Patent application number | Description | Published |
20080222280 | PSEUDO-AGENT - A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices. | 09-11-2008 |
20080222296 | DISTRIBUTED SERVER ARCHITECTURE - A method and apparatus for synchronizing network element state when a network connection between a plurality of servers is restored after a network failure includes a plurality of objects that exist within the network. Each object exists in a plurality of different versions, in which each said different object version results from modifications to an object made by different servers during the network failure when the servers are unable to communicate with each other but otherwise continue to function. Each object comprises a vector including a separate version number for each server, in which each server increments its version number in the vector when it modifies the object. An automatic conflict resolution mechanism provides, at each server, a most up to date view of all objects across all of said plurality of servers upon restoration of the network connection between said plurality of servers after said network failure. The conflict resolution mechanism reconciles the existence of said plurality of different versions of an object to determine which object version should take precedence over other object versions. Conflict resolution is performed when there are multiple versions of a same object at a server. The conflict resolution mechanism also comprises at least one tie breaking rule that is applied to decide which servers take precedence over other servers when determining which object version should take precedence over other object versions. | 09-11-2008 |
20080228442 | STATISTICAL DATA INSPECTOR - An embodiment of the invention provides a technique that allows the collection, storage, and manipulation of data collected in a computer network. | 09-18-2008 |
20080320006 | ENTERPRISE CONSOLE - A console for an enterprise suite is disclosed. The enterprise suite addresses the increasingly complex problem of keeping critical systems updated, compatible, and free of security holes. It uses Fixlet® technology to identify vulnerable computers on the network and then allows authorized personnel to correct problems across any subset of the network with a few simple mouse-clicks. The enterprise suite helps keep the networked computers updated and properly patched, all from a central console which, along with supporting architectural enhancements, is the subject matter of this document. The invention allows rolling out a security patch in minutes instead of months, thus allowing an administrator to stay ahead of potential hacker attacks. The invention also makes it possible to track the progress of each computer as updates are applied, thus making it simple to gauge the level of compliance across the entire enterprise. | 12-25-2008 |
20100017494 | FORMALIZING, DIFFUSING AND ENFORCING POLICY ADVISORIES AND MONITORING POLICY COMPLIANCE IN THE MANAGEMENT OF NETWORKS - An apparatus and method for centralized policy management of large-scale networks ( | 01-21-2010 |
20100332992 | METHOD AND APPARATUS FOR INSPECTING THE PROPERTIES OF A COMPUTER - The invention disclosed herein enables a collection of computers and associated communications infrastructure to offer a new communications process which allows information providers to broadcast information to a population of information consumers. The information may be targeted to those consumers who have a precisely formulated need for the information. This targeting may be based on information which is inaccessible to other communications protocols. The targeting also includes a time element. Information can be brought to the attention of the consumer precisely when it has become applicable, which may occur immediately upon receipt of the message, but may also occur long after the message arrives. The communications process may operate without intruding on consumers who do not exhibit the precisely-specified need for the information, and it may operate without compromising the security or privacy of the consumers who participate. | 12-30-2010 |
20110066752 | DYNAMIC BANDWIDTH THROTTLING - An approximation of the bandwidth of the narrowest link in a network is determined by watching how fast data gets to the other end and then back again. The rate of data transmission is limited according to this approximation. Dynamic capacity of the link, i.e. the amount of data that can be in-flight at the same time, neglecting any buffers, is also tracked. The technique looks at how much data is in-flight and, if there is more data in flight than the dynamic capacity of the network, the data transmission rate is slowed down. | 03-17-2011 |
20120203818 | PSEUDO-AGENT - A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices. | 08-09-2012 |