Patent application number | Description | Published |
20080307035 | System and Method for Off-loading Online Meeting Updates Using Forward Proxy - A system and method for batching individual content requests received from clients at a forward proxy, and sending a batch content request from the forward proxy to a collaboration server is presented. A forward proxy sends an authorization request to the collaboration server for authorization. In turn, the collaboration server verifies each of the clients and provides the forward proxy with a personalized cookie for each client. Subsequently, the forward proxy receives individual content request from different clients for the same content. The forward proxy includes personalized attributes for each of the requesting clients, which include the personalized cookies, in a batched content request to the collaboration server. The collaboration server generates a batch content response, which includes the requested content, and sends the batch content response to the forward proxy. In turn, the forward proxy parses the batched content response and sends the requested content to clients that requested the content. | 12-11-2008 |
20090063618 | Method and Apparatus for Client-Side Aggregation of Asynchronous Fragmented Requests - The Asynchronous Aggregator shifts the burden of retrieving and aggregating asynchronous responses by replacing asynchronous requests in an original request thread with placcholders with a unique identifier, creating new threads for each asynchronous request, writing a script to request the asynchronous request output, and returning the original request and the script to the client. Each of the new threads run independently and when completed, place the output in the server store. The script then requests each output from the server store as the output becomes available to fill the placeholders. | 03-05-2009 |
20090328153 | USING EXCLUSION BASED SECURITY RULES FOR ESTABLISHING URI SECURITY - A solution for controlling access to Uniform Resource Identifier (URI) identified resources can receive a request for a resource identified by a URI. The URI associated with the request can be compared against at least one previously established security rule. The security rule can include an exclusion comparison operator and a regular expression defining a pattern. A determination as to whether to grant a requester access to the resource can be based at least in part upon results of the comparing of the URI against the previously established security rule. | 12-31-2009 |
20100174817 | SPLICING PROXIED WEB REQUESTS WITH CALLBACK FOR SUBSEQUENT REQUESTS - The present invention provides a method, system, and computer program product for splicing proxied web requests with callback for subsequent requests. The method comprises: initiating by a proxy a Transmission Control Protocol (TCP) splice between first and second socket connections in order to service a request; and returning control of the first and second socket connections to the proxy in response to a completion event associated with the TCP splice. | 07-08-2010 |
20130066912 | Deriving Dynamic Consumer Defined Product Attributes from Input Queries - Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute. | 03-14-2013 |
20130066914 | Deriving Dynamic Consumer Defined Product Attributes from Input Queries - Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute. | 03-14-2013 |
20130151307 | DERIVING MARKET INTELLIGENCE FROM SOCIAL CONTENT - Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output. | 06-13-2013 |
20130151309 | DERIVING MARKET INTELLIGENCE FROM SOCIAL CONTENT - Methods and arrangements for deriving market intelligence. Guidelines for deriving mercantile intelligence are input, and social content data is mined. A map is generated which reconciles the social content data with the guidelines, and elements related to mercantile intelligence are extracted from the map. A mercantile intelligence report is output. | 06-13-2013 |
20130254258 | OFFLOADING APPLICATION COMPONENTS TO EDGE SERVERS - An apparatus and method for off-loading application components to edge servers are provided. An application is made edge-aware by defining which components of the application may be run from an edge server, and which components cannot be run from an edge server. When a request is received that is to be processed by an application on an origin server, a determination is made as to whether the application contains edgable components. If so, an edgified version of the application is created. When a request is received that is handled by a component that may be run on the edge server, the request is handled by that component on the edge server. When a request is received that is handled by a component that is not edgable, the request is passed to a proxy agent which then provides the request to a broker agent on the origin server. | 09-26-2013 |