Patent application number | Description | Published |
20080240381 | Method and Apparatus for Providing Contextual Information with Telephone Calls - The present invention is directed to a method for propagating contextual data in an audio communication by storing the contextual data obtained from a calling party in an extensible mark-up language formatted text document. A telephone call between a first party and a second party is converted to a session initiation protocol based voice over internet protocol communication, and the stored text document is attached to session initiation protocol messages that control the voice over internet protocol communication. The document is attached to the signaling messages by embedding the text document in a session description payload associated with the session initiation protocol message. The attached document is propagated with the audio communication, including when the signaling messages are used to transfer the audio communication from the second party to a third party or to add one or more addition parties to the audio communication. | 10-02-2008 |
20080256256 | Method and Apparatus for Autonomically Regulating Ratio of Stateful to Stateless Transaction Processing for Increasing Scalability in a Network of SIP Servers - Systems and methods are provided for maximizing call throughput in a server network by optimizing the balance of stateful to stateless handling or transactions at each server within the network. The identification of transaction messages to be handled statelessly or statefully is made at each proxy server within the network in order to maximize the total throughput at that proxy server within prescribed processor utilization limits. In general, each transaction is handled statefully by at least one server within the network. Reports on the stateful handling of messages and the resource consumption at various proxies are communicated throughout the network to be used in identifying the ratio of messages to be forwarded statefully to messages to be forwarded statelessly at any given proxy. | 10-16-2008 |
20080310312 | Method for Monitoring SIP Call-Flows by Tracking Message Transformation - Systems and methods are provided for monitoring session initiation communications without modifying the operational code of the session initiation protocol proxy servers through which the messages that constitute a given communication are routed. The inbound and outbound versions of session initiation protocol messages are identified at a plurality of proxy servers. The inbound and outbound message versions are correlated at each proxy server using user-defined correlation rules that test conditions of the message headers. The correlated inbound and outbound message versions are then examined for transformations, and these transformations are used to determine the actions taken by the appropriate proxy server on that message. These actions are used to check the proper operation of both the proxy server and the session initiation protocol communication. | 12-18-2008 |
20090298587 | SIP Based VOIP Multiplayer Network Games - This invention is directed to a system and method for the close coupling of Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) with multiplayer network games. Game state dependent voice communications are used as another method of player interaction in the game environment. The system uses SIP enhanced game servers and conference servers with audio mixing capabilities, and the game server controls the creation, maintenance and changing of the voice conferences. Participation in a voice conference is determined by the game state features associated with each player including distance and direction to determine how the voices are mixed in a voice conference. | 12-03-2009 |
20100077018 | Virtual Presence Server - Techniques are disclosed for generating and managing presentities in accordance with a virtual presence server. By way of example, a method for requesting information from at least one server comprises the following steps. A client request, which expresses a request that can not be satisfied by a single existing presentity, is obtained at an intermediate server, wherein the intermediate server operates as a virtual presence server. The virtual presence server (i.e., intermediate server) creates a set of software objects for a virtual presentity, the set of objects embodying logic to combine presence information from one or more of existing presentities and external information sources, in accordance with at least one existing presence server. The virtual presence server creates an association between the request of the client and the created virtual presentity that allows the presence information to be propagated back to the client. | 03-25-2010 |
20110196913 | Programmable Presence Virtualization - Techniques for supporting a presence virtualization query are provided. The techniques include receiving a virtual query from a client, the virtual query specified in terms of a membership set of members, wherein the membership set comprises a list of presentity uniform resource identifiers (URIs) and a separate transformation function, defined over a set of presence documents of the members in the membership set, redirecting the query to a destination virtual presentity URI whose presence state comprises an aggregation of the presence documents of the list of URIs in the membership set and a corresponding query element (QE) object that manages subscriptions for the URI, adding the client as a watcher for the destination virtual presentity URI, and applying transformation logic specified by the watcher client and notifying a corresponding client of a resulting output. | 08-11-2011 |
20110302292 | SYSTEMS AND METHODS FOR SERVICE ASSURANCE USING VIRTUALIZED FEDERATED PRESENCE INFRASTRUCTURE - Systems, methods, apparatuses and program products configured to provide a topology-service tool are described. A presence-federation solution asset is leveraged to address topology-federation problems. A network topology tool takes as input network endpoints, for example caller and callee telephone numbers, determines a network service flow used to connect the network endpoints, and develops a network topology view of the service flow along with associated network device related information. | 12-08-2011 |
20120166420 | SYSTEMS AND METHODS FOR CREATING SCALABLE PRESENCE SUBSCRIPTIONS IN FEDERATED PRESENCE ENVIRONMENTS - Systems and associated methods for providing scalable presence subscriptions in federated presence environments are described. Embodiments provide for intelligent addition of subscriptions to a presence system. Embodiments identify if a virtualized presentity (corresponding to a new query) can be composed from existing virtualized presentities, and if so, corresponding query processing cells (QPCs) (servicing existing queries) are reused to retrieve the presence information (partially or fully) for the new incoming query. Embodiments organize the existing QPCs into a hierarchy such that a QPC/virtual presentity at a higher layer fetches presence information of all or some presentities from QPCs/virtual presentities at lower layer(s) to service the new query. | 06-28-2012 |
20120219144 | VIRTUALIZING HUMAN AGENTS ACROSS MULTIPLE LOCATIONS - Methods and arrangements for virtualizing human agents across multiple locations. A first agent is associated with a first contact center and a second agent is associated with a second contact center. An availability status of the second agent is published, both to the first contact center and to the second contact center. An incoming communication is accepted at the first contact center and a free status of the second agent is ascertained. The incoming communication is routed from the first contact center to the second agent. | 08-30-2012 |
20120278115 | Method and Apparatus for Leveraging Social Media for Pro-Active Customer Notification - Customers are contacted on social media websites and instant messaging programs by monitoring a plurality of network-enabled user-interactive sites, e.g., social media websites, for an active presence of a customer on one of the sites. Upon detection of an active presence, a customer support agent is assigned to the customer associated, and a communication channel of customer's choice is established between the agent and the customer. This communication channel is used to exchange messages between the assigned agent and the associated predefined customer. A single contact center representation is established on each site, and a separate logical representation of each single contact center representation is established on premises equipment associated with the agent. The logical representation on the agent premises equipment is used to establish the communication channel between the customer support agent and the associated predefined customer. | 11-01-2012 |
20130219021 | PREDICTIVE CACHING FOR TELECOMMUNICATION TOWERS USING PROPAGATION OF IDENTIFICATION OF ITEMS OF HIGH DEMAND DATA AT A GEOGRAPHIC LEVEL - Method, computer program product and computer system for predictive caching for telecommunication towers having associated local servers, using propagation of identification of items of high demand data at a geographic level comprising the steps of: receiving within a region at least one request for an item of data made by a user device to a local server associated with a telecommunication tower within the region; and determining if the request is for an item of high demand data. If the item is identified as high threshold data, instructing the local servers within the region to cache the item of data; and if the item is identified as second threshold high demand data, sending an indication to at least one centralized server in an adjacent region, such that the centralized server in the adjacent region causes the local servers within the adjacent region to cache the item of data. | 08-22-2013 |
20130304885 | Managing a Subscription Hierarchy in Presence Systems - A method, an apparatus and an article of manufacture for managing a subscription hierarchy in a presence system. The method includes receiving a presence information request within a presence server, wherein the request is one of a subscription request and an un-subscribe request, determining if the request corresponds to an existing subscriber in the presence server, and if so, sending a redirect message to the existing subscriber, and if not, processing the request within the presence server, and enhancing functionality of subscribers to accept and handle subscription and un-subscribe requests. | 11-14-2013 |
20140289791 | NETWORK-LEVEL ACCESS CONTROL MANAGEMENT FOR THE CLOUD - A cloud access manager obtains input regarding access control for at least one application deployed on a plurality of virtual machine instances in a cloud computing environment; the virtual machine instances are divided into at least first and second access zones. A cloud access manager registrar located in the cloud computing environment registers internet protocol addresses of external clients as seen from the cloud computing environment; at least some of the addresses are assigned to the clients via network address translation (NAT). Session traversal utility for NAT (STUN) is carried out to determine public internet protocol addresses assigned to the clients via NAT. The cloud access manager controls (i) access of the external clients to the plurality of virtual machine instances; and (ii) access of the plurality of virtual machine instances to each other, based on the registered internet protocol addresses, in accordance with the access zones. | 09-25-2014 |
20150186552 | RETRIEVING INDEXED VIDEO AND TEXT CONTENT USING CONTEXT EXTRACTED FROM INCOMING IMAGES - Content from a technical library is retrieved by associating a SIP URI and a HTTP URI with each one of a plurality of existing entries in a technical library maintained by an autonomous computer-based technical assistant. The SIP URI is used on a computing system in communication with the technical assistant across a computer network to communicate a visual image of a device from a user of that device to the technical assistant. The communicated visual image is used to construct a three-dimensional model of the device, which is then used to identify at least one existing entry in the technical library maintained. Each identified existing entry contains technical data associated with the user device. The HTTP URI associated with the identified existing entry in the technical library is used to display the technical data on the computing system associated with the user. | 07-02-2015 |
20150350149 | METHOD FOR REAL-TIME VIRAL EVENT PREDICTION FROM SOCIAL DATA - Filtering a set of social messages received in real time to yield a sub-set likely to relate to some first substantive content subject (such as a video available online). For each message in the sub-set, a respective social message sender, and a corresponding social influence value for each respective social message sender is determined. A prediction of the extent of the spread of the substantive content subject is made based on the social influence values of the social message senders. | 12-03-2015 |
Patent application number | Description | Published |
20090106256 | VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining. | 04-23-2009 |
20090106424 | PROCESSING REQUESTS IN VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for processing read and write requests received from a cloned instance of a server application, the cloned instance of the server application having a corresponding instance that is hosted in a production portion of a computing environment. | 04-23-2009 |
20090150885 | APPLIANCES IN VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for reconciling data on a set of virtual machines, generating a virtual machine snapshot of the set of shadow virtual machines, identifying a set of virtual disks and containers of the set of virtual disks, wherein the set of virtual disks operates as storage for the set of shadow virtual machines, producing a set of storage snapshots of the containers of the set of virtual disks, identifying data that has changed within the set of storage snapshots, and reconciling the data back to when the virtual machine snapshot was generated. Using the reconciled data to test a computer application having a first instance, generate a cloned instance of the application, wherein the cloned instance sources storage shared with the first instance, interact with the cloned instance to cause a result without interacting with the first instance, and monitor the result. | 06-11-2009 |
20090222496 | System and Method for Virtualizing Backup Images - Facility for using images created by backup software to recreate an entire machine as it was at the point in time in the past when the backup was taken. The facility can be extended so as to bring up a set of machines which together serve some logical business function as in a cluster or federated servers, and further extended so that an entire data center may be virtualized from backup images. The virtualized servers provided may serve as an alternate data center standing in case of disaster or to meet maintenance windows achieving low cost Instant Disaster Recovery. A set of virtual machines may stand in for physical machines for a period of time and then resynchronized or re-seeded to physical machines via a combination of bare metal recovery and re-synchronizing from live LXJNs that form the virtual machine disks. | 09-03-2009 |
20100077160 | System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 03-25-2010 |
20100274784 | VIRTUAL DISK FROM NETWORK SHARES AND FILE SERVERS - A system manages a file directory containing data that is exposed by a file-server. The system provides a block-device layered on top of a network share that treats the underlying network share as read-only but allows local file-system semantics to operate on top of the network share. The end-result is a virtual disk containing a locally recognizable file-system that can read and write from the perspective of the operating system but where the data is store in the cloud as network shares. The virtual disk appears to be a fully functional local disk with all the expected local disk semantics. | 10-28-2010 |
20110218968 | System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 09-08-2011 |
20120297246 | System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 11-22-2012 |
20130086347 | SYSTEM AND METHOD FOR VIRTUALIZING BACKUP IMAGES - Facility for using images created by backup software to recreate an entire machine as it was at the point in time in the past when the backup was taken. The facility can be extended so as to bring up a set of machines which together serve some logical business function as in a cluster or federated servers, and further extended so that an entire data center may be virtualized from backup images. The virtualized servers provided may serve as an alternate data center standing in case of disaster or to meet maintenance windows achieving low cost Instant Disaster Recovery. A set of virtual machines may stand in for physical machines for a period of time and then resynchronized or re-seeded to physical machines via a combination of bare metal recovery and re-synchronizing from live LUNs that form the virtual machine disks. | 04-04-2013 |
20130091275 | VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining. | 04-11-2013 |
20130151679 | HYBRID VIRTUAL COMPUTING ENVIRONMENTS - A computer-implemented method involves two phases. In a first phase (e.g., during a development or testing phase) a secondary computing environment is formed with secondary instances of one or more servers of a primary environment. A communication module configured to establish communication between the secondary instances of the servers in the secondary computing environment and remote computing resources (e.g., “cloud” based servers) via the communication module. The secondary instances of the servers of the primary environment are then operated in conjunction with the remote computing resources. In a second phase (e.g., a production phase), the communication module is reconfigured to establish communication between the servers of the primary environment and the remote computing resources via the communication module. The servers of the primary environment are then operated in conjunction with the remote computing resources. | 06-13-2013 |
20130166716 | VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining | 06-27-2013 |
20150249619 | VIRTUAL COMPUTING ENVIRONMENTS - Methods, systems, and apparatus, including computer program products, for discovering entities in a first portion of a data center network, examining information associated with the discovered entities to determine relationships that exist between pairs of entities in the first portion of the data center network, and generating a specification of the relationships that exist between pairs of entities in the first portion of the data center network based on results of the examining. | 09-03-2015 |