Patent application number | Description | Published |
20150067112 | SYSTEM AND METHOD FOR NETWORK ADDRESS ADMINISTRATION AND MANAGEMENT IN FEDERATED CLOUD COMPUTING NETWORKS - Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (NICs) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks. The local cloud network and the remote cloud network are then configured to send packets with unclaimed network address to the associated registered NICs. A layer-2 (L2) network tunnel including a data channel and a control channel is then formed between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network. Network address allocation, administration and management in the federated cloud computing networks are then performed using the formed L2 network tunnel. | 03-05-2015 |
20150082417 | FIREWALL CONFIGURED WITH DYNAMIC COLLABORATION FROM NETWORK SERVICES IN A VIRTUAL NETWORK ENVIRONMENT - Techniques for automatic firewall configuration in a virtual network environment are described. In one example embodiment, firewall rules are configured using virtual machine (VM) inventory objects. The firewall rules are then transformed by replacing the VM inventory objects in the configured firewall rules with associated Internet protocol (IP) addresses using an IP address management table (IPAM) table and a network address translation (NAT) table. The transformed firewall rules are then sent to a firewall engine for filtering communication from and to VMs running on a first machine on one or more computing networks and communication from and to VMs running on a second machine on one or more computing networks at a firewall according to the transformed firewall rules. | 03-19-2015 |
20150134822 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A LOAD BALANCER IN A VIRTUAL NETWORK ENVIRONMENT - Techniques for dynamic configuration of a load balancer in a virtual network environment are described. In one example embodiment, load balancing rules are configured using virtual machine (VM) inventory objects. The configured load balancing rules are then transformed by replacing the VM inventory objects in the configured load balancing rules with associated Internet protocol (IP) addresses using an IP address management (IPAM) table or a network address translation (NAT) table. The transformed load balancing rules are then sent to the load balancer for load balancing network traffic between a plurality of VMs running on one or more host computing systems in one or more computing networks. | 05-14-2015 |
20150163196 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A DHCP SERVER IN A VIRTUAL NETWORK ENVIRONMENT - Techniques for dynamically configuring a dynamic host configuration protocol (DHCP) server in a virtual network environment are described. In one example embodiment, DHCP bindings are configured using virtual machine (VM) inventory objects. Further, the configured DHCP bindings are transformed by replacing the VM inventory objects in the configured DHCP bindings with associated media access control (MAC) addresses using a VM object attribute table. Furthermore, the transformed DHCP bindings are sent to the DHCP sever for assigning Internet protocol (IP) addresses to multiple VMs running on a plurality of host computing systems in a computing network. | 06-11-2015 |
20150215276 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A DNS SERVER IN A VIRTUAL NETWORK ENVIRONMENT - Techniques for dynamic configuration of a domain name system (DNS) server in a virtual network environment are described. In one example embodiment, DNS rules are configured using virtual machine (VM) inventory objects and associated DNS names. Further, the configured DNS rules are transformed by replacing the VM inventory objects in the configured DNS rules with associated Internet protocol (IP) addresses using an IP address management (IPAM) table or a network address translation (NAT) table and the DNS names in the configured DNS rules with modified DNS names using a zone table and a view table. Furthermore, the transformed DNS rules are sent to the DNS server for performing domain name resolutions associated with multiple VMs running on a plurality of host computing systems in a computing network. | 07-30-2015 |
20160103699 | CLOUD VIRTUAL MACHINE DEFRAGMENTATION FOR HYBRID CLOUD INFRASTRUCTURE - A hybrid cloud computing system is managed by determining communication affinity between a cluster of virtual machines, where one virtual machine in the cluster executes in a virtualized computing system, and another virtual machine in the cluster executes in a cloud computing environment, and where the virtualized computing system is managed by a tenant that accesses the cloud computing environment. After determining a target location in the hybrid cloud computing system to host the cluster of virtual machines based on the determined communication affinity, at least one of the cluster of virtual machines is migrated to the target location. | 04-14-2016 |
20160105321 | CROSS-CLOUD POLICY MANAGEMENT FOR HYBRID CLOUD DEPLOYMENTS - A method is provide for managing a migration of a virtual machine from a private data center managed by a first organization to a public cloud computing system by a second organization and where the first organization is a tenant. The configurations of physical infrastructure of the private data center that underlies the virtual machine are determined, along with a corresponding match preference indicating a level of criticality for some corresponding configuration at the public cloud system. The configurations and match preferences generated as part of a migration package. The public cloud computing system instantiates a corresponding VM based on the determined configurations and corresponding match preferences. | 04-14-2016 |
Patent application number | Description | Published |
20140007158 | EMERGENCY ALERT SYSTEM (EAS) ALERT GENERATION | 01-02-2014 |
20140282957 | DTCP CERTIFICATE AUTHENTICATION OVER TLS PROTOCOL - Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or otherwise enable access to services requiring authentication credentials, certificates, tokens or other information. The authentication may utilize Digital Transmission Content Protection (DTCP) certificates, Diffie-Hellman (DH) parameters or other information available to the authenticating devices, optionally without requiring device requesting authentication to obtain an X.509 certificate. | 09-18-2014 |
20150142968 | Service Discovery - Service discovery and other operations related to enabling devices to announce, discover or otherwise control their services and/or the services offered or available from other devices is contemplated. The service discovery may facilitating service discovery for services sourced from devices inside and outside of a network and/or from devices having incompatible messaging capabilities. | 05-21-2015 |
20150143419 | SESSION ADMINISTRATION - Administration of sessions, such as but not necessarily user interface (UI) and media sessions, is contemplated. The session administration may include transferring and/or sharing a session from one client to another without requiring an application required to process the transferred/shared session to be operational when receiving an action used to initialize session administration. | 05-21-2015 |
20160087973 | DTCP CERTIFICATE AUTHENTICATION OVER TLS PROTOCOL - Authenticating devices utilizing Transport Layer Security (TLS) protocol to facilitate exchange of authentication information or other data to permit or otherwise enable access to services requiring authentication credentials, certificates, tokens or other information. The authentication may utilize Digital Transmission Content Protection (DTCP) certificates, Diffie-Hellman (DH) parameters or other information available to the authenticating devices, optionally without requiring device requesting authentication to obtain an X.509 certificate. | 03-24-2016 |
Patent application number | Description | Published |
20150161090 | ANALYZING DOCUMENT CONTENT AND GENERATING AN APPENDIX - A method for generating an appendix from document content is provided. Included is analyzing a structure of a document to identify at least one logical element in a content of a page of the document; identifying at least one relation within the identified at least one logical element to determine an appendix topic; determining a degree of relevance of the at least one relation identifying the appendix topic; extracting an appendix content from at least one source document, based on determining a relevance of the source document to the appendix topic; and formatting the appendix based on the extracted appendix content. | 06-11-2015 |
20150161117 | ANALYZING DOCUMENT CONTENT AND GENERATING AN APPENDIX - A method for generating an appendix from document content is provided. Included is analyzing a structure of a document to identify at least one logical element in a content of a page of the document; identifying at least one relation within the identified at least one logical element to determine an appendix topic; determining a degree of relevance of the at least one relation identifying the appendix topic; extracting an appendix content from at least one source document, based on determining a relevance of the source document to the appendix topic; and formatting the appendix based on the extracted appendix content. | 06-11-2015 |
20150332168 | DETECTION OF COMMUNICATION TOPIC CHANGE - A computer processor determines a first span of a communication, wherein a span includes content associated with one or more dialog statements. If the content of the first span contains one or more topic change indicators which are identified by at least one detector of a learning model, the computer processor, in response, generates scores for each of the one or more indicators. The computer processor aggregates scores of the one or more indicators of the first span, which may be weighted, to produce an aggregate score. The computer processor compares the aggregate score to a threshold value, wherein the threshold value is determined during training of the learning model, and the computer processor, in response to the aggregate score crossing the threshold value, determines a topic change has occurred within the first span. | 11-19-2015 |
20160048511 | EXTRACTION OF CONCEPT-BASED SUMMARIES FROM DOCUMENTS - Embodiments of the present invention enable users to generate a summary for a document with respect to a concept, making use of inherent hierarchies present in a text document based on subject-object relationships of the sentences in the text document. In one embodiment, a text document is parsed into sentences, and a tuple is created for each sentence, the tuple comprising a subject and an object found in the sentence. The tuples may then be searched for a specified topic to identify matching tuples, as well as tuples that are related to the matching tuples based on relationships between their respective subjects and objects. A summary focused on the specified topic may then be generated using the sentences corresponding to the matching tuples and the tuples related to the matching tuples. | 02-18-2016 |
Patent application number | Description | Published |
20140187527 | Macrocyclic Compounds And Metal Complexes For Bioimaging And Biomedical Applications - The present disclosure provides a novel class of macrocyclic compounds and their metal complexes formed with transition metal ion, lanthanide metal ions and other metal ions (e.g., Al, Ga, Y, In, Sn, Tl, Pb and Bi) and their applications in the fields of contrast agents, artificial nucleases, fluorescence probes, nuclear medicines and other biomedical applications in the therapeutics or diagnostics. | 07-03-2014 |
20150291538 | Macrocyclic Compositions And Metal Complexes For Bioimaging And Biomedical Applications - The present disclosure provides a novel class of macrocyclic compounds and their metal complexes formed with transition metal ion, lanthanide metal ions and other metal ions (e.g., Al, Ga, Y, In, Sn, Tl, Pb and Bi) and their applications in the fields of contrast agents, artificial nucleases, fluorescence probes, nuclear medicines and other biomedical applications in the therapeutics or diagnostics. | 10-15-2015 |
Patent application number | Description | Published |
20090013073 | METHOD AND SYSTEM FOR DETECTING WIRELESS ACCESS DEVICES OPERABLY COUPLED TO COMPUTER LOCAL AREA NETWORKS AND RELATED METHODS - A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices | 01-08-2009 |
20090310546 | METHOD AND SYSTEM FOR ALLOWING AND PREVENTING WIRELESS DEVICES TO TRANSMIT WIRELESS SIGNALS - A method for arbitrating use of wireless medium for transmission of wireless signals within a selected local geographic region. The selected local geographic region comprises a first set of a plurality of devices to be allowed to transmit wireless signals and a second set of one or more devices to be substantially restricted from transmitting wireless signals. The method includes providing identity information associated with the first set of wireless devices. The method includes transmitting over a wireless medium at least one packet for each of the wireless devices in the first set. The at least one packet for each of the wireless devices includes an identity information, including an address, associated with that wireless device. That wireless device is a recipient of the one packet on the wireless medium. The at least one packet also has a selected value in a duration field of at least the one packet. The selected value is associated with a portion of time for which that wireless device is to be allowed to transmit wireless signals within the selected local geographic region while restricting at least the wireless devices in the second set. | 12-17-2009 |
20110083165 | Method and system for regulating, disrupting and preventing access to the wireless medium - A method for restricting one or more wireless devices from engaging in wireless communication within a selected local geographic region. The method includes receiving an indication comprising at least identity information. Preferably, the indication is associated with a selected wireless device, which is associated with an undesirable wireless communication within the selected local geographic region. The method includes selecting one or more processes directed to restrict the selected wireless device from engaging in wireless communication and performing a prioritized access to a wireless medium using at least one of one or more sniffer devices, which are spatially disposed within a vicinity of the selected local geographic region. The method transmits one or more packets from the at least one of one or more sniffer devices. Preferably, the one or more packets are directed to perform said one or more processes to restrict the selected wireless device. | 04-07-2011 |
Patent application number | Description | Published |
20140005133 | KETOLIDE COMPOUNDS | 01-02-2014 |
20140088068 | 1,6-Diazabicyclo [3,2,1] octan-7-one derivatives and their use in the treatment of bacterial infections - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 03-27-2014 |
20140088070 | NITROGEN CONTAINING COMPOUNDS AND THEIR USE - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 03-27-2014 |
20140148431 | 1,6- Diazabicyclo [3,2,1] octan-7-one derivatives and their use in the treatment of bacterial infections - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infection is disclosed. | 05-29-2014 |
20140275018 | NITROGEN CONTAINING COMPOUNDS - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infection is disclosed. | 09-18-2014 |
20140288064 | Nitrogen containing heterocyclic compounds - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 09-25-2014 |
20140296526 | NITROGEN CONTAINING COMPOUNDS AND THEIR USE - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 10-02-2014 |
20150018312 | NITROGEN CONTAINING COMPOUNDS AND THEIR USE - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 01-15-2015 |
20150141394 | NITROGEN CONTAINING COMPOUNDS AND THEIR USE - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 05-21-2015 |
20150174133 | NITROGEN CONTAINING COMPOUNDS - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infection is disclosed. | 06-25-2015 |
20150203503 | 1,6- DIAZABICYCLO [3,2,1] OCTAN-7-ONE DERIVATIVES AND THEIR USE IN THE TREATMENT OF BACTERIAL INFECTIONS - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 07-23-2015 |
20150258072 | Antibacterial compositions - A pharmaceutical composition useful for the treatment or control of bacterial infections is disclosed. | 09-17-2015 |
20150322067 | NITROGEN CONTAINING COMPOUNDS AND THEIR USE - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 11-12-2015 |
20150328201 | NITROGEN CONTAINING COMPOUNDS - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infection is disclosed. | 11-19-2015 |
20150336957 | NITROGEN CONTAINING HETEROCYCLIC COMPOUNDS - Compounds of Formula (I), their preparation and use in preventing or treating bacterial infections are disclosed. | 11-26-2015 |
Patent application number | Description | Published |
20130059774 | EFFLUX PUMP INHIBITORS - Novel compositions and methods of reducing microbial resistance to antimicrobial agents and treating infections are disclosed. In particular, compositions and methods of inhibiting efflux pump activity, treating infection and methods of enhancing antimicrobial activity of antimicrobial agents are provided. | 03-07-2013 |
20130296228 | EFFLUX PUMP INHIBITORS - Novel compositions and methods of reducing microbial resistance to antimicrobial agents and treating infections are disclosed. In particular, compositions and methods of inhibiting efflux pump activity, treating infection and methods of enhancing antimicrobial activity of antimicrobial agents are provided. | 11-07-2013 |
20140094447 | Pharmaceutical compositions comprising sulbactam and beta-lactamase inhibitor - Pharmaceutical compositions and methods for treating or preventing bacterial infections are disclosed. The pharmaceutical compositions typically comprise pharmaceutically effective amount of: (a) sulbactam or a pharmaceutically acceptable salt thereof, and (b) at least one beta-lactamase inhibitor or a pharmaceutically acceptable salt thereof, with the provision that the beta-lactamase inhibitor is not sulbactam. | 04-03-2014 |
20140162995 | Compositions Comprising Antibacterial Agent and Tazobactam - A pharmaceutical composition comprising antibacterial agent and tazobactam, wherein the ratio of tazobactam to the antibacterial agent in the composition is in the range of from about 0.5 to about 2 gram of tazobactam per gram of the antibacterial agent, are disclosed. | 06-12-2014 |
20140213566 | Pharmaceutical Compositions Comprising Beta-Lactam Antibiotic, Sulbactam and Beta-Lactamase Inhibitor - Pharmaceutical compositions and methods for treating or preventing bacterial infections are disclosed. The pharmaceutical compositions typically comprise pharmaceutically effective amount of: (a) at least one beta-lactam antibiotic or a pharmaceutically acceptable salt thereof, (b) sulbactam or a pharmaceutically acceptable salt thereof, and (c) at least one beta-lactamase inhibitor or a pharmaceutically acceptable salt thereof, with the provision that the beta-lactamase inhibitor is not sulbactam. | 07-31-2014 |
Patent application number | Description | Published |
20090119741 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 05-07-2009 |
20090119776 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 05-07-2009 |
20120185390 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 07-19-2012 |
20130282579 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 10-24-2013 |
20150012989 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 01-08-2015 |