Patent application number | Description | Published |
20130086197 | MANAGING CACHE AT A COMPUTER - A method and system for managing caching at a computer. A computer receives a file from a storage device on a network in response to a request by a first user. The computer may then determine if other users of the computer are likely to request the file, based upon a type of the file and a type of the network. If other users are likely to request the file, the computer may then cache the file at the computer. In one embodiment, the computer may determine if other users of the computer are likely to request the file based upon access permissions to the file at a source of the file. In another embodiment, the computer may determine if other users of the computer are likely to request the file based upon if the file has been previously cached at the computer. | 04-04-2013 |
20130246470 | RULE-BASED ACCESS CONTROL LIST MANAGEMENT - Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user. | 09-19-2013 |
20140165128 | AUTOMATED SECURITY POLICY ENFORCEMENT AND AUDITING - An approach for managing a connection to or from a device is presented. Connections of the device are identified. Based on the connections, the device is determined and classified based on security zones to which the device is or has been connected, a quality of service requirement for one or more applications within the device, or a level of information technology service management for the device. Whether an existing or proposed connection of the device is consistent with the classification of the device is determined, and if not, an indication is displayed or a notification is sent that the existing or proposed connection is inconsistent with the classification of the device. | 06-12-2014 |
20140176315 | Smart Device to Media Device Coupling to Create Virtual Control Environment - An embodiment of the invention provides a method including receiving in an antenna of a smart device first wireless command and control data from a first electronic device. The antenna receives additional wireless command and control data from at least one second electronic device. The first wireless command and control data and the additional wireless command and control data are automatically received from the first electronic device and the at least one second electronic device without input to the smart device from a user. A universal interface is created in the smart device based on the first command and control data and the additional command and control data, wherein the first electronic device and the at least one second electronic device are controllable by the universal interface. | 06-26-2014 |
20140372631 | ADAPTIVE CABLE INTERFACE - A computer implemented method, a computer program product, and a computer negotiate pin assignment for a cabling interface. A cabling interface discovers an attached device through an interrogation from a connected port. The cabling interface performs a handshake with the attached device. The handshake shares information on the protocols, bandwidth needs, streams and pins supported by the attached device. The cabling interface declares a set of supported streams needed for communication by the cabling interface. The cabling interface negotiates pin layout for each streams that will be used for communication between the cabling interface and the attached device. The cabling interface assigns pins based on needs of the attached device and needs of the cabling interface. | 12-18-2014 |
20150161412 | RULE-BASED ACCESS CONTROL LIST MANAGEMENT - Access control list entries are managed as a function of access control list entry metadata for the object and the requesting user, and of an access control list rule applicable to the requesting user and the requested object. The access control list entry metadata for the object and the user is updated in response to request authorizations and denials. The access control list entry metadata for the object and the user is linked to the object and the user. Updating of the access control list entry metadata for the object and the user does not overwrite metadata for another access control list entry that is associated with the object and with another user that is different from the user. | 06-11-2015 |
20150257040 | CONFIGURABLE WIRELESS SWITCHED NETWORK - A configurable wireless switched network includes a wireless access point. The wireless access point includes an application that is executable thereon. The application is configured to set, by a user via an input component, a first port of a plurality of ports as a command channel. The command channel provides a first point of contact between the wireless access point and client devices. The application is also configured to receive configuration parameters from the user. The configuration parameters include port allocation instructions for the ports and identifiers of the client devices. The application is further configured to monitor bandwidth utilization on a network; receive, at the command channel, a request from one of the client devices to access the network; and assign one of the ports to the client device based on the port allocation instructions, the bandwidth utilization, and an identifier of the client device. | 09-10-2015 |
20150261508 | AUTOMATED CREATION OF SHIM PROGRAMS AND INTERFACES - A computing device determines a first set of functions in a first file having a first bit length. The computing device performs a first test, which includes executing a first test program capable of testing each function in the first set of functions. The computing device determines whether the first test was successful, and based on determining that the first test was successful, creates a shim program based on the first set of functions. The computing device creates a second file based on the first set of functions, the second file having a second bit length. The computing device performs a second test, which includes executing a second test program capable of testing each function in the second file. The computing device determines whether the second test was successful, and based on determining that the second test was successful, publishes one or more of the shim program and second file. | 09-17-2015 |