Patent application number | Description | Published |
20090177354 | METHOD FOR VEHICLE FAULT DIAGNOSIS USING AUDIO SENSORS - A method for implementing vehicle diagnostics includes: receiving one or more sound signals from a series of sensors distributed and positioned in various operational areas of a vehicle; recording the one or more sound signals in response to a command generated by an operator of the vehicle; storing the one or more sound signals in persistent memory; processing the one or more sound signals; and selecting one or more of the processed sound signals for audio playback in response to a user command; and wherein the audio playback is configured to assist in the diagnosis and prevention of vehicle faults and component defects. | 07-09-2009 |
20090282132 | METHOD AND SYSTEM FOR SELF-ORGANIZING COMPUTER SYSTEMS - A system and method to self-configure a distributed system includes obtaining a description of a distributed system which has a plurality of computing nodes, each node being capable of performing any of a plurality of tasks in the description. At each node, a persona of that node is determined in accordance with the description such that the nodes are assigned tasks in the distributed system. Each node is reconfigured in accordance with the persona such that the nodes are linked in the distributed system to provide a self-configured distributed system for performing at least one application. | 11-12-2009 |
20090319531 | Method and Apparatus for Detecting Devices Having Implementation Characteristics Different from Documented Characteristics - Techniques are disclosed for automatically testing for incorrect or incomplete implementation of documented behavior of a device. By way of example, an automated method for checking that one or more devices comply with one or more documented behaviors comprises a computer system performing the following steps. A set of compliance rules is defined for a behavior of at least one of the one or more devices. A set of monitored data is retrieved from the at least one device. The set of monitored data is compared with the set of compliance rules. A result of the comparison is reported. | 12-24-2009 |
20110218920 | METHOD AND SYSTEM FOR PROVENANCE TRACKING IN SOFTWARE ECOSYSTEMS - A system and method for tracking provenance for software use and development includes a developer toolkit program stored in memory media and accessible by a software market place wherein the software marketplace provides a library of software bundles that can be used for software development and modification of the software bundles. The developer toolkit includes a user interface configured to enable software creation of original works and derivative works. The development toolkit further includes a provenance tracker configured to track provenance of the derivative works and original works wherein the provenance tracker makes the derivative work and the provenance of the derivative work available in the software market place. The provenance tracker includes a software bundle identification module configured to identify and verify ownership of the original works and derivative works by associating an owner of the derivative works and original works with features included in portions of the derivative works and original works. | 09-08-2011 |
20110219372 | SYSTEM AND METHOD FOR ASSISTING VIRTUAL MACHINE INSTANTIATION AND MIGRATION - A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations. | 09-08-2011 |
20110225277 | PLACEMENT OF VIRTUAL MACHINES BASED ON SERVER COST AND NETWORK COST - A method, information processing system, and computer program product manage server placement of virtual machines in an operating environment. A mapping of each virtual machine in a plurality of virtual machines to at least one server in a set of servers is determined. The mapping substantially satisfies a set of primary constraints associated with the set of servers. A plurality of virtual machine clusters is created. Each virtual machine cluster includes a set of virtual machines from the plurality of virtual machines. A server placement of one virtual machine in a cluster is interchangeable with a server placement of another virtual machine in the same cluster while satisfying the set of primary constraints. A server placement of the set of virtual machines within each virtual machine on at least one mapped server is generated for each cluster. The server placement substantially satisfies a set of secondary constraints. | 09-15-2011 |
20110289117 | SYSTEMS AND METHODS FOR USER CONTROLLABLE, AUTOMATED RECORDING AND SEARCHING OF COMPUTER ACTIVITY - Systems and methods for automating the process of recording, indexing, and searching computer activity are provided. Events resulting from computer activities trigger capturing of contents and association of operational contextual information to form a searchable record of activities. The searchable record can be stored in local computer for use by its user, or on server computer, such as can be used for a tutorial by multiple users. Storage management can be used to manage the storage requirements of the captured information forming the searchable record. | 11-24-2011 |
20120023223 | PREDICTIVE CONTEXT-BASED VIRTUAL WORKSPACE PLACEMENT - A method, information processing system, and computer program product manage virtual workspace migration. A set of information associated with a user is analyzed. A future virtual workspace demand associated with the user is predicted based on the analyzing. At least a portion of at least one virtual workspace associated with the user is migrated from a first location to at least a second location based on the future virtual workspace demand that has been predicted. | 01-26-2012 |
20120116838 | ANALYSIS OF IT RESOURCE PERFORMANCE TO BUSINESS ORGANIZATION - A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings. | 05-10-2012 |
20120239797 | RECONCILING NETWORK MANAGEMENT DATA - Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold. | 09-20-2012 |
20120278476 | PREDICTIVE PLACEMENT OF CONTENT THROUGH NETWORK ANALYSIS - Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed. | 11-01-2012 |
20130003708 | CONTINUOUS CACHE SERVICE IN CELLULAR NETWORKS - A technique for transmitting an object to a mobile device is provided. In response to the mobile device moving from a first area serviced by a first cache to a second area serviced by a second cache, the first cache transmits the object stored in the first cache to the second cache. The first cache transmits instructions to the second cache that cause the second cache to forward the object to the mobile device in the second area. | 01-03-2013 |
20130007369 | Transparent Cache for Mobile Users - A system includes a cache node operative to communicatively connect to a user device, cache data, and send requested cache data to the user device, and a first support cache node operative to communicatively connect to the cache node, cache data, and send requested cache data to the user device via the cache node. | 01-03-2013 |
20130208888 | MANAGING CONTENT DISTRIBUTION IN A WIRELESS COMMUNICATIONS ENVIRONMENT - A method, system and computer program product for managing content distribution in a mobile communications environment. The communications environment includes a core network and a multitude of end-user devices. In one embodiment, the method comprises downloading content from the core network to the end-user devices; and maintaining a map between the end-user devices, the content downloaded to the end-user devices, and the locations of the end-user devices. When a first of the end-user devices requests a specified content, this map and one or more rules are used to identify a second of the end-user devices having the specified content. The first of the end-user devices fetches the specified content from this identified second of the end-user devices. In one embodiment, object location descriptors embedded in the content are rewritten when the content is downloaded to the end-user devices. | 08-15-2013 |
20130298175 | CONSTRUCTING A CUSTOMIZED MESSAGE IN A VIDEO-ON-DEMAND SERVICE - A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network. | 11-07-2013 |
20130318300 | Byte Caching with Chunk Sizes Based on Data Type - Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type. | 11-28-2013 |
20130330077 | VIRTUAL WAVELENGTH NETWORKS - A computer implemented method provisions optical wavelength connections. A set of applications is grouped to form a set of application groups. A single optical connection having a bandwidth is established through a management plane for each of the set of application groups. A set of persistent upper layer connections is then established for each of the set of application groups. The underlying optical connection is adjusted while preserving the state of the upper layer protocols. | 12-12-2013 |
20130337810 | CONTINUOUS CACHE SERVICE IN CELLULAR NETWORKS - A technique for transmitting an object to a mobile device is provided. In response to the mobile device moving from a first area serviced by a first cache to a second area serviced by a second cache, the first cache transmits the object stored in the first cache to the second cache. The first cache transmits instructions to the second cache that cause the second cache to forward the object to the mobile device in the second area. | 12-19-2013 |
20140013057 | OBJECT TYPE AWARE BYTE CACHING - One or more embodiments perform byte caching. At least one data packet is received from at least one network node. At least one data object is received from the at least one data packet. An object type associated with the at least one data object is identified. The at least one data object is divided into a plurality of byte sequences based on the object type that is associated with the at least one data object. At least one byte sequence in the plurality of byte sequences is stored into a byte cache. | 01-09-2014 |
20140013322 | VIRTUAL MACHINE IMAGE DISTRIBUTION NETWORK - Virtual machine images are distributed to, and retrieved from an image distribution network. A virtual machine image is received on the image distribution network and divided into chunks with a unique resource identifier created for each of the chunks. A virtual machine image reassembly file is created. Each of the chunks is assigned a unique resource locator address. An image distribution network server maintains a mapping between unique resource identifier for each of the chunks and the unique resource locator address. When a request to download a virtual machine image is received, chunks of the virtual machine image that are locally present are identified. Chunks of the virtual machine image that are not locally present are mapped to unique resource locator addresses in the image distribution network. When a sufficient number of chunks has been retrieved to instantiate the virtual machine image, the virtual machine image is instantiated. | 01-09-2014 |
20140023075 | SYSTEMS, METHODS AND ALGORITHMS FOR NAMED DATA NETWORK ROUTING WITH PATH LABELING - The present disclosure relates generally to the field of routing with path labeling (in named data networks). In various examples, routing with path labeling may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 01-23-2014 |
20140023076 | SYSTEMS, METHODS AND ALGORITHMS FOR NAMED DATA NETWORK ROUTING WITH PATH LABELING - The present disclosure relates generally to the field of routing with path labeling (in named data networks). In various examples, routing with path labeling may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 01-23-2014 |
20140036674 | SPLIT TRANSPORT CONTROL PROTOCOL (TCP) FLOW CONTROL MANAGEMENT IN A CELLULAR BROADBAND NETWORK - Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection. | 02-06-2014 |
20140040451 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero. | 02-06-2014 |
20140040457 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero. | 02-06-2014 |
20140064058 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140064141 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140064182 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140067987 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140071803 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140071833 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140075013 | METHOD FOR VIRTUAL MACHINE MONITORING IN CLOUD INFRASTRUCTURES - A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine. | 03-13-2014 |
20140122386 | DIFFERENTIAL DYNAMIC HOST CONFIGURATION PROTOCOL LEASE ALLOCATION - Disclosed is a novel passive fingerprinting technique based on DHCP messages to determine the device type and operating system. DHCP implementations are shown to vary among device types and have an effect on DHCP lease durations. To improve network address utilization, without introducing any protocol changes, the present invention provides a new leasing strategy which takes into account device types. This strategy, compared to current approaches, improves the address utilization sixfold without considerably increasing DHCP overhead. | 05-01-2014 |
20140143444 | SAVING BANDWIDTH IN TRANSMISSION OF COMPRESSED DATA - A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content. In one embodiment, the at least one decompressed portion of the content from the traffic is replaced with an index, the index is compressed to form the associated identifier, and the associated identifier is sent to the receiving end of the link. | 05-22-2014 |
20140164321 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140164328 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140164642 | ALIASING OF NAMED DATA OBJECTS AND NAMED GRAPHS FOR NAMED DATA NETWORKS - Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140164643 | ALIASING OF NAMED DATA OBJECTS AND NAMED GRAPHS FOR NAMED DATA NETWORKS - Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140173074 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140173080 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140207903 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140207954 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140280470 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems, methods and/or algorithms. | 09-18-2014 |
20140280768 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140330973 | SYSTEM AND METHOD FOR BROKERING AND PROVISIONING IN HIGH-SPEED NETWORKS - Network resources are provisioned within an application broker according to aggregated requests in an optical network. Resource requests are sorted to form sorted resource requests. The sorted resource requests are sorted according to destinations of the resource requests. The sorted resource requests are aggregated to form aggregated resource requests. Resource allocation is requested for each of the aggregated resource requests from a network border controller based on requirements of the set of set of aggregated resource requests. A set of allocated resources is received from the network border controller. The set of allocated resources is based on requirements of the aggregated resource requests. For each of the aggregated resource requests, network transmissions network receptions are executed utilizing associated allocated resources. | 11-06-2014 |