providing server generates reference information by converting the data structure of information received from a transmitting device into a data structure processable by a plurality of receiving devices. A SOAP notification generator then generates notification information for each of the receiving device by replacing information at predetermined parts in the generated reference information with receiving device-specific information. | 2009-12-31 |
20090327395 | MULTI-RATE PEER DISCOVERY METHODS AND APPARATUS - Wireless communications devices, e.g., peer to peer mobile wireless terminals in and ad-hoc peer to peer communications network, support multiple modes of peer discovery operation. In different peer discovery transmit modes peer discovery information is transmitted at different rates. In different peer discovery receive modes peer discovery information is monitored at different rates. Performing peer discovery operations at a higher rate has the benefit of reducing discovery latency at the cost of utilizing more communications resources and expending more power. A communications device dynamically changes its mode in response to changing conditions and/or needs. Transitions between modes are in response to a determined change condition trigger occurrence. Various change condition triggers include, e.g., a user event, an application event, information received over the air interface, information derived from information received over the air interface and/or temporal information. | 2009-12-31 |
20090327396 | Tiny File Transfer Protocol (TFTP) Relay Agent - One embodiment for dynamically loading a service onto a node includes requesting, by a service requester, of a service from a service broker. Further, the method includes selecting, by the service broker, of the node among the nodes. Further still, the method includes re-booting, by the service broker, of the node based on the selecting, and then requesting, by the node, of an image from a TFTP relay agent for the service for the node. Yet further, the method includes querying, by the TFTP relay agent, for a type of the service from the service broker for the node, and then downloading of the image for the type of the service from a software repository accessed by the TFTP relay agent to the node. Finally, the method includes booting, by the node, to the image, informing the service requester that the service is ready for use, and using the service. | 2009-12-31 |
20090327397 | MANAGING USER PERSONAL INFORMATION ACROSS WEB SITES - A method of managing user personal information across a set of service provider sites is implemented, preferably as a web browser plug-in function. As a user navigates to a service provider web site and performs an interaction involving user identity attribute data, the interaction is recorded for later replay. Typically, the interaction is a graphical user interface (GUI) interaction. At a later time, previously-recorded interactions at service provider sites are replayed automatically, i.e., without requiring the user to navigate back to the individual sites and perform the interactions, and (during the replay operation) the user's previously-entered identity attribute data is located and retrieved. A display of the identity attribute data collected from the service provider sites then can be examined, e.g., for any inconsistency among the data. If the user then updates identity attribute data for a given service provider site, the identity attribute data for the site is automatically updated, once again without requiring the user to navigate to the site and re-enter the update directly. The method enables the user to ensure that his or her personal data stored at the service provider sites is up-to-date and synchronized. | 2009-12-31 |
20090327398 | Method and System for User Equipment Configuration - A method of managing configuration of user equipment that has a configuration database modifiable with configuration data in a first format, and a communications unit for receiving configuration data in a second format is described. The method comprises storing a user agent at the user equipment; providing received configuration data in the second format to the user agent; using the user agent to transform the configuration data into the first format in the user equipment; and modifying the configuration database with the configuration data in the first format. | 2009-12-31 |
20090327399 | Device and method for managing the availability of access to digital data - The invention pertains to a device for managing the availability of digital data ( | 2009-12-31 |
20090327400 | Methods, Systems, And Computer Program Products For Presenting Topical Information Referenced During A Communication - Methods, systems, and computer program products are disclosed for presenting topical information referenced during a communication. A topic key phrase is received during a communication between a first party communicating via a first communication device and a second party communicating via a second communication device. A topic descriptor associated with the topic key phrase is identified. Whether or not to present the associated topic descriptor at the first communication device is determined based on a relationship between the first party and the second party. The topic descriptor is presented on a user interface based on the determination. | 2009-12-31 |
20090327401 | METHOD AND SYSTEM FOR CLIENT CONTEXT DISSEMINATION FOR WEB-BASED APPLICATIONS - A method advertises the existence of a subscriber profile service on a communication network. A first data request sent from a client device to an application server is intercepted. The first data request is modified by inserting an advertisement of contextual information relating to the existence of the subscriber profile service into the first data request prior to transmission to the application server. The modified data request is transmitted to the application server. | 2009-12-31 |
20090327402 | SYSTEMS AND METHODS FOR MAPPING USER EXPERIENCES IN NETWORK NAVIGATION - In accordance with one or more embodiments of the present disclosure, systems and methods for mapping user experiences over a network include tracking user navigation events through a network site of a resource provider, identifying recurring navigation events of the user, and generating a map of the user navigation events and the recurring navigation events as a user experience. The systems and methods for mapping user experiences, as disclosed herein, provide improved analysis of network site usage patterns for purposes of streamlining and optimizing network site operation. | 2009-12-31 |
20090327403 | ASYNCHRONOUSLY EDITING A SYNCHRONOUS DATA STORE, SUCH AS A PROJECT MANAGEMENT DATA STORE - A dynamic client system is described that provides an interactive client-side web application experience to a user accessing an application through a web browser. At the client, the system receives an edit to a project task from a user of the client. The system receives an indication that the user has completed editing the project task. The system sends the edited project task to the project server. The client sends edits to the project server in the background and users can continue editing the project without waiting for the project server to finish processing the edits. | 2009-12-31 |
20090327404 | UNCACHED DATA CONTROL IN SERVER-CACHED PAGE - Dynamic processing markers for use with cached web pages. If a request for a cached web page is received at a server, the server can provide the cached web page to the client. However, if there are one or more processing markers associated with the cached page, the server may process the dynamic processing marker using information from the request. Potentially, the dynamic result of this processing may be provided with the cached web page to the client. Alternatively or in addition, the dynamic processing marker is provided to the client, whereupon the client provides the processing marker to another server that processes the marker. Accordingly, even cached web pages that are cached at the server side may cause appropriate processing by the server upon receiving a request for the web page. | 2009-12-31 |
20090327405 | Enhanced Client And Server Systems for Operating Collaboratively Within Shared Workspaces - Tools and techniques are described for enhanced client and server systems for operating collaboratively within shared workspaces. These tools may provide methods that include receiving document content associated with a workspace that is shared with one or more client systems. The client system may facilitate and manage the shared workspace. These methods may include receiving search commands that reference a search string, and searching the document content within the shared workspace for the search string. If the search string occurs anywhere within the shared workspace, the methods may report where the search string occurs within the shared workspace. | 2009-12-31 |
20090327406 | BUS SYSTEM - A disclosed bus system includes multiple server agents corresponding one-to-one with server applications; and multiple user agents corresponding one-to-one with user applications. Each server agent includes a first server-agent communication unit for communicating with the corresponding server application; a server-agent determination unit for determining as communication targets one or more selected from the user agents and the other server agents; and a second server-agent communication unit for communicating with the communication targets determined by the server-agent determination unit. Each user agent includes a first user-agent communication unit for communicating with the corresponding user application; a user-agent determination unit for determining as communication targets one or more selected from the server agents and the other user agents; and a second user-agent communication unit for communicating with the communication targets determined by the user-agent determination unit. | 2009-12-31 |
20090327407 | AUTO UPDATE UTILITY FOR DIGITAL ADDRESS BOOKS - An Internet-based system capable of automatically maintaining contact-related information in any computer software application or digital device which stores or manages contact-related information. More particularly, the system allows users to automatically enter and maintain contact-related information in a digital address book or similar application or device (such as a wireless phone or PDA) with minimal or no manual entry of the contact-related information by the user. The system also allows contacts of the user (i.e. people who's contact information or partial contact information is present in the user's address book application) to make corrections to their contact-related information contained in the user's address book, request reciprocal contact information from the user, deny the user access to additional or corrected contact-related information and take other actions relative to managing the contact-related information which others (users) have about them. | 2009-12-31 |
20090327408 | MOBILE TERMINAL - A mobile terminal includes a storage unit, a wireless LAN communication unit, and a display unit. The storage unit stores device identification information for identifying the mobile terminal. The wireless LAN communication unit connects to a management server managing, for each mobile terminal, attribute information related to at least one content server to which the mobile terminal is connected via a network. The wireless LAN communication unit transmits the device identification information to the management server along with a request for the attribute information. Then, the wireless LAN communication unit receives one or more pieces of attribute information from the management server. The display unit displays the received one or more pieces of attribute information. | 2009-12-31 |
20090327409 | METHOD FOR THE CREATION OF AN INTELLIGENT DOCUMENT, AND DEVICE FOR CARRYING OUT SAID METHOD - There is provided a method and system for the creation of an intelligent document that can be executed upon the occurrence of a precondition. An exemplary method comprises providing displayable contents that include static contents and dynamic contents, and inserting the dynamic contents into the intelligent document separately from the static contents. | 2009-12-31 |
20090327410 | WEB PAGE DATA TRANSMITTING APPARATUS AND METHOD OF CONTROLLING OPERATION OF SAME - If a request for a web page is one based upon a crawler, HTML data is transmitted instead of multimedia data. In order to achieve this, if the request is one for a web page represented by multimedia data, it is determined whether the request is one based upon a crawler. If the request is based upon a crawler, then XML data is converted to HTML data by crawler script. The HTML data obtained by the conversion is then transmitted to the terminal that issued the request. | 2009-12-31 |
20090327411 | PROTECTING WEB APPLICATION DATA - A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server. | 2009-12-31 |
20090327412 | METHODS AND SYSTEMS FOR PEER-TO-PEER APP-LEVEL PERFORMANCE ENHANCING PROTOCOL (PEP) - The present invention relates to methods, apparatus, and systems for providing peer-to-peer network acceleration. The system includes content servers and clients. Each of the clients is capable of functioning as a proxy server. A client generates a request for content, and the requesting client determines which of the content servers contains the requested content. The requesting client then determines that one of the clients is in a position to retrieve the requested content on the content server at lower latency than the requesting client. The client then functions as a proxy server for the requesting client, and the requesting client receives the requested content from the client acting as a proxy server. | 2009-12-31 |
20090327413 | NETWORK SYSTEM, SERVER AND INFORMATION TERMINAL FOR LIST MATCHING - A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item. | 2009-12-31 |
20090327414 | SYSTEM AND METHOD OF BINDING A CLIENT TO A SERVER - Systems and methods to bind a client with a server are provided. A particular method includes establishing a connection between a server and a client. A list of best-fit server IP addresses is received at the client via the connection. A determination is made whether the server is identified in the list of best-fit server IP addresses. When the server is not identified in the list of best-fit server IP addresses, the connection to the server is terminated. | 2009-12-31 |
20090327415 | DEVICES AND METHODS FOR DETERMINING A GROUP AND FOR DETERMINING INFORMATION RELATED TO GROUP ENTRIES - Described are methods and devices for identifying a group that include various methods to determine a group. Also described are devices and methods for attempting communication with a missing member of the group include different manners in which to determine information related to an entry of a group. The described devices and methods may be particularly beneficial at the particular time the certain group members plan to be or are in communication with one another. In this way, in the event that two or more entries of a group planned to be in communication or are in communication in-real time, in accordance with the disclosed devices and methods, the parties may be able to bring one or more other entries of the group into the communication as needed or desired. | 2009-12-31 |
20090327416 | INFORMATION TECHNOLOGY SYSTEM COLLABORATION - A computer implemented method includes detecting an event in a multi-component information technology system. Multiple parties having an interest in the event are identifies. An interactive collaboration mechanism is created and access to the collaboration mechanism is provided to the identified multiple parties having an interest in the event. | 2009-12-31 |
20090327417 | Using Semantic Networks to Develop a Social Network - A method, apparatus and program product are provided for identifying common interests between users of a communication network. A program of instruction monitors activity over a communication network by users and identifies interests for users based on network activity. The program of instruction creates semantic networks based on use of the communication network and identifies other users with common interests from the semantic networks. Optionally, social networks may be created or modified by adding other users with common interests as identified by semantic networks. | 2009-12-31 |
20090327418 | PARTICIPANT POSITIONING IN MULTIMEDIA CONFERENCING - A multimedia conference technique is disclosed that allows physically remote users to participate in an immersive telecollaborative environment by synchronizing multiple data, images and sounds. The multimedia conference implementation provides users with the perception of being in the same room visually as well as acoustically according to an orientation plan which reflects each remote user's position within the multimedia conference environment. | 2009-12-31 |
20090327419 | Management of Organizational Boundaries in Unified Communications Systems - In general, this disclosure describes techniques of controlling communications occurring in a unified communications system. As described herein, a directory is established at a server system that hosts the unified communications system. The directory includes a plurality of hierarchically-organized categories. Each category specifies a set of users. One or more conferences may be associated with each of the categories. All communications occurring in the unified communications system occur within the context of one of the conferences. A user can only communicate within a conference if the conference is associated with the category that specifies a set of users that includes the user. By appropriately structuring the categories in the directory and the sets of users specified by the categories, the techniques of this disclosure may serve to prevent a user from using the unified communications system to communicate with certain other individuals. | 2009-12-31 |
20090327420 | CONTROLLED SHARING OF PERSONAL DATA - A first user of a first communicating object shares personal data in response to a request from a second user. The shared data are associated with a reference of the second user in the first communicating object and are transmitted to the second communicating object in order to be recorded therein in association with a reference of the first user. The first user controls the shared personal data from the first communicating object by transmitting a control instruction to the second communicating object. The instruction contains at least the reference of the first user in order to find the personal data of the first user in association with the reference in the second communicating object, and to treat the personal data according to the transmitted control instruction. | 2009-12-31 |
20090327421 | Cross domain interaction of a Web application - A method and system for cross domain interaction of a Web application are proposed, wherein a Web application belonging to a first domain needs to interact with a service belonging to a second domain. The method comprises: by the Web application, creating an iFrame in a webpage, wherein the iFrame is belonging to the first domain; creating a form in the iFrame; submitting the form to a Web server providing a service belonging to the second domain; and refreshing the iFrame by receiving a response from the Web server, changing the domain, to which the iFrame is belonging, to the second domain, and performing cross domain interaction with the service belonging to the second domain with the information contained in the form. | 2009-12-31 |
20090327422 | COMMUNICATION APPLICATION FOR CONDUCTING CONVERSATIONS INCLUDING MULTIPLE MEDIA TYPES IN EITHER A REAL-TIME MODE OR A TIME-SHIFTED MODE - A communication application configured to support a conversation among participants over a communication network. The communication application is configured to (i) support one or more media types within the context of the conversation, (ii) interleave the one or more media types in a time-indexed order within the context of the conversation, (iii) enable the participants to render the conversation including the interleaved one or more media types in either a real-time rendering mode or time-shifted rendering mode, and (iv) seamlessly transition the conversation between the two modes so that the conversation may take place substantially live when in the real-time rendering mode or asynchronously when in the time-shifted rendering mode. | 2009-12-31 |
20090327423 | COMMUNICATION METHOD AND COMMUNICATION SYSTEM - Communications method, comprising the steps: entering a posting to an addressee into a communications platform, publishing the posting on the communications platform, reviewing of the posting by users of the communications platform, selection of at least one posting based on the reviews, transmitting the posting to the addressee, and publishing the answer from the recipient on the communications platform. | 2009-12-31 |
20090327424 | SYSTEMS AND METHODS FOR MAPPING EVENT CHANGES IN NETWORK NAVIGATION - In accordance with one or more embodiments of the present disclosure, systems and methods for mapping user experiences over a network include obtaining path data related to a first sequence of user navigation events, obtaining path data related to a second sequence of user navigation events that is at least different than the first sequence of user navigation events, comparing path data of the first and second sequences of user navigation events, identifying changes to the path data, and generating a map of the user navigation events based on the identified changes to the path data. | 2009-12-31 |
20090327425 | SWITCHING BETWEEN AND DUAL EXISTENCE IN LIVE AND RECORDED VERSIONS OF A MEETING - An asynchronous meeting system is presented that allows a meeting participant to seamlessly switch between live (synchronous) and recorded (asynchronous) meeting information. The asynchronous meeting system provides information to other meeting participants about the status of a meeting participant, including whether the meeting participant is viewing live or recorded meeting information. The asynchronous meeting system allows other meeting participants to notify the meeting participant when attention at the live meeting is desired. Thus, the asynchronous meeting system allows the meeting participant to more productively use his/her time at the meeting, but maintains the ability to have two-way, real-time communication that meeting participants expect. | 2009-12-31 |
20090327426 | REMOTE CALL CONTROL AND CONFERENCING USING PAIRED DEVICES - In one embodiment, a user paired controller communication device may pair with a user paired server communication device. The user paired controller communication device may direct the user paired server communication device to execute a first mode communication session of a multimodal conversation, such as a voice session. The user paired controller communication may execute a second mode communication session of the multimodal conversation, such as an instant messaging session. | 2009-12-31 |
20090327427 | METHOD OF AGGREGATING BUSINESS AND SOCIAL NETWORKS - A method and system for facilitating relationships across multiple networks is described. The meta-network includes relationship information describing users, the networks to which such users belong, and the relationships that they have established within such networks. When a relationship is established in a network, it can be used to propagate relationships across any number of networks with the same or different users. The meta-network enhances the users' ability to search for information and manage their relationships across multiple networks. A user can search for other users according to one or more user-specified attributes. One or more users satisfying the user-specified attributes are identified, and a similarity measure may be determined for each of the identified users. A mapping interface is displayed to the user to enable the user to visually compare the identified users having a similarity measure within the displayed range. The mapping interface allows the user to invite one or more of the displayed users to establish a relationship with the user. | 2009-12-31 |
20090327428 | MULTIMODAL CONVERSATION TRANSFER - In one embodiment, a user may transfer a multimodal conversation. A multimodal conversation may have a first mode communication session and a second mode communication session. A first user point of presence may execute a first transfer of the first mode communication session with a first partner point of presence from the first user point of presence to a first target point of presence. A second user point of presence may execute a second transfer of the second mode communication session with a second partner point of presence from the second user point of presence to a second target point of presence. | 2009-12-31 |
20090327429 | COLLABORATIVE ALERT MANAGEMENT AND MONITORING - Methods, systems, and computer program products for dynamically monitoring, processing, and managing alerts are described herein. In an embodiment, the method operates by receiving messages that are either alerts or responses to existing alerts. The messages are parsed to determine if whether they are alerts or responses to alerts. Actions including updating alert states and storing alert data are executed, and then the method sends notifications regarding the alert messages and responses to a collaboration list of registered subscribers that dynamically expands over time based upon alert escalations. The method then determines whether additional messages have been received; and performs actions associated with these additional messages until there are no remaining alerts or alert responses to process. The method stores updated alert and response data in a repository so that the alerts and responses can be monitored and managed. | 2009-12-31 |
20090327430 | DETERMINING EMAIL FILTERING TYPE BASED ON SENDER CLASSIFICATION - Determining email filtering type based on sender classification. Incoming email is accessed and a sender of the incoming email is identified. The reputation of the sender of the incoming email is determined. An email sender classification is made based on the reputation of the sender. A determination of the type of filtering operations to be performed by an email filter on the email is made based on the classification. The parameters of the type of filtering operations to be performed are determined. The parameters of the type of filtering operations to be performed are provided to the email filter. | 2009-12-31 |
20090327431 | AUTOMATIC DOWNLOAD OF IMAGES FROM ONLINE STORAGE - Various technologies for automatically downloading one or more high resolution image files from online storage. In one implementation, an e-mail client desktop application (stored at a sender's computer) may receive a request from the sender to send an e-mail with one or more high resolution image files added to the e-mail. Although the high resolution image files may be uploaded to a server, the files may be added as lower resolution image files with hidden Uniform Resource Locator (URL) addresses that may indicate the location on the server of the corresponding high resolution image files. Prior to sending the e-mail, the e-mail client desktop application may concatenate each high resolution image file's URL address with an extension or tag such as “?download” so that the address may later be easily identified. | 2009-12-31 |
20090327432 | SOCIAL NETWORK NOTIFICATIONS FOR EXTERNAL UPDATES - Various technologies for notifying users of a social network service of updates to services external to the social network service by members of the social network. The external service may be a typical web service, such as blogging, and video and photo sharing services. In one implementation, a member of a social network may register the external service with the social network service. Thereinafter, updates that the user makes on the external service may trigger notifications to members of the user's social network. | 2009-12-31 |
20090327433 | Displaying Images for People Associated with a Message Item - Technologies are described herein for displaying a list of people associated with a message item along with images and other personal context information in a PIM application. The people associated with the message item are identified and a list is generated containing a name, an image, and other personal context information for each. The list of people associated with the message item is displayed in a window of the PIM along with the information regarding the message item. | 2009-12-31 |
20090327434 | Method, Apparatus, and Computer Program Product for Anonymous Polling - An apparatus for anonymous polling may include a processor. The processor may be configured to receive an input message and identify whether the input message includes a request or a response to the request and, if the input message includes the request, the processor may be further configured to identify a source of the input message. The processor may also be configured to provide for transmission of an output message. In this regard, based on the whether the input message includes a request or a response, and based on the source of the input message, the apparatus may operate as a referral agent, a responder, or a forwarding agent. Associated methods and computer program products may also be provided. | 2009-12-31 |
20090327435 | METHOD FOR PEER TO PEER SUBSCRIBER REGISTRATION AND AFFILIATION - A method for subscriber registration and affiliation in a peer to peer wide area network is provided. The peer to peer wide area network includes at least one Subscriber and a plurality of Peers. The method includes: communicating a registration and affiliation message including a Subscriber Registration Affiliation Index from a Subscriber to a Peer of the plurality of Peers; routing a registration and affiliation update message including a Peer Registration Affiliation Index equal to the received Subscriber Registration Affiliation Index from the Peer to other Peers of the plurality of Peers; comparing the received Peer Registration Affiliation Index with one or more other received Peer Registration Affiliation Indexes by each of the plurality of Peers; and selecting by each of the plurality of Peers a Peer Registration Affiliation for the Subscriber corresponding to a highest value Peer Registration Affiliation Index. | 2009-12-31 |
20090327436 | INSTANT MESSAGING NETWORK CONTROL MODULE - An instant messaging network control module has a processor, a network connecting module, a connecting interface and a memory. The network connecting module is used to connect to an instant messaging server. The connecting interface is used to electronically connect to an outer controlled device. The memory stores a local machine account and a password of the network control module for logging on to the instant message service, a client account and an automatic operating process. The automatic operating process is executed by the processor to allow the network control module to log on to the instant messaging service, receive instant messages sent from a client device logged on to the instant messaging service with the client account and send a corresponding operating command to the outer controlled device. Therefore the network control module provides an easy and cheap way to remotely control the outer controlled device. | 2009-12-31 |
20090327437 | REAL TIME MEDIA-BASED SOCIAL NETWORK NOTIFICATIONS - Real time media-based social network notifications are utilized to provide updates of events that occur in a social network in real time. By providing a data feed of events which are monitored in the social network to a real time media system such as a presence-based messaging network, users can be kept up to date with events as they occur in the social network with alerts or instant messages. | 2009-12-31 |
20090327438 | AUTOMATICALLY CREATING CONTACT GROUPS AND FOR SUGGESTING AN E-MAIL SENDING LIST - There is provided a solution for automatically creating contact groups, a method of the solution comprising: tracking an email sending history of a user, and automatically recording email sending data, wherein the recorded email sending data comprises contact groups, each of which consists of the email addresses and all the receivers of a sent email and corresponding receiving types. There is further provided a solution for suggesting an email sending list to a user, a method of the solution comprising: retrieving one or more contact groups from the recorded email sending data when the user composes a new email; and, presenting to the user the retrieved one or more contact groups as possible sending lists. | 2009-12-31 |
20090327439 | MOBILE PHONE AND COMPUTER MESSAGE SYSTEM - A computer and mobile phone user interface system that includes a computer, a mobile phone, and a messaging system where the messaging system displays messages on both the computer and on the mobile phone that notify the user as to from where the messages were opened or sent and that further deletes messages from the mobile phone when they are deleted from the computer. | 2009-12-31 |
20090327440 | System and Method for Securing a Wireless Network - Methods and systems for configuring a network are provided. A method may include monitoring properties of a connection between a network device and a network. The method may also include detecting a change in the properties of the connection. The may also include verifying the connection to the network is provided by a service provider when the change in the properties is detected and providing network configuration options based on the change. | 2009-12-31 |
20090327441 | INSTANT MESSAGING AS A COMMUNICATION CHANNEL FOR A CONTACT CENTER - A system, method, processor and client device for an instant messaging (IM) system including an IM server and a user device operationally coupled to the IM server. The IM server provides an availability indication element to the user device indicating if any one of a plurality agents are available for an IM communication session. The user device enables selection of the availability indication element to initiate the IM communication session. The IM server routes the IM communication session to the available agent if the availability indication is selected by the user. The user device may provide a user interface including the availability indication. The user interface may display an IM buddy indication associated with the plurality of agents. The availability indication may be displayed in the user interface overlapping with the IM buddy indication. | 2009-12-31 |
20090327442 | Method and System for Providing Backup Messages to Wireless Devices During Outages - The method and system of the present invention provides an improved technique for providing email to a wireless device during an outage. Email messages are redirected from the primary email system to a secondary email system during an outage such as, for example, a natural disaster. Email messages are accessible from the secondary email system through a wireless device. A notification message is sent to the user's wireless device alerting them that their email messages are available on the secondary email system through their wireless device. After the termination of the outage, email messages received during the outage are synchronized into the users standard email application. | 2009-12-31 |
20090327443 | Method and System for Aggregating Messages - Methods and systems are disclosed that support the aggregation of acknowledgement messages and control messages. Advantageously, acknowledgement and negative acknowledgement indications for multiple client nodes are combined into a single aggregated message which is broadcast or multicast to the multiple client nodes. Based on unique identifiers assigned to each client node, client nodes are grouped such that the aggregated acknowledgement messages can be efficiently encoded to conserve both network capacity when they are transmitted, as well as processing capacity when they are parsed by the client nodes. If code division multiple access (CDMA) technology is used, the aggregated acknowledgment message can be transmitted without CDMA spreading to effectively broadcast or multicast it to multiple client nodes. A similar technique can be employed for the efficient broadcast or multicast of aggregated control messages. | 2009-12-31 |
20090327444 | Dynamic Network Link Selection For Transmitting A Message Between Compute Nodes Of A Parallel Comput - Methods, apparatus, and products are disclosed for dynamic network link selection for transmitting a message between nodes of a parallel computer. The nodes are connected using a data communications network. Each node connects to adjacent nodes in the data communications network through a plurality of network links. Each link provides a different data communication path through the network between the nodes of the parallel computer. Such dynamic link selection includes: identifying, by an origin node, a current message for transmission to a target node; determining, by the origin node, whether transmissions of previous messages to the target node have completed; selecting, by the origin node from the plurality of links for the origin node, a link in dependence upon the determination and link characteristics for the plurality of links for the origin node; and transmitting, by the origin node, the current message to the target node using the selected link. | 2009-12-31 |
20090327445 | CONTINUOUS DATA PROTECTION AND REMOTE BLOCK-LEVEL STORAGE FOR A DATA VOLUME - A system and method for writing and reading blocks of a data volume are disclosed. The method provides continuous data protection (CDP) for a data volume by backing up blocks of the data volume in real time to a local CDP log and transmitting the blocks over the Internet for storage in a remote CDP log on a server computer system in response to write requests that change the blocks of the data volume. In response to a read request for a particular block the method attempts to read the block from the data volume. If the block is not present in the data volume the method attempts to read the block from the local CDP log. If the block is not present in the local CDP log the method request the server computer system to read the block from the remote CDP log and return the block. | 2009-12-31 |
20090327446 | Software Application Striping - A distributed computing system comprising networking infrastructure and methods of executing an application on the distributed computing system is presented. Interconnected networking nodes offering available computing resources form a network fabric. The computing resources can be allocated from the networking nodes, including available processing cores or memory elements located on the networking nodes. A software application can be stored in a system memory comprising memory elements allocated from the nodes. The software application can be disaggregated into a plurality of executable portions that are striped across the allocated processing cores by assigning each core a portion to execute. When the cores are authenticated with respect to their portions, the cores are allowed to execute the portions by accessing the system memory over the fabric. While executing the software application, the networking nodes having the allocated cores concurrently forward packets through the fabric. | 2009-12-31 |
20090327447 | EXTENDING SHARING OPTIONS OF LOCAL COMPUTING RESOURCES - A method, system, and medium are provided for sharing items residing on a computing device. Items selected for sharing can be made simultaneously available to users on a local network and to users outside of the local network. A remote sharing service allows access to copies of items based on user identifiers associated. Local attributes associated with items are modified such that the user identifiers are associated with the items for providing access via a local network. | 2009-12-31 |
20090327448 | PEER-TO-PEER SYNCHRONOUS CONTENT SELECTION - Various technologies for sharing digital images within an instant messaging (IM) session between two users. In one implementation, a first user uploads a set of images to the second user. The set of images may be displayed as thumbnails on the displays of both users. By clicking on one of the thumbnails, either user may make the associated image appear as a larger image on both users' displays. In the event that both users click on different images simultaneously, or near-simultaneously, a protocol may be employed that selects which image is displayed. | 2009-12-31 |
20090327449 | WIRELESS SYNCHRONIZATION OF MEDIA CONTENT AND SUBSCRIPTION CONTENT - Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device may be used to help locate nearby accessible wireless networks. Once a synchronization relationship between the portable device and a media library on a host computer is established, periodically updated content, such as podcasts, may be discovered and subscribed to using software on the host computer, and the content synchronized with the host computer. A portable device may manage episodic content, such as podcasts, using the device's own wireless connection, and may further send such content to other portable devices. A central user profile may be set up on a web server to synchronize multiple wireless or wired devices. | 2009-12-31 |
20090327450 | USER STATUS REPORTS PROVIDED BY AN ENTERTAINMENT ACCESS SYSTEM - An entertainment access system is provided that enables a user to request and receive status reports that present current information concerning a wide variety of items pertaining to the user's devices, entertainment content and usage rights in a standard, predictable and consistent manner that enhances rather than hinders the user experience. In some illustrative examples, the user can request the status report from one of his devices that is registered with the entertainment access system. The entertainment access system responds by collecting and formatting the status information so that is can be conveniently displayed or otherwise rendered on the registered device. For instance, if the request is received from a cell phone device, which generally has a relatively small screen, the information may be presented in a relatively abbreviated format. On the other hand, if the request is received from the user's personal computer, the information may be presented by the entertainment access system to the personal computer in a more detailed or entirely different format than when the information is to be presented to a cell phone device. | 2009-12-31 |
20090327451 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR AIRCRAFT MULTIMEDIA DISTRIBUTION - A method, system and computer program product for aircraft multimedia distribution, including a multimedia server provided within an aircraft of an airline and a multimedia communications network within the aircraft coupled to the multimedia server. The multimedia server is configured to distribute, over the aircraft multimedia communications network, multimedia in-flight to a device of a passenger for at least one of viewing, listening and purchasing by the passenger. | 2009-12-31 |
20090327452 | AUTOMATED CHANNEL DATA EXTRACTION AND TRANSFORMATION - Select portions of product channel data collected by a product channel participant and stored in a data warehouse are periodically extracted based on a previously determined template. The extracted subset of product channel data is thereafter transformed so that the format of the data complies with that of the requesting enterprise. Once transformed, one or more rule sets is applied to the subset of transformed data to guarantee that the information complies with requirements set forth by the enterprise yet does not violate any disclosure rules of the product channel participant. Thereafter and on a scheduled basis, the transformed and validated data is delivered to a delivery server from which the enterprise can retrieve the data at its convenience. | 2009-12-31 |
20090327453 | METHOD FOR IMPROVING DATA READING SPEED OF A DISKLESS COMPUTER - A method for improving data reading speed of a diskless computer is applied to at least one diskless computer and a remote server having at least one disk drive and a cache unit. The method comprises acts of retrieving a data reading request from the diskless computer, determining if the requested data is in the cache unit, transferring the requested data from the cache unit to the diskless computer when the requested data is in the cache unit and transferring the requested data from the at least one disk drive to the diskless computer and the cache unit when the requested data is not in the cache unit. Therefore, speed of the diskless computer reading data from the remote server increases because access speed of the cache unit is faster than a conventional disk drive. | 2009-12-31 |
20090327454 | SERVICE FLOW PROCESSING APPARATUS AND METHOD - A service flow processing apparatus requests a service on a network to perform processing in accordance with a service flow description document and an interface description document, and receives a response from the service. The service flow processing apparatus also generates a proxy service that corresponds to the service, and if a normal response has not been received from the service, the service flow processing apparatus changes the destination of the request for the service described in the interface description document to the proxy service. | 2009-12-31 |
20090327455 | RESOURCE CONFIGURATION METHOD, SERVER, NETWORK EQUIPMENT AND NETWORK SYSTEM - A resource configuration method, a server, a network equipment, and a network system are provided. The resource configuration method includes performing a resource configuration on a network equipment according to a resource requirement of the network equipment and updated resource configuration information. The resource configuration information includes resource registration information reported by each of network equipments in a network. By implementing the present invention, the number of lookups for the resources is reduced and the process thereof is shortened, thereby achieving an effective resource allocation. In the case that an update frequency is fast enough, a search for resources is realized by one lookup. With such dynamic resource configuration information, the resource allocation is performed quickly and the waste of processing capacity of the server is avoided effectively. | 2009-12-31 |
20090327456 | METHOD AND APPARATUS FOR EXTENDING FUNCTIONALITY OF NETWORKED DEVICES - Disclosed are methods for providing extended functionality to a networked device, the networked device connected in a network, as well as corresponding apparatus and computer-readable medium. The embodiments intercept data communications in which the networked device is a party, the data communications being intercepted by an interdictor, receive at the interdictor a subscription registration for notification of a networked device event which is to be altered, the subscription registration being received from an extension service, determine whether the data communications in which the networked device is a party corresponds to the subscription registration of the networked device event which is to be altered, and modify the data communications in which the networked device is a party to provide the extended functionality when the data communications are determined to correspond to the subscription registration of networked device event to be altered. | 2009-12-31 |
20090327457 | Distributed Configuration Management Using Loosely-Coupled Action-Style Documents - Described is a technology in a distributed configuration network management environment, in which action-style documents are used as guides in processing structured documents to perform management tasks. For example, the action-style documents may be used by a standard stylesheet processor to validate a constitutional document, and process input lines of that constitutional document into output lines of a document. When executed, the output lines perform a management task. In this manner, for example, policy statements of an administrator are transformed into a single type of self-contained document that is consistently interpreted, and thus consistently executed, regardless of its source or when it was authored. | 2009-12-31 |
20090327458 | ONLINE PREDICATE CHECKING FOR DISTRIBUTED SYSTEMS - Exemplary methods, computer-readable media, and systems describe detecting a performance bug or a nontrivial correctness in a distributed system. The techniques describe using an online predicate checker by specifying a predicate on distributed properties of the distributed system. The process describes monitoring and checking the predicate when the system is deployed and providing a service. In response to detection of the performance bug, the process describes performing modifications of the predicate or installing new predicate. | 2009-12-31 |
20090327459 | On-Demand Capacity Management - Dynamically upsizing and/or downsizing a network farm in response to network demand. An application message router routes messages to the network farm. When the network farm approaches or is anticipated to be approaching capacity, a group of one or more servers may be added to the network farm. When the added server(s) are capable of participating in the network farm, the application message router is triggered to route also to the added servers. When the network farm has excess capacity, a group of one or more servers may be dropped from the network farm. This may be accomplished by triggering the application message router to no longer route messages to the removed servers. The removed servers may be either immediately or gracefully removed from service. | 2009-12-31 |
20090327460 | Application Request Routing and Load Balancing - An application request router that routes incoming application message to various servers in a network farm, even though the original network request itself does not directly specify which server is to handle the request. The application request routing module uses intra-farm routing policy and characteristics of the request itself to identify which of the servers is to handle the message and then dispatches the message to the appropriate server. This allows a user to reconfigure the network farm by reconfiguring the capabilities of the servers in the network farm, and then altering the routing policy accordingly to take advantage of the reconfigured network farm capabilities. | 2009-12-31 |
20090327461 | COMPUTING APPARATUS - A reconfigurable computing apparatus includes plural computing element networks respectively formed of computing elements of an identical bit width, the bit width of each of the computing element networks differing according to computing element network; a bit width converting element that converts bit widths between the computing element networks; a control signal-dedicated network that is formed of computing elements, is reconfigurable, and controls each of the computing element networks; and a sequencer that controls a timing at which circuit configurations are switched with respect to the computing element networks, the control signal-dedicated network, and the bit width converting element. | 2009-12-31 |
20090327462 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR MANAGING ASSIGNMENT OF MAC ADDRESSES IN A VIRTUAL MACHINE ENVIRONMENT - A method, system and program product for managing assignment of virtual physical addresses. The method includes requesting, using a services function provided by a virtual machine operating system, a MAC address assignment for a real device and searching, in a MAC assignment table created and stored within a virtual memory space, to determine whether or not an explicit MAC address is assigned to the device. If an explicit MAC address is determined to be assigned to the device, retrieving the explicit MAC address upon verifying that the MAC address is not in use by another device and forwarding, using the services function, the explicit MAC address retrieved for assignment to the real device. If an explicit MAC address is not assigned to the device, retrieving an available MAC address from a MAC address pool table and forwarding the available MAC address retrieved for assignment to the real device. | 2009-12-31 |
20090327463 | Information Processing Apparatus and Boot Method Thereof - According to one embodiment, an information processing apparatus that is connectable to a server that stores an operating system (OS) includes a data storage module, a setting storage module, a controller, and a boot module. The data storage module stores data. The setting storage module stores setting information indicating either a first mode using the data storage module or a second mode not using the data storage module. The controller retrieves the setting information from the setting storage module before an OS boots up, and, when the setting information indicates the second mode, disables access to the data storage module. The boot module loads, when access to the data storage module is disabled, the OS from the server, and boots up the OS. | 2009-12-31 |
20090327464 | Load Balanced Data Processing Performed On An Application Message Transmitted Between Compute Nodes - Methods, apparatus, and products are disclosed for load balanced data processing performed on an application message transmitted between compute nodes of a parallel computer that include: identifying, by an origin compute node, an application message for transmission to a target compute node, the message to be processed by a data processing operation; determining, by the origin compute node, origin sub-operations used to carry out a portion of the data processing operation on the origin compute node; determining, by the origin compute node, target sub-operations used to carry out a remaining portion of the data processing operation on the target compute node; processing, by the origin compute node, the message using the origin sub-operations; and transmitting, by the origin compute node, the processed message to the target compute node for processing using the target sub-operations. | 2009-12-31 |
20090327465 | Distributed Configuration Orchestration for Network Client Management - Described is a network configuration management technology in which an orchestration point coordinates client machines and/or other machines to each run an activity with respect to the client machines to perform management tasks. The orchestration point controls the start of the activity. A management point and server may report progress. The orchestration point coordinates running the activities, e.g., serially or in parallel among the clients, and/or based on percentage of total machines allowed to simultaneously run an activity and/or current workload. Activities may include a task sequencing activity, a desired configuration management activity, a command set-related activity and/or a custom activity generated from a script, e.g., a PowerShell™ script. Also described is a replicator activity, which may be limited (e.g., based on a percentage of the total machines) and/or throttled (e.g., based on current load). | 2009-12-31 |
20090327466 | INTERNAL UNIFORM RESOURCE LOCATOR FORMULATION AND TESTING - A mechanism for computer-assisted generation of matching rules for a proposed internal Uniform Resource Locator (URL) to a corresponding possible public URL. After accessing the proposed internal URL from the user, one or more options for a public URL corresponding to the internal URL are generated. Also, a mechanism for testing whether a candidate public Uniform Resource Locator (URL) has a corresponding match to an internal URL. Upon accessing a candidate public URL, matching rules are used to determine whether or not the candidate public URL matches a valid internal URL using any of the matching rules. If it is determined that there is not a match, matching rules that may be used to more closely match the candidate public URL to the valid internal URL are then displayed. | 2009-12-31 |
20090327467 | DEVICE DISCOVERY IN A WIRELESS COMMUNICATION SYSTEM - A method and apparatus for performing device discovery in a wireless communication system is described. In one embodiment, a device discovery process is used in a wireless communication system having an apparatus for communicating with WirelessHD devices in a wireless network, where the apparatus comprises a host processor; a transceiver; a physical interface coupling the host processor and the transceiver; and a memory accessible by the host processor and the transceiver to exchange information between the host processor and the transceiver, and the device discovery process comprises: discovering a remote wireless device in the wireless network; notifying, by the transceiver, the host processor of the remote wireless device; requesting, under control of the transceiver, capability information from the remote wireless device prior to receiving a request from the host processor for the capability information; buffering, under control of the transceiver, the capability information before the capability information is requested by the host processor; receiving a capability request from the host processor; and providing the host processor access to the capability information. | 2009-12-31 |
20090327468 | Interactive Remote Command Execution Over a Stateless Client/Server Network Protocol - A mechanism for executing a remote command in a stateless client/server environment that provides progress information and allows user input that can influence command execution. A server receives a command request thread and processes the thread asynchronously by launching an asynchronous thread of execution and creating a conversation identifier for identifying the thread. In executing the command thread, if a conflict in execution of the thread exists, the server halts execution of the thread, creates a user input request to provide a resolution to the conflict and a user input request identifier, and sends the user input request, user input request identifier, and conversation identifier to the client. Responsive to receiving a response from the client, the server processes the user input and resumes execution of the command thread based on the user input. | 2009-12-31 |
20090327469 | Method for Controlling Host Throughput to a Computer Storage Subsystem - A method for controlling the throughput in a communications channel between a host and its storage subsystem is disclosed. A determination is made whether or not a total throughput value is greater than a predetermined maximum throughput value. If the total throughput value is greater than the predetermined maximum throughput value, a delay is applied to the communications channel. If the total throughput value is not greater than the predetermined maximum throughput value, another determination is made whether or not one time period has completed. If one time period has completed, a total throughput value and an exponential moving average (EMA) throughput value of the communications channel is retrieved, a new EMA throughput value is generated based on the total throughput value and the EMA throughput value, and adjusting the total throughput value based on whether or not the new throughput value is greater than a predetermined maximum throughput value. | 2009-12-31 |
20090327470 | SCALING SYSTEMS MANAGEMENT USING A STATELESS PROXY - A system for managing system devices including a first managed system, which includes hardware, an operating system executing on the hardware, and an agent management object (AMO) executing on the operating system and configured to obtain first management information about the operating system and the hardware. The system also includes a second managed system, including a first proxy management object (PMO) configured to receive the first management information from the AMO, request second management information about the hardware from the first managed system, receive the second management information from the first managed system, normalize the first management information and the second management information to obtain first normalized management information, and populate a first proxy data model associated with the PMO using the first normalized management information, where the first normalized management information is used to manage the first managed system. | 2009-12-31 |
20090327471 | MULTITENANT HOSTED VIRTUAL MACHINE INFRASTRUCTURE - A multi-tenant virtual machine infrastructure (MTVMI) allows multiple tenants to independently access and use a plurality of virtual computing resources via the Internet. Within the MTVMI, different tenants may define unique configurations of virtual computing resources and unique rules to govern the use of the virtual computing resources. The MTVMI may be configured to provide valuable services for tenants and users associated with the tenants. | 2009-12-31 |
20090327472 | DRM TIME SETTING METHOD AND APPARATUS OF PORTABLE TERMINAL - A method and apparatus for setting a Digital Rights Management (DRM) time for a DRM-enabled portable terminal for securing a reliable DRM time are provided. The method includes detecting a DRM time setting event, acquiring a reference time and a local time upon detection of the DRM time setting event, determining a reference value using the reference time and the local time, and setting the DRM time or the portable terminal based on the reference value. | 2009-12-31 |
20090327473 | Methods, Systems and Computer-Readable Media for Dynamically Recognizing and Processing Service Order Types in a Network Management System - Methods, systems, and computer-readable media are provided for dynamically recognizing and processing service order types in a network management system. Service type data for a new service order type is registered in a database table while the network management system is operating. Then, a service order is received in the network management system and the service order is parsed to determine if the received service order corresponds with the new service order type based on the service type data registered in the database table. If the service order corresponds with the new service order type, then the service order is processed by the network management system. If the service order does not correspond with the new service order type, then updated service type data may be registered in the database table. | 2009-12-31 |
20090327474 | Electronic Device and Connected Device Searching Method - According to one embodiment, a method of making it possible to identify the connection of an external device reliably, the method comprises transmitting a command to check the connection of an external device to a logical address to which no physical address has been caused to correspond in an address list, if there has been a response to the command to check the connection, transmitting to the logical address a command to obtain a physical address allocated to an external device to which the logical address has been allocated, and registering a physical address included in a response to the command to obtain the physical address so as to correspond to the logical address to which the command to check the connection has been transmitted in the address list stored in a storage unit. | 2009-12-31 |
20090327475 | METHOD FOR MANAGING A COUNTER STATUS ALLOCATED TO A PAIR COMPRISING A COMMUNICATION TERMINAL AND A BASE STATION - A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved. | 2009-12-31 |
20090327476 | Dynamic Infrastructure for Monitoring Service Level Agreements - A dynamic infrastructure for monitoring service level agreements (SLAs) is described. In an embodiment, the infrastructure comprises three types of functional elements: probes, metrics and audits and a small number of primitive actions for manipulating these elements. The elements are connected by streams which store data for processing and transport data between functional elements. The primitive actions, which are duplicating and removing functional elements as well as splitting and joining metrics, are arranged such that the functional elements can be optimized dynamically in responses to changes in the service and/or the hardware without losing any data. | 2009-12-31 |
20090327477 | MODULAR INTEGRATED COMPUTING AND STORAGE - A modularized computing system includes a plurality of modular components that are coupled together forming a network. Each modular component includes a standard network interface. The system further includes an initialization module, a monitor module, a storage medium, and a management module. As a module unit is coupled to the network, the initialization module automatically configures the component to an operable state. The monitor module monitors network operations including performance parameters of each modular component based on a plurality of system policies. Based on information gathered by the monitor module, the management module actively modifies network structure and resource allocation to optimize network performance. | 2009-12-31 |
20090327478 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A system that facilitates selecting a sensor from amongst a plurality of sensors from which to request data is described. The system includes a receiver component that receives a value of information for data that corresponds to a segment of a phenomenon model that models a phenomenon. The receiver component also receives user-defined preferences regarding sharing data from at least one sensor. The system further includes a selector component that selects the at least one sensor from amongst a plurality of sensors based at least in part upon the value of information and the preferences. The determination of the value ascribed to sensors may include considerations of the utilitarian benefit of reduction of uncertainty to a population of people. | 2009-12-31 |
20090327479 | USER-BASED WIDE AREA NETWORK OPTIMIZATION - An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer. | 2009-12-31 |
20090327480 | METHOD AND SYSTEM FOR DISCOVERING MANAGED SYSTEMS IN A NETWORK - A method for discovering managed systems in a network including classifying a first managed system associated with a first active Internet Protocol (IP) address in the network using a plurality of network protocols, identifying a set of drivers using the classification, where the set of drivers are configured to obtain first management information about the managed system, obtaining a first set of drivers, populating a data model with the first management information obtain using at least one of the first set of drivers, and managing the first managed system using the data model. | 2009-12-31 |