Patent application number | Description | Published |
20080270971 | APPLICATION-REQUIREMENT BASED CONFIGURATION DESIGNER FOR DISTRIBUTED COMPUTING SYSTEMS - Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system. | 10-30-2008 |
20090049485 | Method For Context-Based Channel Switching in Bandwidth Limited Television Systems - A method for switching channels on a video playback device, the device receiving content from a plurality of channels transmitted by a digital video distribution network, the method including establishing a context for selecting additional channels; receiving a selection for another channel; updating the context with the selection; and transmitting the selection to the device and providing the additional channels for fast channel switching. | 02-19-2009 |
20090210286 | METHOD FOR AUTOMATIC OPTIMIZED PRICE DISPLAY - A method of updating prices, includes automatically and continually adjusting prices of goods and services provided by a company through local outlets located across a geographic area, including activating trigger sources, the trigger sources including static and dynamic causes, inputting additional parameters, the parameters including a competitor's name, location, price of an item, a time and date, and an observed popularity of an item, storing the additional parameters in a historical database, making dynamic decisions for adjusting the prices across the local outlets based on the trigger sources and the additional parameters, the making dynamic decisions being based on the trigger sources, the additional parameters, and company selected criteria, which includes revenue targets, market conditions, market forecasts, and historical data, automatically adjusting a price of goods and services provided by the company. | 08-20-2009 |
20090276469 | METHOD FOR TRANSACTIONAL BEHAVIOR EXTACTION IN DISTRIBUTED APPLICATIONS - A method of analyzing log data related to a software application includes: selectively collecting data log entries that are related to the application; agnostically categorizing the data log entries; and associating the categories of the data log entries with one or more operational states of a model. | 11-05-2009 |
20100098078 | FORWARDING GROUPS OF MULTICAST FLOWS - A routing element and method for forwarding multicast traffic in a network includes grouping a collection of path-related multicast information flows from a source and associating each information flow of the collection with a multicast address from a set of multicast addresses. Forwarding information is placed in routers within the network between the sources and destinations wherein the forwarding information includes a single entry in a forwarding table using an identifier, e.g., a representative address, for the collection. | 04-22-2010 |
20100318648 | Selective Instrumentation of Distributed Applications for Transaction Monitoring - Systems and methods provide a selective instrumentation strategy for monitoring the progress of transactions in a distributed computing system. The monitoring of the transactive processing of jobs is considered through a collection of computer operating stages in a distributed system, using limited information. The monitoring is performed by observing log records (or footprints) produced during each stage of processing in the system. The footprints lack unique transaction identifiers resulting in uncertainties in monitoring transaction instances. The processing stages are selective instrumented to reduce monitoring uncertainty under the given constraints such as limited budget for instrumentation cost. | 12-16-2010 |
20110289029 | AUTOMATIC MODEL EVOLUTION - A method comprising: performing on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model. | 11-24-2011 |
20110289117 | SYSTEMS AND METHODS FOR USER CONTROLLABLE, AUTOMATED RECORDING AND SEARCHING OF COMPUTER ACTIVITY - Systems and methods for automating the process of recording, indexing, and searching computer activity are provided. Events resulting from computer activities trigger capturing of contents and association of operational contextual information to form a searchable record of activities. The searchable record can be stored in local computer for use by its user, or on server computer, such as can be used for a tutorial by multiple users. Storage management can be used to manage the storage requirements of the captured information forming the searchable record. | 11-24-2011 |
20120116838 | ANALYSIS OF IT RESOURCE PERFORMANCE TO BUSINESS ORGANIZATION - A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings. | 05-10-2012 |
20120188940 | Spatiotemporal Annotation of Data Packets in Wireless Networks - Techniques for annotating data packets with time and/or location information in wireless networks are provided. In one aspect, a method for processing information streams produced by end-computing devices that are transmitted over a wireless network having at least one network element is provided. The method includes the following steps. Data packets which originate from the end-computing devices and are received by the network element are inspected for spatiotemporal metadata. Spatiotemporal metadata is inserted into the data packets and the data packets are transmitted if the step of inspecting the data packets reveals that the data packets are missing spatiotemporal metadata. Otherwise the data packets are transmitted if the step of inspecting the data packets reveals that spatiotemporal metadata is already present in the data packets. | 07-26-2012 |
20120215893 | Characterizing and Selecting Providers of Relevant Information Based on Quality of Information Metrics - Mechanisms for selecting data providers to provide input data to an application are provided. A desired region and desired quality of information (QoI) function for the desired region are defined. The desired region is a region for which a condition is to be analyzed by the application. One or more provider regions and one or more QoI functions associated with the one or more provider regions are retrieved. A relevancy level between the one or more provider regions and the desired region is calculated based on the desired QoI function for the desired region and the QoI functions associated with the one or more provider regions. One or more data providers for providing input data to the application are selected based on the calculated relevancy level. | 08-23-2012 |
20120250685 | FORWARDING GROUPS OF MULTICAST FLOWS - A routing element and method for forwarding multicast traffic in a network includes grouping a collection of path-related multicast information flows from a source and associating each information flow of the collection with a multicast address from a set of multicast addresses. Forwarding information is placed in routers within the network between the sources and destinations wherein the forwarding information includes a single entry in a forwarding table using an identifier, e.g., a representative address, for the collection. | 10-04-2012 |
20120330639 | AUTOMATIC MODEL EVOLUTION - A method includes performing, on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model. | 12-27-2012 |
20130051216 | Techniques for Recovery of Wireless Services Following Power Failures - Techniques for managing a wireless network when disruptive events occur are provided. In one aspect, a method for managing a heterogeneous wireless network having at least two classes of nodes is provided. The method includes the following steps. One or more network signaling activities are observed. If the network signaling activities exhibit a behavior that is associated with a power failure affecting at least one of the classes of nodes, network resources for transmission and processing of network signaling associated with one or more other of the classes of nodes are adjusted to accommodate the behavior. | 02-28-2013 |
20130078961 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130078965 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130170472 | MOBILITY MANAGEMENT OF OSI CONNECTIONS BETWEEN CELL TOWERS - A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. A predetermined trigger event is identified. In response to the predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. | 07-04-2013 |
20130260783 | SYSTEMS AND METHODS FOR PROVISIONING SENSING RESOURCES FOR MOBILE SENSOR NETWORKS - An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data. | 10-03-2013 |
20140032175 | QUALITY OF INFORMATION ASSESSMENT IN DYNAMIC SENSOR NETWORKS - Quality of information (QoI) assessment in dynamic sensor networks that includes evaluating, by a computer, a first value reflective of available reports from sensors that are dynamically associated with the computer. A second value reflective of reports expected to have been available for evaluation about the observed phenomena is estimated. A QoI of the available reports is assessed. The assessing is based on the first value reflective of the available reports and the second value reflective of reports expected to have been available for evaluation. A third value, based on the assessing is output. | 01-30-2014 |
20140081596 | QUALITY OF INFORMATION ASSESSMENT IN DYNAMIC SENSOR NETWORKS - Quality of information (QoI) assessment in dynamic sensor networks that incudes evaluating, by a computer, a first value reflective of available reports from sensors that are dynamically associated with the computer. A second value reflective of reports expected to have been available for evaluation about the observed phenomena is estimated. A QoI of the available reports is assessed. The assessing is based on the first value reflective of the available reports and the second value reflective of reports expected to have been available for evaluation. A third value, based on the assessing is output. | 03-20-2014 |
20140105005 | PERFORMING VALUE AND CONTEXT AWARE COMMUNICATIONS NETWORKING - An aspect of this invention is a computer-executable method for distributing one or more features associated with information to be transported by a communications network that includes a plurality of end nodes interconnected via a plurality of network nodes. The method includes receiving one or more features associated with information to be transported by the communications network, wherein the one or more features are specified at an end node of the plurality of end nodes for receipt by a network node of the plurality of network nodes; responsive to the one or more received features, configuring at least a portion of the communications network to perform actions on information based upon the features; receiving the information using the plurality of network nodes; and based at least on the received features and the configuring, performing one or more actions with the information. Illustratively, the one or more actions comprise sending the information to one or more edge entity nodes in accordance with the configuring and the received features. | 04-17-2014 |
20140105174 | STATE MIGRATION OF EDGE-OF-NETWORK APPLICATIONS - A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower). | 04-17-2014 |
20140133348 | PERFORMING VALUE AND CONTEXT AWARE COMMUNICATIONS NETWORKING - An aspect of this invention is a computer-executable method for distributing one or more features associated with information to be transported by a communications network that includes a plurality of end nodes interconnected via a plurality of network nodes. The method includes receiving one or more features associated with information to be transported by the communications network, wherein the one or more features are specified at an end node of the plurality of end nodes for receipt by a network node of the plurality of network nodes; responsive to the one or more received features, configuring at least a portion of the communications network to perform actions on information based upon the features; receiving the information using the plurality of network nodes; and based at least on the received features and the configuring, performing one or more actions with the information. Illustratively, the one or more actions comprise sending the information to one or more edge entity nodes in accordance with the configuring and the received features. | 05-15-2014 |
20140293885 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140297822 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20150029870 | BOUNDED-BUDGET MONITOR DEPLOYMENT IN MONITORING NETWORKS VIA END-TO-END PROBES - The present disclosure relates generally to mechanisms for bounded-budget monitor deployment in monitoring networks via end-to-end probes. In various embodiments, methodologies may be provided that automatically perform bounded-budget monitor deployment in monitoring networks via end-to-end probes. | 01-29-2015 |