Entries |
Document | Title | Date |
20080201464 | PREVENTION OF FRAUD IN COMPUTER NETWORK - Systems, methods, and computer programming media useful in the identification and prevention of fraudulent activity on computer networks. In various aspects the invention provides methods, systems, and programming for monitoring requests received by network resources for access to data by remote signal sources. Signal source identifiers such as URLs associated with original and referred data requests are checked for satisfaction of one or more trustworthiness criteria. If the network identifier associated with the remote signal source does not satisfy the trustworthiness criteria, data associated with the untrusted signal source is assessed to determine whether it comprises fraudulent or suspicious content. If the data comprises fraudulent or suspicious content, the source of the data can be referred for further investigation or enforcement action, either by the operator or processor assessing the data, or by a network enforcement resource such as network standards or law enforcement agencies. | 08-21-2008 |
20080201465 | Centralized Monitoring of Distributed Systems - A remote server managing multiple client computers at a customer site communicates with a server at a service provider site. A proxy gateway at the remote server allows communications through a network to the server at the service provider site. Remote monitoring of the multiple client computers may be performed at the server at the service provider site through a central monitoring console. | 08-21-2008 |
20080201466 | Web hosting community - An example embodiment of a Web Hosting Community includes at least three members, i.e. a Hosting Provider, a Hosting Customer and a Partner. The Hosting Provider may have one or more Hosting Servers, and create and maintain a Partner Web Site and a Community Web Site. The Partner Web Site and the Community Web Site may provide tools that are tailored for the needs of the Partner and the Hosting Customer, respectively, to participate in the Web Hosting Community. The Partner may provide an application, i.e. software program, to be integrated into the Web Hosting Community and the Hosting Customer may purchase and install the application onto its Hosted Web Site, which is stored on a Hosting Server. | 08-21-2008 |
20080201467 | System and method for event management - An event management system, comprising a server comprising a platform component architecture (PCA) and a software engine, wherein the PCA is configured to provide runtime discovery and display of system components. The system also comprises a data source for storing user define data objects and applications; at least one system component; and at least one client for administering and monitoring user-defined events, wherein the PCA provides a common interface between the server, the data source, and the at least one client. | 08-21-2008 |
20080201468 | Apparatus and method for measuring and using response to SNMP requests to provide real-time network parameter estimates in a network management zone - Method creates Real-Time Estimates (RTE) of network parameters for responsive resources of a network management zone (NMZ) by sending requests in a management protocol and uses those real-time estimates to present a resource map of the NMZ, possibly altering a responsive resource, possibly posting a service schedule request. The invention includes implementation mechanisms and installation packages. The RTE of network parameter is a product of the process. Constructing a quality of service measure from RTE of at least two network parameters. Quality of service measure as a product of the process. The quality of service measure may include or be the Mean Opinion Score. | 08-21-2008 |
20080201469 | SYSTEM AND METHOD FOR AGGREGATING AND EXTENDING PARENTAL CONTROLS AUDITING IN A COMPUTER NETWORK - A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates. | 08-21-2008 |
20080201470 | NETWORK MONITOR PROGRAM EXECUTED IN A COMPUTER OF CLUSTER SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER - A network monitor program operating in each node included in a cluster system, for causing the node to execute: when a response to an existence confirmation message from a relay apparatus, which relays a business request to the node, could not be received, obtaining status data of other nodes included in the cluster system; when the status data of the other nodes represents that one of the other nodes is in a usable state, confirming whether or not the node in the usable state can communicate with the relay apparatus; and when it is confirmed that the node in the usable state can communicate with the relay apparatus, notifying a cluster manager of an occurrence of a communication failure. | 08-21-2008 |
20080209028 | DISCOVERING AND DETERMINING CHARACTERISTICS OF NETWORK PROXIES - A device, system, and method are directed towards determining network information. A network address is determined for a possible proxy. A determination is made whether a port on the possible proxy is open and/or if the port supports an HyperText Transfer Protocol (HTTP) proxy request. A request is sent to the possible proxy over the port, the request being configured to be forwarded to a network device. A type of the possible proxy is determined based in part on a behavior of the network device. The behavior may indicate whether the request is received by the network device, or whether the possible proxy obscures an origin of the request. The proxy type may include whether the possible proxy is a non-proxy, an anonymous-proxy, a controlled-proxy, and/or an open-proxy. Various types of network analysis may then be performed using the possible proxy and the determined proxy type. | 08-28-2008 |
20080209029 | SYSTEM AND METHOD FOR MONITORING BUSINESS PERFORMANCE USING MONITORING ARTIFACTS - A method (and system) of monitoring business performance using a monitoring artifact includes processing an incoming event using the monitoring artifact | 08-28-2008 |
20080209030 | Mining Web Logs to Debug Wide-Area Connectivity Problems - Internet service providers and their clients communicate by transmitting messages across one or more networks and infrastructure components. At various points between the service provider and the clients, inclusively, records may be created of each messages occurrence and status. These records may be read and analyzed to determine the effects of the networks and infrastructure components on the provided quality of service. User-effecting incidents (e.g., failures) occurring at networks may also be identified and described. | 08-28-2008 |
20080209031 | Method of collecting and managing computer device information - A method of collecting and managing computer device information is provided to collect, analyze, and manage device information of a plurality of client computers in a network through a server/client application program. The method includes installing and running a client server application program on client computers in a network and installing and running a server management application program on a server in the network; after each of the client computer is booted, selecting a corresponding data acquisition method according to the type of the operating system of the client computer, so as to perform data acquisition on the device information of the computer in real time; analyzing and summarizing the acquired device information and then sequentially assorting and storing the information; monitoring and recording the changes of the information in real time; and sending the stored information and the changes thereof to the server for statistical analysis and tracking management. | 08-28-2008 |
20080209032 | Alarm method for insufficient storage space of network storage system - An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space. | 08-28-2008 |
20080209033 | Event monitoring and management - Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application. | 08-28-2008 |
20080209034 | Home Network System, Method of Controlling the Same, Method of Setting Residential Gateway For the Same, and Method of Processing Event Protocol For the Same - The present invention relates to a home network system, in which devices constituting a home network can be installed to be provided with home network service, and can be controlled using various terminals, and to a method of controlling the home network system, method of setting a residential gateway and method of processing an event protocol for the home network system. In the home network system, an HNSN ( | 08-28-2008 |
20080209035 | Communications Device and System for Implementing a Management System Remote From Devices - A communication device for implementing a system for remotely managing at least one item of equipment by a management application able to communicate via a telecommunication network with an application embedded in the item of equipment. The device includes a first communication interface allowing implementation of a local communication link with the embedded application, a second communication interface allowing access to the telecommunication network, and a communication management device configured to communicate with the embedded application via the first interface and with the management application via the second interface, serving as communication relay between the embedded application and the management application, and configured to transmit to one of the two applications a message received from the other application, according to predefined transfer rules and as a function of at least one parameter received with the message. | 08-28-2008 |
20080209036 | INFORMATION PROCESSING CONTROL APPARATUS, METHOD OF DELIVERING INFORMATION THROUGH NETWORK, AND PROGRAM FOR IT - An apparatus including a section acquiring the information as to the information processor of the delivery destination in the second network, a section alternatively providing service to an access from the first network by using the acquired information, a section receiving and delivering the information from the first network by using the alternatively supplied service, a section changing the information processor of the delivery destination in the second network to the service providing state, when the apparatus receives the information including the contents from the first network and the information processor of the delivery destination in the second network is not in the service providing state, it is possible to change the information processor of the delivery destination to the service providing state and deliver information including the contents to the information processor of the delivery destination. | 08-28-2008 |
20080215720 | Apparatus and system for lost/stolen data storage device recovery - A recoverable data storage apparatus including a hand-portable housing configured with an input/output (I/O) port presented outwardly therefrom, a data storage means retained within the housing and operatively coupled with the input/output port, and a client agent embodied as device-executable code residing on the data storage device and configured. When executed on a network-linked computing device, the client agent is configured to establish communication with a remote server and receive data indicating a possession status of the data storage apparatus. A device tracking system including a data network means, a hardware portion, and a software portion. The hardware portion includes at least, (1) a server device operatively coupled with the network means, and (2) a data storage device with an externally presented input/output port configured to operatively couple with a host device, and a software portion including. The software portion includes at least, (1) a data storage device tracking means configured to identify a data storage device based upon unique identification-relevant data included in a polling message received via the network means, and (2) a client agent stored as device executable code stored at a memory means operatively coupled with the data storage device, wherein the client agent is configured so operatively when coupled to cause a host device to transmit host device-relevant identifying data via the network means. | 09-04-2008 |
20080215721 | COMMUNICATION MONITORING SYSTEM, COMMUNICATION MONITORING APPARATUS AND COMMUNICATION CONTROL APPARATUS - A communication monitoring apparatus for monitoring communication data which are transmitted among a plurality of nodes on a network, includes a detecting section for detecting whether or not a shellcode is included in communication data transmitted and received between at least two nodes within the plurality of nodes and a storing section for storing communication data transmitted from the two nodes as being starting points during a predetermined time, when the detecting section detected the shellcode in communication data. | 09-04-2008 |
20080215722 | Remote User Computer Control And Monitoring - In a method of computer usage monitoring, a user computer monitors for the input of predetermined keywords or phrases into an application running thereon, the presence of the keywords or phrases in a file received via a computer network, or the launching of one or more predetermined applications or programs. In response detecting the input of one or more of the predetermined keywords or phrases, the presence of one or more of the predetermined keywords or phrases in a file received via the computer network, or the launching of one or more the predetermined applications or programs, the user computer records a digital form of at least one visual image appearing on a video monitor of the user computer. The user computer dispatches the digital form of the recorded image to the server computer via the computer network. | 09-04-2008 |
20080215723 | RELAY SYSTEM, RELAY PROGRAM, AND RELAY METHOD - A technique is provided to dynamically change priority, according to content of communication data, when the communication data is relayed between a client device and a host device. A communication gateway ( | 09-04-2008 |
20080215724 | COMMUNICATION CONTROL METHOD AND COMMUNICATION CONTROL UNIT - A communication control method is provided for an encryption processing unit connected to a connection status acquiring unit which is connected to a circuit that transmits packets on a network and acquires the status of a connection to a network for an encrypting device for encrypting the packet, and connected to an expansion card for connecting to the network, based on the network connection status requested and acquired from the connection status acquiring unit by the expansion card each prescribed period of time, by relaying and acquiring the network connection status from the connection status acquiring unit and forcibly notifying the expansion card that the connection status is connected and/or not connected, according to a requirement/criteria. | 09-04-2008 |
20080215725 | SYSTEMS AND METHODS FOR MANAGING THE PLAYING OF RING TONES AND OTHER MEDIA FILES ON MOBILE DEVICES - Systems, methods, and software applications for managing the playing of ring tones and other media files on mobile devices are provided. In one embodiment, a software application executed by a processor of a mobile device tracks the playing of a media file on the mobile device and reports information regarding the playing of the media file from the mobile device to a server over a wireless network. In another embodiment, the media file is provided on the mobile device as a ring tone file. | 09-04-2008 |
20080215726 | SYSTEM AND METHOD FOR HARDWARE AND SOFTWARE MONITORING WITH INTEGRATED RESOURCE ACQUISITION - A method, system, and network providing hardware and software inventorying and monitoring provide the status of a local network of interconnected information technology devices. A user downloads and installs a local network monitoring software program from an online source onto a host computer system. The local network monitoring software system initiates an inventory of all information technology devices associated with said local network of information technology devices. Also, the local network monitoring software determines the operational status of the information technology devices and the status of software programs installed on the information technology devices. The results of the inventory and status determinations are presented to the host computer system. The presented information permits the user of said host computer system to initiate maintenance and support actions for the information technology devices in response to the operational status and status of software programs using the local network monitoring software. | 09-04-2008 |
20080215727 | REMOTE MONITORING SYSTEM - A method for monitoring and reporting information regarding status of a power supply/management device operated by a user comprises detecting the status of the device using a monitoring device having an application interface configured to communicate over a communication network, generating a status update indication using a self-describing computer language and sending the status update indication over the communication network to a remote computer, and associating the user with the status update information for the remote device using the remote computer. | 09-04-2008 |
20080215728 | Computer Management System and Computer Management Method - A computer management system and a computer management method are provided. The computer management system comprises a management workstation and at least one computer system based on virtualization technology. The computer system comprises a virtual machine monitor, a servo operating system, a management agent module and at least one user operating system. The management workstation comprises a detection/recognition module, an information collection module and a configuration module. The centralized management on the computer system by the management workstation can be realized through the management agent module establishing a network connection and communicating with the management workstation. | 09-04-2008 |
20080215729 | Method and Apparatus for Cross-Tier Management in Multi-Tier Computing System Architecture - Techniques are disclosed for providing cross-tier management in a multi-tier computing system architecture. For example, a method for managing a computing system, wherein the computing system includes a first tier and at least a second tier, wherein the first tier and the second tier are configured to respond to a request received by the computing system, includes the steps of monitoring performance of the second tier from the first tier, and sending one or more management commands from the first tier to the second tier based on the monitored performance. In one embodiment, the first tier may be an application server tier of the computing system, and the second tier may be a database server tier of the computing system. | 09-04-2008 |
20080215730 | Method and system for providing on-demand content delivery for an origin server - An infrastructure “insurance” mechanism enables a Web site to fail over to a content delivery network (CDN) upon a given occurrence at the site. Upon such occurrence, at least some portion of the site's content is served preferentially from the CDN so that end users that desire the content can still get it, even if the content is not then available from the origin site. In operation, content requests are serviced from the site in the usual manner, e.g., by resolving DNS queries to the site's IP address, until detection of the given occurrence. Thereafter, DNS queries are managed by a CDN dynamic DNS-based request routing mechanism so that such queries are resolved to optimal CDN edge servers. After the event that caused the occurrence has passed, control of the site's DNS may be returned from the CDN back to the origin server's DNS mechanism. | 09-04-2008 |
20080222282 | ANALYZING VIRTUAL PRIVATE NETWORK FAILURES - The specification provides information for determining any impacted customers, virtual private networks, circuits, and devices following a path failure. The specification uses an information-gathering component to find system information and uses the system information in determining any impacted units. A report is created that allows a network management system to process the impacted units. If any of the impacted units are customer devices, then the management system calculates the impact on the customer based on a Service Level Agreement. | 09-11-2008 |
20080222283 | Behavioral Networking Systems And Methods For Facilitating Delivery Of Targeted Content - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user. | 09-11-2008 |
20080222284 | Methods of processing and segmenting web usage information - A massive amount of information is collected when tracking statistics such as web site usage data. To simplify the analysis of such data, it is advantageous to process and segment the web site usage data. One proposed method of segmenting the data is to create a reverse sorted associative container for each different web section of a web site. Page-views, c, sessions, and other web viewing metrics may be used as keys in the reverse sorted associative container and web viewer identifiers are used as values associated with the page-view value keys. After creating the reverse sorted associative containers, each reverse sorted associative container is segmented on a percentile basis. | 09-11-2008 |
20080222285 | Configurable network device user interface - Network devices, systems and methods are described that configure a network device user interface. One method includes receiving input to define user-selectable information from among a list of pre-arranged network information presented on a network device display. The method includes configuring the user-selectable information into a particular grouping and presenting the user-selectable information according to the particular grouping. | 09-11-2008 |
20080222286 | Computer Usage Monitoring - The present invention relates to a method of monitoring worker activity in a work group, the work group comprising workers each using a computer on a computer network their method comprising displaying to a work group supervisor, in consolidated form, a label indicating each worker and information indicating the current activity and/or classification determined for each worker. | 09-11-2008 |
20080222287 | Constructing an Inference Graph for a Network - Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components. | 09-11-2008 |
20080222288 | METHOD AND SYSTEM FOR APPLICATION PROFILING FOR PURPOSES OF DEFINING RESOURCE REQUIREMENTS - Disclosed are a method of and system for profiling a computer program. The method comprises the steps of using a utility application to execute the computer program; and on the basis of said execution of the computer program, identifying specific performance requirements of the computer program. A profile of the computer program is determined from said identified performance requirements; and based on said determined profile, resources for the computer program are selected from a grid of computer services. | 09-11-2008 |
20080228910 | METHOD FOR MONITORING USER INTERACTION TO MAXIMIZE INTERNET WEB PAGE REAL ESTATE - A method for rendering Internet Web page content for a client, includes: setting client based policies with a plug-in; monitoring client based Internet Web page usage and interaction with the plug-in or Web page; determining whether a client policy exists for a particular Internet Web page; verifying whether a server-side application is configured for screen management; wherein whenever the server-side application is configured for screen management the plug-in sends the client policy to the server-side application; and in the event the server-side application is returning enhanced content to the client, the enhanced content is altered on the server-side application based on the client policy and then sent to the client. | 09-18-2008 |
20080228911 | Systems and Methods for Script Injection - Systems and methods for script injection are shown and described. The method can include intercepting, by a network appliance, a request for a web page from a computing device, transmitting, by the network appliance, the request for a web page to a web server, and intercepting, by the network appliance, a response from the web server, the response including at least a portion of the requested web page. The method can also include injecting, by the network appliance, a script having instructions that when executed by the computing device registers to be notified of the occurrence of a web page event thereby creating a modified response and transmitting the modified response to the computing device that requested the web page. | 09-18-2008 |
20080228912 | Enhanced Quality Reporting for Transmission Sessions - This invention relates to methods, computer program products, clients, servers, systems and protocols in the context of reporting a quality of a transmission session according to one or more metrics, inter alia to adapt quality reporting to a switching of content within the transmission session and to allow faster session startup. | 09-18-2008 |
20080228913 | Network response time measurements in an asymmetric routing environment - In one embodiment, a method can include: (i) receiving flow records from a plurality of network devices on asymmetric paths; (ii) reconstructing a network transaction from the received flow records; and (iii) deriving response times using the reconstructed network transaction. | 09-18-2008 |
20080228914 | System and method for attributing a portion of a response time to an element of a virtual network - A system and method for evaluating a portion of a response time of an application that is attributable to an element on a virtual IP network. | 09-18-2008 |
20080228915 | EVENT NOTIFICATION DEVICE AND EVENT NOTIFICATION METHOD - An event notification device notifies event information via a network. A storage unit stores therein event-transmission determination information. An event monitoring monitors whether an event occurs. A determining unit determines based on the event-transmission determination information whether event information of occurred event is to be transmitted to only a target communication device from among communication devices that have requested to be notified of the event information. An event notifying unit notifies the target communication device or all the communication devices of the event information by using the WS-Eventing protocol according to a result of the determination. | 09-18-2008 |
20080228916 | Method and System for Automatic Skill-Gap Evaluation - A system for automatic user skill-gap evaluation using a proxy server or a proxy application. The proxy server or application receives a user input from a user and analyzes the user input to determine whether the user input falls below an acceptable user skill threshold level. The user input consists of user activity within an application and the user activity is recorded in a user action log. To determine whether the user input falls below the acceptable user skill threshold level, the proxy server or application compares the user activity recorded in the user action log with user skill-gap behavior patterns created by a subject matter expert. In response to determining that the user activity recorded in the user action log falls below the acceptable user skill threshold level, the proxy server or application sends a specific training module to the user based on an identified user skill-gap. | 09-18-2008 |
20080228917 | Method and system for importing an application and server map to a business systems manager display - An automated system displays enables a user to observe the activities in a system based on information in the display. From this display, the user can quickly identify the source of problems for the purpose of troubleshooting without the need to manually determine the source and nature of the problem. In this system, data about the system is gathered through a plurality of agents positioned throughout the network. This data is analyzed and a system monitor deployment configuration is developed. This monitor deployment information along with information about the various devices in the system and any relationships of devices in the system are imported to the display system. The display system then displays this information showing the present relationships of the devices in the system. | 09-18-2008 |
20080235364 | Method and apparatus for using dynamic workload characteristics to control CPU frequency and voltage scaling - Some embodiments involve determining a processor performance characteristic associated with a workload, determining a workload characteristic associated with the workload, and determining a processor performance state for the workload based on the performance characteristic and the workload characteristic. Other embodiments are disclosed and claimed. | 09-25-2008 |
20080235365 | AUTOMATIC ROOT CAUSE ANALYSIS OF PERFORMANCE PROBLEMS USING AUTO-BASELINING ON AGGREGATED PERFORMANCE METRICS - Anomalous behavior in a distributed system is automatically detected. Metrics are gathered for transactions, subsystems and/or components of the subsystems. The metrics can identify response times, error counts and/or CPU loads, for instance. Baseline metrics and associated deviation ranges are automatically determined and can be periodically updated. Metrics from specific transactions are compared to the baseline metrics to determine if an anomaly has occurred. A drill down approach can be used so that metrics for a subsystem are not examined unless the metrics for an associated transaction indicate an anomaly. Further, metrics for a component, application which includes one or more components, or process which includes one or more applications, are not examined unless the metrics for an associated subsystem indicate an anomaly. Multiple subsystems can report the metrics to a central manager, which can correlate the metrics to transactions using transaction identifiers or other transaction context data. | 09-25-2008 |
20080235366 | METHOD AND SYSTEM FOR MONITORING MESSAGES PASSED OVER A NETWORK - A method for performing a monitoring function for an application that passes messages between two or more endpoints, comprising: receiving a message including transaction data, the transaction data including data relating to transport of the transaction data; storing the message and transaction data in respective message data and transaction data buffers in a data store; storing status and semantic information associated with the message in the data store; receiving a signal selecting one or more module instances to define the monitoring function, each module instance for independently performing a respective aspect of the monitoring function, each module instance having related module instance data stored in a respective module instance data buffer in the data store, each module instance having a respective service access point for accessing the data store, each service access point having related service access point data stored in a respective service access point data buffer in the data store, each module instance independently accessing one or more of the message, transaction, module instance, and service access point data buffers to process data contained therein to perform its aspect of the monitoring function; and, initiating operation of the one or more module instances in accordance with a schedule defined by one or more routing rules, the one or more routing rules for routing a pointer to the message, as stored in the message data buffer, between the one or more module instances to thereby perform the monitoring function. | 09-25-2008 |
20080235367 | METHOD AND APPARATUS FOR UPDATING USER STATUS IN AN INSTANT MESSAGING SYSTEM - A computer implemented method, apparatus and computer usable program code for managing user status. A number of active conversations present for a user of an instant messaging service is identified. The user status for the user is changed based on a policy using the number of active conversations. | 09-25-2008 |
20080235368 | SYSTEM AND METHOD FOR MONITORING NETWORK TRAFFIC - Described herein are systems and methods for matching clicks of links on a webpage with page views by a user. The method may comprise identifying a link on a webpage requested by a client device, generating a link identifier for the link and attaching the link identifier to the link. Upon receiving a request for data associated with the link, the link identifier is stored in a log file. | 09-25-2008 |
20080235369 | Distributing replication assignments among nodes - Replication in distributed systems may be based on a determination of the number of connections to a node to be replicated. When a new user is adding a node in a distributed system, the number of connections between nodes connected to the new node is determined. In addition, the change in relationships among nodes directly influence the changes in their respective connections. A ranking based on the number of connections is developed and data associated with a node is replicated based on its ranking. | 09-25-2008 |
20080235370 | Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares - A method and a system for controlling a network traffic of P2P and instant messenger softwares are disclosed. In accordance with the method and the system, both a header and a payload of a packet generated by an instant messenger software or a P2P software are monitored to terminate a session by transmitting a termination signal to a receiver and a transmitter when required, thereby blocking the exchange of the attached file and storing the content of the conversation. | 09-25-2008 |
20080235371 | SYSTEM, COMPUTER PRODUCT AND METHOD FOR EVENT MONITORING WITH DATA CENTRE - A system, computer product and method for monitoring and disseminating data form a plurality of electronic devices via the Internet is provided. The plurality of electronic devices, or further electronic devices connected to the plurality of electronic devices, generate signal data. A computer product of the present invention is loaded on the electronic devices such that the signal data is collected via the Internet at a remote web server. The web server stores this data in a database such that a client can monitor its signal data by means of the web server, via the Internet. The present invention also permits the client to disseminate the signal data, including signal data meeting alarm parameters, based on business rules established by the client. A method for deploying the system of the present invention across a plurality of electronic devices, including electronic devices across a plurality of locations is also provided. | 09-25-2008 |
20080235372 | METHOD AND SYSTEM FOR MEASURING STATUS AND STATE OF REMOTELY EXECUTING PROGRAMS - A system and method for providing attestation and/or integrity of a server execution environment are described. One or more parts of a server environment are selected for measurement. The one or more parts in a server execution environment are measured, and the measurements result in a unique fingerprint for each respective selected part. The unique fingerprints are aggregated by an aggregation function to create an aggregated value, which is determinative of running programs in the server environment. A measurement parameter may include the unique fingerprints, the aggregated value or a base system value and may be sent over a network interface to indicate the server environment status or state. | 09-25-2008 |
20080235373 | SYSTEM AND METHOD FOR DETECTING STATUS CHANGES IN A NETWORK USING VIRTUAL COORDINATE MAPPING - A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network. | 09-25-2008 |
20080235374 | Electronic device monitoring method, electronic device computer and program thereof - Processing relating to maintenance of a monitoring subject device is performed by detecting by a computer an IP address of an electronic device connected to a LAN, automatically referring to communication protocol specification data indicating a communication protocol with the electronic device indicated in remote maintenance management data provided in advance or obtained from the electronic device, and performing a communication with the electronic device by using said communication protocol and the IP address indicated by the communication protocol specification data. | 09-25-2008 |
20080244060 | ELECTRONIC DEVICE PROFILE MIGRATION - A network comprising a first electronic device associated with a first profile that uniquely identifies the first electronic device on the network. The network also comprises a second electronic device coupled to the first electronic device. The first profile is migrated to the second electronic device such that the first electronic device is no longer associated with the first profile and such that the first profile uniquely identifies the second electronic device on the network. | 10-02-2008 |
20080244061 | METHOD FOR MANAGING RESOURCES - The present disclosure provides a method for managing resources. According to one exemplary embodiment, the method may include establishing a resources threshold, the resources threshold indicative of a maximum level of recommended resource consumption for a particular client. The method may further include monitoring a level of activity at the client and notifying the client if the level of activity is approaching the resources threshold. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment. | 10-02-2008 |
20080244062 | Scenario based performance testing - A framework for simulating user scenarios is provided in which actions defined by a script are automated and sent to a remote application in a terminal services environment. The scenarios may be created, modified, reused, or extended to a particular use case (i.e., a description of events used to achieve a product design goal) by reflecting different types of users, a combination of applications employed by such users, and characteristics associated with actions of the users. An automation engine is provided that interacts with one or more productivity applications through an object model. A scripting engine parses actions described by script (e.g., an XML (extensible Markup Language) script) and maps them to instructions sent to a corresponding component in the automation engine to be implemented through an interface with the application. The script establishes a profile schema that expresses the scenario. | 10-02-2008 |
20080244063 | Automatically detecting managed servers in a network - A group of managed servers may be monitored by initially querying the network to determine which servers are present. The present servers may be identified by a universal unique identifier and their Internet Protocol address. A table may be maintained to correlate the Internet Protocol address and the universal unique identifier. | 10-02-2008 |
20080244064 | VERIFYING METHOD FOR IMPLEMENTING MANAGEMENT SOFTWARE - A verifying method for implementing management software at a client end is provided herein. The management software works for collecting, managing, and analyzing data of a plurality of peripheral hosts. In the verifying method, a management system fitting the requirements of the management software is established at a service end first. The management system includes a management host and a plurality of first peripheral hosts, and the management host is connected to each of the first peripheral hosts through a network, and the management software is installed in the management host. One or more verifying scenarios are provided herein for testing configuration and performance of the management software at a simulated environment of the client end. Each of the scenarios for testing may consider that a request form the client computer is validated through multiple authorization points and finally a valid and complete response to the client's request is returned. | 10-02-2008 |
20080244065 | CHRONOLOGY DISPLAY AND FEATURE FOR ONLINE PRESENTATIONS AND WEB PAGES - A chronology display is generated for use with a web presentation or other form of network presentation. The chronology display may include a plurality of intervals, with each interval representative of a period of time. In an embodiment, some of the intervals may indicate a number of content items provided on the network presentation during the time period that corresponds to each particular interval. The indication may be provided by a characteristic, such as for example, a color or shading that represents the number of content items provided on the network presentation. | 10-02-2008 |
20080244066 | NETWORK CONTROL APPARATUS, NETWORK CONTROL METHOD, STORAGE MEDIUM - A network control apparatus forming a network with a plurality of image-processing apparatuses acquires attribute information about images stored in each image-processing apparatus from the plurality of image-processing apparatuses, arranges a display order of the images based on the attribute information, detects a change in the configuration of the image-processing apparatuses on the network, and rearranges the display order if a change in the configuration of the image-processing apparatuses on the network is detected. | 10-02-2008 |
20080244067 | Contents distribution system and information processing method thereof, as well as contents management apparatus and recording medium on which program thereof is recorded - To appropriately adjust a number of contents data which are transmitted and received among terminal apparatus, in a peer-to-peer type contents distribution system including a plurality of terminal apparatus mutually connected via a network. | 10-02-2008 |
20080244068 | COMPUTER PRODUCT, OPERATION MANAGEMENT METHOD, AND OPERATION MANAGEMENT APPARATUS - A resource coordinator manager automatically sets a LAN and a SAN for a server to be add according to an increase in load. An ASCC satellite executes a boot script to boot up a user application on the server. The ASCC satellite executes a stop script to stop a user application executed on a server to be returned to a server pool according to a decrease in load. The resource coordinator manager automatically releases a LAN and a SAN set for the server to be returned. | 10-02-2008 |
20080244069 | METHOD AND APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING - Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic. Dormant mode with paging is implemented in a protocol that supports dormant functionality and paging functionality but does not itself provide methods or standards for implementing such functionality, such as the IEEE 802.11. The methods and apparatuses disclosed herein provide the methods needed to implement dormant mode with paging in such a protocol. Generally, the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device. | 10-02-2008 |
20080250135 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR MANAGING APPLICATION PERFORMANCE ON A NETWORK - Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment. | 10-09-2008 |
20080250136 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 10-09-2008 |
20080250137 | SYSTEM AND METHOD FOR INTRUSION PREVENTION HIGH AVAILABILITY FAIL OVER - A system and method for intrusion prevention high availability fail over. The system includes a network infrastructure which comprises a first sensor and at least one back-up sensor. The first sensor and the at least one back-up sensor are in line with a network path. The first sensor and the at least one back-up sensor are configured to share connection and session information via a communication link. | 10-09-2008 |
20080250138 | Multiple displays of large dynamic alarm windows - A GUI for a Network Management System client is provided. The GUI presents network alarms in more than one alarm window. Each alarm window includes a drop-down menu for selecting an alarm filter and a pause button for halting display of new alarms. Alarm filters may be retrieved from a database accessible from a number of NMS clients, thereby allowing public filters to be created by a supervisor. A method of automatically populating the “additional text” field of alarms in a way specified manually after installation of the NMS, which provides additional means of filtering alarms. The invention provides an improved interface by which network administrators can manage network alarms, the interface being particularly advantageous during floods of large numbers of network alarms. | 10-09-2008 |
20080250139 | FACILITATING MONITORING AND SIMULTANEOUSLY ANALYZING OF NETWORK EVENTS OF MULTIPLE HOSTS VIA A SINGLE NETWORK INTERFACE - The substantially simultaneous tracing/monitoring of a plurality of sets of events via a single network interface. The plurality of events can be traced and/or monitored for one host or for a plurality of hosts coupled via the same network interface. The sets of events to be traced/monitored for a host are defined by the host and maintained in one or more configuration files. The configuration files may be dynamically updated. | 10-09-2008 |
20080250140 | MONITORING APPARATUS, PROCESSING METHOD, PROGRAM FOR IMPLEMENTING THE PROCESSING METHOD, AND MANAGEMENT APPARATUS, MANAGEMENT METHOD, AND PROGRAM FOR IMPLEMENTING THE MANAGEMENT METHOD - There is provided a monitoring apparatus which is capable of efficiently notifying an external host of completion of installation of the monitoring apparatus for image forming apparatuses, and completion of operations carried out for the image forming apparatuses. The monitoring apparatus is connected to a management apparatus for communication therewith. The monitoring apparatus acquires maintenance information from the image forming apparatuses, and sends the acquired maintenance information to the management apparatus. The monitoring apparatus carries out one of management of completion of installation of the monitoring apparatus and central management of completion of operations carried out for the image forming apparatuses. | 10-09-2008 |
20080250141 | MONITORING SERVICE WITH INTER-ENTERPRISE CONTEXTUAL ANALYSIS - Methods and apparatuses for receiving data associated with one or more system metrics, contextually analyzing that data in view of prior received data of other computer systems of different subscriber enterprises, determining, based at least in part on the results of the contextual analysis, if an alert needs to be sent, and sending or causing to be sent an alert, are described herein. In various embodiments, the methods and apparatuses are further for managing computer systems of subscriber enterprises, including providing updated operating images. Other embodiments may also be disclosed. | 10-09-2008 |
20080256229 | Detecting Machine Utilization Activity - Detecting machine utilization activity may be provided. Client machine activity within a computer network may be monitored to determine if the client machine is available for use, or if the computer is already engaged in one or more activities. During a predetermined receive period, machine activity information for a given client machine. The machine activity information for the client machine is compared to previously stored machine activity information to determine if an activity state for the client machine has changed. If the activity state of the client machine has changed, the activity state for the machine is updated. Machine activity information for all computers in the computer network may be used to track and optimize resources with the computer network. | 10-16-2008 |
20080256230 | METHOD AND SYSTEM FOR DETECTING AN ANOMALOUS NETWORKED DEVICE - Methods and systems for detecting one or more anomalous devices are disclosed. For each of a plurality of devices, semi-structured data may be received from the device. For each pair of devices, of the plurality of devices, a similarity measurement may be determined between semi-structured data from a first device of the pair of devices and semi-structured data from a second device of the pair of devices. One or more anomalous devices may then be identified and one or more remedial actions may be performed for the one or more identified anomalous devices. | 10-16-2008 |
20080256231 | METHOD FOR MAINTAINING STATE CONSISTENCY AMONG MULTIPLE STATE-DRIVEN FILE SYSTEM ENTITIES WHEN ENTITIES BECOME DISCONNECTED - A computer implemented method, data processing system, and computer program product for maintaining state consistency among multiple state-driven file system entities when the file system entities become disconnected. Responsive to a distributed file system server being disconnected from a distributed file system client, a monitor is registered with the configuration management framework (CMF) for a file system. When the CMF detects access to a file in the file system, the CMF notifies the monitor of the access to the file, and the monitor stores information about state of the file. When the distributed file system server is reconnected to the distributed file system client, information about state of the file stored in the monitor is provided to the distributed file system client. | 10-16-2008 |
20080256232 | Service Discovery Aggregation Method In a Local Area Network and Device Implementing the Method - The invention enables a standard client according to the DVB-IPI phase | 10-16-2008 |
20080256233 | SYSTEM AND METHOD FOR TRACKING THE NETWORK VIRAL SPREAD OF A DIGITAL MEDIA CONTENT ITEM - Systems and methods are provided to track viral marketing. The resulting user interfaces can include a map that tracks propagation via a node tree or a geographic map that shows where media was viewed. The information may also be displayed as a cumulative or absolute tracking graph, which is based on various parameters, such as number of views, number of transmissions, rewards earned, etc. The systems and methods can track viral propagation through, e.g., email, social networking service or site messages or postings, and instant messages. Data used by the invention include URLs as received from a media transmission page form, the URLs pertaining to both the propagator and the recipient, time stamps at which the media was propagated and viewed, and so on. | 10-16-2008 |
20080256234 | Data flow control - A system and method for managing content data in a gaming environment to control the flow of information is provided wherein the method includes initiating a game configured to receive content data from at least one of a plurality of content servers, identifying at least one preferred content server from the plurality of content servers, operating the game to receive the content data from the at least one preferred content server, associating the content data with a content map based upon at least one characteristic, monitoring the content map to identify changed content data and adjusting content data based upon the changed content data. | 10-16-2008 |
20080256235 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 10-16-2008 |
20080263193 | System and Method for Automatically Providing a Web Resource for a Broken Web Link - A system and method for automatically providing a Web site resource for a broken Web link are provided. Mechanisms are provided for locating Web site resources that have been moved to a new location in a Web site structure in response to receiving a request directed to an old location of the Web site resource, such as via a broken link. Index data structures of Web site structures are used to identify the structure of the Web site at various times. The index data structures are compared to determine how the Web site structure has been changed and these changes are stored as entries in a differences data structure. The differences data structure is then used to locate a moved Web site resource in the event that a request directed to an old location of the Web site resource is received, such as by selection of a broken link. | 10-23-2008 |
20080263194 | METHOD AND SYSTEM FOR OPTIMAL BINDING SELECTION FOR SERVICE ORIENTED ARCHITECTURES - A method for selecting a best performing binding for a server and a client in a service-oriented architecture includes: discovering configuration information about the service and the operating environment of the server and the client; selecting the best performing binding between the client and the server based on the discovered information; enabling the selected binding in a binding proxy for communication between the client and the server. | 10-23-2008 |
20080263195 | Performance Monitoring - Real-time data is extracted from a log file for at least one monitored process on each of a plurality of servers. For each monitored process, extracted real-time data is inserted into object variables of an object. The object variable data is processed to generate performance statistics for the monitored processes and to determine whether to trigger an alarm. A database is updated with object variable data and performance statistics when an event associated with a monitored process takes place. Historical performance statistics from the database are compared with current performance statistics to determine a performance trend. | 10-23-2008 |
20080263196 | Programming techniques for distributed multi-party networks - Architecture for programming in a distributed computing environment where different components of a system are owned or controlled by different entities and heterogeneous in terms of resource availability and a willingness to share. Multiple devices can be programmed when a task requires human intervention. Method are described for using a tolerance level provided by the application developer to control the execution of the application instructions at multiple devices with varying resources, and for using an involvement level provided by the sensor or computing device owner for the purpose of automatically adapting the execution of application code at multiple devices to suit the individual owner's willingness to share resources, and the capabilities of resources available with that owner. Code distribution allows an application developed by one entity to be distributed to multiple devices owned by multiple entities, where each of the entities has varying connectivity, resource availability, and sharing willingness. | 10-23-2008 |
20080263197 | Passively attributing anonymous network events to their associated users - Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event. | 10-23-2008 |
20080263198 | Device and method using non-cycle accurate measurements for discovering emulated clients - A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier. | 10-23-2008 |
20080263199 | SYSTEM FOR SEARCHING DEVICE ON NETWORK - There is disclosed a network system in which the position, attribute, and status of a desired device on a network can visually comprehensibly be grasped. A server manages location information indicating information on the device position in a hierarchical manner and attribute information from the device. Each device holds a plurality of status information (icon information) in accordance with various statuses of the device. A client holds map information corresponding to each class of the location information, and overlaps and outputs (display output) device status information obtained by communication by a polling system with the device detected by search in the server, and map information corresponding to the location information of the device. | 10-23-2008 |
20080263200 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 10-23-2008 |
20080263201 | METHOD FOR REAL-TIME MONITORING A REMOTE CONTROL PROCESS BY A THIRD PARTY AND SYSTEM THEREOF - The invention relates to a remote monitor technique. In particular, the present invention relates to a method for real-time monitoring a remote control process by a third party and a system thereof, which are able to third-party monitor a control terminal and a controlled terminal in the remote control process. The method comprises steps of establishing a connection between a control terminal and a third party monitoring terminal; arranging the control terminal, the controlled terminal and the third party monitoring terminal in one and the same session based on the connection; the controlled terminal sending its desktop video to the third party monitoring terminal via a virtual display driver; and the third party monitoring terminal sending a predetermined control strategy to the controlled terminal. | 10-23-2008 |
20080263202 | METHOD AND APPARATUS FOR REDUCING SPAM ON PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content). | 10-23-2008 |
20080263203 | METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS - METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS ABSTRACT One embodiment of the present method and apparatus for delegating responses to conditions in computing systems includes acknowledging (e.g., at a systems management component in the computing system) a condition, and delegating responsibility for a strategy for a response to the condition to another component. In further embodiments, the present method and apparatus for delegating responses to conditions in computing systems includes receiving (e.g., at a computing system component) an assignment from another computing system component (e.g., a systems management component), where the assignment assigns responsibility for a strategy for a response to a condition, and determining whether and how to respond to the condition. | 10-23-2008 |
20080270593 | Method and Devices for Distributing Management Information in a Management Network of a Communications System - A method for distributing management information in a management network for monitoring and controlling a communications system, whereby the management network comprises managers “NMC” and agents “OMC | 10-30-2008 |
20080270594 | METHOD AND SYSTEM OF SEPARATE FILE STORAGE LOCATIONS AS UNIFIED FILE STORAGE - Methods and systems of separate file storage locations as unified file storage. At least some of the illustrative embodiments are systems comprising a computer system coupled to a network, a first server coupled to the network (the first server provides a first file storage location), and a second server coupled to the network (the second server provides a second file storage location). The first server is configured to present the first file storage location and second file storage location as a unified storage location accessible through the first server. | 10-30-2008 |
20080270595 | SYSTEM AND METHOD FOR GENERATING SYNTHETIC WORKLOAD TRACES - A method comprises receiving a pattern of resource demands in a workload trace. The method further comprises identifying a plurality of occurrences of the determined pattern in the workload trace, and analyzing the occurrences to determine a trend of the workload trace. The method further comprises generating at least one synthetic workload trace representative of expected resource demands of the received workload trace accounting for the determined trend. | 10-30-2008 |
20080270596 | System and method for validating directory replication - A distributed information processing system comprising a collection of servers providing a directory service is augmented with the ability to validate whether replication is occurring between these directory servers. | 10-30-2008 |
20080270597 | End user control configuration system with dynamic user interface - An end user control configuration (EUC) system with dynamic user interface provides a user friendly tool for consumers to self-provision and manage network services such as Voice over Internet Protocol (VoIP) services. The EUC system dynamically generates graphical user interface (GUI) renderings that assist users in the completion of tasks related to provisioning, and managing network services. The EUC system allows telecommunication service providers to effectively hide the complexity of operational support systems (OSS) and the network elements that deliver the network services. The EUC system solves the technical problems of reducing the cycle-time to self-provision network services, assisting users to complete the tasks required to activate, and manage network services, and actually activating and managing the network services. | 10-30-2008 |
20080270598 | Methods and Apparatus for Sampling Usage Information From a Pool of Terminals in a Data Network - Methods and apparatus for sampling usage information from a pool of terminals in a data network. In an aspect, a method is provided that includes determining a designated set of terminals, and transmitting tracking parameters to the designated set of terminals, wherein the tracking parameters identify at least one upload window. In an aspect, an apparatus is provided that includes provisioning logic configured to determine one or more tracking parameters that identify at least one upload window, and targeting logic configured to determine a designated set of terminals, and to transmit tracking parameters to the designated set of terminals. In another aspect, a method is provided for performing usage tracking. The method includes receiving tracking parameters that identify at least one upload window, performing usage tracking according to the tracking parameters to produce a tracking log, and transmitting the tracking log during the at least one upload window. | 10-30-2008 |
20080270599 | METHOD AND SYSTEM FOR CONFIGURING A PLURALITY OF NETWORK INTERFACES THAT SHARE A PHYSICAL INTERFACE - Certain aspects of a method and system for configuring a plurality of network interfaces that share a physical interface (PHY) may include a system comprising one or more physical network interface controllers (NICs) and two or more virtual NICs. One or more drivers associated with each of the virtual NICs that share one or more Ethernet ports associated with the physical NICs may be synchronized based on controlling one or more parameters associated with one or more Ethernet ports. One or more wake on LAN (WoL) patterns associated with each of the drivers may be detected at one or more Ethernet ports. A wake up signal may be communicated to one or more drivers associated with the detected WoL patterns. One of the drivers may be appointed to be a port master driver. If a failure of the appointed port master driver is detected, another driver may be appointed to be the port master driver. | 10-30-2008 |
20080270600 | Method for Connection Leak Detection and Prevention - A method, system and machine readable medium for connection leak detection and prevention collect metadata about the connection on a request by an enterprise component and on connection release or transaction completion. If the enterprise component is server managed, the connection gets automatically released by the server at the end of the call to the enterprise component. If the enterprise component is not server managed, the collected metadata is stored and displayed in a user readable manner allowing an administrator to identify the erroneous behaving enterprise component which is causing the connection leak. | 10-30-2008 |
20080270601 | SYSTEM METHOD AND APPARATUS FOR SERVICE ATTACK DETECTION ON A NETWORK - Embodiments of the invention are directed to a detection system, method and apparatus that identifies and eradicates fraudulent requests on a network. Embodiments of the detection system comprise at least one router, a server, and an activity monitoring system. The activity monitoring system comprises a route arbiter and a traffic analyzer, wherein the route arbiter monitors the activity on the router. The route arbiter continuously monitors the router and firewall device to determine if abnormal activity or traffic patterns are emerging. If a determination is made that abnormal activity or abnormal traffic patterns exist, the activity monitoring system responds by blocking the activity or redirecting the traffic. | 10-30-2008 |
20080270602 | Electronic Device Client and Server System and Method - An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers. | 10-30-2008 |
20080270603 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM - A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications. | 10-30-2008 |
20080270604 | Timing Module for Regulating Hits by a Spidering Engine - A method and system for retrieving web-site based information by a spider engine at a target bandwidth is described. A target band width is received from the spider engine. A wait time is calculated by a timing module. Data retrieval from a web site is delayed by the calculated wait time so that data is retrieved at the desired target bandwidth. | 10-30-2008 |
20080270605 | Distributing and Geographically Load Balancing Location Aware Communication Device Client-Proxy Applications - A method and system for balancing server work load for cellular phone client-proxy applications in an environment where the clients change position within a given geographic area is disclosed. The method comprises the steps of mapping, monitoring, automatically re-mapping the system when required, updating a map address book, and updating a client address book. The system has a mapping system and a communication system connected to a plurality of servers, proxy servers and applications by an internal network. The proxy servers are connected to a plurality of clients by the Internet. If a threshold is exceeded, the monitoring program sends a message to a mapping program. Upon receipt of the message, the mapping program uses a rules engine to calculate a new map graph to remove load from an overloaded server (or servers) and to adjust communication requirements for data by reconfiguring partitions. | 10-30-2008 |
20080275980 | METHOD AND SYSTEM FOR TESTING VARIATIONS OF WEBSITE CONTENT - The invention is a method and system for testing variations of website content useful to optimize website visitor conversions. The invention includes integrating test variations of website content with web analytics platforms so that website variations can be tracking and analyzed within web analytics reporting systems. The invention helps website operators create content variations, and then scientifically test and measure the impact of those variations on conversion rates. The invention includes a method of using a reverse proxy server to introduce page variations on existing website content without needing to modify the existing web server. Using the reverse proxy server, the invention automatically injects values, associated with website variations, into web page tags used with web analytics platforms. The invention makes it possible to test any number of website variations and access such data from within web analytics platforms. The invention also provides a method to automatically transform web page tags of a first web analytics platform to web page tags of a second web analytics platform to easily try new third party web analytics solutions. | 11-06-2008 |
20080275981 | CLIENT SERVER SYSTEM AND METHOD FOR EXECUTING AN APPLICATION UTILIZING DISTRIBUTED OBJECTS - A client connected to a communication network performs an access request to an object. An application server performs an application by an actual object according to the client request. An object pool connected to the client and the application server pools a proxy object corresponding to the actual object and holds the actual object management information. The application server notifies the object pool of an event according to the status change of the application. The object pool automatically updates the actual object management information according to the notification of the event from the application server. | 11-06-2008 |
20080275982 | SYSTEM AND PROGRAM PRODUCT FOR TRACKING WEB USER SESSIONS - The present invention provides a solution for efficiently tracking web user sessions. Specifically, under the present invention, web user sessions are tracked on an analytics system based upon a unique identifier assigned to a requested web page and a session cookie that identifies a particular web user session. By tracking web user sessions in this manner, web page data transmitted during a particular web user session can be efficiently and accurately correlated for analysis. | 11-06-2008 |
20080275983 | Method and system for network management providing access to application bandwidth usage calculations - A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time. | 11-06-2008 |
20080275984 | Method and system for network management providing access to application bandwidth usage calculations - A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time. | 11-06-2008 |
20080275985 | Systems, Methods and Computer Programs for Monitoring Distributed Resources in a Data Processing Environment - Methods, apparatus and computer programs are described for monitoring resources within a data processing network. Monitoring entities can be selected, and a set of active monitoring functions can be modified, based on the requirements of consumers of monitored data. A first method involves monitoring resources on behalf of consumer entities within the network. A description of the consumer entity's monitoring requirements are published by the consumer entity and stored in a repository. The monitoring requirements of the consumer entity are compared with the monitoring capabilities of a plurality of monitoring entities, to identify a monitoring entity capable of satisfying the monitoring requirements of the consumer entity. An identified monitoring entity is selected, and a connection is established between the selected monitoring entity and the consumer entity. A second method involves modifying an active set of monitoring functions in response to changes to monitoring requirements of a currently active set of consumer entities. | 11-06-2008 |
20080275986 | Method to Update Status on Multiple Voice and Text Systems from a Single Device - A method for updating a message on a plurality of devices from a single device comprising a Configuration Program (CP), an Audio Device Update Program (ADUP), and a Text Device Update Program (TDUP). Using the CP, the user may enable and disable the present invention, add or delete devices, create and save messages, select existing messages to play to callers or display to senders, enable automated status updates, enable multiple message levels, or enable availability updates. The automated status update automatically creates messages from the user's calendar. The multiple message levels are a hierarchy of messages in which the message sent to a caller or sender based on their identity. The availability update communicates the user's next available time to the caller or sender. The ADUP and TDUP select the appropriate message to play or send based on whether automated status updates, multiple message levels, and availability updates are enabled. | 11-06-2008 |
20080275987 | METHODS AND APPARATUS FOR INTEGRATING SERVICES FOR ACCESSING THE WORLD WIDE WEB - Web pages retrieved by a browser core are translated into user interface component definitions and page information. The definitions and page information are transmitted to a user device which recomposes the definitions and page information into a format for presentation to a user on a user device. Transmitting the definitions and page information includes translation of the definitions and page information into a format appropriate for both the particular communications media on which the information is transmitted, and the device to which the information is transmitted. The device includes a browser client which performs the recomposition. The browser client also receives user input, and may respond by altering the information locally at the user device, and sending information related to the user selection back to the browser core for further processing. The browser core also tracks user sessions, thus allowing a user to access the network from several devices, and capture session information for each access from each device. This allows users to switch devices, and start a new session at the point where a previous session ended. | 11-06-2008 |
20080275988 | Method And System For Lawful Interception In Next Generation Networks - A method and system for lawful interception by Law Enforcement Agency (LEA) in next generation networks. The system includes a Delivery Function | 11-06-2008 |
20080281957 | DEFERRED INVOCATION OF COMMUNICATION SERVICES - In one embodiment, a network device determines one or more conditions for invoking one or more real applications to the network device for a session. This determination may be made at the initiation of the session, such as when a SIP INVITE message is received. The one or more conditions allow real applications to be invoked when a future event satisfies the condition. When it is determined that a condition is satisfied, a real application associated with the condition is then invoked. Accordingly, conditions may be set for real applications that may be tested against future events that have not yet occurred. This allows deferred invocation of real applications. Accordingly, if real applications are not needed for a session, then they are not invoked. But, when a real application is needed, it can be invoked. | 11-13-2008 |
20080281958 | Unified Console For System and Workload Management - Disclosed are systems and methods for implementing a unified console for managing computing-based devices. Described is a unified management solution to efficiently manage one or more workloads or a plurality of tasks performed by a user for managing the resources of applications in a computer network that includes the computing-based devices. The system can be implemented by providing a combined functionality that includes features of monitoring and update services, in a single console. | 11-13-2008 |
20080281959 | MANAGING ADDITION AND REMOVAL OF NODES IN A NETWORK - Systems and methods for managing a networked computing environment. The method comprising determining a change in status of a first computing system in a network according to status information communicated from the first computing system to a monitor system over a dedicated connection formed between the first computing system and the monitor system, wherein the dedicated connection is independent of network communication lines connecting the first computing system to other computing systems in the network. | 11-13-2008 |
20080281960 | Traffic supervision system - A method and a computer system for monitoring traffic, the computer system comprising an information handling server ( | 11-13-2008 |
20080281961 | NETWORK DELAY ANALYSIS INCLUDING PARALLEL DELAY EFFECTS - A multi-functional graphical user interface facilitates the analysis and assessment of application delays, including delays that occur on multiple paths. A trace file of an application's network events is processed to categorize the causes of delays incurred in the propagation and processing of these events. The system identifies the amount of delay (‘component delay’) that can be eliminated by eliminating each of the components of delay individually, as well as the amount of delay (‘parallel delay’) that can be eliminated by eliminating combinations of the delay components. A user interface displays the amount of reduction that can be achieved by eliminating each component delay individually and the amount of reduction that can be achieved by eliminating combinations of the individual component delays. To facilitate the analysis and assessment of these potential reductions, the interface allows the user to ‘drill down’ to view the individual delay components contained in each combination forming the parallel delays. In this manner, the user is provided a view of each of the delay components that would need to be addressed, either individually or in combination, to improve the overall application delay. | 11-13-2008 |
20080281962 | INFORMATION ASSET MANAGEMENT SYSTEM, LOG ANALYSIS SERVER, LOG ANALYSIS PROGRAM, AND PORTABLE MEDIUM - An information asset management system in a network environment includes a monitoring program | 11-13-2008 |
20080281963 | DISTRIBUTED REMOTE MANAGEMENT (DRMON) FOR NETWORKS - A method and apparatus for the distributed monitoring of network traffic deploys end system agents to collect traffic statistics at distributed points in the network. These statistics are forwarded to collectors which compile the statistics to create higher level pictures of network performance. A collector may act as a proxy for a prior art standalone network probe and may interact with network management software as though it were a standalone network probe. The invention is designed to work in accordance with a variety of standard network management protocols including SNMP, RMON, and RMON | 11-13-2008 |
20080281964 | Server discovery, spawning collector threads to collect information from servers, and reporting information - Server discovery, spawning collector threads to collect information from servers, and reporting such information, is disclosed. A method of one embodiment determines a number of servers communicatively coupled to a network. For each server, a collector thread is spawned to collect information regarding the server by sending requests to the server and receiving responses from the server. The collector threads can be spawned by and run on a computing device other than the number of servers, such that no computer-executable code is installed on the servers for collecting the information. Upon completion of the collector thread for each server, the information regarding the server as collected is stored to a database by one or more writer threads. The information may include dynamic load-oriented and function-oriented information regarding the servers, as well as static configuration information, from which server utilization-oriented statistics may be distilled to identify candidate servers for server consolidation. | 11-13-2008 |
20080281965 | METHOD AND SYSTEM FOR REPORTING DEVICE CAPABILITY UPDATE INFORMATION - A method and system for reporting device capability update information, which allows a client to selectively update and report their capabilities, thereby reducing the traffic between the client and a server as well as alleviating the burden on the server. In the present invention, the mechanism of subscription/notification is added to the updating and reporting of device capabilities, and the server subscribes to only the client's capabilities related to the service provided the server. With the function of managing the subscription, a single client may accept subscriptions from a plurality of servers, with each server requesting one or more subscriptions. Once the service provided by the server has been changed, the server again initiates a subscription flow. | 11-13-2008 |
20080288628 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MONITORING COMMUNICATIONS AND TAKING A RESPONSIVE ACTION - Exemplary embodiments include a device for monitoring communications and taking a responsive action including: a receiver operable for receiving an input signal from a user; a transmitter operable for transmitting an output signal to a communications network and a command signal to a secondary device; and a processor in operable communication with the receiver and the transmitter. The processor is operable for monitoring the input signal for an event and responsively instructing the transmitter to transmit the command to the secondary device. | 11-20-2008 |
20080288629 | METHODS, MEDIA, AND SYSTEMS FOR TRACKING CONTENT USAGE OVER A NETWORK - A content management system distributes items of media content to groups of users. The media is fingerprinted and tracked for reporting purposes. The system uses an algorithm to compensate for multiple content owners. The system can also be configured to provide content while still providing anonymity for actual use. | 11-20-2008 |
20080288630 | DEVICE MANAGEMENT - A device, such as a mobile phone, comprises a management tree store ( | 11-20-2008 |
20080288631 | STANDARD BASED DETECTION AND LAUNCH OF CLIENT APPLICATIONS - The claimed subject matter provides a system and/or method that detects, installs and launches applications on client machines. The disclosed system can include a component that receives a request to launch or install a client application. The component detects whether an application is present in a client machine by scrutinizing the received request and extracting an agent string associated with the client application. Based at least in part on the agent string, a server in receipt of the request can distribute a formatted document affiliated with the client application and thereafter initiate the application to execute on the client machine through MIME-type association. | 11-20-2008 |
20080288632 | METHOD AND SYSTEM FOR UNDERSTANDING SOCIAL ORGANIZATION IN A DESIGN AND DEVELOPMENT PROCESS - A method and system constructs a socio-technical network representing design and development processes. In one aspect, a network of inter-personal interactions comprising at least a plurality of nodes representing actors in design and development process is established; an artifacts network comprising at least a plurality of nodes representing a plurality of heterogeneous artifact types is established; one or more relationships between the nodes in the network of inter-personal interactions are determined; one or more relationships between the nodes of the artifacts network are determined; and one or more relationships between the nodes in the network of inter-personal interactions and the nodes of the artifacts network are determined. | 11-20-2008 |
20080288633 | NETWORK DEVICE TRACKING USING A NETWORK DEVICE SERVER - Systems and methods for tracking devices that are connected to physical communication ports of a network device server. In one example embodiment, a method includes detecting the connection of a device to a physical communication port of a device server; determining whether the device has been assigned an NCC; if the device has not been assigned an NCC, assigning an unassigned NCC to the device; and mapping the device's assigned NCC to the physical communication port. | 11-20-2008 |
20080288634 | Real-time monitoring of operations support, business service management and network operations management systems - The invention relates to a system and method for monitoring the availability and performance of an organisation's Business/Operational Support System (B/OSS) and Business Service Management Systems (BSM) which are referred to as a target platform. The invention gathers data from that monitored OSS/BSS/BSM arising from a distinct knowledge of the OSS/BSS/BSM's anatomy including its behaviour, log messages, configuration and public APIs and analyses that data to determine the OSS/BSS/BSM's run and configuration state, and performance, so as to report on these and other system events detected. This will allow the operational impact of the monitored OSS/BSS/BSM to be ascertained. | 11-20-2008 |
20080288635 | System and method for associating a client identity between servers - A client identity is associated between servers by establishing an identity for the client at a first sever utilizing a cookie transmitted to the client by the first server and transmitting to the client by the first server a URL, wherein the URL includes the identity established at the first server and information identifying the first server, and wherein the URL is transmitted by the client to the second server. | 11-20-2008 |
20080288636 | SENSOR NETWORK SYSTEM AND DATA RETRIEVAL METHOD FOR SENSING DATA - A sensor network system, including: a model list that stores preset model names; an event table that stores monitoring conditions of data transmitted from sensor nodes; an event generator that receives data corresponding to the model names from the sensor nodes, and notifies an occurrence of an event when receiving data satisfying the monitoring conditions from the sensor nodes; and an event-action controller including an action executer that executes processing previously specified when the occurrence of an event is indicated from the event generator. | 11-20-2008 |
20080294767 | Ubiquitous Wireless Network System, Node Module, and Operation Method of the Node Module - A ubiquitous wireless network system, node module, and operation method of the node module are disclosed. The present invention allows a display unit to display detected information or received information when the information corresponds to its own node module as an arrival destination. Therefore, the present invention enables users to ascertain the surrounding physical context around the corresponding node module or the information inputted by the administrator. | 11-27-2008 |
20080294768 | HOT WITHIN MY COMMUNITIES - Embodiments of the invention are directed to identifying network resources or other topics that are of interest to members of multiple online communities to which a user belongs. Online communities include blogs, websites, games, e-commerce systems, messaging systems, wikis, etc. For each online community, click activity or other client behaviors are tracked and analyzed to determine statistical metrics about community activity, such as which articles, links, services, or other network resources are popular in the online community. At least some of the tracking or analysis can be performed by clients that access the online communities, by a server of each online community, and/or by a central tracking system. The results for each community may be further analyzed relative to each other. The results are provided for all communities with which a given user is associated. For example, a list of the most popular links in the user's selected online communities. | 11-27-2008 |
20080294769 | Efficient synchronization of agents starting a task where the agents poll a server to learn the task start time - A server sets a task start time equal to a next polling time by a last agent that has most recently polled the server. In response to each of a number of agents, including the last agent, polling the server, the server provides the task start time. At each agent, a task is started at the task start time, such that all the agents start the task at a same time. As such, all the agents except for the last agent have to wait for the task start time to start the task after polling the server, whereas the last agent starts the task immediately after polling the server. The server may also determine a polling interval time based on a number of the agents that have polled the server, where the polling interval time indicates how long each agent waits between successive pollings of the servers. | 11-27-2008 |
20080294770 | SYSTEM AND METHOD FOR MANAGING COMPUTER NETWORKS - A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts. | 11-27-2008 |
20080294771 | ASSET MONITOR FOR FIELDBUS DEVICES - A software product and method of monitoring a field device in an enterprise having an industrial process. A subscription to the OPC DA server for diagnostic data from the field device is made and a subscription to an OPC AE server for event notifications from the OPC AE server is made. The subscription to the OPC AE server is activated, but the subscription to the OPC DA server is not activated. When an event notification is received from the OPC AE server, the subscription to the OPC DA server is activated. Diagnostic data from the field device is received and device health information from the diagnostic data is generated. The device health information is displayed on a viewing monitor. The subscription to the OPC DA server is then deactivated. | 11-27-2008 |
20080294772 | AUTOMATICALLY INFERING AND UPDATING AN AVAILABILITY STATUS OF USER - A system, system, and program for automatically inferring and updating an availability status of a user are provided. At least one current activity of a user is detected, where the current activity includes at least one system level event within a computer environment accessible to the user. A current availability status for a particular communication request is inferred from the current activity of the user in view of multiple availability rules, where the multiple availability rules map current activity to multiple possible availability statuses. In addition, inference of the current availability status is determined based on the identity of the requester of communication with the user, where the multiple availability rules map the requester identity in combination with the current activity to multiple availability rules. Output of the current availability status is controlled, such that the requester of the particular communication request is notified of an availability of the user to respond to the particular communication request. | 11-27-2008 |
20080301279 | Specifying Associations among Attributes of Entities in - Specifying associations among attributes of entities in a data center, the data center comprising a facility that houses computers and equipment supporting computer operations, the entities including the computers and the equipment, some attributes associated with a resource domain, the resource domain composed of a physical characteristic shared by some of the computers and equipment, including inducing, by a management module within the data center, a change in a value of a first attribute of a first entity; monitoring, by the management module within the data center, a change in a value of a second attribute of a second entity; determining whether the monitored change in the second attribute correlates with the induced change in the first attribute; and, if the monitored change in the second attribute correlates with the induced change in the first attribute, specifying an association among the first attribute, the second attribute, and the resource domain. | 12-04-2008 |
20080301280 | WEB MEDIA ASSET IDENTIFICATION SYSTEM AND METHOD - Methods of dynamically identifying a server provided media asset on a client device are provided herein. | 12-04-2008 |
20080301281 | Search Ranger System and Double-Funnel Model for Search Spam Analyses and Browser Protection - An exemplary method for defeating server-side click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. An exemplary method for investigating client-side cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script. Other methods, systems, etc., are also disclosed. | 12-04-2008 |
20080301282 | Systems and Methods for Storing Interaction Data - A method for storing customer center communications data includes receiving communications data at a host, wherein the communications data corresponds to a communication involving a customer center agent at a customer center located remotely from the host, storing the communications data at the host, and providing the communications data to a device located at the customer center. | 12-04-2008 |
20080301283 | Website-controllable warning message broadcasting system - A website-controllable warning message broadcasting system includes a first network linking apparatus and a plurality of second network linking apparatus linked to one another via a central server. When a first alarm unit connected to the first network linking apparatus is triggered, users at the second network linking apparatus may use respective second display unit thereat to view images captured by a first image capture unit connected to the first network linking apparatus, and broadcast a warning to deter any invader or to help the user at the first network linking apparatus. | 12-04-2008 |
20080301284 | Systems and methods for capture of electronic evidence - Systems and methods are provided for capturing electronic evidence. One or more agents are deployed to one or more sources of electronic evidence over a communications network, wherein the one or more deployed agents are undetectable by the one or more sources. One or more instructions are transmitted to the one or more deployed agents to capture electronic evidence from at least one service control point, wherein the one or more deployed agents are inactive unless the one or more instructions are received. Upon receipt of the one or more instructions by the one or more deployed agents from the at least of service control point, electronic evidence is captured from the one or more sources of electronic evidence. The use of resources of the one or more sources by the one or more deployed agents is monitored. | 12-04-2008 |
20080301285 | Methods, apparatus and systems for analyzing data carried by a plurality of data tributaries, wherein the analysis is based on a mapping of the data tributaries to one or more tributary sets - In one embodiment, data carried by a plurality of data tributaries is received. As the data is received, a stored mapping of data tributaries to one or more tributary sets is accessed, and common data tags are assigned to the data carried by ones of the data tributaries mapped to common ones of the one or more tributary sets. The data based on the common data tags is filtered; the filtered data is analyzed; and a result of the analysis is output. Other embodiments are also disclosed. | 12-04-2008 |
20080301286 | Persistent message store - A method and apparatus for using a persistent message store in a distributed computing system having a service oriented architecture. A message is detected that is transmitted from a message producer to a message consumer in the distributed computing system having the service oriented architecture. A determination is made as to whether the message should be copied based on at least one predetermined criterion. A copy of the message is generated if the message is to be copied. The copy of the message is stored in the persistent message store. | 12-04-2008 |
20080301287 | Managing Partitioning in a Cluster of Nodes - For managing partitioning in a cluster of nodes, each node is assigned a prime number for use in determining which partition should be activated following partitioning of the cluster. The cluster is monitored for partitioning. If partitioning is detected, a partition value is calculated from the product of the prime numbers assigned to each node in each partition. A node is activated only if it is within the partition having the greatest partition value. | 12-04-2008 |
20080301288 | METHOD AND DEVICE FOR MONITORING A TRANSACTION - A device for detecting a timeout event during a transaction between a user and a host includes a memory storing a set of predetermined threshold values in association with corresponding operations. A timing control unit that is operative to provide timing information. A controller is operative to detect a timeout event based on the timing information provided thereto and on the predetermined threshold vale of a corresponding operation. Activation of the device is conditional upon a signal received from a host. In another example embodiment, a device for detecting a timeout event during a transaction between a user and a host based on timing information and the predetermined threshold values includes means to access external power from the host. | 12-04-2008 |
20080301289 | METHOD AND APPARATUS FOR SEARCHING FOR UPNP DEVICE - Provided is a method of searching for a Universal Plug and Play (UPnP) device in a UPnP network. Accordingly, a control point inserts attribute information on a device designated by a user in addition to information on a device type, a service type, or the like into a search message that is multicasted to search for a UPnP message, and a UPnP device which receives the search message determines whether or not the received attribute information corresponds to an attribute of the UPnP device with reference to a device description and a service description, and transmits a response message according to a result of the determining. Therefore, network traffic that occurs in an operation of searching for a UPnP device can be reduced, and a user can easily and rapidly search for a desired UPnP device. | 12-04-2008 |
20080301290 | METHOD AND APPARATUS FOR MANAGEMENT OF COMMON SIDE INFORMATION - The invention is directed at a method of managing side information, used during interactive compression, common to a server and one of multiple devices. In order to manage common side information, a global common side information table including entries for the side information is maintained. The entries store characteristics of the common side information and include a reserve counter whereby entries can be reserved so that they are not erroneously deleted from the server. | 12-04-2008 |
20080301291 | PORTABLE HOST-PLUGGABLE APPLIANCE TRACKING SYSTEM - A recoverable data storage apparatus includes a hand-portable housing configured with an input/output (I/O) port presented outwardly therefrom, a data storage means retained within the housing and operatively coupled with the input/output port, and a client agent embodied as device-executable code residing on the data storage device and configured. When executed on a network-linked host computing device, the client agent is configured to establish communication with a remote server and receive data indicating a possession status of the data storage apparatus. A device tracking system includes a data network means, a hardware portion, and a software portion. The hardware portion includes at least, (1) a server device operatively coupled with the network means, and (2) a data storage device with an externally presented input/output port configured to operatively couple with a host device. The software portion includes at least, (1) a data storage device tracking means configured to identify a data storage device based upon unique identification-relevant data included in a polling message received via the network means, and (2) a client agent configured as device executable code stored at a memory means operatively coupled with the data storage device, wherein the client agent is configured so operatively when coupled with a host device to cause the host device to transmit host device-relevant identifying data via the network means. | 12-04-2008 |
20080301292 | POWER MANAGEMENT OF NETWORK ATTACHED DEVICE - Power management of one or more network-attached devices connected to a plurality of computer units is disclosed. In an exemplary arrangement, each computer unit as one computer unit, in response to a command for shutdown of the one computer unit, determines whether or not at least one remaining computer unit has been placed in a shutdown state, and the one computer unit, in response to a determination that the at least one remaining computer unit has been placed in a shutdown state, transmits a terminate-command signal to the one or more network-attached devices via the network for termination of the one or more network-attached devices. | 12-04-2008 |
20080301293 | Method and apparatus for discovering universal plug and play device using resource information - Provided are a method and apparatus for discovering a Universal Plug and Play (UPnP) device by using resource information. The method includes: multicasting a search message including resource request information, which requests a resource to the device, to a network complying with the predetermined standard; receiving at least one response message regarding the search message; and discovering a device corresponding with the resource request information based on the received response message. Accordingly, available information of the resource can be obtained in a discovery process, and as a result, a trial and error during the search and control can be avoided. Also, unnecessary waste of resources, such as network traffic, can be prevented, and thus efficiency of a communication protocol is improved. | 12-04-2008 |
20080301294 | Method and Apparatus for Operating an Open API Network Having a Proxy - A telecommunication system, method, apparatus, and computer readable media that implements an open application program interface (API) system in which open API servers pass and receive API commands to applications through a novel proxy. The proxy assists implementing various management functions, such as assigning open API servers to application and monitoring the overall system, and service contract control, all beneficially in a transparent manner. The proxy enables the telecommunication system to handle geographically diverse applications and open API servers. All API command can, but need not, pass through the proxy. | 12-04-2008 |
20080301295 | SYSTEM AND METHOD FOR USAGE-BASED MISINFORMATION DETECTION AND RESPONSE - Methods of detecting, and providing a notification of, the existence of misinformation using usage patterns of a network service enable an organization to respond to the misinformation. The method includes establishing common usage patterns of the network service, identifying an irregular usage pattern, determining that the irregular usage pattern was caused by misinformation, and responding to the misinformation. | 12-04-2008 |
20080307087 | PROTECTION OF INDUSTRIAL EQUIPMENT FROM NETWORK STORMS EMANATING FROM A NETWORK SYSTEM - A method of protecting a networked industrial controller from network storms is disclosed in the specification. The networked industrial controller has a real-time operating system and communication components performing communication exchanges with connected networks. The method comprises steps of: | 12-11-2008 |
20080307088 | Performance Monitoring Web Console for Distributed Transaction Service - A computer-implemented system to support performance monitoring of distributed transaction service can comprise one or more distributive transaction monitoring infrastructures, wherein each distributive transaction monitoring infrastructure contains at least one local monitor server that receiving monitoring data from one or more distributive transaction monitoring processes; a central monitor server that accepts monitoring data from one or more distributive transaction monitoring infrastructures and stores monitoring data into a database; and a web application that communicates with the central monitor server and provides interaction with a user. | 12-11-2008 |
20080307089 | COMPUTER NETWORK SOFTWARE AND HARDWARE EVENT MONITORING AND REPORTING SYSTEM AND METHOD - A method, system, and network for providing a method, system, and network, for network and device event monitoring and reporting. The disclosed subject matter associates with a host computer, a local network of information technology devices, a community of network users, and a global information technology community. The present disclosure initiates an inventory of a plurality of information technology devices associated with a local network of information technology devices. The method, system and apparatus determine change in the operational status of the plurality of the information technology devices associated with the local network. Then, the present disclosure monitors for changes in the operational status of the plurality of the information technology devices associated with the local network. The disclosed subject matter then presents to the host computer information relating changes in the operational status of the information technology devices associated with the local network. The present method and system associate changes to the operational status with a plurality of products from a set of product vendors, and those changes to the operational status with a plurality of advertisements presented in association with plurality of products. | 12-11-2008 |
20080313322 | Asynchronous Network Stack Operation in an Operating System Independent Environment - Techniques for operation of an asynchronous stack in a pre-boot environment. A token-based stack design may be used to support communications between network stack layers. | 12-18-2008 |
20080313323 | Methods, Systems, And Computer Program Products For Monitoring Transaction Status With A Presence Tuple - Methods and systems are described for monitoring transaction status with a presence tuple. A transaction having a multi-stage life-cycle and having a transaction participant is detected. A presentity is provided for tracking a status associated with a stage of the life-cycle and for publishing the status to a presence tuple associated with the presentity in response to the detection of a transition of the life-cycle to the stage. A subscription to the presence tuple is established for the transaction participant based on information determined from the transaction. At a presence server, a message is received including presence status associated with a stage of a transaction and transaction participant information. The presence information is processed for creating a presence tuple for tracking the transaction. A subscription to the presence tuple is established for the transaction participant based on the transaction participant information received in association with the message. | 12-18-2008 |
20080313324 | REDUNDANT PILE OF INEXPENSIVE DRIVERS (RPID) - The claimed subject matter provides a system and/or method that manages storage media associated with a plurality of disparate devices. The disclosed system can include a network of disparate devices wherein each device in the network can be associated with storage media. Additionally, the disclosed system can also include a component that identifies each device in the network, associates a likelihood that the device will periodically leave or rejoin the network, and utilizes the associated likelihood to construct a logical redundant pile of inexpensive disks comprising the storage media associated with the disparate devices. | 12-18-2008 |
20080313325 | COMPUTER NETWORK SOFTWARE AND HARDWARE ASSET CONFIGURATION AND DISCOVERY SYSTEM AND METHOD - A method, system, and network for interfacing the work-flow monitoring and reporting of a host computer, a local network of information technology devices, a community of network users, and a global information technology community. This includes the processes and system features for initiating an inventory of a plurality of information technology devices associated with the local network of information technology devices. The present disclosure further includes determining needs of the local network of information technology and associating the needs to similar needs of the community of network users, and solution product and services of the global information technology community. The system directs the host computer to research and purchase resources similar in temperament of the needs of the local network of the information technology devices, and drive the global information technology community advertisements of the needs of the local network to the user of the host computer. | 12-18-2008 |
20080313326 | Information Processor and Information Processing System - The information processor includes a device communication performance management module. The device communication performance management module includes: a communication performance evaluation unit that measures and evaluates the communication performance with respect to a device to be used when it is used by a device-use application; a device naming rule management unit that manages a naming rule for incorporating the communication performance evaluated by the communication performance evaluation unit into the name of the device file for a device as the target of evaluation; and a device file management unit that creates a device file for a device as the target of evaluation in accordance with the naming rule based on the result of communication performance evaluation. The result of communication performance evaluation by the communication performance evaluation unit is incorporated into the name of a device file and the evaluation result is thereby provided to a device-use application. | 12-18-2008 |
20080313327 | COLLECTING INDIVIDUALIZED NETWORK USAGE DATA - A method for collecting individualized network usage data includes routing Internet communications between a plurality of local clients and a plurality of remote servers over a common data link between a router device and the Internet. For each of the plurality of clients, characteristics of that client's communications routed over the data link are monitored at the router device. A collection of statistics reflecting the monitored characteristics are maintained. From the router device, the collection of statistics are periodically communicated over the data link to an interested server. | 12-18-2008 |
20080313328 | METHOD AND SYSTEM FOR BACKGROUND REPLICATION OF DATA OBJECTS - In an embodiment, a system and method may manage network resources to provide a near zero-cost background replication of data. Such a system may be inhibited from causing interference with foreground data flows. Such a system may also utilize a large fraction of spare network bandwidth. A system configured to implement such a method may include one or more servers and at least one client in communication via a to network. Additionally the system may include a hint server, a monitor and/or a front-end application between a demand server and the network. | 12-18-2008 |
20080313329 | PRESENCE SERVICE ACCESS DEVICE, PRESENCE SERVICE SYSTEM AND METHOD FOR PUBLISHING AND ACQUIRING PRESENCE INFORMATION - A presence service access device is disclosed for a presentity to publish presence information and transmit said information to the presence server, the device comprising a presentity communication module and a service scheduling control module. Further disclosed is a presence service system using the presence service access device, comprising a presentity, a presence service access device, a presence server, and a watcher client. Also disclosed is a method of publishing and acquiring presence information comprising steps of: 1. a presentity which publishes presence information; 2. the presence service access device which receives the presence information published by the presentity and forwards the same to a presence server; and 3. the presence server which distributes the presence information to corresponding watcher client. According to the present invention, various presentities provide presence information to watcher clients by connecting presence servers through a presence service access device. | 12-18-2008 |
20080320121 | SYSTEM, COMPUTER PROGRAM PRODUCT AND METHOD OF DYNAMICALLY ADDING BEST SUITED SERVERS INTO CLUSTERS OF APPLICATION SERVERS - A system, computer program product and computer-implemented method of dynamically adding a best suited application server to a cluster of application servers are provided. To do so, a history of quality of service (QoS) of a plurality of application servers is maintained. Using the history of QoS, an application server is dynamically selected and added to the cluster when the cluster is under a heavy workload. The selected application server is one that has the most historically favorable QoS and a heavy workload is one that exceeds a user-configurable threshold. | 12-25-2008 |
20080320122 | METHOD AND APPARATUS FOR MANAGEMENT OF VIRTUALIZED PROCESS COLLECTIONS - A management software approach to automatic and dynamic migration of applications running within virtualized process collections while retaining state during the migration operation. Performance metrics are received for a virtualized process collection running in a first logical partition. A threshold value is calculated for the performance metrics. A performance state analysis of the performance metrics is executed to determine whether the calculated threshold value of the performance metrics exceed a maximum or minimum threshold specified in a stack tier policy for the virtualized process collection. A stack tier analysis of the performance metrics is executed to identify any trigger violations and determine a migration action to be taken for the virtualized process collection. Responsive to a determination that the number of identified trigger violations exceeds a trigger violation count, a migration event is generated to migrate the virtualized process collection to a second logical partition. | 12-25-2008 |
20080320123 | PROCESS AND METHODOLOGY FOR GENERIC ANALYSIS OF METRICS RELATED TO RESOURCE UTILIZATION AND PERFORMANCE - A generic algorithm for analysis of resource metrics. A threshold is calculated in a stack tier policy for the performance state of a metric in a virtualized process collection (VPC). Responsive to determining that the metric is a critical metric, a weighted average of all metrics in the VPC is determined. Responsive to determining that the weighted average exceeds the threshold in the stack tier policy, if the value of the metric is determined to be higher than values for all recorded metrics, the value of the metric is stored as a highest value. A weighted average performance state of all metrics is calculated as the weight property of the performance metric divided by the weight factor total. Responsive to determining that the highest value is higher than the weighted average performance state of all metrics, the highest value is used as the performance state of the VPC. | 12-25-2008 |
20080320124 | DATA-ASSISTED CONTENT PROGRAMMING - Methods, systems, and apparatuses for data-assisted content programming are described. Link access data for a website is collected, such as numbers and times of views and clicks for links of the website, and link generated revenue information. The link access data is optionally stored. A link performance measure is generated for a link based on the link access data. An indication of the calculated link performance measure for the link is graphically displayed in a content scheduler. The indication may be based on an actual click through rate for the link, on an average click through rate for links in a module in which the link resides, link user engagement information, revenue generated by the link, or on other link access data. The content scheduler may display a website content schedule timeline or a webpage preview that includes the graphical indication. | 12-25-2008 |
20080320125 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page. | 12-25-2008 |
20080320126 | ENVIRONMENT SENSING FOR INTERACTIVE ENTERTAINMENT - The claimed subject matter relates to an architecture that can facilitate an enhanced entertainment experience based upon interactivity between entertainment medium or content and a content consumer's environment. In one aspect, based upon features or condition of a content consumer's environment, entertainment content can be interactively selected or modified. In another aspect, based upon features included in the entertainment content, components or conditions extant in the environment can be interactively updated or modified. | 12-25-2008 |
20080320127 | SECURE PUBLISHING OF DATA TO DMZ USING VIRTUAL HARD DRIVES - A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is disclosed. The mechanism may include the transference of virtual hard disk files between the internal network and the DMZ host computer. The DMZ host computer may be configured with two network interface cards (“NICs”). One NIC may be connected to the DMZ network. The other NIC may be connected to the internal network. The virtual machines are connected only to the DMZ NIC. The physical host communicates only with the internal network NIC. When it is necessary to publish data to the DMZ-resident computer, a virtual hard disk file may be copied to the DMZ host over the internal network NIC. The DMZ resident virtual computer simply detects the presence of the new drive and mounts it. | 12-25-2008 |
20080320128 | Method, system and service for structured data filtering, aggregation, and dissemination - A system and method of processing data, including identifying a first data processing criteria, communicating the first data processing criteria from a data processing application to a network element, receiving sensor data from a plurality of sensors at the network element, operating on the sensor data at the network element to process the data according to the identified first data processing criteria, resulting in a first processed data result, transmitting the first processed data result from the network element to the data processing application, and processing the first processed data result at the data processing application resulting in a second processed data result. The criteria can be dynamically updated. | 12-25-2008 |
20080320129 | METHOD OF SPECIFYING A MONITORING CRITERION FOR A PARAMETER OF AN OBJECT IN AN OPERATIONAL MANAGEMENT SYSTEM - The invention relates to a method of specifying a monitoring criterion for a parameter of an object in an operational management system. The method in accordance with the invention comprises the step of assigning first information to the parameter, wherein the first information is associated with a first priority. In a further step, the first information is employed as monitoring criterion for the parameter if no further information associated with a priority higher than the first priority is assigned to the parameter. | 12-25-2008 |
20080320130 | VISIBILITY AND CONTROL OF WIRELESS SENSOR NETWORKS - A computer implemented technique framework, prototype tool and associated methods that provide a high degree of visibility and control over the in-field execution of software in a minimally intrusive manner wherein developer-defined correctness tests and validation logic are embedded into the sensor node itself, making in-field software testing autonomous without necessitating continuous developer participation. | 12-25-2008 |
20080320131 | Method, Apparatus or Software for Managing Propagation of the Performance of a Node in a Network - A method, apparatus and software are disclosed for managing a network of nodes in a manner that enables the effect of the performance of one node on its neighbouring nodes in the network to be controlled. | 12-25-2008 |
20080320132 | METHOD FOR COMMUNICATION WITH INTERCEPTION OF CONTROL MESSAGES - A connection-oriented communication method between at least two communicating entities, to with a sending entity and a recipient entity connected via a telecommunication network said method comprising the following steps:
| 12-25-2008 |
20080320133 | Method for determining the dynamics of a logical network - A method for determining the dynamics of a logical network, said network comprising a plurality of communication nodes ( | 12-25-2008 |
20080320134 | Methods and Apparatus for Implementing Virtualization of Storage within a Storage Area Network - Methods and apparatus for implementing storage virtualization on a network device of a storage area network are disclosed. A frame or packet is received at a port of the network device. It is then determined that the frame or packet pertains to access of a virtual storage location of a virtual storage unit representing one or more physical storage locations on one or more physical storage units of the storage area network. A virtual-physical mapping between the one or more physical storage locations and the virtual storage location is then obtained. A new or modified frame or packet is then sent to an initiator or a target specified by the virtual-physical mapping. | 12-25-2008 |
20080320135 | METHOD AND SYSTEM FOR ESTABLISHING NETWORK CONNECTIONS - A method, computer readable medium and computer system for repairing a failed network connection between a client system and a network is disclosed. In a first aspect, the method preferably includes collecting real time connectivity information by the client system and utilizing the real time connectivity information by the client system to establish a connection with the network. In a second aspect, a computer system coupled to a network includes at least one network adapter for monitoring and collecting real time connectivity information from the network, memory for storing the real time connectivity information, and a processor coupled to the memory and to the at least one network adapter, where the processor is configured to execute program instructions for utilizing the real time connectivity information to repair a failed network connection between the computer system and the network. | 12-25-2008 |
20080320136 | System and method for consolidating, securing and automating out-of-band access to nodes in a data network - A system and method for out-of-band network management is provided wherein one or more different management interfaces are converted into a common format management data. The system may encrypt the common format management data. The system may also authenticate each user that attempts to access the management interfaces. | 12-25-2008 |
20090006605 | EXTENDED WRITE COMBINING USING A WRITE CONTINUATION HINT FLAG - A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage. | 01-01-2009 |
20090006606 | COMMAND QUEUE LOADING - A data storage system and associated method are provided wherein a policy engine continuously collects qualitative information about a network load to the data storage system in order to dynamically characterize the load and continuously correlates the load characterization to a command queue depth of data transfer requests. | 01-01-2009 |
20090006607 | SCALABLE METHODS FOR DETECTING SIGNIFICANT TRAFFIC PATTERNS IN A DATA NETWORK - Methods and apparatuses are provided for detecting traffic patterns in a data network. A sequential hashing scheme can be utilized that has D hash arrays. Each hash array i, wherein 1≦i≦D, includes M | 01-01-2009 |
20090006608 | DYNAMICALLY ENHANCING MEETING PARTICIPATION THROUGH COMPILATION OF DATA - Meeting attendees can have the resources available to participate in an efficient meeting regardless of where the attendees are located (e.g., across from each other or thousands of miles apart). Information can be gathered that relates to the attendees, the subject matter of the meeting or other information. In addition, relationships between attendees, if any, can be determined and displayed to the attendees to show the interrelatedness of the group. Various aspects during the meeting can also be observed and analyzed to allow the attendees to become more aware of the dynamics between individuals as well as the entire team. | 01-01-2009 |
20090006609 | MEDIA CONTENT DISTRIBUTION INDICATOR - A method includes providing an expandable element associated with a message transmit key of a device. An outer border of the expandable element moves or expands to reflect a number of recipients of a message to be sent from the device. The message transmit key of the device is contacted to cause the initiation of the message transmitted to each of the recipients, and a size of an inner region within the outer border is expanded to reflect a state of the message transmission to each of the recipients, wherein the size of the inner regions expands to fill an area within the outer border in order to send the message to each recipient. | 01-01-2009 |
20090006610 | Event driven plugin architecture for importing scanned image data into a production workflow - Systems and methods are described that facilitate importing scanned image data into a production workflow, in accordance with various features described herein. A plurality of loosely-coupled, dynamically loaded plugins can be defined in a configuration file for a given production scanning job. The plugins can be invoked in response to a trigger with which each plugin is associated, and triggers can be associated with different phases of the production workflow, such as image data acquisition (importation), data filtering (pre-scanning), image analysis (scanning), and metadata processing (post-scanning). In this manner, the overarching scanning architecture need not have direct knowledge of which plugins are triggered, or even present, and custom plugins as well as standard plugins can be provided for each production scanning job. | 01-01-2009 |
20090006611 | COMMUNICATION NETWORK ANALYSIS SYSTEM IN MULTI-LAYERED COMMUNICATION SYSTEM - The present invention relates to a communication network analysis apparatus in a multi-layered communication system and a method using the apparatus, and more specifically, to a communication network analysis apparatus in a building automation and control system, a communication method using the apparatus, and a protocol conversion method. | 01-01-2009 |
20090006612 | COMMUNICATION SYSTEM, PROXY SERVER, METHOD OF CONTROLLING SAME AND CONTROL PROGRAM THEREFOR - It is arranged so that the history of access to a web page at a terminal device that does not have a unique IP address can be determined. To achieve this, a proxy server generates identification data of the terminal device upon accepting a request for a web page from the terminal device the first time. A link destination URL included in the web page conforming to the request is changed by the proxy server and a web page in which the URL after the change has been embedded is displayed on the terminal device. If the proxy server is requested for the web page having the URL after the change, the URL is restored by the proxy server to the URL that prevailed before the change and the web server is requested for the web page having the URL that prevailed before the change. Since the URL after the change is one that only the terminal device of the generated identification data can ascertain, the history of access by the terminal device can be determined by storing the URL, which prevailed before the change, of the requested web page in correspondence with the identification data. | 01-01-2009 |
20090006613 | System and a method for updating a user presence status on a terminal by aggregating multisource information - A method of updating a user presence status at at least one terminal connected to a telecommunications network, on the basis of presence status information provided by at least one status source of said terminal. The presence status is determined during an aggregation step comprising collecting a plurality of unit presence probability values provided by a plurality of status sources associated with said terminal; and calculating an aggregated presence status probability resulting from a linear combination of said unit presence probability values. | 01-01-2009 |
20090006614 | Monitoring Web Service Transactions - Systems and methods for monitoring web service transactions include a monitoring server that is configured to monitor a web service transaction. The monitoring server allows a user to describe a sequence of web service requests that in combination define a web service transaction. The monitoring server sends out the web service requests in sequence to remote agents that are deployed in geographically diverse locations. The agents send the requests to the target web service and the results are provided back to the monitoring server. The monitoring server receives the results and then dynamically constructs the next request in the series based on the sequence of requests from the user and data from the response to a prior request. The dynamically constructed next request is then sent to remote agents for execution and the results are provided to the monitoring server. | 01-01-2009 |
20090006615 | METHOD AND APPARATUS FOR EXTRACTING AND VISUALIZING EXECUTION PATTERNS FROM WEB SERVICES - One embodiment of the present method and apparatus for extracting and visualizing execution patterns from Web Services collects data relating to one or more transactions executed in accordance with one or more Web Services-based applications (e.g., messaging systems or other services). One or more patterns is then extracted from the collected data, where the patterns are representative transactions commonly executed in accordance with the Web Services configuration under analysis. | 01-01-2009 |
20090006616 | END-TO-END PERFORMANCE TOOL AND METHOD FOR MONITORING ELECTRONIC-COMMERCE TRANSACTIONS - A method and apparatus for monitoring electronic commerce transactions. A network delay agent, coupled to the access point for the electronic commerce provider's system is operable to send and receive communications to a designated customer's site for measuring network transport latency. Application test latency is also determined. An application monitor agent that is coupled to the electronic commerce provider's access point sends application tests that correspond to tasks performed during a typical electronic commerce transaction, to the electronic commerce provider's system. The time required for the electronic commerce provider's system to perform the indicated tasks and return a response to the application monitor agent is recorded as application test latency. Network transport latency and application test latency are displayed to indicate the delays that are experienced by a user in executing an electronic commerce order. | 01-01-2009 |
20090006617 | System And Method For Transmitting Pollution Information Over An Integrated Wireless Network - A pollution information message system provides a system and method for generating and transmitting pollution information messages. In one embodiment, the pollution information message system employs a transceiver network with a plurality transceivers coupled to monitoring devices. Control room operators receive a pollution information message from an identifiable transceiver. The transceiver, identified by an identification code, indicates a location and the nature of the detected pollution. | 01-01-2009 |
20090013068 | SYSTEMS AND PROCESSES FOR EVALUATING WEBPAGES - Systems and methods may manage webpages in a set of webpages. The set of webpages may include webpages in an intranet and/or an extranet of an enterprise. Queries may be performed on the webpages and a list of results determined based at least in part on query terms and webpage scores. Webpage scores may be based on ratings of webpages and/or metrics of change. A metric of change of a webpage may be based at least in part on changes in text, images, and/or ratings of the webpage. | 01-08-2009 |
20090013069 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSOR, SERVER, INFORMATION PROCESSING METHOD AND PROGRAM - An information processor ( | 01-08-2009 |
20090013070 | SYSTEM AND METHOD FOR PROVIDING NETWORK APPLICATION PERFORMANCE MANAGEMENT IN A NETWORK - The present invention relates to a system and method for network performance management for monitoring performance of network applications. The system comprises a transmitter for sending one or more types of probe packets to the network, a receiver for receiving the one or more network probe packets from the network and for receiving one or more network application performance queries from one or more network applications, a processor connected to the transmitter and the receiver and operable to process network probe packets received by the receiver to generate network performance statistics for each type of probe packet and to look up the network application performance requirements of the one or more network applications and compare the network application performance requirements with the corresponding network performance statistics to determine whether the network application should access the network. Network performance statistics may be obtained using lean packet probes, using real traffic test streams or obtaining network performance statistics from a service provider. Thus by providing a probe, lookup, feedback methodology, network parameters, or network application requirements, may be adjusted to meet performance requirements of one or more network applications. | 01-08-2009 |
20090013071 | Provision Information Notification Apparatus, Provision Information Notification Method and Software Program - An apparatus and method is provided which enable a user using a plurality of terminals to obtain information in a convenient manner compared to conventional systems. An image forming apparatus includes a notification setting database | 01-08-2009 |
20090013072 | NETWORK APPARATUS TEST SYSTEM AND NETWORK APPARATUS TEST METHOD - An object of the present invention is to provide a network apparatus test system capable of highly efficiently performing a test of a network apparatus, wherein the host server includes a first control unit which transmits a test signal to a monitoring server, the monitoring server includes a second control unit which detects a test request signal and transmits the detected test request signal to a setting server, and which transmits the test signal to the network apparatus, and the setting server includes a storage unit which stores a plurality of IP addresses, and a third control unit which is configured, each time the test request signal is received, to assign one of the plurality of IP addresses to the network apparatus, and to perform processing for generating identification information, and is configured to make the first control unit transmit and the second control unit transmit the test signal. | 01-08-2009 |
20090013073 | METHOD AND SYSTEM FOR DETECTING WIRELESS ACCESS DEVICES OPERABLY COUPLED TO COMPUTER LOCAL AREA NETWORKS AND RELATED METHODS - A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices | 01-08-2009 |
20090013074 | SYSTEM AND METHOD FOR DISTRIBUTED NETWORK MONITORING FOR STEGANOGRAPHIC MESSAGES - This invention relates to distributed monitoring of networks for steganographically encrypted or encoded messages. Terrorists or criminal groups may use stenography to encode or hide messages in image data or other encrypted data. Law enforcement agencies seek to monitor the distributed networks for the hidden information. However, the size of the Internet exceeds the capacity of law enforcement resources. A method and system are described that use various computational devices distributed about the network to individually monitor network locations. Suspect data is documented on a set of servers. These servers then alert analysts to the presence of suspicious data. In one exemplary embodiment, a common interpreted programming language is used to program a set of instructions that may be performed by various devices distributed about the Internet to monitor network locations for encoded or hidden communications. | 01-08-2009 |
20090013075 | Monitoring apparatus, executive program, and information processing system - The present invention has: a data deriving section | 01-08-2009 |
20090019145 | Internet connection terminal apparatus and internet connection status determining method - In order to provide an Internet connection terminal apparatus which is capable of correctly determining the Internet connection status without the influences of a DNS cache or the like, an Internet printer ( | 01-15-2009 |
20090019146 | ASSOCIATING AND EVALUATING STATUS INFORMATION FOR A PRIMARY INPUT PARAMETER VALUE FROM A PROFIBUS DEVICE - A method and system are disclosed for managing Profibus device information in a distributed control system. After receiving input parameter data originating from a Profibus device message, the I/O module assembly performs steps for processing, maintaining and providing the input parameter data to a requesting control processor. The processing step includes extracting input parameter values from a received Profibus device message. The extracted input parameters are then deposited in a repository on the I/O module assembly, such that for a primary input parameter, the I/O module assembly stores at least: (1) a measured value, and (2) a status value. Furthermore, the I/O module assembly maintains a reference linking the first status parameter to the first input parameter. The I/O module assembly provides a data status value with the measured value for the first input parameter in accordance with an I/O read operation. The data status value is based on the status value for the first status parameter. | 01-15-2009 |
20090019147 | NETWORK METRIC REPORTING SYSTEM - A tool for monitoring the use of devices in an interconnected network. Desired network information, such as the use of browsers on the networked devices, the use of other applications hosted on the networked devices, and the speed and volume of data traffic to and within the network, may be collected by one or more network management tools operating within the network, and then provided to an outside reporting server. In response, the reporting server then organizes and reports the collected information to one or more authorized parties associated with the network. The reporting server may send the collected network information directly to the authorized parties via electronic mail, or provide access to the collected network information by posting it on a secured Web site. | 01-15-2009 |
20090019148 | Method and apparatus for internet traffic monitoring by third parties using monitoring implements - Disclosed is an internet traffic monitoring method that includes a network service provider analyzing an HTTP transaction involving an internet user client. The network service provider responds to the HTTP transaction by forwarding, to the internet user client, an interstitial web page including a monitoring implement. After forwarding the interstitial web page to the internet user client, the network service provider forwards web content, originally associated with the HTTP transaction, to the internet user client. | 01-15-2009 |
20090019149 | CONTENT DISTRIBUTION AND TRACKING - A computer-implemented method for tracking multimedia content includes generating a first feature vector of a first multimedia object, extracting a second multimedia object from a transmission of digital traffic, generating a second feature vector of the second multimedia object, and determining a similarity of the second feature vector to the first feature vector. Responsively to the similarity, the second multimedia object is identified as an instance of the first multimedia object. | 01-15-2009 |
20090019150 | TECHNIQUES FOR CHOOSING AND BROADCASTING RECEIVER BEAMFORMING VECTORS IN PEER-TO-PEER (P2P) NETWORKS - One feature provides for establishing an ad hoc peer-to-peer network over an existing channel allocation for another network. To mitigate interference between multiple peer-to-peer devices, a plurality of receiver chains in a receiver device may be configured with beamforming coefficients so as to focus reception in the direction of an intended signal from a transmitter device while minimizing reception from other directions. Similarly, the receiver device may also use a plurality of antennas and a transmitter chain to beamform in the direction of the transmitter device, thereby focusing its transmission toward the transmitter device. The receiver device may also notify nearby devices that it is employing a plurality of receive antennas. This information can be used by the nearby devices to more intelligently perform transmitter yielding. By utilizing beamforming information to make the transmitter and/or receiver yielding decision, better interference mitigation may be achieved. | 01-15-2009 |
20090019151 | METHOD FOR MEDIA DISCOVERY - A method including receiving a request for a web page; communicating with a content server by receiving content associated with the requested web page; determining whether the content includes particular content requiring plug-in support; initiating a native plug-in to handle the particular content; receiving a request for additional content from the native plug-in; retrieving the additional content for the native plug-in; monitoring the additional content to determine whether the additional content includes media content; and updating the content for the requested web page based on the monitoring. | 01-15-2009 |
20090019152 | Apparatus and Method for Real-Time Monitoring and Controlling of Networked Appliances Using an Intermediate Server - A method and an apparatus for real-time monitoring and controlling of networked appliances over both a wide-area network (WAN) and a local-area network (LAN) using a Device State and Location Server (DSLS) as an intermediate server are disclosed. The DSLS is configured to either receive beacons from networked appliances periodically or poll networked appliances to update current activity status of each networked appliance. A unified user interface on a commanding device is configured to monitor the current activity status of each networked appliance by simply receiving updated data from the DSLS, thereby offloading a cumbersome task of tracking all networked appliances over the WAN and the LAN on its own. A color coding scheme and different icon shapes are used for ease of monitoring of the networked appliances. An orbital user interface software further helps to visualize location and current activity status of each networked appliance. | 01-15-2009 |
20090019153 | METHODS AND SYSTEMS FOR PERFORMING A PREFETCH ABORT OPERATION - The present invention relates to systems, apparatus, and methods of determining whether to abort a prefetch operation. The method includes receiving a prefetched object downloaded from a content server, and checking the prefetched object to determine the prefetched object's size. The method further includes determining a probability of use of the prefetched object, checking a link between a server and a client to determine the link's bandwidth, and checking the link between the server and the client to determine the link's latency. In addition, the method includes, based on at least one of the size of the prefetched object, the probability of use of the prefetched object, the bandwidth of the link, and the latency of the link, determining whether to forward the prefetched object to the client. | 01-15-2009 |
20090019154 | ENABLING RENT/BUY REDIRECTION IN INVITATION TO AN ONLINE SERVICE - A system and method are directed towards enabling a user to access a client service such as a client game program that interacts with an online service such as a multiplayer game. A client probe detects execution of the client service on a first client device, and sends an instant message with address information to a second client device. A messaging service on the second client device, displays a presence of the first client and provides a selectable button to initiate the client service. If not already installed, the messaging service requests the client service from a remote online service such as a portal that may be independent from the online game service. The remote online service may provide options to freely try, rent, or buy the client service. The second client device downloads the client service and uses the address to connect to the same online multiplayer game. | 01-15-2009 |
20090024733 | Apparatus for Mediation between Measurement, Biometric, and Monitoring Devices and a Server - The present invention is a mediation apparatus between a server on a communication network and measurement, biometric, and monitoring devices, which, on their own, may or may not be capable to originate connections. Additionally, the mediation apparatus of the present invention can serve as an intermediate buffer for the data acquired from devices and as a source of control or processing data for devices. The present invention may be implemented either as a standalone device or built-in to a measurement device. Measurement devices may be of almost any type: biometric access control devices, security monitoring devices, physical access monitoring devices, various measurement devices, etc. The main function of mediation apparatus is a connection of measurement devices to the server through a communications network. In this arrangement the central server doesn't need to connect to devices directly. Instead, it periodically tries to connect to the server or constantly polls the server. | 01-22-2009 |
20090024734 | Automatically Adjusting Scheduled Inventory of Switched Fabrics - A mechanism is provided in a storage management application that automatically reconfigures agents and scheduled probes of agents in cases where the agents do not automatically reconfigure themselves to manage a newly formed fabric after fragment segmentation. The solution does not burden the storage administrator to reconfigure agents or to reconfigure regularly scheduled inventory probes through storage management applications. | 01-22-2009 |
20090024735 | METHOD AND SYSTEM OF CONTROLLING COMMUNICATIONS DELIVERY TO A USER - A method of controlling communications delivery to a user includes generating an internet protocol address space of internet protocol addresses for each of one or more communications networks operable to transmit marketing communications for delivery to the user; assigning an integrity value to an integrity rating associated with each communications network; assigning a user controllable selection to a set of receiving options associated with the communications networks; and filtering communications received from the communications networks in accordance with respective integrity values and the selection. | 01-22-2009 |
20090024736 | NETWORK PERFORMANCE ASSESSMENT APPARATUS, SYSTEMS, AND METHODS - Various embodiments of network performance assessment apparatus, systems and processes collect performance information pertaining to a current capacity utilization of a network, identify an occurrence of a capacity constraint on a portion of the network that is communicating the program to at least one presentation device, select one of a plurality of paths coupling the receiving device and the presentation device, and modify the program to a format compatible with the selected path. | 01-22-2009 |
20090024737 | WEBSITE MONITORING AND COOKIE SETTING - A method and apparatus for setting cookies on client devices | 01-22-2009 |
20090024738 | REMOTE RADIO SPECTRUM INFORMATION ACQUISITION - A scanner system provides real-time remote acquisition of a scanner's audio signals and visual display, and real-time remote control of scanner operations, including settings and functions. The scanner system may be used to gather information in a regional market by listening to geographically distant broadcasts available on radio spectrum frequencies. By synchronizing multi-spectrum monitoring, audio delivery, visual cueing, and control of spectrum reception, geographically independent persons can process scanner information as if they were physically present in the market. Thus, operators can gather information from public agencies and radio broadcasts from a remote market as if they were present in the market. The scanner audio signals may be used to produce traffic reports. | 01-22-2009 |
20090031018 | Web based fault detection architecture - A remote analysis system for equipment condition monitoring and the like, using a data acquisition device operable at the remote site of monitored equipment, a wide area network for communication of data to an analysis server, and an empirical model for analyzing operational performance based on data from the device. An information processor such as a personal computer (PC) or an embedded processor application is coupled to the data acquisition device for collecting signals indicative of the monitored machine or process. A communications network, such as a wireless or telephony network, or a wide area network application such as an intranet or the Internet, facilitates communications to an analysis server for conveying the collected signals to an application service provider (ASP) for analysis of the remotely monitored site. A communications server may also be used for facilitating communications via a number of different communications networks. A notification server is provided responsive to the analysis server for completing a notification procedure for a customer subscribing to the ASP services for remote analysis with the data acquisition device at the process-monitoring site. The customer may be notified through a variety of electronic or telephonic communication methods, including, e-mail, facsimile, telephone calls, or subscriber dial-up and the like. | 01-29-2009 |
20090031019 | Technique for Graphically Displaying Application Processing Time Distributions in Real-Time - A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times. | 01-29-2009 |
20090031020 | APPARATUS AND METHOD FOR MONITORING USE OF RESOURCES BY HEALTHCARE EMPLOYEES - A system that monitors use of resources by healthcare employees includes a plurality of resource identification devices located adjacent different resources, such as pieces of plumbing fixture, medical equipment, documents and hospital rooms. Each resource identification device emits a wireless signal containing a resource identifier. A plurality of healthcare employees carry separate data acquisition devices which receive the wireless signal when nearby a resource identification device. Upon receiving a wireless signal, the data acquisition device records the date and time of day and the resource identifier carried by the wireless signal. The information stored in each data acquisition device along with an employee identifier are employed to monitor the activity and use of resources by employees, and create reports about activity and use of the resources by the healthcare employees. | 01-29-2009 |
20090031021 | TRANSMITTING/RECEIVING METHOD OF SVC FILE AND APPARATUS THEREOF - In the conventional content, a minimum access unit of the random access information is one frame unit. In the case of SVC video content, one frame consists of a plurality of scalable layers. The SVC data can be used for each salable layer only when the data is accessible for each scalable layer. The present invention provides a method and apparatus for transmitting and receiving an SVC file for each scalable layer wherein the SVC file can be accessed for each scalable layer by allowing metadata to contain a layer descriptor in a network abstraction layer unit (NALU) or in a byte unit. | 01-29-2009 |
20090031022 | Multi-Hierarchy Latency Measurement in Data Centers - A method for monitoring performance of a data center that includes: (a) a performance monitor analyzing packets that flow between a client and a web or application server; (b) assigning packets to contexts where a context is a request-reply entity; (c) determining one or more of application, network, and back-end latency measures wherein: (i) the application latency measure is a time it takes for an application to respond to a request, (ii) the network latency measure is a time that it takes for packets to go through a network between the client and the web or application server, and (iii) the back-end latency is a time required for a back-end system to execute a request and respond to the application server. | 01-29-2009 |
20090031023 | Digital File Path Tracker (DFPT) Technology for Tracking Comsumption of Digital Content - Digital File Path Tracker (DF′PT) technology for tracking consumption of digital content for business information purposes, digital content distribution purposes, online multiplayer gaming environments, and the like. Tracking consumption of digital content is achieved by provisioning digital files with a so-called DF′PT for including consumption information regarding their Server consumption, and providing a DFTP mechanism for iteratively updating DFPTs. | 01-29-2009 |
20090031024 | Method and System for Monitoring Server Events in a Node Configuration by Using Direct Communication Between Servers - In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur. | 01-29-2009 |
20090031025 | Load optimization - Methods, computer code, and means are described that can control load in a network. In some applications, the monetary cost of operating the network can be reduced. Utilization of links in the network can be monitored. A degree of suboptimality with respect to some criteria can be assessed. In some instances, the criteria could be based at least partly one or more monetary billing structures of some subset of two or more links. A subset of the forwarding decisions of one or more forwarding nodes in the network can be adjusted automatically, based at least partly on the assessing. The adjustment can attempt to reduce the degree of suboptimality. | 01-29-2009 |
20090037569 | SYSTEM AND METHOD FOR PROVIDING A DISTRIBUTED WORKFLOW THROUGH A PLURALITY OF HANDHELD DEVICES - A system which provides workflow management includes a central server which is configured to communicate with two or more handheld computing devices to effect a delivery of specific work tasks to users of the respective handheld devices. By maintaining an interface with the handheld devices it is possible to coordinate and control performance of specific tasks within the workflow environment. A related method is also described. | 02-05-2009 |
20090037570 | Method and Apparatus for Resource Assignment in a Sensor Network - Resources are assigned in a network of sensor nodes by a first sensor node of the network detecting an event and collecting data samples for the event, exchanging messages with other sensor nodes of the network that detect the event to form a community of sensor nodes. Based on information exchanged, the total data samples collected for the event is calculated and the community sends a help message to other sensor nodes. The other sensor nodes are assigned to cover the event if the potential marginal gain if they were to cover the event exceeds a threshold. The potential marginal gain comprises the expected change in a utility function that is dependent upon the total data samples collected for the event by the community. The utility function is a concave function of the total data samples and may be dependent upon an importance level of the event. | 02-05-2009 |
20090037571 | Dynamic Agent Formation For Efficient Data Provisioning - Methods and apparatus, including computer program products, are provided for monitoring one or more computers in a distributed computing system. In one aspect, there is provided a computer-implemented method. The method may include determining, at a node, a first quantity of first agents reporting to the node and limiting the quantity of first agents to not exceed a predetermined threshold. The first agents configured to directly report to the node a first information corresponding to systems being monitored by the first agents. A second quantity of second agents may also be determined. The second agents report to the node through the first agents. The second agents report a second information corresponding to systems being monitored by the second agents. The first agents may be notified to report to the node the first information corresponding to systems being monitored by the first agents. The second agents may be notified to report to at least one of the first agents the second information corresponding to systems being monitored by the second agents. Related apparatus, systems, methods, and articles are also described. | 02-05-2009 |
20090037572 | Adaptation Of Clusters To Virtualization Technologies - Methods and apparatus, including computer program products, are provided for adapting processing in a distributed computing system based on automatically detected changes caused by virtualization. In one aspect, the computer-implemented method includes detecting whether one or more changes occur at a cluster of a distributed computing system. The one or more changes may be caused by a virtualization system. Moreover, the one or more changes may correspond to at least one of a quantity of processors at the cluster, a quantity of memory at the cluster, a quantity of bandwidth among nodes of the cluster, and a storage speed. The cluster may be adapted based on the detected changes. Related apparatus, systems, methods, and articles are also described. | 02-05-2009 |
20090037573 | SYSTEM AND METHOD OF HEALTH MONITORING AND FAULT MONITORING IN A NETWORK SYSTEM - A method of monitoring a network is disclosed and includes receiving an enrollment message at a heartbeat manager from a heartbeat agent associated with a first application stored at a first network entity. The method also includes automatically associating a heartbeat interval with the first application based at least partially on the enrollment message. In another embodiment, a system of monitoring a network is disclosed and includes a network entity having processing logic and memory accessible to the processing logic. The memory stores an application including a heartbeat agent portion having instructions executable by the processing logic to enroll with a heartbeat management server communicating with the network entity and including a heartbeat monitor including instructions to subscribe to notifications indicating an operational status of an application residing at a second network entity. | 02-05-2009 |
20090037574 | Autonomous Handling Management System, Autonomous Handling Management Method, and Program - An autonomous handling management system performing autonomously system handling management based on handling management policies. Determination means ( | 02-05-2009 |
20090037575 | RESEARCH DATA GATHERING WITH A PORTABLE MONITOR AND A STATIONARY DEVICE - Methods of gathering data concerning a location of an audience member proximate to a content presentation are provided. A stationary device is proximate to the content presentation. A portable monitor is carried by or with the person of an audience member. Location data is obtained by communicating data from the portable monitor to the stationary device, or from the stationary device to the portable monitor, or by comparing data gathered by both the stationary device and the portable monitor. | 02-05-2009 |
20090037576 | DATA ANALYZING SYSTEM AND DATA ANALYZING METHOD - A data analyzing system includes an input-output device, a plurality of local analyzing devices, a center analyzing device and a connecting device which connects between the input-output device, the local analyzing devices, and the center analyzing device. The connecting device may receive and execute a forwarding setting command from the input-output device to select and set one or more devices, to which the command from the input-output device should be forwarded, from the local analyzing devices and the center analyzing device and forward a command different from the forwarding setting command transmitted from the input-output device to the devices, in which forwarding is set, and forward data or command transmitted from the local analyzing devices and the center analyzing device, in accordance with destinations described in the data or the command. | 02-05-2009 |
20090037577 | DATA LISTENERS FOR TYPE DEPENDENCY PROCESSING - A method and apparatus for data listeners for type dependency processing. An embodiment of a method for dependency processing of computer files includes receiving a data stream input at a scanner component, where the data stream input represents program elements of one or more computer files. A data stream of type definitions and type usages is generated, and the data type definitions and data type usages are provided as an input to a listening component. The listening component performs a listening function of filtering the type definition and type usage data, aggregating the type usage data, or echoing the data stream output, and an output is generated from the listening component. | 02-05-2009 |
20090037578 | DATA PROCESSING APPARATUS AND NETWORK SYSTEM THAT OUTPUTS QUALITY OF SERVICE INFORMATION TO A USER - In each of the information processing apparatuses connected to each other via a network, there is arranged a quality of service (QOS) table to which functions and performance thereof are registered. When an information processing apparatus is additionally linked with the network, a QOS table thereof is automatically registered to a local directory of the network such that an agent converts the contents of the QOS table into service information to be supplied via a user interface to the user. Thanks to the operation, information of functions and performance of each information processing apparatus connected to the network is converted into service information for the user. Consequently, the user can much more directly receive necessary services. | 02-05-2009 |
20090037579 | Page Grouping For Site Traffic Analysis Reports - Website administrators can specify page groups and/or single pages as checkpoint nodes for site analysis reporting purposes, and can configure the system of the invention to provide information as to a particular visitation path through the checkpoints. Any group of pages can be designed as a single checkpoint node for website traffic analysis and reporting purposes. Page groups can be used in place of or in addition to individual web pages in any context where site traffic analysis is being presented or performed. | 02-05-2009 |
20090037580 | Method to Identify Transactions and Manage the Capacity to Support the Transaction - A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation periodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage. | 02-05-2009 |
20090037581 | REMOTE COMMUNICATION SYSTEM AND METHOD IMPLEMENTING A SESSION SERVER AND ONE OR MORE OBJECT SERVERS - A remote communication system and method are disclosed. An environment is identified defining a plurality of parameters communicated between a first and a second computer as part of a remote session (i.e., the first computer remotely controlling the second computer via the remote session), with each parameter defining an action associated with the remote session. A first application, via a unidirectional communication with the environment, modifies at least one parameter associated with the environment (e.g., modifying keyboard scan codes, cursor position, mouse position, clipboard data, screen resolution, or channel administration), wherein the modified parameter is extracted by an interceptor associated with the second computer and, the interceptor, based on a look-up, executes a pre-defined action affecting the remote session, wherein the pre-defined action being different than the modified parameter's associated action. | 02-05-2009 |
20090043880 | CREDIT DEPLETION NOTIFICATION FOR TRANSMITTING FRAMES BETWEEN A PORT PAIR - Provided are a method, system, and article of manufacture for credit depletion notification for transmitting frames between a port pair. Credits indicate a number of outstanding frames a first device may transmit to a second device. The credits are decremented in response to transmitting a frame to the second device. The credits are incremented in response to receiving a ready code from the second device indicating that the second device processed the transmitted frame. A determination is made as to whether additional credits are needed for communicating frames from the first device to the second device. A credit depletion notification is sent to the second device in response to determining that the additional credits are needed for communication with the second device. | 02-12-2009 |
20090043881 | CACHE EXPIRY IN MULTIPLE-SERVER ENVIRONMENT - In a multiple-server or multiple-process environment where each server has a local cache, data in one cache may become obsolete because of changes to a data store performed by another server or entity. The present invention provides techniques for efficiently notifying servers as to cache expiry indications that indicate that their local cache data is out of date and should not be used. A cache expiry manager receives cache expiry indications from servers, and sends cache expiry indications to servers in conjunction with client requests or in response to certain trigger events. The need for broadcasting cache expiry notifications to all servers is eliminated, as servers can be informed of cache expiry indications the next time a server is being given a client request that relates to the cache in question. Extraneous and duplicative cache expiry notifications are reduced or eliminated. | 02-12-2009 |
20090043882 | Systems and methods for consolidated service level agreements - An embodiment relates providing collaborative support for a service portal. The method includes providing a plurality of products on the service portal, where each product is associated with a respective vendor. The method also includes receiving a set of selection of products based on the plurality of products and determining a set of support resources for the set of selection of products. The method further includes applying a single service level agreement to the set of selection of products, where a first product is associated with a first vendor and a second product is associated with a second vendor. | 02-12-2009 |
20090043883 | Method for Monitoring a Technical Appliance - There is described a method and a device which is suitable for carrying out said method. Said method monitors a technical device, wherein a communication connection is established or can be established between the technical device and a device for supporting the monitoring. Data communication with the device for supporting monitoring is carried out by means of the communication connection. The technical device is monitored in a flexible manner possible. The monitoring of the technical device can be configured in such a way that modifications of a monitoring configuration can be transmitted from the device to the monitoring support on the technical device. The internet is used, in particular, for transmission, and the device for supporting monitoring is a webserver. | 02-12-2009 |
20090043884 | Recording Method and Recording System of Log - The present invention provides a recording method and recording system of log, the method comprising the steps of: generating an IP log, the content recorded by the IP log comprising at least an IP address and the operation being performed; finding the IP address in the IP log; replacing the found IP address with a user's information to obtain the ID log. With the present invention, the IP log is converted into ID log, in this way, the true user of the computer may be directly obtained through the ID log, the log information may provide the administrator of the system with very useful information on what is hazardous to the safety, which is significantly advantageous to the secret and security of the network of a company or an enterprise. | 02-12-2009 |
20090043885 | System and Method for Maintenance Support - System and method for maintenance support for electronically actuated and/or monitored appliances implemented within an electronically networked automation system, having a central monitoring unit processing present operating parameters for appliances for establishing the servicing state of the appliances using comparison operating parameters, where an external SSIS server logically combines the servicing request established by the monitoring unit with appliance-specific servicing performance information stored in a database and forwards these data to electronic mobile terminals of the servicing personnel in order to perform the servicing. | 02-12-2009 |
20090043886 | OPTIMIZING VIRTUAL INTERFACE ARCHITECTURE (VIA) ON MULTIPROCESSOR SERVERS AND PHYSICALLY INDEPENDENT CONSOLIDATED VICs - Optimization of the Virtual Interface Architecture (VIA) on Multiprocessor Servers using Physically Independent Consolidated NICs (Network Interface Cards) allows for improved throughput, increased resiliency and transparent fail-over; and also by hiding the actual NICs involved in particular data transactions, enables operations with substantially unmodified applications software. | 02-12-2009 |
20090043887 | Heartbeat mechanism for cluster systems - A heartbeat system and method is provided for a cluster system. In one embodiment, a heartbeat mechanism includes a quorum file for receiving heartbeat messages from the plurality of nodes. A network controller connects the quorum file to the plurality of nodes with a serial bus that establishes peer-to-peer and point-to-point device communication. A node map maintained by the network controller identifies active nodes based on signals from the serial bus. A status logic for determining a status of a node from the plurality of nodes by comparing heartbeat messages in the quorum file written by the node and the node map. | 02-12-2009 |
20090049167 | PORT MONITORING - The invention is directed to the transparent allocation of a unique per user /tmp file system. A method for monitoring a port in accordance with an embodiment of the present invention includes: obtaining a current uptime of a network switch; obtaining a status of a port of the network switch; in the case that the port of the network switch is idle: comparing the uptime of the network switch to a last used time of the port; and determining that the network switch has been rebooted since the port was last used, in the case that the uptime of the network switch is less than the last used time of the port. | 02-19-2009 |
20090049168 | Managing a Communication Availability Status - In response to a first user becoming active on a communication device, a first availability status can be automatically established as a current availability of the first user. A first time period can be automatically identified. During the first time period, the first availability status can be maintained as the current availability of the first user to at least a second user. In response to the first time period elapsing, a second availability status can be automatically established as the current availability of the first user to the second user. | 02-19-2009 |
20090049169 | Adaptively Processing Client Requests to a Network Server - In a computer network environment, a server protocol is provided to process read requests from clients. Rather than all read requests being processed synchronously or all read requests being processed asynchronously, an attempt is first made to perform a synchronous read. If the synchronous read is unsuccessful, the connection through which the request was received by the server is registered with a monitoring service. When the data is ready to be read, an appropriate callback is called and the data transmitted. An optional delay may be imposed before the synchronous read is attempted to increase the likelihood that the attempt will be successful. A series of delays/read attempts may also be employed in order to increase the likelihood still further that an attempt will be successful. | 02-19-2009 |
20090049170 | Connectivity Service-Level Guarantee Monitoring and Claim Validation Systems and Methods - A system monitors performance in a network that includes several network resources. The system obtains a list of targets in the network. The targets include selected ones of the resources. The system sends a request to the targets, receives responses from the targets, and determines a status of the targets based on the received responses or a lack of responses from the targets. The system then analyzes the status of the targets to determine compliance with the service-level guarantee. | 02-19-2009 |
20090049171 | SYSTEM AND COMPUTER-READABLE MEDIUM FOR CONTROLLING ACCESS IN A DISTRIBUTED DATA PROCESSING SYSTEM - Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent. | 02-19-2009 |
20090055522 | WEBSITE LOAD TESTING USING A PLURALITY OF REMOTELY OPERATING AGENTS DISTRIBUTED OVER A WIDE AREA - Website load testing using agents is disclosed. An address of a website and a window of time in which to perform a load test are received. The address and the window of time are distributed to a plurality of remotely operating agents, distributed over a wide area. Each agent in the plurality is to access the website at the received address during the window of time to load test the website. Data from the plurality of agents is received upon passage of the window of time, describing a load placed upon the website by the plurality of agents. The received data describing the load placed upon the website is presented. Alternatively, a script may be used to load test a website, the script a series of commands to be executed across the website as a simulation of a transaction, the script to be executed in the window of time. | 02-26-2009 |
20090055523 | IDENTIFYING AND RECOMMENDING POTENTIAL COMMUNICATION STATES BASED ON PATTERNS OF USE - Techniques for identifying potential communication uses of various systems are disclosed. Identifying potential communication uses of a computing system can improve the manner in which the computing system is used by allowing more intelligent decisions and better choices to be made regarding its communication use. By way of example, communication applications (or tasks or services) that are likely (or more likely) to be used by a person in a particular situation can be identified as potential communication use of a particular device. Such potential uses can, for example, be made more assessable (or more readily available) and/or effectively recommended (or automatically initiated), thereby allowing a person to more conveniently use the device. By way of example, identifying communication applications or tasks that are likely to be used by a person in a particular situation for various reasons (e.g., preferences and/or habits of a person in a particular situation) as potential communication use of a system (e.g., computing and/or communication device) allows making the communications applications, tasks, or services more assessable and/or effectively recommending them for use in a particular situation. | 02-26-2009 |
20090055524 | NETWORK SYSTEM - A network system suitable for remote monitoring or remote control of equipments is provided. When an execution of a server-side object is requested from a client terminal device to a server, the server requests an execution of an equipment-side object to the equipment(s). The execution request of the server-side object from the client terminal device is performed by use of a first identifier assigned to the server-side object, and the execution request of the equipment-side object is performed by use of a second identifier assigned to the equipment-side object. Since the server has an identifier setting function of setting a correspondence relation between the first identifier and the second identifier, it is possible to reduce burden on the client terminal device, and flexibly cope with cases of exchanging and increasing the equipment(s) in the network system without considering specific identification information of the equipments such as IP address. | 02-26-2009 |
20090055525 | System for Remote Configuration, Control, and Monitoring of Devices Over Computer Network Using Central Server - Devices, systems and methods are disclosed that relate to the control of devices over a network from a central controller. A computer server can control, monitor and affect devices which include a controller and a network interface for communicating information between the device and the server. The device and central controller communicate using a predefined communications protocol for either remote configuration, control, or monitoring of the device and the protocol allows the central server to recognize the device as a hierarchical tree of contexts including data elements and metadata describing each said data element. | 02-26-2009 |
20090055526 | Information terminal, server apparatus, and information processing method - An information terminal that reduces the effort of presence input is provided. The information terminal is connected via a network to a server for disclosing a presence that is a present state of each user or each object, and includes: a display unit for displaying a presence input screen that is a screen for inputting the presence; a storage unit storing a terminal identifier that differs from one user terminal to another and information on the presence input screen; and a control unit that causes the presence input screen to be displayed on the display unit upon receiving a presence input request signal that is a signal for requesting input of the presence from another information terminal via the network, and when the presence is inputted via an operating unit, transmits the terminal identifier together with the presence to the server. | 02-26-2009 |
20090055527 | SECTION IDENTIFICATION AND DISTRIBUTION SYSTEM MONITORING SYSTEM, METHOD AND PROGRAM PRODUCT - A system is provided for specifying arbitrary nodes and identifying a section between them on a system diagram of a distribution system. It comprises a system diagram information management portion for managing information on each of nodes and spans constituting the system diagram and ID information given to each of the nodes, an input portion for receiving an input specifying the nodes, a search portion for creating a search condition using the ID information based on the node specification and searching the span between the specified nodes so as to identify the section constituted by the searched span, and an output portion for display-outputting the system diagram visually indicating the section identified by the search portion. | 02-26-2009 |
20090055528 | Method for Providing Status Information to a Device Attached to an Information Infrastructure - A method for providing status information to a device on a computer network is disclosed. Data initiated by a communication initiation device within a computer network are monitored by a device. A determination is made by a device monitoring application within the device whether or not the data includes a message signature. In response to the data includes a message signature, a status message is generated and sent to a system administrator for the computer network. | 02-26-2009 |
20090055529 | METHOD OF COLLECTING DESCRIPTIONS OF STREAMS PERTAINING TO STREAMS RELATING TO AT LEAST ONE CLIENT NETWORK ATTACHED TO AN INTERCONNECTION NETWORK - A method for collection of flow descriptions for flows relating to at least one client network, the client network being attached to an interconnection network. The method receives flow descriptions for flows coming from the client network, aggregates the flow descriptions for the flows coming from the client network as a function of an aggregation criterion, transmits the aggregated flow descriptions to a collection device, analyzes the flow descriptions for the flows coming from the client network to determine at least one flow characteristic specific to the client network, receives flow descriptions for flows coming from the interconnection network, filters the flow descriptions for the flows coming from the interconnection network, in which the flow descriptions for flows lacking the at least one determined flow characteristic specific to the client network are eliminated, and transmits the filtered flow descriptions to the collection equipment. | 02-26-2009 |
20090055530 | Re-Direction of Streaming Multimedia in Wireless Communication Devices - A wireless communication device ( | 02-26-2009 |
20090063671 | METHOD, DEVICE, SOFTWARE FOR DETERMINING A NEED - The present invention relates to a method, a client device (CL) and a computer program product for determining the need for requesting network configuration information from a network. The client device includes memories (M | 03-05-2009 |
20090063672 | MONITORING OF COMPUTER NETWORK RESOURCES HAVING SERVICE LEVEL OBJECTIVES - In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described. | 03-05-2009 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090063674 | METHOD AND SYSTEM FOR MONITORING AND INSTANTLY IDENTIFYING FAULTS IN DATA COMMUNICATION CABLES - A method and an associated system for monitoring and instantly identifying faults in a data communication cable are disclosed. A fault monitoring program learns a reference data traffic pattern communicated through the data communication cable by reading inputs from a sensor. The reference data traffic pattern is stored and is used for determining normalcy of data traffic through the data communication cable. The fault monitoring program monitors for a fault in a data traffic, and, if a fault is detected, activates a fault indicator sending out fault signals to notify users of the fault. If the fault is not recovered within a predefined recovery period, the fault monitoring program deactivates the fault indicator and shuts down a power source for later use of the data communication cable. | 03-05-2009 |
20090063675 | Internet-based method of and system for monitoring space-time coordinate information - An Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object moving along a course through the space-time continuum. The Internet-based system comprise a wireless GSU-enabled client network device affixed to the body of an animate object. The wireless device includes a global synchronization unit (GSU) for automatically generating time and space (TS) coordinate information corresponding to the time and space coordinate of the animate object with respect to a globally referenced coordinate system, as the animate object moves along a course through the space time continuum. The device also includes biophysiological state sensor affixed to the body of the animate object, for automatically sensing the biophysiological state of the animate object and generating biophysiological state information indicative of the sensed biophysiological state of the animate object along its course. The wireless device also includes a wireless date transmitter for transmitting the TS coordinate information and the biophysiological state information through free-space. A TS-stamping based tracking server receives the TS coordinate information and the biophysiological state information through in a wireless manner, and stores the same as the animate object moves along its course. An Internet information server serves Internet-based documents containing the collected TS coordinate and biophysiological state information. An Internet-enabled client system enables authorized persons to view the served Internet-based documents and monitor the collected TS coordinate and biophysiological state information, for various purposes. | 03-05-2009 |
20090063676 | METHOD AND APPARATUS FOR PROVIDING STATUS INFORMATION BY UTILIZING PRESENCE SERVICE AND METHOD AND APPARATUS FOR GENERATING CONTENT STATUS INFORMATION BY UTILIZING PRESENCE SERVICE - A method of and apparatus for providing status information by using presence information data, and a method of and apparatus for generating content status information are provided. The method of providing status information on a second user to a first user terminal which is used by a first user includes: inserting additional data into the status information on the second user requested by the first user terminal; and transmitting the status information on the second user into which the additional data is inserted to the first user terminal. | 03-05-2009 |
20090063677 | Systems and Media For Updating An Instant Messaging System - Systems and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based oh receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments, include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc. | 03-05-2009 |
20090063678 | EQUIPMENT SET GENERATION SUPPORT APPARATUS AND METHOD - An equipment set generation support apparatus (a) acquires, from a plurality of equipments connected to a network, state change event information notifying a state change of each equipment and an occurrence time and date of the state change, (b) sets a detection condition including a start time and an end time of a detection period, (c) selects state change event information whose occurrence time and date of the state change falling within the detection period from the state change event information acquired, and (d) detects, from the plurality of equipments, a set of equipments whose states change in the detection period and a set of state values after the state change of each equipment based on the state change event information selected. | 03-05-2009 |
20090063679 | NETWORK RELAY APPARATUS - A network relay apparatus which conducts data transfer by using a plurality of network LSIS includes a transfer engine unit having at least two network LSIs and a central control unit which controls the operation state of the network relay apparatus. The transfer engine unit includes the network LSIs capable of changing over at least one of a clock and an operation which differ every function block, a load judgment unit for judging a load laid upon each of function blocks in the network LSI, and a frequency voltage control unit for individually changing over at least one of the clock and operation voltage supplied to each function block on the basis of the load judged by the load judgment unit. | 03-05-2009 |
20090063680 | Connection Locator in a Power Aggregation System for Distributed Electric Resources - Systems and methods are described for a power aggregation system. In one implementation, a method includes charging an electric resource over a power connection to an electric network, obtaining a unique identifier of a device over the power connection, and determining an electric network location of the electric resource from the unique identifier. | 03-05-2009 |
20090070454 | Allocating access across shared communication medium - A method of providing network access across a shared communications medium between competing users ( | 03-12-2009 |
20090070455 | APPARATUS, SYSTEM, AND METHOD FOR VISUAL LOG ANALYSIS - An apparatus, system, and method are disclosed for visual log analysis. The apparatus for visual log analysis is provided with a plurality of modules configured to functionally execute the necessary steps of retrieving log entries from a plurality of devices on a network, parsing the log entries to determine an execution flow of commands executed of the network, and displaying a graphical representation of such execution on the network. These modules in the described embodiments include a log consolidation module, a parsing module, and a display module. | 03-12-2009 |
20090070456 | PROTOCOL FOR ENABLING DYNAMIC AND SCALABLE FEDERATION OF ENTERPRISE SERVICE BUSES - In a method and system for creating a federation of a plurality of enterprise service buses (ESBs), a plurality of ESB nodes provide connectivity to one or more services. According to a protocol, at least a portion of the ESB nodes transmit policy-based service advertisement messages to other ESB nodes, wherein the policy-based service advertisement messages include service state information. In response to receiving the policy-based service advertisement messages, each of the ESB nodes stores the service state information received from other ESB nodes in respective distributed registries to create a local view of routable service endpoints in the federation. Each of the ESB nodes then uses its respective distributed registry to make routing decisions when routing service requests. | 03-12-2009 |
20090070457 | Intelligent Performance Monitoring of a Clustered Environment - A method, system and computer-usable medium for selectively monitoring transactions in a cluster computing environment are disclosed. A transaction is received by a load balancer. A transaction monitoring manager determines if the received transaction is a candidate for monitoring. If it is, then the resource thresholds defined in the transaction's corresponding TMP are determined. The load balancer is then interrogated to determine which application server instance is assigned to process the transaction. Once determined, resource usage information is collected from the target application server instance and provided to the transaction monitoring manager. The collected resource information is compared to the transaction's corresponding TMP. If resource usage exceeds resource threshold values contained in the TPM, then the transaction is monitored. Otherwise it is not. | 03-12-2009 |
20090070458 | SERVER DEVICE, INFORMATION REPORT METHOD, AND INFORMATION REPORT SYSTEM - A server device including a management unit for receiving and managing a status of equipment or a user operating the equipment as status information and detecting a load status of the server device from receiving situation of the status information, a notification request receiving unit for receiving a notification request message that requests notification of the status information from a reference person terminal; a notification response transmitting unit for transmitting a notification respond message that responds to the received notification request message; and a status notification transmitting unit for transmitting an information notification message including the status information received by the management unit to the reference person terminal according to the load status. The server device can precisely transmit information from a user device, and the like, to the reference person terminal when the server device is in an overload state. | 03-12-2009 |
20090070459 | High-Performance Context-Free Parser for Polymorphic Malware Detection - The invention provides a method and apparatus for advanced network intrusion detection. The system uses deep packet inspection that can recognize languages described by context-free grammars. The system combines deep packet inspection with one or more grammar parsers ( | 03-12-2009 |
20090070460 | METHOD AND SYSTEM FOR SOCIAL NETWORK ANALYSIS - Methods and system for social network analysis are described. In one embodiment, a strongly connected component value, an in-component value, an out-component value, a disconnected component value, a tendril value, and a tube value of a social network for a time period may be accessed. A social strength of the social network for the time period may be calculated by combining the strongly connected component value, the in-component value, the out-component value, the disconnected component value, the tendril value, and the tube value. The social strength of the social network for the time period may be utilized for analysis of the social network. The strongly connected component value may have a greatest weight and the disconnected component value may have the lowest weight in the combining. | 03-12-2009 |
20090070461 | DISTRIBUTED FILE SYSTEM AND METHOD OF REPLACING CACHE DATA IN THE DISTRIBUTED FILE SYSTEM - Provided are a distributed file system and a method of replacing cache data in a distributed file system capable of replacing cache data based on the degree of network instability between a server and a client. The method includes monitoring network instability between the first apparatus and the second apparatus, determining whether an empty space exists in a storage space of the second apparatus if the second apparatus needs data of the first apparatus, if an empty space does not exist in the storage space, deleting at least one cache data item already stored in the second apparatus according to the monitored network instability, and storing data obtained from the first apparatus in the empty space generated by deleting the cache data. | 03-12-2009 |
20090070462 | SYSTEM AND COMPUTER PROGRAM FOR MONITORING PERFORMANCE OF APPLICATIONS IN A DISTRIBUTED ENVIRONMENT - A system and computer program for monitoring the performance of applications running on a server in a distributed computing environment includes prompting the user to select information for monitoring, monitoring application performance in accordance with the selected information, and making the monitored performance information available to the user. | 03-12-2009 |
20090070463 | Preliminary Classification of Events to Facilitate Cause-Based Analysis - The present invention provides methods and systems for performing preliminary cause-based classification of events in a computer or networked computer system. Methods are provided in which, based on an event message, cause-based preliminary classification of an associated event is performed. The result of the preliminary classification is used to facilitate subsequent cause-based analysis, such as root cause analysis, relating to the event. Methods are provided in which preliminary classification is performed using a database including a catalog associating event messages with appropriate preliminary classifications of events associated with the event messages. | 03-12-2009 |
20090070464 | Autonomic Content Load Balancing - Techniques are disclosed for providing autonomic content load balancing. A programmatic selection is made from among alternative content versions based upon current conditions. Preferably, the alternative selectable versions specify content to be used in a Web page, and a version is selected responsive to receiving a request for the Web page. The selectable version may comprise the Web page, or a component of a Web page may have selectable versions. Optionally, the Web page may include more than one component with dynamically-selectable content. In this case, the versions may be selectable independently of one another. | 03-12-2009 |
20090070465 | Method and Device for Making Clients Rapidly Access to the Peer-to-Peer Network - A method and device for making clients rapidly access to the peer-to-peer network comprise that the accessed clients, which are separated into one or more normal state groups; the clients that intend to log in are separated into one or more login groups; and the required contents, the variant of the contents or the content-related information are selectively transmitted to the members of the login groups immediately. After a certain login group becomes stable, the normal state groups which the login groups intend to be added into are selected and each member of the login groups is added into the selected normal state groups. In this invention, there is no need to frequently send notification individually when each client loges in, rather than send group notification, thus it can reduce network dithering, at the same time the user can receive the content or the related variant of the content immediately and watch the playing of the content without any wait when accessing to the network. | 03-12-2009 |
20090077220 | SYSTEM AND METHOD FOR IDENTIFYING MUSIC CONTENT IN A P2P REAL TIME RECOMMENDATION NETWORK - A peer-to-peer (P2P) network for providing real time media recommendations is provided. The media recommendations may be song recommendations or video recommendations. Each time a media presentation is played by a peer device, the peer device provides a recommendation identifying the media presentation to other peer devices in the P2P network. A peer device having received recommendations from the other peer devices in the P2P network then programmatically, or automatically, selects a next media presentation to play from the media presentations recently played by the other peer devices and one or more locally stored media presentations. If the selected media presentation is not stored locally by the peer device, the peer device may obtain the selected media presentation from a subscription based service enabling streaming or download of the selected media presentation, an e-commerce service enabling purchase and download of the selected media presentation, or another peer device. | 03-19-2009 |
20090077221 | SYSTEM FOR ANALYZING AND VISUALIZING ACCESS STATISTICS FOR A WEB SITE - A method for monitoring and visualizing user access made to a web site is disclosed. The method comprises: embedding in a web page to be monitored code to request a thumbnail image from a site when the page is loaded into a browser. The embedded code also includes a user-activateable link to a page within the system server. At the system server, the requested thumbnail image is returned to the web browser, and the IP address from which the thumbnail was requested is recorded. For each recorded IP address, the server determines a corresponding geographical location. The server creates and stores an image that is a geographical representation of the geographical distribution of the recorded IP addresses, and a thumbnail representation of that image. Upon activation of the user-activateable link, the linked page within the system server that includes the image previously created is retrieved by the browser. The thumbnail image requested by the embedded code is the thumbnail image created in this step. A number of threshold, updating, clustering, storage and archiving routines are deployed to ensure large scalability. | 03-19-2009 |
20090077222 | KVM SWITCH AND MULTI-COMPUTER SYSTEM INCORPORATING THE SAME - The invention discloses KVM switches comprising a body, a data transceiver, a micro control unit, and a display disposed on the body. The data transceiver receives data from a plurality of computers. The micro control unit analyzes and operates the received data to generate an image. The image may show data from all computers in chorus. The display displays the image. The data provided by the computers are generated by application programs of the computers. The application program may retrieve system information of the corresponding computer as the data, retrieve discs of the corresponding computer to get the data, or download information from the internet as the data. | 03-19-2009 |
20090077223 | METHODS AND SYSTEMS INVOLVING MONITORING WEBSITE CONTENT - An exemplary embodiment of a system for monitoring website content, including, a browser client operative to send a first request for content to a first website server, the content stored on a second website server, an intermediate server, operative to receive a URL associated with the content, from the first website sever, the URL comprising an address of the intermediate server, an address of the content, and an address for threshold data stored on the intermediate server associated with the content, the threshold data including a plurality of thresholds, the intermediate server further configured to send a second request for the content to the second website server, receive the content, determine whether the content exceeds the plurality of thresholds associated with the content, deny the first request for content, responsive to determining that the content exceeds one of the plurality thresholds associated with the content. | 03-19-2009 |
20090077224 | METHOD AND APPARATUS FOR PROPAGATING ACCELERATED EVENTS IN A NETWORK MANAGEMENT SYSTEM - This invention relates to a method, system and computer program product for a network management system comprising: | 03-19-2009 |
20090077225 | METHOD AND APPARATUS FOR DISTRIBUTING AND ACTIVATING SECURITY PARAMETERS - An apparatus and method for distributing and activating a new security parameter in a computer network in a non-disruptive manner includes transmitting a new security parameter to the an element in the network, instructing the element to place the new security element in a pending database of the element and activating the new security parameter. The present invention also determines possible conflicts in the computer network. | 03-19-2009 |
20090077226 | METHOD AND SYSTEM OF AUTO-MONITORING NETWORK PORTS - A method of auto-monitoring network ports includes the steps of: receiving at least one path of an application program; detecting whether or not the application program represented by the received path needs at least one network port; notifying a router to open the relative network port required by the application program if the detecting result indicates that the application program needs the network port; and notifying the router to close the relative network port required by the application program if the detecting result indicates that the application program no longer needs the network port. Hence, the present invention can achieve the purpose of exempting users from a mandatory setup of network ports for the router according to different application programs. | 03-19-2009 |
20090077227 | System and method for monitoring network communications originating in monitored jurisdictions - A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer network based on predetermined criteria. The computer network includes at least one monitored jurisdiction and at least one unmonitored jurisdiction. A database is queried to identify at least one communication identifier associated with the monitored jurisdiction. The method also includes a step of storing a list including the at least one communication identifier. Only network communication having communication identifiers included in the list are monitored. | 03-19-2009 |
20090077228 | Behavioral classification of communication sessions using active session initiation - A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is identified using the behavioral characteristics, such that the sessions in the subset are suspected of using a target communication protocol. A candidate session is selected from the subset. A trial communication session is initiated with a node of the communication network, which participates in the candidate session, using the target communication protocol. Responsively to receiving a positive response from the node to initiation of the trial communication session, it is determined that one or more further sessions in the plurality are using the target communication protocol. The one or more further sessions are controlled responsively to a predetermined control criterion that is applicable to the target communication protocol. | 03-19-2009 |
20090077229 | PROCEDURES AND MODELS FOR DATA COLLECTION AND EVENT REPORTING ON REMOTE DEVICES AND THE CONFIGURATION THEREOF - Systems and methods are disclosed to monitoring a remote object with a remote client to receive a configuration file directing the remote client to capture events of interest specified by one or more rules; a wireless network to communicate events of interest captured by the remote client; and a server coupled to the remote client over the wireless network, the server receiving events of interest from the remote client and generating a report on the events of interest. | 03-19-2009 |
20090077230 | CALL PROCESSING SYSTEM AND METHOD - A call processing system ( | 03-19-2009 |
20090077231 | DEVICE INFORMATION MANAGEMENT APPARATUS, DEVICE INFORMATION MANAGEMENT METHOD, AND STORAGE MEDIUM - A device information management apparatus for processing a report from a device management client during a failure of a transaction system is disclosed. The device information management apparatus includes a reception unit configured to receive the report from the device management client; a determining unit configured to determine whether to process the report based on an importance level of the report and a load (workload) level of the device information management apparatus; a processing unit configured to process the report if the determining unit determines to process the report; and a discarding unit configured to discard the report if the determining unit determines not to process the report. | 03-19-2009 |
20090077232 | REMOTE ACTIVITY MONITORING - A computer readable medium and system for remotely monitoring activity includes generating first server heartbeat information at a first server at a local site, and storing the first server heartbeat information in a first primary site disk at the local site. The method also includes sending the first server heartbeat information from the first primary site disk, to a first secondary site disk at a remote site. The method further includes receiving information from a 10 second secondary site disk at the local site, and determining if the information received from the second secondary site disk includes updated heartbeat information. | 03-19-2009 |
20090077233 | Load Control Device and Method Thereof - The number of response-waiting requests which are already sent to a server ( | 03-19-2009 |
20090083411 | SYSTEM AND METHOD FOR REMOTE CONTROL OF MULTIPLE DEVICES - The present invention is a system and method for operating multiple devices using a new remote control method. The following new techniques are illustrated for operating multiple devices using the remote control method of the present invention comprising the steps of operating multiple devices simultaneously; and performing an operation checked on one device on multiple other devices. In addition, the system and method of the present invention has four new concepts ideas for improving operation on multiple devices transmitting to multiple devices simultaneously; detecting differences in the result screens and displaying the differences in a different color; checking on one device on multiple other devices; and automatically detecting unexpected operation results and stopping the operation. | 03-26-2009 |
20090083412 | ILLUSTRATION SUPPORTED P2P MEDIA CONTENT STREAMING - A system and method for Peer-to-Peer (P2P) media content streaming are provided. In one embodiment, prior to streaming desired original media content, a playback agent of a first peer playback device downloads illustration media content, which is a derivate light-weight version of the original media content. The playback agent then initiates streaming of the original media content from one or more other peer playback devices hosting the original media content or a segment thereof. The playback agent monitors a quality of the network connection to the other peer playback devices streaming the original media content to the playback agent. If the quality of the network connection falls below a defined threshold, the playback agent switches playback to the illustration media content. Once the quality of the network connection improves or a new connection is established, the playback agent switches playback back to the streaming original media content. | 03-26-2009 |
20090083413 | Distributed frequency data collection via DNS - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 03-26-2009 |
20090083414 | Method and System for Monitoring and Analyzing Peer-to-Peer Users' Activities over a Data Network - The present invention relates to a method and system for monitoring peer-to-peer traffic over a data network, comprising (a) file identifier unit ( | 03-26-2009 |
20090083415 | UNOBTRUSIVE METHODS AND SYSTEMS FOR COLLECTING INFORMATION TRANSMITTED OVER A NETWORK - The present invention relates generally to unobtrusive methods and systems for collecting information transmitted over a network utilizing a data collection system residing between an originator system and a responding system. In one embodiment the Originator System can be a web browser and the Responding System can be a web server. In another embodiment the Originator System can be a local computer and the Responding System can be another computer on the network. Both these and other configurations are considered to be within the domain of this invention. The Data Collection System acts in a hybrid peer-to-peer/client-server manner in responding to the Originating System as a Responding System while acting as an Originating System to the Responding System. This configuration enables real-time acquisition and storage of network traffic information in a completely unobtrusive manner without requiring any server- or client-side code. | 03-26-2009 |
20090083416 | METHODS TO VERIFY WIRELESS NODE PLACEMENT FOR RELIABLE COMMUNICATION IN WIRELESS SENSOR CONTROL NETWORKS - In one exemplary embodiment, a method of verifying placement of automation components configured for use within a building automation system is disclosed. The method includes determining a wireless communication channel for use within a building automation system, polling a plurality of automation components deployed within the building automation system, wherein each of the plurality of automation components utilizes the wireless communication channel for communication, determining communication parameters associated with each of the plurality of automation components, and adjusting the deployment of at least one of the plurality of automation components in response to the determined communication parameters. | 03-26-2009 |
20090083417 | METHOD AND APPARATUS FOR TRACING USERS OF ONLINE VIDEO WEB SITES - The method and/or apparatus monitors and records the times when a user interacts with a network video player, e.g. a web video player, while watching an online video clip. Specifically, a data collection agent (DCA) is loaded to the player or to a web page that displays the video clip. The DCA collects detailed viewing information and periodically sends this information to a central server. The viewing information is processed by the central server to generate at least one of: a viewership attention span report, a viewership demographics report, and a viewership geographic report. | 03-26-2009 |
20090083418 | METHOD AND APPARATUS FOR PROVIDING REAL FRIENDS COUNT - A method and apparatus for tracking communications in a network are disclosed. For example, the method receives a subscription from a customer for a service to track at least one variable associated with a plurality of communicants of the customer. The method identifies a plurality of members of a social network of the customer, and gathers communication data associated with the plurality of members for tracking the at least one variable. The method then displays at least one result derived from the communication data to the customer. | 03-26-2009 |
20090083419 | SYSTEM, APPARATUS AND METHOD FOR MAINTAINING PRESENCE INFORMATION OF PUBLIC GROUP MEMBERS - A system for maintaining presence information of public group members is provided, which includes a presence server and a group list management server, and further includes a presence group server, connected to the presence server and the group list management server and adapted to obtain information of the public group members from the group list management server according to a received subscription request for the presence information of the public group members, subscribe for the presence information of the public group members from the presence server, and save the presence information of the public group members. A presence group server and a method for maintaining presence information of public group members are also provided, which can reduce the stress on a resource list server and a presence server in terms of performance and resource occupation. | 03-26-2009 |
20090083420 | Method and Apparatus for Automatically Conducting Hardware Inventories of Computers in a Network - A method, apparatus, and computer instructions for conducting an inventory of a data processing system. When a basic input output system (BIOS) is launched during a boot process for the data processing system, the basic input output system creates a hardware report of the data processing system. This report is sent to a remote data processing system on the network. | 03-26-2009 |
20090083421 | Internet Website Traffic Flow Analysis - An Internet-based analysis tool follows, in real-time, the flow of traffic through a website. For every website page requested by a website visitor, the state of the visitor's browser is recorded and data relating to the path visitors take through the website is collected and studied. The state of the visitor's browser path is maintained in a traffic analysis cookie that is passed between a website file server and the visitor browser with every page requested for viewing. The cookie is maintained in a size that can be passed from server to browser and back again without negatively impacting server performance and without negatively impacting browser performance. The data in the cookie can follow the visitor browser through independent file servers, regardless of how the pages of a website might be distributed in storage. | 03-26-2009 |
20090089414 | REPORTING MULTIPLE EVENTS IN A TRAP MESSAGE - A method for reporting events relating to objects of a network element manageable by a network management device, using a network management protocol, and devices, a network, and computer-readable storage medium storing control logic, that operate in accordance with the method. Events for each object are detected, event information is generated for detected events, generated event information for multiple events is packaged into a trap message for each object type, the trap message is communicated from the network element to the network management device, and the event information from the communicated trap message is unpacked at the network management device. In this manner, network congestion and processor overload at the network management device can be reduced. | 04-02-2009 |
20090089415 | SYSTEM AND METHOD FOR KEYBOARD NAVIGATION IN A SEARCH RESULTS PAGE - The present invention is directed towards systems, methods and computer program products for providing keyboard navigation between components within a content item. The method of the present invention comprises receiving the content item from a server and receiving a signal indicating keyboard utilization by the user to determine a specific key that the user presses. A determination is made as to whether the specific key is from a monitored set of keys and if the specific key is from a monitored set of keys, performing an action associated with the specific key. | 04-02-2009 |
20090089416 | SYSTEM AND METHOD FOR NON-LETTER KEY FUNCTIONALITY IN A SEARCH CONTROL - The present invention is directed towards systems, methods and computer program products for providing keyboard navigation within a search box that a search engine presents in a content item. The method of the present invention comprises presenting a search control to a user and determining if the search control receives focus. A signal indicating keyboard utilization by the user to determine a specific key that the user presses may then be received and a determination is made as to whether the specific key is from a monitored set of keys. If the specific key is from a monitored set of keys, an action associated with the specific key is performed. | 04-02-2009 |
20090089417 | DIALOGUE ANALYZER CONFIGURED TO IDENTIFY PREDATORY BEHAVIOR - A dialogue analyzer configured to identify online communications relating to lewd, predatory, hostile, and/or otherwise inappropriate subject matter is disclosed. Identified communications include those occurring via social networks, instant messaging, online chat rooms, computer in-game chat, email and the like. The communications of a monitored computer user are scanned to identify those communications that match predetermined lexical rules. The rules comprise sets of word-concepts that may be associated based on spelling, sound, meaning, appearance or probability of appearance in a text string, etc. Various numbers and configurations of word concepts may be implemented in a rule in order to more accurately scan the online communication data for a potential match. When a match is found, a copy of the communication, along with contextual information, is presented to a parent or guardian user. This information is presented at a central website and via an email notification to the parent or guardian. Various embodiments are described. | 04-02-2009 |
20090089418 | METHOD AND SYSTEM TO DETECT A NETWORK DEFICIENCY - A system to detect a network deficiency, in one example embodiment, comprises a receiving module to receive utilization metrics of at least one network resource, wherein the utilization metrics are collected and made available at a network level, an aggregator to aggregate the utilization metrics of at least one network resource with the utilization metrics of a plurality of the network resources, a processing module to determine a level of aggregated utilization metrics of the network resources, and a detecting module to detect a precursor indicative of a network traffic deterioration based on the level of the aggregated utilization metrics. | 04-02-2009 |
20090089419 | METHOD AND SYSTEM FOR INTELLIGENT REQUEST REFUSAL IN RESPONSE TO A NETWORK DEFICIENCY DETECTION - A system for intelligent request refusal in response to a network deficiency detection, in one example embodiment, comprises an aggregator to aggregate revenue generated by a requesting entity with a revenue generated by requesting entities homogenous to the requesting entity, and a filtering module to filter a response to a service request when an aggregated revenue-to-network-resource-utilization ratio is below a second threshold unless utilization of a plurality of network resources drops below a first threshold. | 04-02-2009 |
20090089420 | Flash tracking system and method - A system, method and computer readable medium configured to track Internet users as they browse web-sites when cookies are disabled or deleted. One aspect of the present invention includes the realization that cookies are not adequate to track Internet web users as cookies are limited and size, and easily deleted by users. A web-site receives a request for content from the computing-device. After obtaining information about the computing-device, the tracking-server assesses the request for content from the computing-device. If the computing-device has an available flash plug-in, the tracking-server transmits a flash applet to the computing-device. The flash applet is configured to: determine whether a unique flash identifier has been assigned to the computing-device, generate the unique flash identifier if no unique flash identifier has already been assigned to the computing-device, transmit the unique flash identifier to a tracking server, and store the unique flash identifier in local flash storage. The process also stores a cookie at the computing-device when no flash plug-in is available. | 04-02-2009 |
20090089421 | Method and System for Visualizing Distributed Systems - Monitoring distributed systems includes receiving availability parameters for distributed systems. A distributed system corresponds to at least one distributed system group. A status of at least one distributed system is determined according to the availability parameters. Grid map image data is generated that is operable to initiate display of a grid map. The grid map includes one or more areas. An area corresponds to a distributed system group. An area includes one or more cells. A cell has a status indicator indicating the status of at least one distributed system. A cell also has a display size indicating a relative importance of at least one distributed system. The grid map image data is transmitted to a client in order to display the grid map. | 04-02-2009 |
20090089422 | Automated Media Delivery System - An automatic graphics delivery system that operates in parallel with an existing Web site infrastructure is provided. The system streamlines the post-production process by automating the production of media through content generation procedures controlled by proprietary tags placed by an author within URLs embedded within Web documents. | 04-02-2009 |
20090089423 | INFORMATION PROCESSING DEVICE, AND METHOD AND COMPUTER READABLE MEDIUM FOR THE SAME - There is provided an information processing device comprising: an image processing unit including at least one of an image reading function and a print function; a historical information acquisition unit to acquire a plurality of pieces of historical information, each of the plurality of pieces of historical information concerning execution of at least one of the image reading and print functions; a historical information transmission unit to transmit the historical information to the client device; a request reception unit to receive from the client device a request for data corresponding to a selected piece of historical information selected from the plurality of pieces of historical information through the client device, the data concerning a job executed by at least one of the image reading function and the print function; and a data obtaining unit configured to obtain the data corresponding to the request received by the request reception unit. | 04-02-2009 |
20090089424 | DYNAMICALLY UPDATING SUBCOMPONENTS IN A TIERED REMOTE MONITORING SYSTEM - Various approaches for updating system monitoring policy parameters. In one approach, updates to the monitoring policy parameters are transmitted to an event server via an event report. The event server transmits the event report to a subcomponent manager executing on the monitored system. The subcomponent manager determines to which of a plurality of monitoring subcomponents the update is to be applied. The subcomponent manager then suspends the execution thread of the monitoring subcomponents, updates monitoring policy parameters of the subcomponent with data from the event report, and thereafter resumes the execution thread of the subcomponents. The subcomponent then operates with the updated monitoring policy parameters. | 04-02-2009 |
20090094357 | ROGUE ROUTER HUNTER - A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing. | 04-09-2009 |
20090094358 | Data Bridge Maintenance Utilizing Data Traffic Log Change - Data traffic, through a data bridge that couples two entities, is monitored and logged in a data traffic log. If the size of the data traffic log does not change within a pre-determined period of time, the data bridge is automatically reset. | 04-09-2009 |
20090094359 | Local Area Network Management - There is provided a method for managing a Local Area Network (LAN) having at least one video server in signal communication with a plurality of clients. In one embodiment of the present invention, the method includes providing a lossless Transmission Control Protocol/Internet Protocol (TCP/IP) Virtual Local Area Network (VLAN) fabric within the LAN. The method further includes providing a shared file system on the at least one video server. Moreover, the method includes deterministically managing isochronous access to the shared file system on the at least one video server by the plurality of clients, over the VLAN fabric, utilizing at least one Internet Small Computer System Interface (ISCSI) block protocol, to provide lossless delivery of video applications from the at least one video server to any of the plurality of clients without invoking TCP error recovery mechanisms. | 04-09-2009 |
20090094360 | Multi-Source Broadcasting in Peer-to-Peer Network - A computer-implemented method for broadcasting over a network using peer-to-peer technology including commencing a broadcast over a peer-to-peer network, wherein a control computer selects at least one of multiple computers in the peer-to-peer network as an originating source of the broadcast; and changing the originating source of the broadcast, during the broadcast and as indicated by the control computer, from the at least one of the multiple computers to at least another of the multiple computers. | 04-09-2009 |
20090094361 | SESSION INITIATION PROTOCOL REGISTRATION WITH PING - Systems and methodologies are described that facilitate improving session initiation protocol based registration of a mobile device and an IP multimedia subsystem in wireless communications. The mobile device discovers one or more SIP servers (e.g., proxy call session control functions) that are available. The mobile device issues a ping message to each discovered server in parallel to determine reachability. Based at least in part on measured round trip times associated with the ping messages, the mobile device initiates registration procedures with at least one server. | 04-09-2009 |
20090094362 | Method and system for managing quality of service in a network - According to embodiments, the present invention comprises a method and system for managing support of quality of service requirements for various clients of a telecommunications network at a server level. Servers assigned to the various clients may include quality of service descriptors that identify relative priorities of the clients. In the event of a failure or reduced performance of a server, for example, an assignment of respective servers to respective clients may be changed based on the relative priorities of the respective clients. | 04-09-2009 |
20090094363 | METHOD, SYSTEM, CLIENT AND SERVER FOR LOCATING OPERATION NODES IN COMMUNICATION SYSTEM - The present disclosure relates to the field of mobile communication technologies, and provides a method for locating operation nodes in a communication system. The method includes using an identifier in the received message to obtain an adjusted path from the root node of the management tree of the client to the standard management object corresponding to the identifier, using the message to obtain a relative path between the target operation node and the root node of the standard management object on the management tree, concatenating the adjusted path with the relative path, and locating the target operation node according to the concatenated path. The present disclosure also provides a system for locating operation nodes, a client for locating operation nodes in a communication system, and a server for performing management operations for clients. | 04-09-2009 |
20090100168 | AUTOMATIC LOCATION DETECTION IN A COMPUTING ENVIRONMENT - Automatic position location detection, such as satellite position information is used along with a computer to enhance an operation over a remote information channel or a network. This may be used over the Internet to enhance an Internet transaction by determining the origin of the transaction and determining if that origin is authorized. It can also be used for determining a person's location and seeing if the person has moved more than a specified amount in the specified time. It can be used for a biometric scan to determine certain characteristics about the person. Another aspect uses automatic position location to detect handwriting. Yet another application is an automatically determining the source of a request for information from a website, and returning information from that website. This system can also be used in chat room environment. | 04-16-2009 |
20090100169 | NETWORK BOOKMARKING BASED ON NETWORK TRAFFIC - A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass through the network element; detecting network resource identifiers within the data packets; forming network resource identifier report messages that carry the network resource identifiers; forwarding the network resource identifier report messages to a bookmark processing server; storing records of each of the network resource identifiers carried therein; storing counters that identify numbers of times that associated network resource identifiers were requested; determining interesting network resource identifiers based on the records and decision steps; generating and providing a report of the interesting network resource identifiers. As one result, interesting network resource identifiers can be automatically found in network traffic and provided to a social bookmarking site. | 04-16-2009 |
20090100170 | APPARATUS, METHOD, COMPUTER PROGRAM PRODUCT AND SYSTEM FOR REQUESTING ACKNOWLEDGMENT OF TRANSMITTED DATA PACKETS - An apparatus, method, computer program product and system are provided for initiating a request for acknowledgment of successfully, or unsuccessfully, transmitted data packets, wherein the request is initiated in response to the detection of a potential overload situation or an upcoming resource limitation. In particular, a transmitter may monitor certain resources associated with the transmitter, such as memory consumption or processing capacity, and automatically request that a receiver transmit an acknowledgement when a potential overload of one or more of the resources is detected. This may occur, for example, when it is determined that memory consumption has exceeded a predefined threshold or that the processing capacity has been substantially exhausted, to name a few. | 04-16-2009 |
20090100171 | PROVIDING A USER OF AN INSTANT MESSAGE CLIENT WITH AN OVER-SHOULDER STATUS - In an instant message (IM) method and system, a user of an IM client is provided with an over-shoulder status indicating the user has a visitor. The method and system further include receiving a preference setting for an over-shoulder status for defining an over-shoulder status toggle input. Mouse and keyboard strokes entered into the IM client by the user are then monitored in real-time. In response to any of the mouse and keyboard strokes matching the toggle input, the over-shoulder status is automatically toggled, whereby the over-shoulder status is updated in a contact list of at least one other IM client, such that activation of the over-shoulder status serves as a warning that the user has a visitor. | 04-16-2009 |
20090100172 | METHOD AND APPARATUS FOR MONITORING WEB SERVICES RESOURCE UTILIZATION - A method for dynamically adjusting resources among a plurality of co-existing applications comprises the steps of: building a relation model between a request number and resource consumption of said plurality of applications; obtaining at multiple sampling moments a request number and resource consumption of each of said plurality of applications; calculating resource consumption ratio of each of said plurality of applications; and analyzing resource consumption of a plurality of currently co-existing applications. | 04-16-2009 |
20090100173 | COMMUNICATION MANAGEMENT SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND COMMUNICATION CONTROL DEVICE - The present invention provides a technique for managing P2P communication appropriately. | 04-16-2009 |
20090100174 | Method and system for automatic polling of multiple device types - A common poller polls multiple network devices of a communication network regardless of device type. A device personality service associates information corresponding to each of the devices with unique identifiers thereof. The common poller provides information resulting from polling the devices to network management systems (“NMS”) that request status and health information thereof. A poller client interface isolates the NMS from a common datastore coupled to the common poller and processes the information between the datastore and the NMS so the datastore is not directly exposed to the NMS. A scheduled poller causes the common poller to poll each network device according to a predetermined schedule. An on-demand poller may poll the devices between scheduled polling events. If a predetermined period as not passed since previous scheduled polling, the poller client interface forwards previously stored information from the common datastore to an NMS requesting status for a given device. | 04-16-2009 |
20090100175 | Location of Unidirectional Handover Relationships - A management system includes a first management device storing information regarding: objects monitored by the first management device, objects monitored by a second management device and relationships between objects monitored by the first management device and objects monitored by the second management device. The first management device requests such information from the second management device. Using the information stored by the first management device and the information requested from the second management device, the first management device ascertains at least one relationship between at least one object monitored by the first management device and at least one object monitored by the second management device and which is stored either just by the first management device or just by the second management device. | 04-16-2009 |
20090100176 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A MULTIMEDIA APPLICATIONS GATEWAY - Methods, systems, and computer program products for providing application services to an end user domain are disclosed. A method includes providing a multimedia applications gateway that is connected to an access gateway for the end user domain of the application services or a multimedia applications gateway that includes an integrated access gateway function. The access gateway is communicatively coupled to end user devices at the end user domain. The method also includes configuring the multimedia applications gateway to convert network communications of a selected application service that is downloaded to the access gateway and transmitted from the access gateway to an end user device into communications having an open standards protocol recognized by each of the end user devices. The method further includes executing the selected application service via a virtual machine operating on an operating system of the multimedia applications gateway, and monitoring activities occurring in response to execution of the selected application service. | 04-16-2009 |
20090100177 | CONDITION DEPENDENT DATA MAINTENANCE SYSTEM FOR A PLURALITY OF FUNCTIONAL ENTITIES - The present invention is directed to a server system for supplying differing amounts of data into a database, wherein the system comprises the database and a data tracker device, wherein the data tracker receives data sent by a plurality of functional entities, preferably office machines and in particular devices with a printer, wherein the data tracker device is prepared to transmit data asynchronously to an intermediate buffer storage device with a queue structure, the intermediate buffer storage device storing the data sequentially and transmitting the data sequentially to the database to be stored. | 04-16-2009 |
20090106413 | Method and apparatus for detecting click fraud - Detecting click fraud at a user device involves detecting a event targeted to a network service that is rated based on the number of individuals who access the network service. The event is of a type associated with user interface selections. It is determined whether the user device is in a low-power state contemporaneously with the detection of the event. The event is caused to be disregarded for the purposes of rating the network service based on a determination that the user device was in the low power state contemporaneously with the detection of the event. | 04-23-2009 |
20090106414 | Digital Living Network Alliance (DLNA) Enabled Portable Electronic Devices, DLNA Management Consoles and Related Methods of Operating DLNA Enabled Portable Electronic Devices - Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided. | 04-23-2009 |
20090106415 | Display of Person Based Information Including Person Notes - Among other disclosures, a method may include collecting historical communication data and personal data relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include generating a profile based on the collected historical communication data and personal data. The method may include receiving user input and incorporating the user input into the profile. The method may include presenting the profile including the user input in response to user behavior. | 04-23-2009 |
20090106416 | Shared Groups Rostering System - Information about all current members of a group is stored. Instructions are received from at least one current member to invite at least one prospective member to join the group and the invitation to join the group is sent to the prospective member. In the event that an affirmative response is received, the prospective member is added to the current members of the group and automatically updated services are provided to current members of the group. | 04-23-2009 |
20090106417 | Method and apparatus for packet analysis in a network - A method and system for monitoring traffic in a data communication network and for extracting useful statistics and information is disclosed. | 04-23-2009 |
20090106418 | AGENT DEVICE, IMAGE-FORMING-DEVICE MANAGEMENT SYSTEM, IMAGE-FORMING-DEVICE MANAGEMENT METHOD, IMAGE-FORMING-DEVICE MANAGEMENT PROGRAM AND STORAGE MEDIUM - An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming devices in the local network through the Internet. The agent device includes a command receiving unit which starts connection with the management device and receives a management command from the management device via the firewall, the command being sent by the management device in response to the connection. An image-forming-device communication unit receives device-state information of a corresponding one of the image-forming devices according to the management command. A command response transmitting unit transmits the device-state information to the management device through the Internet. | 04-23-2009 |
20090106419 | Methods to Test Multimedia Devices on Computer Systems - The described embodiments relate to testing streaming media capture devices and/or computer systems. One exemplary method enumerates and tests multiple streaming media capture device which are operably associated with a computer. The method simultaneously exercises said computer's display and power states. | 04-23-2009 |
20090106420 | GHOST AGENTS FOR APPLICATION DOMAINS WITHIN A GRID ENVIRONMENT - A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object. | 04-23-2009 |
20090106421 | Network Monitoring System - Methods and systems consistent with the present invention solve the limitations of current monitoring systems by automatically and completely monitoring various networks devices and services. Specifically, a network monitoring system monitors all services and conditions on various networks. Moreover, the network monitoring system may provide an advance warning of potential failures and may diagnose an problems that may surface. | 04-23-2009 |
20090113036 | System and Method for Logging Communications - A method for logging communication includes determining when a target user is active and identifying an access device and private Internet Protocol (IP) address associated with the target user when the target user is active. The method further includes causing the access device to provide traffic information associated with the target user to a logging device. | 04-30-2009 |
20090113037 | INTEROPERABLE NETWORK PROGRAMMABLE CONTROLLER GENERATION SYSTEM - An interoperable controller operation system having a command module or processor, and input and output interfaces. The command module may have an application that is fixed, configurable or programmable. The module may be changeable on the fly. The input and/or output interfaces may be changeable on the fly. The module or processor may have a memory or be connected to one. The processor and/or memory may contain a function block engine. | 04-30-2009 |
20090113038 | Systems and Methods for Monitoring Performance of Field Assets - A system and method for monitoring performance of field assets are disclosed. A method may include transmitting packets on a shared bus located in a field asset may be captured. The captured packets may be analyzed to determine one or more operational parameters associated with one or more peripheral devices coupled to the shared bus. The one or more operational parameters may be analyzed to determine an operational efficiency of the field asset. | 04-30-2009 |
20090113039 | METHOD AND SYSTEM FOR CONTENT HANDLING - Methods and systems for content handling mapping are described. A client profile may be accessed. The client profile may include a general usage pattern of an access device. A current usage pattern of the access device may be accessed. The current usage pattern may be based on a plurality of interactions between the access device and a network server during a current time period. A determination may be made of whether the current usage pattern is in accordance with the client profile. A throttle instruction may be provided to a networked device to throttle at least one additional interaction of a plurality of additional interactions between the access device and the network server based on the determining. The networked device may be on an access network with the access device and the network server. | 04-30-2009 |
20090113040 | COMMUNITY BASED MODERATION IN ON-LINE SESSIONS - Methods, apparatuses, and techniques for moderating activity in an online community are described. Aspects include a triggering mechanism being activated by a community member in response to inappropriate activity by another community member. Receiving a time based history of community members activity around a time of the triggering mechanism being activated. Recreating the community activity from the time based history. Evaluating activities of the community members to determine if there was inappropriate activity and if there is inappropriate activity by an offending community member taking appropriate action against the offending community member. | 04-30-2009 |
20090113041 | SYSTEM AND METHOD FOR PROVIDING AN INTELLIGENT WIRELESS NETWORK - A system and method is for identifying where an employee is located and which network services node, such as a printer, is near him/her through a access point. The system uses the connection between the access point to identify the location of the user and which printer he/she can use. The main network server transmits the information to the wireless router providing the network access to the user and updates the database with the user and localization. | 04-30-2009 |
20090113042 | METHOD FOR CORRELATING PERIODICALLY AGGREGATED DATA IN DISTRIBUTED SYSTEMS - A computer-implemented method for computing distributed component lag times includes: determining a transaction path for groups of transactions in a plurality of transactions to be processed; determining a distribution of elapsed times from a start of work at each component to an end of work at each component for the plurality of work processing components in the transaction path; determining a distribution of the offsets between the completion of work at the last component of the transaction path and the time of reporting the work at the last component of the transaction path; and combining the distributions of component elapsed times and the distribution of component offsets to calculate the transaction lag for each component in the transaction path. | 04-30-2009 |
20090113043 | NETWORK LOCATION SERVICE - A method is provided for a network location service in which one or more packet forwarding devices in the network collect and maintain location data for the devices/users currently connected to a network. The data is maintained locally in each packet forwarding device and may be provided on demand to a network/business application, such as emergency 911 services or a location-based security or personalization system. The location data is provided in real-time or near real-time using an in-band channel communication and/or over the Internet using a standard transport protocol, such as HTTP/S and SOAP web services. | 04-30-2009 |
20090113044 | SYSTEM AND METHOD OF CONFIGURING A NETWORK - Methods and systems for configuring a network are provided. A method may include monitoring properties of a connection between a computing device and a network. The method may also include detecting a change in the properties of the connection. The may also include verifying the connection to the network is provided by a service provider when the change in the properties is detected and providing network configuration options based on the change. | 04-30-2009 |
20090113045 | System and method for an integrated DSL/cable modem performance test - A modem, method, and system is presented for performing a data communications speed test or line speed test between a network node and a customer premises. The modem may be configured to perform calculations for determining the data communications speed without interference of network elements or overhead modules that cause data communications to be inaccurate or otherwise affected. | 04-30-2009 |
20090113046 | INFORMATION PROCESSING APPARATUS FOR UPDATING ENVIRONMENT INFORMATION - According to an aspect of an embodiment, a server apparatus connected to a plurality of client apparatuses capable of sending out a message containing environment information to the server apparatus, the server apparatus has a storage for storing environment information in association with each of the client apparatuses and a processor for receiving a message including updated environment information indicative of addition of an interface device connected to the client apparatus from the client apparatus and for updating the environment information in the storage with the updated environment information. | 04-30-2009 |
20090113047 | METHOD AND APPARATUS FOR LAST MESSAGE NOTIFICATION - An agent for generating a last message notification in an asynchronous message delivery environment, wherein messages received by a messaging server are routable to a messaging client through an API binding protocol, the agent comprising: a monitoring component for monitoring a message store to determine if there is a message stored for delivery to a message listener; and a message notification component for generating a message indicating that there are no further messages in the message store for routing to the messaging listener, in response to a negative determination by the monitoring component. | 04-30-2009 |
20090113048 | METHOD AND PROGRAM FOR MANAGING THE QUANTITY OF DATA TRANSMITTED BY A TRANSMISSION DEVICE OVER A TELECOMMUNICATION NETWORK - The invention relates to a method of managing the quantity of data transmitted by a transmission device over a telecommunication network, characterized in that the method comprises the steps, carried out by the transmission device, of:
| 04-30-2009 |
20090113049 | SYSTEMS AND METHODS FOR REAL-TIME FORECASTING AND PREDICTING OF ELECTRICAL PEAKS AND MANAGING THE ENERGY, HEALTH, RELIABILITY, AND PERFORMANCE OF ELECTRICAL POWER SYSTEMS BASED ON AN ARTIFICIAL ADAPTIVE NEURAL NETWORK - A system for utilizing a neural network to make real-time predictions about the health, reliability, and performance of a monitored system are disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a virtual system modeling engine, an analytics engine, an adaptive prediction engine. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The adaptive prediction engine can be configured to forecast an aspect of the monitored system using a neural network algorithm. The adaptive prediction engine is further configured to process the real-time data output and automatically optimize the neural network algorithm by minimizing a measure of error between the real-time data output and an estimated data output predicted by the neural network algorithm. | 04-30-2009 |
20090113050 | METHOD AND SYSTEM FOR AUTOMATED SESSION RESOURCE CLEAN-UP IN A DISTRIBUTED CLIENT-SERVER ENVIRONMENT - A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. A session may terminate naturally because a program which is using the resource (such as a database) has completed its operation and ended normally. A session may also terminate unnaturally, e.g., because the connection between the client and the server has been broken for some reason or because a program has aborted or become hung in an inoperative state. Because such unnatural terminations do not normally provide a farewell message from the client to the server—only silence, from the lack of further processing messages—there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client. | 04-30-2009 |
20090119399 | Intelligent graph walking - An apparatus, and corresponding method, for performing a search for a match of at least one expression in an input stream is presented. A graph including a number of interconnected nodes is generated. A compiler may assign at least one starting node and at least one ending node. The starting node includes a location table with node position information of an ending node and a sub-string value associated with the ending node. Using the node position information and a string comparison function, intermediate nodes located between the starting and ending nodes may be bypassed. The node bypassing may reduce the number of memory accesses required to read the graph. | 05-07-2009 |
20090119400 | Presence Management System - According to one embodiment a presence management system including: a first presence server that controls a first network; a plurality of presentities that belong to the first network; a second presence server that controls a second network, the second network connected to the first network via a communication channel; and a plurality of watchers belonging to the second network; wherein the first presence server includes: a first watcher list that registers a given presentity under the first network associated with one of the watchers that requests presence information of the given presentity; and an external notification section that sends the presence information of the given presentity to the second presence server, and wherein the second presence server includes: a second watcher list that registers the one of watchers associated with the given presentity; and an internal notification section that sends the presence information to the one of watchers registered correspondingly to the given presentity. | 05-07-2009 |
20090119401 | CONTENT PROVIDING SYSTEM, MONITORING SERVER, AND SIP PROXY SERVER - A content providing system that provides content to a user terminal via a network includes a content providing server that is connected to the network and provides content, an SIP proxy server that is connected to the network and relays transmission and reception between the user terminal and the content providing server, and a monitoring server that is connected to the network and stores monitoring information regarding transmission and reception between the user terminal and the content providing server, the monitoring information being transmitted from the SIP proxy server. | 05-07-2009 |
20090119402 | DOMAIN NAME OWNERSHIP VALIDATION - Embodiments of the invention provide systems and methods for validating ownership of a domain name. According to one embodiment, a validating ownership of a domain name can comprise retrieving one or more domain name ownership records. For example, the one or more domain name ownership records comprise Who Is records. Validity of the one or more domain name records can be confirmed with a designated domain manager. According to one embodiment, confirming validity of the one or more domain name records with the designated domain manager can comprise authenticating the designated domain manager based on a certificate provided by the designated domain manager. | 05-07-2009 |
20090119403 | Composite Resource Models - A mechanism and model are provided for representing and managing composite resource models. When a resource monitor is deployed for a resource, the resource monitor scans for information that indicates that the resource under monitoring is part of a cluster, grid, or other composite configuration. The resource monitor then determines whether monitoring information for the resource should be reported differently because of the composite configuration. If monitoring information for the resource is to be reported differently, the resource monitor alters the reporting format to reflect the composite resource model. The resource manager may then receive the monitoring information and apply this information to individual resources and aggregates the monitoring information for composite resources. | 05-07-2009 |
20090125622 | SYSTEM AND METHOD FOR PROVIDING SERVER STATUS AWARENESS - A method including analyzing one or more network interactions of a user. One or more servers associated with the one or more network interaction may be identified. A listing of at least a portion of the one or more servers may be rendered. | 05-14-2009 |
20090125623 | DATA VALIDATION USING SIGNATURES AND SAMPLING - Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process. | 05-14-2009 |
20090132694 | BANDWIDTH CONSTRAINT CONSTRUCTION FOR OVERLAPPED LOGICAL CHANNELS - In one embodiment, a technique determines whether configured logical bandwidth allotments for logical channels are supported by maximum available physical bandwidths of physical channels assigned to those logical channels. The technique establishes a bandwidth-constraint directed acyclic graph (DAG) or “BCD” based on novel relationship rules between vertexes of the BCD that represent logical channels or unions of logical channels as well as the underlying physical channels and their maximum available bandwidth constraints. Once the BCD is established, the vertexes of the BCD may be traversed (e.g., from in-neighbor vertexes to out-neighbor vertexes) to determine whether their constraints are met. | 05-21-2009 |
20090132695 | Calculation of the degree of participation of a server in a cluster using half-life decay - A method and apparatus for calculating a degree of participation of a server in a group of servers is disclosed. In one embodiment, a memory stores timestamps for each access to the server. A processor weights the timestamps to treat more recent accesses as more important than older accesses, wherein older accesses decay in importance exponentially using a half-life constant. | 05-21-2009 |
20090132696 | Facilitating DHCP diagnostics in telecommunication networks - A computer-implemented method for facilitating DHCP diagnostic functionality comprises a plurality of operation. An operation is performed for identifying misconfigurations to a DHCP option configuration of a DHCP agent between a DHCP server and a client of the DHCP server. An operation is performed for confirming proper address concentration configuration with respect to the DHCP agent. An operation is performed for snooping on address assignments from the DHCP server to the client of the DHCP server to determine unauthorized ones of the address assignments. | 05-21-2009 |
20090132697 | INTEGRATION OF PASSENGER AND FLIGHT OPERATION COMMUNICATIONS - A communications device is provided for permitting internet access on an aircraft. A first computer on the aircraft is in communication with the communications device. A second computer on the aircraft is also in communication with the same communications device. Access to the first computer is provided to a passenger. Access to the second computer is provided to a second person. The passenger is prevented from obtaining access to the second computer. | 05-21-2009 |
20090132698 | System and Method for Automatic Configuration and Management of Home Network Devices - Embodiments of a method and system for automatically installing and managing consumer devices in a home network environment are described. A system implements automated configuration and maintenance of devices and their peripherals that connect to the home network, in particular the establishment of a distributed system that serves as a service platform which facilitates automated discovery and initial and ongoing deployment of a home networks and the devices that may interact with or connect to their network automatically or through manual means. An embodiment is directed to a distributed system and method for facilitated automatic configuration, maintenance, and diagnostics of a local area network that in parallel provides for the interoperability of connected intelligent independent computing devices using physical layer, network layer and application layer programmatic interfaces. This distributed system provides a generalized aggregated interface that is a programmatic resource for representing a continuous and historic reference of a local network and connected devices. | 05-21-2009 |
20090132699 | Data Center Synthesis - A data center is designed by determining a compute description that describes computer resources to be used in the system from design requirements and models of the computer resources. A facility description that describes facilities to be used in the data center is determined from the compute description and models of the facilities. An integrated system describing the design of the data center is determined from the facility and compute descriptions. | 05-21-2009 |
20090132700 | NETWORK-CONNECTABLE DEVICE AND METHOD FOR MANAGING POWER THEREOF - A network-connectable device is configured to communicate with one or more computer-related devices via a network. The network-connectable device includes a list management unit and a shutdown unit. When the list management unit receives a start command signal instructing an activation of the network-connectable device which is transmitted from a computer-related device, the list management unit registers the computer-related device on a list. When the computer-related device registered on the list is switched to or is to be switched to a disconnected state disconnected from the network-connectable device, the list management unit deletes the computer-related device from the list. The shutdown unit shuts down power to a part of the network-connectable device when none of the computer-related devices is registered on the list. | 05-21-2009 |
20090132701 | DUPLICATE ADDRESS DISCOVERY AND ACTION - A duplicate address discovery process detects duplicate MAC addresses or duplicate unique port identifiers within the network, alerts attached devices of the duplicates, and takes action to avoid data corruption that might be caused by such duplicate addresses. | 05-21-2009 |
20090132702 | Generic Method for Resource Monitoring Configuration in Provisioning Systems - A generic mechanism and model are provided to capture and store configuration profiles for resource monitors such that monitors can be flexibly deployed, configured, modified, and removed using appropriate sets of parameters and values. As an integral part of resource provisioning, this generic mechanism will require only a generic set of workflows and a generic data model to provision monitors. The provisioning system of the present invention captures and stores response parameters and values from monitors created during initial deployment such that these parameters can be used for later modification and removal of these monitors. | 05-21-2009 |
20090132703 | VERIFYING RESOURCE FUNCTIONALITY BEFORE USE BY A GRID JOB SUBMITTED TO A GRID ENVIRONMENT - A method, system, and program for verifying resource functionality before use by a grid job submitted to a grid environment are provided. When a new resource is allocated to a particular execution environment within a grid environment managed by a grid management system, then a grid verification service automatically selects and runs at least one functionality test on the new resource as controlled by the grid management system. Responsive to a result of the functionality test, the grid verification system verifies whether the result meets an expected result before enabling routing of the grid job to the new resource, such that the functionality of the new resource is automatically verified before access to the new resource is allowed to maintain quality of service in processing grid jobs. | 05-21-2009 |
20090132704 | Federated Transaction Path and Service Level Agreement Monitoring Across Service Oriented Application Partner Domains - Computer implemented method, system and computer usable program code for monitoring a transaction that crosses an enterprise boundary in a composite application. A computer implemented method for monitoring a transaction that crosses an enterprise boundary in a composite application includes a provider enterprise of the transaction receiving a request to provide monitoring data regarding the transaction to a requester enterprise of the transaction. The received request includes a correlation token identifying the monitoring data to be provided and the requester enterprise as being authorized to receive the monitoring data. The transaction monitoring data is then provided to the requester enterprise. The provided transaction monitoring data may be analyzed by the requester enterprise to provide analysis results regarding transaction delivery performance. | 05-21-2009 |
20090138588 | METHOD OF PERFORMING ETHERNET GATEWAY SWITCH TROUBLE DIAGNOSTICS - A service provider unit automatically diagnoses problems in an Ethernet network that are associated with layers 1, 2, and/or 3 and determines whether there is a problem associated with an Ethernet gateway switch EGS. Further diagnostics can be performed to determine the layer, type, and/or location of the problem(s) based on whether there is a problem with the EGS. The diagnostic process followed depends on the types of problem(s) in the network. Once the problems have been diagnosed, an operator can be notified of the location and/or type of problem. | 05-28-2009 |
20090138589 | SYSTEM AND METHOD FOR ACTIVE BUSINESS CONFIGURED WEBSITE MONITORING - The website performance monitoring systems and methods of the present invention are implemented via a website monitoring tool that includes a website canvas and a plurality of web page objects configured to be dragged and dropped onto the generic website canvas to facilitate creation of a website model. The monitoring tool also includes a graphic interface which may be utilized to define and associate performance operational rules of a website being modified or created. The performance operational rules include website performance thresholds and rules associated with alerts which may be delivered in response to a website achieving or falling below defined performance alert levels. The monitoring tool also includes a pixel module which may be engaged to assign a plurality of attributes to a pixel associated with a page within the website model. The graphic interface of the monitoring tool also includes a plurality of web page objects that are configured to be selected, dragged and dropped onto the generic website canvas to facilitate creation of a website model that illustrates the process flow of pages within the website model. | 05-28-2009 |
20090138590 | APPARATUS AND METHOD FOR DETECTING ANOMALOUS TRAFFIC - An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced. | 05-28-2009 |
20090138591 | Method for the display of visual sequencing of message communications between application portlets and task page relationship information in a web-base environment - A display portlet is incorporated into a portal page in a web-based environment. This display portlet presents the message communication information between the portlets that are currently running on that portal page. The displayed message communication information indicates the portlet that is the source of a transmitted message and displays one or more portlets that receive the message. The visual representations can be of various formats such as a spacial display or a tree representation. Each communicated message has a stored record identifying the transmitting portlet and any portlet that receives the message. | 05-28-2009 |
20090138592 | METHOD AND APPARATUS FOR DETECTION OF INFORMATION TRANSMISSION ABNORMALITIES - In one embodiment, a method for securing a network application is described. The method for securing a network application includes receiving network information within a network application and assigning a probability value to an independent aspect of the network information. The probability value is based on a verification of the independent aspect of the information against a profile of acceptable behavior. The method for securing a network application also includes aggregating the probability values of the independent aspects of the network information to determine the probability of the entire network traffic. In addition, the method for securing a network application includes determining whether the probability value of the entire network information is above or below a threshold probability value. The entire network information is screened out based on the probability value of the entire message with respect to the threshold probability value. | 05-28-2009 |
20090138593 | SYSTEM AND METHOD FOR COLLECTING, REPORTING AND ANALYZING DATA ON APPLICATION-LEVEL ACTIVITY AND OTHER USER INFORMATION ON A MOBILE DATA NETWORK - System and method for collecting and analyzing information on application-level activity and other user information on a mobile data network. A platform non-intrusively and transparently monitors data activity on a mobile data network in real-time so that user-level information can be reported to an operator. The platform comprises a plurality of collectors, a data manager, and a report manager. The collectors communicate with network routers to almost all network data. The collectors inspect the data for IP addresses and correlate them to user mobile phone numbers. The data manager receives the data and augments it with information obtained by querying carrier information. The data manager stores the data and monitors it to see if it satisfies a set of defined real-time reports. The report manager then works with the data manager to develop and test new reports based on operator instructions for a specific report. | 05-28-2009 |
20090138594 | COORDINATING THE MONITORING, MANAGEMENT, AND PREDICTION OF UNINTENDED CHANGES WITHIN A GRID ENVIRONMENT - A method, system, and program for coordinating the monitoring, management, and prediction of unintended changes within a grid environment are provided. A grid change controller within a particular grid environment detects an unintended change within that grid environment. In particular, grid change controller monitors potential change indicators received from multiple disparate resource managers across the grid environment, where each resource manage manages a selection of resources within the grid environment. The grid change controller then determines a necessary response to the unintended change within the grid environment and communicates with at least one independent manager within the grid environment to resolve the unintended change, such that the grid change controller facilitates recovery from the unintended change within the grid environment to maintain performance requirements within the grid environment. | 05-28-2009 |
20090138595 | TECHNIQUE TO GENERICALLY MANAGE EXTENSIBLE CORRELATION DATA - A technique to generically manage extensible correlation data is provided for correlating a series of events. The technique employs a global unique identifier (GUID) for identifying an event and uses the GUID as a key to associate one or more extensible correlators of correlation data. A transport correlator may be configured to transport the GUID for associating with a GUID of a second event such that a small and fixed amount of data is passed by the communications layer providing the transport, minimally impacting communications. An arbitrary amount of data may be logged and keyed with the GUID, providing optimization and flexibility. | 05-28-2009 |
20090144408 | Detecting relayed communications - Methods, apparatus and computer readable code for determining whether a potential relay device is a relay device are provided herein. In some embodiments, first and second information elements are received from a potential relay device, which is an original source of the second information element. In order to determine whether the potential relay device is a relay device, it is determined whether a feature of an original source of the first information element and a feature of the potential relay device are features unlikely to relate to a single device, wherein a positive result of the determining is indicative that the potential relay device is a relay device. In an exemplary embodiment, a disclosed system includes an information element receiver and a feature incompatibility analyzer. Optionally, the disclosed system includes a feature discovery module, a parameter obtainer and a feature database. | 06-04-2009 |
20090144409 | METHOD FOR USING DYNAMICALLY SCHEDULED SYNTHETIC TRANSACTIONS TO MONITOR PERFORMANCE AND AVAILABILITY OF E-BUSINESS SYSTEMS - A method and apparatus is provided for monitoring operations of a specified transaction server that has an associated network topology. One embodiment comprises the steps of defining a plurality of zones within the network topology, and assigning one or more monitoring agents to each of the zones, wherein each agent is adapted to selectively run synthetic transactions with the specified server. The method further comprises monitoring results of successive synthetic transactions carried out by the agents, in order to detect any errors associated with the successive transactions. In response to detecting a performance or an availability problem, selectively, that is associated with a particular synthetic transaction run by a particular one of the agents, one or more agents is dynamically scheduled to run synthetic transactions, wherein each scheduled transaction has a specified relationship with the particular transaction. | 06-04-2009 |
20090144410 | MONITORING NETWORK TRAFFIC BY TRACKING DATA PACKETS ON A PER PROCESS BASIS - Methods, apparatus, systems, and articles of manufacture directed to the monitoring and visualizing of network traffic are disclosed. The network monitoring can include tracking data packets on a per process basis. As a data packet traverses a communications interface, it can be correlated with the process responsible for that data packet and a local process address can be logged providing a record of the packet and an associated source, destination, and process identifier. The visualizing can include generating a visual representation of network traffic and packet-process correlations. | 06-04-2009 |
20090144411 | METHOD AND SYSTEM FOR EVALUATING AND SELECTING TRACEROUTES TO BE USED IN DETERMINING THE GEOGRAPHIC LOCATION OF A NETWORK BLOCK - Described herein are a method and system for evaluating and selecting traceroutes to be used in determining the geographic location of a network block. A particular embodiment of the system includes a set of traceroute feature vector extractors, each traceroute feature vector extractor being associated with at least one of a plurality of traceroutes, each traceroute feature vector extractor being configured to generate a traceroute feature vector for at least one of the plurality of traceroutes; a set of traceroute classifiers each coupled to at least one of the traceroute feature vector extractors, each traceroute classifier being associated with at least one of the plurality of traceroutes, each traceroute classifier being configured to generate at least one traceroute classification and/or regression based on at least one of the traceroute feature vectors; and a traceroute geolocation determining engine to determine a geographic location of a network block based on the at least one traceroute classification and/or regression generated by the set of traceroute classifiers. | 06-04-2009 |
20090144412 | METHOD AND APPARATUS FOR THE DELIVERY OF DIGITAL DATA - A method and apparatus for the delivery of digital data to an end user ( | 06-04-2009 |
20090144413 | Communications enterprise server monitor - A system includes one or more wireless handheld devices, one or more enterprise servers in communication with the one or more wireless handheld devices, and an enterprise server monitor in communication with the one or more enterprise servers to collect communications performance data from one or more of the one or more enterprise servers in communication with one or more of the one or more wireless handheld devices associated with a select group of users, and to generate one or more alerts if the collected communications performance data match one or more alert conditions, the one or more alert conditions being indicative of one or more levels of potential communication failures. | 06-04-2009 |
20090144414 | Method for summarizing flow information from network devices - A method for aggregating network flow information within a relational database relates to by maximizing concurrency between insertion and analysis of database records. In particular, data is generally stored according to the network devices associated with the flow records. Then, the flow records for the separate devices may be aggregated at certain time intervals and separately organized. In this way, contention is decreased as analysis can occur on the aggregated flow records, while new flow records are stored. In another embodiment, the aggregated data can be reaggregated again at a second, larger time interval. | 06-04-2009 |
20090144415 | Detecting automation cheating in online applications - In general, in one aspect, a method is described that includes monitoring data received from input devices. The received data from the input devices associated with an application is copied when the application is active. The data is converted to user commands. Commands used to update the application are received from the application. The converted user commands are compared to the commands from the application. Mismatching commands are reported to a remote server. | 06-04-2009 |
20090144416 | METHOD AND SYSTEM FOR DETERMINING AN OPTIMALLY LOCATED STORAGE NODE IN A COMMUNICATIONS NETWORK - A method for locating an optimum storage node for serving a data file request received via a communications network, includes: receiving a file request from a user device coupled to the communications network; determining a geocode value based on a communications network address associated with the user device, wherein the geocode value is indicative of a geographic location of the user device; selecting a storage node from a plurality of storage nodes coupled to the communications network to serve the file request, wherein the storage node is selected based at least in part on the geocode value; and redirecting the file request to the selected storage node for handling. | 06-04-2009 |
20090144417 | RESILIENT SERVICE QUALITY IN A MANAGED MULTIMEDIA DELIVERY NETWORK - A managed multimedia delivery network ( | 06-04-2009 |
20090144418 | METHODS AND SYSTEMS FOR ENABLING ANALYSIS OF COMMUNICATION CONTENT WHILE PRESERVING CONFIDENTIALITY - Disclosed are methods and systems for enabling analysis of communication content while preserving confidentiality. In one embodiment, communication content is processed to increase the similarity of superficially dissimilar instances of communication content and/or to increase the distinctiveness of superficially similar instances of communications content. In this embodiment at least part of the processed communication content is hashed to obscure the actual communication content. In one embodiment, social network analysis is performed on the communication content after hashing, and visualization of the social network analysis includes thread graphs and/or circular graphs. | 06-04-2009 |
20090144419 | IP NETWORK MANAGEMENT - Methods and apparatus are provided for managing an IP network interconnecting a plurality of network hosts ( | 06-04-2009 |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20090144421 | System and Method for User Behavioral Management in a Computing Environment - A system and method for user behavioral management in a computing environment are disclosed. In one embodiment, the system includes a computer having computing resources including, for example, a plurality of applications installed thereon. A monitoring module is associated with the computer in order to monitor a plurality of utilization parametrics to determine the utilization of the computing resources by a user and provide to the user a substantially realtime, visible indication of the utilization of the computing resources. The data captured relative to the utilization parametrics enables, at the management level, enterprise-wide administration of the computing resources and, at the user level, self-directed behavioral modification with respect to computing resource management. | 06-04-2009 |
20090150536 | Application layer congestion control - A method of managing congestion within a request-response system is disclosed. The method includes determining a response time that is directly or indirectly indicative of how long it takes a back end system to process a request received from a front end system and return a corresponding response. The response time is compared to a threshold criterion. A determination is made, based at least in part on the comparison, that the back end system is becoming congested with requests from the front end system. The front end system is adjusted so as to at least temporarily reduce the number of requests provided to the back end system by the front end system. | 06-11-2009 |
20090150537 | Data communication method for a set of hard-real time applications within a network - A data communication method for a set of hard real-time applications with an associated set of predefined network requirements (PNR) is provided. The method comprises configuring the physical layer of the network with a set of static modulation parameters (SMPs) to guarantee the PNRs are met at worst-case operating conditions for the network. The method further comprises measuring the current network performance within the network based on a given network performance monitoring schedule and, whenever the current network performance exceeds the PNRs by predefined amounts, adjusting the physical layer of the network by selecting a set of dynamic modulation parameters (DMP's) to increase the bandwidth availability within the network. Advantageously, the invention further allows for the allocation of the excess bandwidth to a set of non-hard real-time applications, whenever the current network performance exceeds the PNR. | 06-11-2009 |
20090150538 | Method and system for monitoring virtual wires - In general, the invention relates to a method for monitoring virtual wires. The method includes selecting a first virtual wire to monitor, wherein the first virtual wire connects a first virtual network interface card (VNIC) located on a first computer to a second VNIC located on a second computer, where the first computer and the second computer are connected to a chassis, and where the first virtual wire is implemented by the chassis. The method further includes collecting usage statistics associated with the first virtual wire, and performing a first action using the collected usage statistics associated with the first virtual wire. | 06-11-2009 |
20090150539 | Webpage domain monitoring - Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified and a counter is incremented, respectively, for each identified domain. When the counter for a respective said domain exceeds a threshold, a notification is output by the client that indicates that the respective said domain has a likelihood of tracking the client. | 06-11-2009 |
20090150540 | Method for identifying components in a network - A method of identifying components in a network path by defining a role for a component from a rule governing another component or the network path, and identifying an instance of such first component from a data base listing instances of the component and associations of such component with other components in the path. | 06-11-2009 |
20090150541 | System and method for dynamically generating user interfaces for network client devices - A system and method for dynamically generating user interfaces for client devices in an electronic network includes a network server and a network of client devices. Each of the client devices monitors and compiles client statistics regarding usage characteristics for various elements of corresponding user interfaces. A recommendation engine of the network server accesses and analyzes the client statistics to thereby generate individual user interface recommendations for the various client devices. The client devices may then dynamically update their respective user interfaces in accordance with respective individual user interface recommendations. | 06-11-2009 |
20090150542 | MANAGEMENT COMPUTER, COMPUTER SYSTEM AND METHOD FOR MONITORING PERFORMANCE OF A STORAGE SYSTEM - To solve a problem in that reliable detection of a performance problem caused by a configuration change needs detailed performance information, which is costly to keep and analyze, a management computer which manages a computer system having a host computer and a storage system is provided. The management computer is configured to: store performance information obtained from resources that belong to paths at first time intervals until a predetermined length of time elapses since the detection of an addition or removal of the resources to the paths; store performance information obtained from the resources that belong to the paths at second time intervals, which are longer than the first time intervals, without storing performance information obtained from the resources that belong to the paths at the first time intervals after the predetermined length of time elapses since the detection of the addition or removal of the resources to the paths. | 06-11-2009 |
20090150543 | Communication System and Communication Device - A communication system includes a communication device and a communication network configured to communicate with the communication device. The communication network includes a storage unit configured to store first communication information related to a communication to the communication device that is generated when communications with the communication device are unattainable; and a notifying unit configured to send the first communication information stored in the storage unit to the communication device when communications with the communication device become attainable. The communication device is configured to receive the first communication information sent from the notifying unit, and includes a restraining unit configured to restrain function of a local device based on the first communication information. | 06-11-2009 |
20090150544 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - An information processing device and an information processing method are provided which can provide services to all clients (users) at a certain service level while preventing a server from being overloaded by reducing concentration of access from some clients without requiring special processing on the client side. The server monitors requests sent from clients and does not execute business logic as an error when receiving intervals of requests do not exceed a threshold. Also, timing of a request being resent from a client next time is controlled by controlling return timing when an error response is returned to the client. | 06-11-2009 |
20090150545 | AUTOMATIC COLLECTION AND UPDATING OF APPLICATION USAGE - A method and system providing automatic collection and updating of application usage on a large number of electronic devices without user intervention. The electronic devices may be a palm-sized computer systems, personal digital assistants (PDAs), or wireless telephones. On an electronic device, application usage statistics, for example, the number of times a user uses an application, are gathered and stored. Once gathered and stored, the usage statistics are transferred to a host computer, and subsequently to a server (alternatively, the electronic device can send the gathered statistics directly to a server). The server tabulates usage statistics gathered from a plurality of electronic devices and publishes the results. The users of the electronic devices that gather usage statistics can be compensated in a variety of ways (e.g., monetary, chances in a raffle, discounts on purchases etc.). | 06-11-2009 |
20090150546 | Protecting Encrypted Files Transmitted over a Network - An improved system and approaches for protecting secured files when being used by an application (e.g., network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e.g., the Internet) to unauthorized destinations. In one embodiment, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner. | 06-11-2009 |
20090157864 | GRID COMPUTING CONTROL METHOD FOR TESTING APPLICATION PROGRAM CAPACITY OF SERVER AND SERVICE METHOD THEREOF - Disclosed is a grid computing control method for testing the application program capacity of a server and a method for providing a service based on the same. The grid computing control method includes the steps of providing a number of user clients with a capacity measurement program by a capacity measurement server; selecting user clients capable of capacity measurement from the user clients, the capacity measurement program having been installed in the user clients, by the capacity measurement server; transmitting a capacity measurement script to the selected user clients by the capacity measurement server; executing the capacity measurement script so as to create capacity measurement data by the selected user clients; transmitting the created capacity measurement data to the capacity measurement server by the selected user clients; and collecting the transmitted capacity measurement data and composing a capacity measurement result report by the capacity measurement server. | 06-18-2009 |
20090157865 | SYSTEM AND METHOD OF MANAGING NETWORK CONNECTIONS USING A LINK POLICY - A system and method of managing network connections using a link policy is disclosed. In one form, a network link management system can include a link control logic module operable to alter a first link data rate of a first link operable to communicate network traffic. The network link management system can also include a link manager coupled to the link control logic module. In one form, the link manager can be configured to initiate altering the first link data rate to a second link data rate value in response to a first link rate policy entry of the first link. The network link management system can also include a link rate policy accessible to the link manager and operable to store the link rate policy entry of the first link. | 06-18-2009 |
20090157866 | TRANSPARENT AUTO-DISCOVERY OF NETWORK DEVICES LOGICALLY LOCATED BETWEEN A CLIENT AND SERVER - Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake. | 06-18-2009 |
20090157867 | SYSTEM AND METHOD FOR REAL-TIME GRAPHIC MONITORING OF DIFFERING GRAPHICS RESOLUTIONS USING A SINGLE GRAPHICS BUFFER - A system and method automatically scale the resolution of video output of a selected workstation blade so that an administrator can view the video output by the selected workstation blade in the same format as it is displayed at the user terminal associated with the selected workstation blade. The video is automatically scaled to the administrator's VGA resolution while maintaining the same end-user DVI resolution and displaying the video so that the administrator may see the video output regardless of display format at the end user. This system and method allows the administrator to see the entire display. | 06-18-2009 |
20090157868 | METHOD AND APPARATUS FOR CHECKING THE HEALTH OF A CONNECTION BETWEEN A SUPPLEMENTAL SERVICE PROVIDER AND A USER DEVICE OF A PRIMARY SERVICE PROVIDER - A system and method for communicating between a secondary content provider and a user device includes a user device locator module and a primary service provider providing primary service content to the user device. The user device communicates a user device identifier, an IP address and a port number to the user device locator module. A secondary service content provider in communication with the user device locator module provider has a healthcheck module receiving the IP address and the port number from the user device locator module. The healthcheck module communicates a healthcheck signal to the user device using the port number and the IP address of the user device through a network. The secondary service content provider communicates secondary content to the user device through the network. | 06-18-2009 |
20090157869 | Tracking Content in Communication Networks - The present invention relates to methods of, and systems for, tracking content in communication networks by collecting content transmission information from the network. The collected content transmission is examined to identify discrete content items, and these are compared to predetermined content items. The result of the comparison is stored on a database, and if an identified discrete content item is the same as or substantially similar to a predetermined content item and/or if an identified discrete content item has been previously sent to or received by a subscriber or application, an event signal is triggered. | 06-18-2009 |
20090157870 | RESOURCE-AMOUNT CALCULATION SYSTEM, AND METHOD AND PROGRAM THEREOF - A response-time-difference calculation/request-number converting means ( | 06-18-2009 |
20090157871 | Information Processing Apparatus and Wireless Connection Service Availability Notification Method - According to one embodiment, an information processing apparatus includes a display device, an operation button, a wireless modem, and a control module. The control module determines, when the operation button is operated, wireless connection service availability in accordance with whether or not the wireless modem allows communication with a base station which forms a wireless connection service area and accommodates a mobile station within the wireless connection service area in a network, and displays the determination result on the display device. | 06-18-2009 |
20090157872 | Model-based composite application platform - Embodiments provide an architecture to enable composite, autonomous composite applications and services to be built and deployed. In addition, an infrastructure is provided to enable communication between and amongst distributed applications and services. In one or more embodiments, an example architecture includes or otherwise leverages five logical modules including connectivity services, process services, identity services, lifecycle services and tools. | 06-18-2009 |
20090157873 | Verifiable online usage monitoring - In the present invention, observed online CPD or CE activities must be within a designated envelope of acceptable behaviour for accredited activity to be recorded in a session log for that user. When a watcher program detects one or more loss of user focus on the activity, it alerts the user and gives them a short opportunity to rectify the situation, otherwise a session timer is stopped and no further credits are added or verified to the user's session log. When a session is ended by a user or the watcher program, only the verified activity that can be accredited to CPD is itemised and catalogued cumulatively in the user's session log. | 06-18-2009 |
20090157874 | MONITORING AND REPORTING SYSTEM AND METHOD OF OPERATING THE SAME - A monitoring and reporting system for use with an embedded computer of a hosted system and method of operating the same. In one embodiment, the monitoring and reporting system includes a device driver configured to monitor a status of a user subsystem of the embedded computer and generate a status signal therefrom. The monitoring and reporting system also includes a modem configured to send a short message to an external device as a function of the status signal. The modem employs a low amount of overhead to send the short message expeditiously. | 06-18-2009 |
20090157875 | METHOD AND APPARATUS FOR ASYMMETRIC INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, copied packets that are based on original packets sent from a user client are monitored for a web content request meeting certain monitoring selection criteria. Upon detection of a copied packet having a web content request meeting the selection criteria, a replacement packet is forwarded to the user client such that the user client receives the replacement packet before receiving a response packet from a target server of the corresponding original packet, wherein the replacement packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement. | 06-18-2009 |
20090164621 | METHOD AND SYSTEM FOR MONITORING REST WEB SERVICES - Generally, the present invention provides a method and computerized system for monitoring REST web services including generating a REST based web service client call operative to be used for monitoring web service activities. The web service client call is then deployed. The method and computerized system further includes monitoring the web service activities via the call invocation and a response analysis. The method and computerized system further includes receiving a plurality of feedback results from the monitoring of the web service functionality and thereupon adjusting the web service parameters based on the aggregated feedback. | 06-25-2009 |
20090164622 | Monitoring Instant Messaging Usage - A method of monitoring instant messaging usage can include identifying an instant messaging session between a plurality of participants, selecting a participant in the instant messaging session, identifying at least one attribute of the instant messaging session, and identifying at least one attribute of the selected participant. The method further can include determining an instant messaging usage metric for the selected participant according to the at least one attribute of the instant messaging session and the at least one attribute of the selected participant and outputting the instant messaging usage metric of the selected participant. | 06-25-2009 |
20090164623 | METHODS AND SYSTEMS FOR TRACKING EVENT LOSS - Systems and methods for tracking event loss are set forth in this disclosure. More specifically, systems and methods for tracking event loss within a first time period and second time period are set forth in this disclosure. | 06-25-2009 |
20090164624 | Method and Apparatus for Acquiring Content-Based Capital Via A Sharing Technology | 06-25-2009 |
20090164625 | METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI. | 06-25-2009 |
20090164626 | METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI. | 06-25-2009 |
20090164627 | DATA TRANSMISSION/RECEPTION APPARATUS AND METHOD FOR INSERTING AND EXTRACTING MAINTENANCE MANAGEMENT DATA - A data transmission/reception apparatus including a network layer device section for performing a process corresponding to a physical layer of an OSI reference model is provided. The apparatus includes a maintenance management data insertion/extraction section for inserting maintenance management data into data to be transmitted, transmitting the data to be transmitted, and extracting the maintenance management data from received data, wherein the maintenance management data insertion/extraction section performs the insertion and extraction of the maintenance management data with respect to the network layer device section. | 06-25-2009 |
20090164628 | CIRCUIT AND METHOD FOR SETTING DATA AND THEIR APPLICATION TO INTEGRATED CIRCUIT - An integrated circuit is disclosed, including at least one configuration pin, an interface circuit, a detecting circuit, a determining circuit and a storage unit. A physical layer circuit of the invention not only increases the flexibility of setting PHY addresses, but also reduces the number of configuration pins. | 06-25-2009 |
20090164629 | UTILIZING A SINGLE AGENT ON A NON-ORIGIN NODE FOR MEASURING THE ROUNDTRIP RESPONSE TIME OF WEB PAGES WITH EMBEDDED HTML FRAMES - A computer-based system and article of manufacture utilizing a single response time monitor, located on a non-origin node of a public or private network, for measuring the total roundtrip response time of a set of requests resulting from an original request having embedded HTML frames. The response time monitor builds a relationship tree for the original request and its embedded HTML frames. For each request from the set of requests resulting from the original request, including requests for the embedded HTML frames, the method uses the response time monitor to detect a start time and end time of each component of the request's roundtrip response time in order to calculate each component's duration. Later, the response time monitor calculates the total roundtrip response time by adding together the duration of all components of the original request and all its additional requests that have the same network address and port number. | 06-25-2009 |
20090172146 | Media Playlist Construction for Virtual Environments - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 07-02-2009 |
20090172147 | BALANCED MANAGEMENT OF SCALABILITY AND SERVER LOADABILITY FOR INTERNET PROTOCOL (IP) AUDIO CONFERENCING BASED UPON MONITORED RESOURCE CONSUMPTION - Embodiments of the present invention address deficiencies of the art in respect to audio stream management in an audio conferencing server and provide a method, system and computer program product for balancing audio server loadability and audio server scalability based upon monitored resource consumption. In an embodiment of the invention, a method for balancing audio server loadability and audio server scalability based upon monitored resource consumption can be provided. The method can include monitoring computing conditions in an audio conferencing server receiving encoded audio packets from coupled Internet Protocol (IP) audio clients and routing the encoded audio packets as audio streams to the IP audio clients, and responsive to detecting deteriorating computing conditions in the audio conferencing server, reducing a number of the audio streams forwarded to the IP audio clients by the audio conferencing server. | 07-02-2009 |
20090172148 | METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF IP NETWORKS ELEMENTS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network. | 07-02-2009 |
20090172149 | REAL-TIME INFORMATION TECHNOLOGY ENVIRONMENTS - Real-time data of business applications of an Information Technology environment is monitored to obtain information to be used in managing the environment. A business application includes processing collectively performed by a plurality of components of the environment. A component includes one or more resources, and therefore, in one example, the real-time data being monitored is associated with those resources. | 07-02-2009 |
20090172150 | COORDINATED DEEP TAGGING OF MEDIA CONTENT WITH COMMUNITY CHAT POSTINGS - Embodiments of the present invention address deficiencies of the art in respect to deep tagging of media content and provide a method, system and computer program product for coordinating deep tagging of media content with chat postings. In an embodiment of the invention, a method for coordinating deep tagging of media content with chat postings can be provided. The method can include monitoring a group chat of participants co-browsing media content, identifying a token in the group chat appearing a threshold number of times within a temporal window, and creating a deep tag in the media content in association with a portion of the media content played back concurrently with the temporal window. | 07-02-2009 |
20090172151 | DYNAMIC NETWORK CONFIGURATION - In one embodiment, determining a default gateway of a network, determining a MAC address and an IP address associated with the default gateway of the network, updating a table of one or more MAC addresses and corresponding one or more IP addresses based on the detected MAC address and the IP address of the default gateway, detecting in the table of one or more MAC addresses and the corresponding one or more IP addresses, a further MAC address associated with the IP address of the default gateway, determining a port associated with the further MAC address and with the IP address of the default gateway, and disabling the port, are provided | 07-02-2009 |
20090172152 | REAL-TIME MONITORING OF A ROUTING SERVER - Calculating the roundtrip delay between first and second computers due to the latency of a routing server. The first computer receives an incoming message from the second computer via the routing server. The incoming message includes incoming time information indicative of processing time at the second computer and outgoing time information indicative of a time when a first outgoing message was sent by the first computer. The first computer calculates an observed roundtrip time indicating the routing server latency for a first outgoing message and the incoming message as a function of a time when the first computer received the incoming message, the outgoing time information, and the incoming time information. | 07-02-2009 |
20090172153 | HETEROGENEOUS TWO-PHASE COMMIT TEST ENGINE - A computer-implemented method, information processing system, and computer program storage product validate a two-phase commit process. First information is received that indicates a plurality of web services to be tested. Each of the web services are associated with a different resource manager. Second information is received that indicates a plurality of application servers for performing the web services. A global transaction is created that includes a plurality of transactions based on the first information that was received. A two-phase commit process is initiated at one of the application servers for performing the global transaction. After the two-phase commit process has ended, results of the global transaction that include information regarding each of the transactions within the global transaction are displayed. | 07-02-2009 |
20090172154 | METHOD FOR AUTONOMIC DETECTION AND REPAIR OF BROKEN LINKS IN WEB ENVIRONMENTS - A method for implementing autonomic detection and repair of broken links in Web environments includes receiving a request for additional Web content in a server in response to a link present in an originating Web content held on a host server; determining the present state of the received link; wherein the server performs in response to the received link: returns the requested additional Web content to a user; returns a Web content not found notification to a user; returns a Web content has moved notification with a valid link; wherein the notifications are digitally signed by the server; wherein in response to the returned notifications, the user's browser sends the notifications to the host server; and wherein in response to the reception of the notifications the host server notifies a content manager of the link state, stores the notification in a database, and repairs the link. | 07-02-2009 |
20090172155 | METHOD AND SYSTEM FOR MONITORING, COMMUNICATING, AND HANDLING A DEGRADED ENTERPRISE INFORMATION SYSTEM - A system and method in accordance with the present invention provides a 3-phase commit client-server protocol that allows the EIS server to detect the sick-but-not-dead situations, identify the resources involved, determine its degraded level, take the actions if needed, and send out a degraded status information message to the client. In a system and method in accordance with the present invention an internal availability monitor analyzes the resources that have not been externalized, such as storage pools, control blocks, etc, and are therefore not available to external monitors. | 07-02-2009 |
20090172156 | ADDRESS SECURITY IN A ROUTED ACCESS NETWORK - In one embodiment, providing multi-layer address security incorporating Layer 2 Media Access Control (MAC) addresses and corresponding Layer 3 Internet Protocol (IP) addresses for host machines on a routed access network is provided. | 07-02-2009 |
20090172157 | Method and Device for Content Transmission on P2P Network - This invention discloses a method and device for content transmission on P | 07-02-2009 |
20090172158 | MEMORY MANAGEMENT SYSTEM AND METHOD FOR OPEN PLATFORM - The present invention relates to a memory management system and method for open platform. The memory management system and method of the present invention utilizes the main spirit of sharing service in open platform. When the used memory in local open platform exceeds an upper limit, the standard service bundle access interface is used for accessing the standard service bundle in remote open platform. Therefore, the standard service bundle in local open platform can be off-loaded to release the memory space so as to resolve the memory shortage problem. The stability of the whole system can be maintained. | 07-02-2009 |
20090172159 | Web Page Link-Tracking System - A link-tracking server receives a request for a Web page or an image and stores link-tracking information in one or more link-tracking files to create a record of link-tracking information. The link tracking files may later be accessed by a link-tracking subscriber, such as by logging onto the link-tracking server. A content provider embeds link-tracking code in each Web page where link-tracking information is desired to be captured. Such Web pages embedded with such link-tracking code are then stored in a content provider server, which then serves such tracking-enabled Web pages to users on the network. When a user requests a tracking-enabled page, the link-tracking code sends one or more requests to a link-tracking server to record link-tracking information. | 07-02-2009 |
20090177766 | REMOTE ACTIVE WINDOW SENSING AND REPORTING FEATURE - A system and method is provided for remote active window sensing of a display in a computing device and reporting of the same. The system includes a tool comprising a remote monitoring and reporting component configured to monitor active windows of one or more remote devices and provide a report to a presenter as to whether the active windows of the one or more remote devices are associated with a presentation of the presenter. | 07-09-2009 |
20090177767 | Local Web Server Based Controller - A system for monitoring parameters related to a product in a storage tank is provided. The system includes a monitor operably coupled to the storage tank, an internet protocol (IP) enabled electronic device, and an internet protocol enabled controller. The controller is in communication with the monitor and the electronic device. The controller and the electronic device communicate through an internet regarding information observed by the monitor. | 07-09-2009 |
20090177768 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR EXTRACTING PORT-LEVEL INFORMATION OF WEB SERVICES WITH FLOW-BASED NETWORK MONITORING - Systems, methods, and computer program products for extracting port-level information of Web services with flow-based network monitoring. Exemplary embodiments include a method for extracting port-level information of Web services with flow-based network monitoring, the method including identifying a registry machine, coupling the registry machine to a traffic meter and flow monitor dynamically configuring the traffic meter, including exporting a first n bytes of a traffic payload exporting a sub-second traffic flow start and end times, extracting service provider information from traffic flow exports, including analyzing the exported n bytes of the traffic payload to extract port-level information at the flow monitor, extracting a value of an access point element, mapping a logical service provider address to a physical address and inserting the service into a Web Service Provider Registry within the flow meter, thereby populating the Web Service Provider Registry. | 07-09-2009 |
20090177769 | DETERMINING ONLINE STATUS OF A MEDICAL DEVICE - Methods and systems of patient treatment are disclosed. The methods and systems include use of medical device informatics to modify and validate therapies and drugs used in those therapies. In certain embodiments, a medical device, such as a medical infusion pump, interfaces with a server to administer the patient treatments. In one aspect, a method of determining the on-line status of a medical device is disclosed. The method includes expecting communication from the medical device within a predetermined period, and determining whether a message has been received from the medical device within the predetermined period. The method further includes establishing an on-line status for the medical device based on the determining step. | 07-09-2009 |
20090177770 | DOMAIN MANAGING METHOD, DOMAIN EXTENDING METHOD AND REFERENCE POINT CONTROLLER ELECTING METHOD - A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request for authenticating a reference point controller from a reference point controller candidate; invalidating a membership of the stored reference point controller; generating a unique reference point controller membership for verifying that the reference point controller candidate is a new reference point controller; and transmitting the generated reference point controller membership to the reference point controller candidate. Accordingly, even when an error occurs in the reference point controller, the function of the reference point controller can be rapidly replaced by using the reference point controller candidate. | 07-09-2009 |
20090177771 | METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, a first packet, sent from a user client, having a web content request meeting certain monitoring selection criteria is detected. Upon detection of the first packet, a second packet is forwarded to the user client. The second packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement. | 07-09-2009 |
20090177772 | METHOD, SYSTEM AND DEVICE FOR ESTABLISHING A PEER TO PEER CONNECTION IN A P2P NETWORK - A method and system for establishing a peer to peer connection in a P2P network and a peer device in the P2P network, wherein the method comprises of the following: (1) a management node in the P2P network receives a resource request; (2) the management node selects one or more peers which meet the demand from a resource list established previously according to the logon information of the other peers in the P2P network to return it to a resource request peer; (3) the connection is established between the said resource request peer and the said peers which meet the demand. | 07-09-2009 |
20090182863 | CENTRALIZED SOCIAL NETWORK RESPONSE TRACKING - Embodiments of the present invention address deficiencies of the art in respect to response subscriptions and provide a method, system and computer program product for centralized response tracking across social networks. In one embodiment of the invention, a social networking response tracking method can be provided. The method can include associating subscribers with a user or a group of users based upon a posting by the user or a user in the group of users within a centralized response tracking system, aggregating different postings from the user to correspondingly different forums disposed about a global computer communications network within the centralized response tracking system, and, notifying the subscribers of the aggregated postings from the centralized response tracking system. | 07-16-2009 |
20090182864 | Method and apparatus for fingerprinting systems and operating systems in a network - A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers. Generally, the internet protocol packet that is analyzing will be captured from an aggregation point in the carrier network. | 07-16-2009 |
20090182865 | SMART COMPONENT MONITORING - One embodiment of the present invention provides a system that automatic discovers and monitors enterprise components. During operation, the system scans an enterprise environment for an item of meta-data. Next, the system analyzes the item of meta-data to determine a monitoring instruction for a corresponding enterprise component. Finally, the system performs the monitoring instruction for the corresponding enterprise component. | 07-16-2009 |
20090182866 | Method of setting and managing performance monitoring conditions and computer system using the method - In order to change a policy while alarm-monitoring a production environment, during a production-environment operation, a method of controlling a computer system is provided, in which a policy is temporarily changed, thereby performing setting change. An agent transmits a monitoring result based on a first monitoring condition. A management unit generates a second monitoring condition based on a received change request. The agent transmits a monitoring result based on the second monitoring condition. The management unit holds information for correlating the first and second monitoring conditions with each other. Upon reception of a confirmation request for confirming the second monitoring condition, the management unit specifies the first monitoring condition correlated with the second monitoring condition based on the information. The agent which has received the deletion request stops the transmission of the monitoring result based on the first monitoring condition. | 07-16-2009 |
20090182867 | METHOD AND APPARATUS FOR IDENTIFYING A PACKET - A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network. | 07-16-2009 |
20090182868 | Automated network infrastructure test and diagnostic system and method therefor - A testing system provides automated testing of one or more network infrastructures. The testing system may automatically reconfigure one or more devices within a network infrastructure and then conduct testing on the newly configured network infrastructure. Test results may be used to diagnose network anomalies and to compare performance or other characteristics of various network configurations. In one embodiment, the testing system tests a communication channel between a front-end and back-end mechanism where data traffic is encoded between the front-end and back-end mechanism. | 07-16-2009 |
20090182869 | VIEWING EFFECT MEASURING SYSTEM, AND MEASURING METHOD AND MEASURING TERMINAL THEREOF - A viewing effect measuring system is provided. A user terminal performs a content output process for receiving content from a content delivery apparatus and outputting the content, a Web site displaying process for accepting a request to access a Web site, while the content are outputted, accessing the Web site via the network, and displaying the Web site in such a manner as available for browsing, and a measurement information sending process for establishing an association between Web site specifying information which identifies the Web site as to which the access is requested, and content specifying information which identifies the content being outputted when the access is performed, and sending information of the association as viewing information to a measuring server. The measuring server receives the viewing information from the user terminal and sends the information to a Web server of the Web site as measurement information. | 07-16-2009 |
20090182870 | METHOD AND COMMUNICATION SYSTEM FOR MANAGING A COMMUNICATION NETWORK - Communication networks are automatically tested from a superordinate producer-independently managing network management center, such as when subordinate, producer-specific operation and maintenance centers (OMCs) are not occupied. Producer-dependent information is transmitted when an alarm report is sent and producer-specific hardware tests are automatically generated in the network management center (NMC). It is unnecessary for producer-specific object classes to be completely defined in the information model of the OMC-NMC interface. The tests automatically generated in the network management center can be triggered in response to errors, e.g. for a particular hardware board, or preventively, for example for the entire hardware of a network unit. | 07-16-2009 |
20090182871 | BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service. | 07-16-2009 |
20090182872 | Method and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community - A method of detecting events in a computer-implemented online community includes providing a computer-implemented event processor, providing the computer-implemented event processor with a description of at least one event to be detected, automatically analyzing messages of the online community with the computer-implemented event processor to detect the at least one event, and issuing a notification of a detected event. Also an apparatus for carrying out the method. | 07-16-2009 |
20090187650 | Method and system for determining probability for availability in an instant message system - This invention provides a method or a system to track, query, and display an accurate time for the availability of other users in an instant messaging environment. The solution provides an advantage over the known solutions by providing an accurate estimation of the time for the user to be online, thus avoiding waiting for the person to log on during a timeframe where the person typically does not log on. This is a common occurrence where team members are located on the other side of the world. | 07-23-2009 |
20090187651 | Information technology remote services management environment - An apparatus for providing remote services to an integrated information technology environment. The information technology environment comprises a services appliance. The services appliance provides agent-less monitoring of information handling systems within the information technology environment. The apparatus comprises a remote management platform. The remote management platform is configured to receive services information from the services appliance. The remote management platform analyzes the services information and determines a response based upon the services information. The remote management platform initiating the response by the remote management platform based upon the services information. | 07-23-2009 |
20090187652 | Inferred Discovery Of Devices Of A Data Communications Network - Methods, apparatus, and products for inferred discovery of devices of a data communications network are described. In embodiments of the present invention the data communications network includes a plurality of data communications devices connecting a plurality of routers, each data communications device having a device address, each router having one or more network interfaces. Embodiments of the present invention also include querying each router for connection data, the connection data associating interfaces of the router with device addresses; identifying for each router in dependence upon the connection data an interface of the router connected to a data communications device including identifying a device address associated with the interface; and creating, in dependence upon the identified device addresses for all routers, a representation of the data communications network in a network model. | 07-23-2009 |
20090187653 | SYSTEMS AND PROCESSES OF IDENTIFYING P2P APPLICATIONS BASED ON BEHAVIORAL SIGNATURES - Disclosed are a system and a process for identifying P2P applications and specific P2P software as well from an original mixed packet trace based on behavioral-signatures. The behavioral-signature based system and process according to the invention is mainly to check whether the application has these specific periodic behaviors or not. The process of this invention comprises the steps of filtering out all irrelative packets; translating the filtered packet trace into discrete-time sequences; processing the sequences to obtain frequency-domain characteristics of original packet trace; and analyzing the frequency-domain characteristics and determining the identification. | 07-23-2009 |
20090187654 | SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm. | 07-23-2009 |
20090187655 | Secure platform management device - A platform management device configured to control the functionality of a provisioned electronic device is disclosed. The platform management device includes a processor operative to execute commands. A memory maintains a series of instructions that when executed by the processor, causes the processor to: ( | 07-23-2009 |
20090187656 | METHOD, SYSTEM, AND APPARATUS FOR SCHEDULING PATTERN BASED WEB SERVICES - A method of scheduling a request for a plurality of Web services can include providing service activation rules. Each service activation rule can specify a trigger condition and a state condition for causing a watcher to invoke a particular Web service. The method also can include receiving an event indicating a change in a common memory, wherein each event specifies trigger information, comparing the trigger conditions of the service activation rules with the trigger information of the event, adding the service activation rules that match the event to a trigger list, and comparing the state conditions of service activation rules in the trigger list with a state of the common memory. The service activation rules of the trigger list that match the state of the common memory can be selected thereby causing the invocation of at least one watcher and corresponding Web service. | 07-23-2009 |
20090193111 | METHOD FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels. | 07-30-2009 |
20090193112 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels. | 07-30-2009 |
20090193113 | SYSTEMS AND METHODS FOR GRID-BASED DATA SCANNING - A computing grid for performing scanning operations on electronic data in a networked computing environment. The data scanning operations may include scanning data for viruses or other malicious software code. The computing grid for performing data scanning operations may include one or more event detectors to detect data scanning events and one or more grid scanning elements to perform the data scanning operations. The computing grid may also include a grid coordinator to monitor the grid configuration, perform necessary updates to the grid, and to take pre-determined actions based on the results of the data scans. | 07-30-2009 |
20090193114 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ANALYZING DATA FROM NETWORK-BASED STRUCTURED MESSAGE STREAM - A system, method and computer program product for analyzing data from a message stream, are disclosed. Data in a structured format is captured from a message stream. The captured data is processed to conform to a data model format so that one or more events can be identified from an analysis of the processed data. Once an event has been identified, the message stream is monitored to detect the identified event. When detected, the event is exported via a network. | 07-30-2009 |
20090193115 | Monitoring/analyzing apparatus, monitoring/analyzing method and program - A receiving unit receives data of a specific protocol, transmitted from a server to a client. An extraction unit extracts status codes from the received data. A classification unit classifies the extracted status codes, into first-type status codes and second-type status codes. A judgment unit finds a receiving rate of first-type status codes and a receiving rate of second-type status codes and compares the receiving rate of first-type status codes against a threshold value thereof, and the receiving rate of second-type status codes against a threshold value thereof. From results of comparison, the judgment unit then determines whether an increase in server load has resulted from a normal traffic or an abnormal traffic. | 07-30-2009 |
20090193116 | DATA CAPTURE SYSTEM AND METHOD - A computer-implemented data capture system and method for capturing inputs made at a client system are disclosed. The data capture system | 07-30-2009 |
20090193117 | SYSTEM AND METHOD FOR PRESENCE SUBSCRIPTION DELEGATION - A system and method for presence subscription delegation in a multi-domain environment in an SIP-based presence system are provided, in which a watcher transmits a presence subscription delegation request to a presence subscription delegation handler of a delegating user, the presence subscription delegation handler performs delegation authorization for the received presence subscription delegation request according to a presence delegation authorization rule of the delegating user being authorization information about presence subscription delegation, and a presence server of a presentity receives the presence subscription delegation request from the presence subscription delegation handler, performs presence authorization according to a presence authorization rule of the presentity, and transmits presence information about the presentity to the watcher via the presence subscription delegation handler. | 07-30-2009 |
20090193118 | Non-centralized network device management using console communications apparatus - A apparatus for the management of one or more wide area or local area network connected devices by a collocated managing device. The managing device includes communications connectivity to each of the managed devices via a console connection and optionally via shared local area network connections. Additionally, the managing device includes a control system and a database. The device is designed to operate securely and operate autonomously or coupled with an external device, for example a management system, or a user. | 07-30-2009 |
20090193119 | Methods and Systems for Reducing the Spread of Files on a Network - Methods and systems can reduce the spread of computer files or data on a network by obtaining and tracking times of arrival for chunks of data transmitted on the network. The times of arrival for a node can be transformed into time-series and periodograms computed from the time-series. Successive periodograms can be compared to determine changes in the strongest peaks of the periodograms. If a new peak is identified, a search for the occurrence of the peak in previous periodograms can be conducted. If no peak having a matching frequency is found, a search for the peak in the periodograms for neighboring nodes can be performed. If matching peaks are found, the associated data stream can be classified. Predictions of the timing and length of associated data packets can be used to randomly interrupt transmission of associated data packets resulting in reducing the spread of the classified data stream. | 07-30-2009 |
20090198813 | SERVER APPARATUS AND COMPUTER READABLE RECORDING MEDIUM - Prior to a request from an integrated system | 08-06-2009 |
20090198814 | Monitoring device, monitoring system, monitoring method, and program - Diverting condition storage unit | 08-06-2009 |
20090204700 | COORDINATED PEER-TO-PEER (P2P) REPLICATED BACKUP AND VERSIONING - Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy. | 08-13-2009 |
20090204701 | NODE MONITOR CLIENT CACHE SYNCHRONIZATION FOR MOBILE DEVICE MANAGEMENT - A stateful cache layer is created at a mobile device client that tracks the state on both the mobile device and management service. The states are synchronized between the mobile device and the management service on every management session. Through the statefulness of the cache layer, unauthorized changes on the mobile device are detected and accordingly handled such as internal correction or reporting to the management service for actionable instructions. A cache layer on the management server is configured to identify organizational policy changes that affect specific devices and initiate unsolicited immediate management sessions to update the configuration to the specific devices. | 08-13-2009 |
20090204702 | SYSTEM AND METHOD FOR NETWORK MANAGEMENT USING SELF-DISCOVERING THIN AGENTS - In one embodiment, a computer-implemented method of managing a computer network includes installing an agent in each of a plurality of network nodes in the network. The agent may be configured to identify one or more types of network resources attached to a particular node with which the agent is associated. One or more roles may be assigned to or by the agent based, at least in part, upon the one or more types of network resources identified by the agent. Functions associated with the identified roles may be executed. Monitoring the status of each agent may also be carried out. In another embodiment, a network management system includes an agent executing within an associated network node of the network. The agent may be configured to operate so as to identify one or more types of resources attached to the network node. The agent may be assigned one or more roles based, at least in part, on an inference based upon the one or more types of attached resources identified by the agent. | 08-13-2009 |
20090204703 | AUTOMATED DOCUMENT CLASSIFIER TUNING - Subject matter disclosed herein relates to document classification and/or automated document classifier tuning. | 08-13-2009 |
20090204704 | SYSTEM AND METHOD FOR TRACKING UNIQUE VISITORS TO A WEBSITE - A system and method for analyzing traffic to a website is provided that is based on log files and that uses both server-side and client-side information channeled through one source to create a more complete picture of activity to a website. In one preferred embodiment, a sensor code is embedded in a requested web page, and sends information back to the web server where the website resides. This additional information is logged along with normal requests. | 08-13-2009 |
20090204705 | On Demand File Virtualization for Server Configuration Management with Limited Interruption - Inserting a file virtualization appliance into a storage network involves configuring a global namespace of a virtualization appliance to match a global namespace exported by a distributed filesystem (DFS) server and updating the distributed filesystem server to redirect client requests associated with the global namespace to the virtualization appliance. Removing the file virtualization appliance involves sending a global namespace from the virtualization appliance to the distributed filesystem server and configuring the virtualization appliance to not respond to any new client connection requests received by the virtualization appliance. | 08-13-2009 |
20090204706 | BEHAVIORAL NETWORKING SYSTEMS AND METHODS FOR FACILITATING DELIVERY OF TARGETED CONTENT - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user. | 08-13-2009 |
20090204707 | BANDWIDTH CONTROL SERVER, COMPUTER READABLE RECORD MEDIUM ON WHICH BANDWIDTH CONTROL PROGRAM IS RECORDED, AND MONITORING SYSTEM - A bandwidth control server, a bandwidth control program recorded on a computer readable record medium, and a monitoring system that control the sending of image data obtained by cameras in accordance with priority corresponding to a situation. A setting information storage section stores setting information regarding a camera installed at each point. When disaster information is acquired, a disaster detection section extracts a disaster type and a disaster area from the disaster information. A priority determination section searches the setting information on the basis of the disaster type and the disaster area and extracts setting information corresponding to the disaster type. Then the priority determination section determines priority for sending image data obtained by cameras installed in the disaster area on the basis of the extracted setting information. A bandwidth control section ensures bandwidths which can be used for sending the image data in descending order of the priority on the basis of the priority and bandwidth information acquired by a network monitoring section. | 08-13-2009 |
20090204708 | MANAGING A NETWORKED STORAGE CONFIGURATION - Managing a networked storage system having a host operable to connect through a network fabric to storage apparatus comprises: a configuration component for inputting a configuration change into the networked storage system responsive to change instructions; a monitoring component operable in communication with the host and the network fabric to monitor I/O activity associated with elements of the networked storage system; an activity data storage component responsive to the monitoring component for storing a record of a monitored I/O activity; an analysis component, responsive to the configuration component for inputting configuration changes, for analysing the record of a monitored I/O activity for a recent activity; and an alert component, responsive to the analysis component detecting a recent activity, for alerting the configuration component. | 08-13-2009 |
20090204709 | System, method and computer program product for monitoring and controlling network connections from a supervisory operating system - A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system. | 08-13-2009 |
20090210525 | Method for Detection of the Activity of a Device In a Network of Distributed Stations, as Well as a Network Station for Carrying Out the Method - The invention relates to the technical field of local data transmission networks, in particular domestic networks. In networks such as these, the network stations log on in connection to the network. On disconnection, the network station which is leaving the network logs off in an appropriate manner. In the situation in which the user disconnects a network station simply by pulling out the network cable from the network, it is physically impossible to transmit the logging-off message. The invention is now concerned with the problem of how reliably an inactive network station can be identified, also taking account of the disconnection of the network station simply by pulling out the network plug. The invention solves the problem by regular transmission of a search request to the stations in the network. If a search request remains unanswered by one network station, an HTTP access is additionally attempted to, for example, the device description of the network station in question, or a control request. The network station is identified as being inactive only if this access/control request also fails. In the case of a UPnP network, the search request is made using the unprotected SSDP protocol, so that the lack of any response to the search request does not in its own right reliably indicate that the network station has logged off. The supposition that the network station which did not respond to the search request is inactive is confirmed by means of the HTTP access, which takes place on an error-protected basis. | 08-20-2009 |
20090210526 | DOMAIN NAME CACHE CONTROL - Domain name caching is controlled by adding a nonce to a domain name to force propagation of lookup to an authoritative server or service. Desired caching behavior is dictated by controlling when a new and unique nonce-bearing name is created. For example, caching can be completely eliminated by generating a new nonce-bearing name for every request. While a nonce can simply correspond to a random or pseudo random value, it can also be time based. Furthermore, nonces can be phase or time shifted to limit authoritative server load as well as improve response time. | 08-20-2009 |
20090210527 | Virtual Machine Management Apparatus, and Virtual Machine Management Method and Program - A virtual machine management apparatus connected to a plurality of server devices via a network generates a new virtual machine on a server device in accordance with a request from a management terminal. At that time, for one or more server devices to which a new virtual machine can be allocated, the virtual machine management apparatus refers to an allocation rule table for storing a score for each of combinations of types of virtual machines. The score indicates appropriateness of a condition that each combination of types of virtual machines is to be allocated to the same server device. Thus, the virtual machine management apparatus computes an index value indicative of appropriateness of a condition that the new virtual machine is to be allocated to the server device. Then the virtual machine management apparatus determines an allocation target for the new virtual machine with reference to the computed index value. | 08-20-2009 |
20090210528 | METHOD FOR DETERMINING METRICS OF A CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK - A method for determining metrics of a content delivery and global traffic management network provides service metric probes that determine the service availability and metric measurements of types of services provided by a content delivery machine. Latency probes are also provided for determining the latency of various servers within a network. Service metric probes consult a configuration file containing each DNS name in its area and the set of services. Each server in the network has a metric test associated with each service supported by the server which the service metric probes periodically performs metric tests on and records the metric test results which are periodically sent to all of the DNS servers in the network. DNS servers use the test result updates to determine the best server to return for a given DNS name. The latency probe calculates the latency from its location to a client's location using the round trip time for sending a packet to the client to obtain the latency value for that client. The latency probe updates the DNS servers with the clients' latency data. The DNS server uses the latency test data updates to determine the closest server to a client. | 08-20-2009 |
20090216872 | METHOD AND DEVICE FOR TRANSMITTING FILES VIA A NETWORK - A method for transmitting files via a network is proposed. In a first step, the size of a file to be transmitted is transmitted. Following this, the value of a maximum permitted data traffic is calculated from the size of the file and a factor X. Finally, the transmission process of a file is stopped as soon as the data volume transmitted exceeds the maximum permitted data traffic. | 08-27-2009 |
20090216873 | Communication of Offline Status Between Computer Systems - A method for communication of offline status between nodes includes detecting an impending deactivation of a physical port and sending a message from a sending node to a receiving node notifying the receiving node of the impending deactivation of the physical port. The method further includes deactivating the report of any error for the physical port and sending a response from the sending node to the receiving node verifying that deactivation of the physical port. | 08-27-2009 |
20090216874 | MONITORING ASYNCHRONOUS TRANSACTIONS WITHIN SERVICE ORIENTED ARCHITECTURE - A monitoring system is used to monitor extended business transactions comprised of asynchronous messages. Each message may be a request or a response of an application transaction request-response pair and may be identified with a unique identifier. The unique identifier may be used to identify two or more asynchronous messages, where each extended business transaction may be associated with one or more unique identifiers to identify messages that comprise the business transaction. The extended business transactions are completed over an extended period of time and implemented over several different machines which may or may not be in communication with each other are monitored. Alerts are generated when messages of the extended business transaction do not satisfy a threshold or other criteria, such as a time period for occurring. A user interface or other mechanism may be used to configure the transactions and provide information regarding the status of the transactions and alerts generated for uncompleted portions of the transaction. | 08-27-2009 |
20090216875 | FILTERING SECURE NETWORK MESSAGES WITHOUT CRYPTOGRAPHIC PROCESSES METHOD - A network filtering system and method without requiring cryptographic processing of secure message transmissions. The method provides for determining target node ID associations corresponding to domain names of filtered node DNS requests and corresponding network address and address duration data determined according to a corresponding DNS responses. The method also provides for comparing a destination address of a current message transmission corresponding to a filtered node with the determined target node ID associations, and conducting filtering processing of the current message transmission. | 08-27-2009 |
20090216876 | SMART ENDPOINT AND SMART MONITORING SYSTEM HAVING THE SAME - A smart endpoint and a smart monitoring system having the smart endpoint are provided. The smart endpoint includes a central processing unit (CPU), an interface module, a digital signal processing unit, and a memory module. The interface module is coupled to the CPU for receiving a plurality of heterogeneous monitoring signals and an identification code. The digital signal processing unit is coupled to the CPU for integrally considering the monitoring signals and the identification code to determine an abnormal event, and generate an abnormal event data thereby. The memory module is coupled to the CPU for recording the abnormal event data. As such, the present invention is adapted to determine an occurrence of an abnormal event, by which the passive monitoring can be upgraded to an active monitoring and analyzing, and thus achieving a smart monitoring. | 08-27-2009 |
20090216877 | Network monitoring system with common storage medium and a method thereof - A network monitoring system with common storage medium includes at least one monitor, a network communication path, a monitoring host, a network memory, and a display screen. The monitoring host assigns a different IP address to each of the monitors. When the network monitoring system is started, the monitoring host controls each of the monitors to obtain the monitor data according to the IP address. Next, the monitoring host uses the data serial stream transmission technology to obtain the monitor data from the monitors via the network communication path. Finally, the monitoring host stores the monitor data and transmits the monitor data to the display screen and display it. Thereby, the resource is shared, and the network monitor is achieved. | 08-27-2009 |
20090216878 | Method and System for Providing A Self-Populating Database for the Network Collection of Meter Data - The invention provides a method and a system for collection of meter readings from the field and for providing a self-populating database for storing and retrieving the meter data. A network data collection computer operating according to a stored computer program reads in data from the receivers and detects the meter reading devices that are sending data through a respective receiver. If not previously detected, the network data collection computer allocates space in the database for the data and stores the meter data and indexes it by the receiver and meter reading device from which it was received, and by the date and time of reception at the network data collection system. This data can then be retrieved and displayed or printed out by these parameters in database reports. | 08-27-2009 |
20090216879 | ELEMENT MANAGEMENT SYSTEM WITH FUNCTION TO TRANSFER DATABASE - An element management system which allows a client to monitor and control elements on a network through element management servers includes a unit configured to manage a transfer state separately for each element when management information regarding an element accommodated in a first element management server is to be transferred to a second element management server, and a unit configured to cause the management information at the second element management server to reflect a differential between the management information at the first element management server and the management information at the second element management server upon creation of the differential that is created by the client upon controlling an element for which the transfer state indicates uncompleted transfer, wherein an accommodated element is transferred in real time between the first and second element management servers without suspending monitor and control performed by the first and second element management servers. | 08-27-2009 |
20090216880 | Methods and Systems for Dynamic Transport Selection Based on Last Mile Network Detection - The present invention relates to systems, apparatus, and methods of dynamic transport selection. The method includes determining link characteristics for a network connection between a client and a server. The link characteristics include a transport type and a connection type. The method further includes, based on the link characteristics, dynamically determining an optimal transport type, changing the transport type to the optimal transport type, and transmitting data between the client and the server using the optimal transport type. | 08-27-2009 |
20090216881 | METHOD AND APPARATUS FOR MAINTAINING THE STATUS OF OBJECTS IN COMPUTER NETWORKS USING VIRTUAL STATE MACHINES - A network appliance for monitoring, diagnosing and documenting problems among a plurality of devices and processes (objects) coupled to a computer network utilizes periodic polling and collection of object-generated trap data to monitor the status of objects on the computer network. The status of a multitude of objects is maintained in memory utilizing virtual state machines which contain a small amount of persistent data but which are modeled after one of a plurality of finite state machines. The memory further maintains dependency data related to each object which identifies parent/child relationships with other objects at the same or different layers of the OSI network protocol model. A decision engine verifies through on-demand polling that a device is down. A root cause analysis module utilizes status and dependency data to locate the highest object in the parent/child relationship tree that is affected to determine the root cause of a problem. Once a problem has been verified, a “case” is opened and notification alerts may be sent out to one or more devices. A user interface allows all objects within the network to be displayed with their respective status and their respective parent/child dependency objects in various formats. | 08-27-2009 |
20090216882 | METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS TRANSMITTED VIA PIGGYBACKING HTTP TRANSACTIONS - Disclosed is an internet traffic monitoring method that includes a network service provider analyzing an HTTP transaction involving an internet user client. The network service provider responds to the HTTP transaction by forwarding, to the internet user client, a modified web object including a monitoring implement. After forwarding the modified web object to the internet user client, the network service provider forwards a web object, originally associated with the HTTP transaction, to the internet user client. | 08-27-2009 |
20090216883 | MANAGING ESCALATING RESOURCE NEEDS WITHIN A GRID ENVIRONMENT - A method, system, and program for managing escalating resource needs within a grid environment are provided. A job is submitted into a first selection of resources in a grid environment from among a hierarchy of discrete sets of resources accessible in the grid environment. Discrete sets of resources may include locally accessible resources, enterprise accessible resources, capacity on demand resources, and grid resources. The performance of the first selection of resources is monitored and compared with a required performance level for the job. If the required performance level is not met, then the discrete sets of resources are queried for available resources to meet the required performance level in an order designated by said hierarchy. Available resources in a next discrete set of resource from the hierarchy of discrete sets of resources are added to a virtual organization of resources handling the job within the grid environment. In particular, the virtual organization of resources may include the first selection of resources and the added resources which are distributed across heterogeneous systems. If capacity on demand resources are allocated and added to the virtual organization, then the capacity on demand resources are deallocated when no longer needed. | 08-27-2009 |
20090222549 | CORRELATING PERFORMANCE DATA OF MULTIPLE COMPUTING DEVICES - Systems, products, and methods are disclosed for facilitating the correlation of performance data associated with multiple computing devices. An illustrative method includes referencing a time as indicated by a computer and referencing a start time indication that identifies a time to begin monitoring computer performance. Thereafter, the time indicated by the computer and the start time indication are utilized to determine an initial monitoring delay. Upon determining an initial monitoring delay, an initial monitoring of the computer performance is delayed until the initial monitoring delay has lapsed. In one embodiment, computer performance data collected upon the lapse of the initial monitoring delay can be correlated with performance data associated with other computing devices. | 09-03-2009 |
20090222550 | MEASUREMENT OF THE EFFECTIVENESS OF ADVERTISEMENT DISPLAYED ON WEB PAGES - A method to determine user attentiveness to an information item included in a web page comprising: displaying an image representing a first web page that includes a first information item to a first individuals; determining a baseline time that represents a typical amount of time that respective first individuals look at the first information item; sending a first web page over a network to first user devices; and sending a second web page over a network to second user devices; wherein the second web page appears substantially the same as the first web page except with a second information item instead of the first information item; obtaining first time measurements of an amount of time that first users of the first user devices typically spend looking at the first web page; obtaining second time measurements of an amount of time that respective second users of the second user devices typically spend looking at the second web page; determining a comparative time measure that is indicative of a difference in time respective first and second users typically spend looking at the first and second web pages; using the baseline time and the comparative time measure to determine an amount of time that a typical user is likely to spend looking at the second information item included in the second web page. | 09-03-2009 |
20090222551 | METHOD AND SYSTEM FOR QUALIFYING USER ENGAGEMENT WITH A WEBSITE - A system and a method of identifying information characterizing use of a website is provided. A plurality of user profiles are analyzed. A user profile includes information associated with an interaction by a user with the website. A plurality of user comments associated with the website are analyzed. Characteristic information associated with use of the website is determined based on the analyzed user profiles and the analyzed user comments. The determined characteristic information is presented to a user. | 09-03-2009 |
20090222552 | HUMAN-COMPUTER PRODUCTIVITY MANAGEMENT SYSTEM AND METHOD - The invention is a human-computer productivity management system with both processes and data systems designed to monitor the interactions between humans and computer systems, log the interactions, securely transmit the data to a centralized server, archive the data, process the data into highly efficient database, analyze the data to calculate productivity metrics, distill the data into key business intelligence reports and control the use of the computer systems. | 09-03-2009 |
20090222553 | Monitoring network performance to identify sources of network performance degradation - A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation. | 09-03-2009 |
20090222554 | Statistics for online advertising - An apparatus and a method for collecting online advertisement statistics is described. In one embodiment, a web browser of a client requests from a server, a web page having an advertisement banner. The web browser receives the web page and a JavaScript program. The browser loads the webpage and the JavaScript program which polls the browser of one or more property of an HTML image object included in the advertisement banner of the web page. The JavaScript program reports out the one or more property of the HTML image object. | 09-03-2009 |
20090222555 | Network performance monitor - A network performance monitor for a computer. The performance monitor maintains a baseline for communication paths between a networked computer and other networked computers connected. The network performance baseline is established and maintained by measuring and updating network performance parameters of the communication paths. The network performance parameters are updated using values obtained during time intervals when the communication path consumed a bandwidth approximately equal to its estimated bandwidth. If congestion is detected on the network or the network is underutilized, values of the network performance parameters obtained during that interval are not used to update the network performance parameters. Some performance parameters in the baseline, such as minimum and maximum bandwidth values may be updated by computing a moving average of each parameter. Asymmetric weight values for updating the moving average may be selected based on a direction of change of a value of a network parameter. | 09-03-2009 |
20090222556 | Monitoring Network Usage - A method of determining whether a user has complied with a service level agreement (SLA) with a network operator, comprising collecting a set of data values representative of the user's service usage and comparing the set of data values to the service level agreement. The data values collected provide the operator with sufficient information so that it can determine whether a SLA is being complied with and to plan provision of network services. A method of monitoring a user's usage of a network service and a service usage indicator is also disclosed. | 09-03-2009 |
20090222557 | ANALYSIS SYSTEM, INFORMATION PROCESSING APPARATUS, ACTIVITY ANALYSIS METHOD AND PROGRAM PRODUCT - An analysis system, information processing apparatus, activity analysis method, and program for analyzing activities of an information source on a network. The system and apparatus include an attribute extraction block for extracting, an information propagation graph acquisition block for searching action history data, and a characteristic user calculation block for calculating an amount characteristic. The method and program product include the steps of extracting an information characteristic value, searching action history data, registering the information, calculating an amount characteristic, and integrating the amount characteristic. | 09-03-2009 |
20090222558 | Managing Network Data Transfers in a Virtual Computer System - A method for protecting a virtual computer system which may be susceptible to adverse effects from a Denial of Service attack is described. The virtual computer system includes a plurality of VMs. In the method, data that is transferred between the virtual computer system and the computer network is monitored for an indication of a possible Denial of Service attack. If an indication of a possible Denial of Service attack is detected, one or more of the VMs is suspended, to reduce the risk of adverse effects on one or more other VMs. | 09-03-2009 |
20090228579 | Unified Service Management - The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc. | 09-10-2009 |
20090240797 | An On Demand Message Based Financial Network Integration Middleware - The present invention relates to distributed networking, and in particularly to a message-based networking environment. More particularly, it relates to business applications ( | 09-24-2009 |
20090240798 | Resource Equalization for Inter- and Intra- Data Center Operations - An exemplary component for managing requests for resources in a data center includes a service request module for receiving requests for resources from a plurality of services and a resource module to monitor resources in a data center and to match received requests to resources. Such a component optionally includes an application programming interface (API) that provides for sending information in response to an API call made by a service. Other methods, devices and systems are also disclosed. | 09-24-2009 |
20090240799 | INTERACTIVE DNS FOR CONTROLLING PARTY - A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information. | 09-24-2009 |
20090240800 | REMOTE MONITORING OF USER INPUT DEVICES - A precision data capture recorder/security device non-intrusively and precisely captures and records information from computerized input devices (e.g., computer keyboards and mouses). Information collected by a data capture recorder co-located with a client can be precisely date and time tag user input to a user interface (e.g., keyboard) and transmitted to a base collection station for archiving and analysis. Archived information provides accurate history logs for regulatory audit compliance, data security, and system administrative troubleshooting. Analysis can help determine whether user data input patterns at the user interface are authorized. | 09-24-2009 |
20090240801 | Computer data network filter - An electronic device which connects a network (e.g. the internet) to a subnet (e.g. a home network) for the purpose of filtering the data that moves through the device in order to prevent computers on the subnet from accessing material on the network which may be deemed inappropriate (e.g. pornography). The device contains advanced algorithms that analyze the network traffic to determine the proper configuration of the network device, without the aid of any external peer- or server-based configuration protocols (e.g. Dynamic Host Control Protocol, or DHCP). The device also contains advanced algorithms to determine, apply and update the filter rules with no direct operator authorization or intervention. | 09-24-2009 |
20090240802 | METHOD AND APPARATUS FOR SELF TUNING NETWORK STACK - A method and apparatus for tuning a computer network by detecting different workload patterns. One embodiment of the method provides a system configuration analyzer to collect data regarding network configuration and tuning parameters, a workload analyzer to collect and store data relating to tuning such as network traffic information, a system tuner to determine whether there is a change in workload and whether tuning is necessary. Another embodiment of the method provides tuning policies that would instruct the system tuner to perform certain actions if the system tuner determines that tuning is necessary. | 09-24-2009 |
20090240803 | METHOD FOR COPYING SESSION INFORMATION, CALL CONTROL SERVER FOR EXECUTING THE SAME, AND COMPUTER PRODUCT - The method is executed by a call control server that establishes a media session for sending and receiving media data between a calling terminal and a called terminal. The method includes exchanging messages with calling terminal and called terminal for establishing the media session, generating a session information necessary for establishing the media session based on the messages exchanged with the calling terminal and/or the called terminal, monitoring a media information included in the messages, the media information containing a definition specifying a way of exchanging the media data, determining, based on the monitoring result, whether the media session has been established, and transferring the session information to at least one other call control server different from the call control server if the media session has been established. | 09-24-2009 |
20090240804 | METHOD AND APPARATUS FOR PREVENTING IGMP PACKET ATTACK - A method for preventing IGMP packet attacks includes two levels of anti-attack steps: anti-attacking on the basis of the source IP address of an IGMP packet; and anti-attacking on the basis of the multicast group IP address of the IGMP packet. Moreover, an apparatus for preventing IGMP packet attacks is disclosed herein. In the embodiments of the present disclosure, the attacks are prevented hierarchically in light of the source address and multicast group IP of the IGMP packet, thus effectively solving network exceptions caused by malicious IGMP packets which surge in a short time. | 09-24-2009 |
20090240805 | Isolating Local Performance Variation in Website Monitoring - Systems and methods are provided for isolating performance variation in website monitoring. A set of geographically diverse monitoring agents are identified and a subset of baseline agents is selected from these monitoring agents. The baseline agents are those agents that are geographically close to the target website or otherwise enjoy reliable communications with the target website and are therefore less affected by network latencies. The frequency at which a target website is monitored is weighted in favor of the baseline agents in order to get an accurate baseline metric for the target website while also obtaining information regarding global accessibility of the website from the geographically disperse monitoring agents. The variations in sample frequency can be optimized for each particular set of baseline agents. The set of baseline agents can be pre-assigned or dynamically identified based on an analysis of the performance variation from each of the monitoring agents. | 09-24-2009 |
20090248850 | WAIT FOR READY STATE - Automation of actions on a server system (e.g., web server, FTP server) is facilitated by a server system that is ready for actions to be performed upon it. Because there are scenarios when a server system is not in a state to be acted upon (e.g., web page changed due to navigation, script execution, asynchronous request through dynamic web extensions), an automated action needs to be synchronized to when then server system is in a ready state for that action to occur. A wait-for-ready state can be initiated that detects when a server system is ready for a next action. | 10-01-2009 |
20090248851 | DEPLOYING ANALYTIC FUNCTIONS - A method, system, and computer usable program product for deploying analytic functions are provided in the illustrative embodiments. A resource is identified in an analytic function specification. A set of input time series is identified for the analytic function specification. An analytic function instance corresponding to the analytic function specification is instantiated in relation to an object of the resource. Each input time series in the set of time series is located in relation to the object. The analytic function instance is associated with each input time series in the set of time series. An analysis is performed using the set of input time series and an analytic function described in the analytic function specification. The analytic function instance is instantiated if both the object and the set of data sources are present in an object graph where the analytic function instance is to be instantiated. | 10-01-2009 |
20090248852 | Evaluating Entities Associations with their Respective Environments - A method comprising representing an association between a first entity and a first environment as a first edge that connects a first node to a second node, wherein the first node and the second node respectively represent said first entity and said first environment; and assigning a first weight value or type to the first edge based on an association level detected between the first entity and the first environment. | 10-01-2009 |
20090248853 | REAL TIME CONTROL AND MANAGEMENT OF SECURITY "BUDDY" SYSTEM OVER MSO LAN - An inventive system and method for a buddy security system is presented. The system and method enable the buddy security system in which messages can be exchanged between two distinct security systems. The inventive system is operable on a network having dynamic IP addresses using a centralized database of real time IP addresses. An MSO maintains the centralized database including basic information for connecting the control panels of the security systems to each other. The first and second security systems each have a control panel having a dynamic IP address; the control panel of the second system provides information to and can be controlled by the control panel of the first system. The dynamically IP address of each control panel is obtained from the centralized database. | 10-01-2009 |
20090248854 | METHOD AND SYSTEM FOR ENERGY EFFICIENT ROUTING AND NETWORK SERVICES - A method and system of an embodiment may include identifying a power source used by a network element, determining a carbon footprint of a unit of power usage from the power source, identifying one or more components associated with the network element used for a network operation performed by the network element, determining the power usage of the one or more identified components during the process, and calculating the carbon footprint of the process performed by the network element. | 10-01-2009 |
20090248855 | METHOD FOR MONITORING WEB PAGE STATISTICS - A method includes, at a web server: receiving a request from a web browser for a page; requesting the page from a web application; receiving the requested page from the web application; generating a monitoring script after receiving the request from the web browser for the page, wherein the monitoring script is hardcoded with a reference to the web application; adding the generated monitoring script to the page; sending the page with the script to the web browser, the script executing on a system hosting the web browser for generating statistics; receiving the statistics generated by the script; receiving the reference to the web application with the statistics; and storing the statistics and the reference and an association of the reference with the statistics. | 10-01-2009 |
20090248856 | Staged Integration Of Distributed System And Publishing Of Remote Services - A method, computer program product, and system for the staged integration of a remote entity and the simultaneous publishing of services is provided. The integration of the distributed remote entities is broken into five stages, with appropriate events published after each stage. Each of the five stages is initiated only if the previous stage completed successfully. The first stage is the initiate discovery phase. The first event is the discovery start event. The second stage is the discovery completed phase. The second event is the discovery completed event. The third stage is the basic software services verified phase. The third event is the basic software verification completed event. The fourth stage is the basic hardware services verified phase. The fourth event is the basic hardware verification completed event. The fifth stage is the extended hardware services verified phase. The fifth event is the full integration of disturbed entity event. | 10-01-2009 |
20090248857 | SESSION MANAGEMENT METHOD FOR COMPUTER SYSTEM - There is provided a session management method for a computer system including an initiator, and a storage system coupled to the initiator via a network. The initiator includes an interface coupled to the network, a processor and a memory. The storage system includes an interface coupled to the network, a memory and a processor. The session management method comprising the steps of: executing, by the initiator, health check for diagnosing a status of a session established between the initiator and the storage system in the case of which no data is input/output to/from the storage device for a first predetermined period; and cutting off and re-establishing, by the initiator, the session with the storage system at a timing of executing the health check in the case of which no data is input/output to/from the storage system for a second predetermined period. | 10-01-2009 |
20090248858 | CONTENT MANAGEMENT - A system and method for management and processing of resource requests is provided. A content delivery network service provider determines a class associated with a set of client computing devices and monitors resources requests for the determined class. The content delivery network service provider then identifies at least one cache component for providing additional content, such as advertisement content or other additional content provided in anticipation of future resource requests, to client computing devices as a function of the determined class. In other embodiments, instead of cache components, the content delivery network service provider identifies a second set of client computing devices as a function of the determined class for providing the additional content information. | 10-01-2009 |
20090248859 | ELECTRONIC DEVICE AND METHOD FOR MONITORING COMMUNICATION WITHIN A NETWORK - The present invention relates to an electronic device ( | 10-01-2009 |
20090248860 | SYSTEM AND METHOD FOR USING VIRTUAL IP ADDRESSES IN A MULTI-USER SERVER SYSTEM - A method of handling network access in a multi-user server system is disclosed. In the disclose system, a virtual network adapter is created for each user session on the multi-user server system. Each virtual network adapter receives its own independent IP address such that each individual user session appears to be a unique network node to other systems on the computer network. | 10-01-2009 |
20090248861 | DEVICE MANAGER AND DEVICE MANAGEMENT PROGRAM - A device manager and a computer readable medium storing a device management program are provided. The device manager includes a transmission unit that transmits, to devices connected to a network, a broadcast command which requests management information that is stored in and unique to each device for use in communication using a first communication protocol that enables communication using authenticated and encrypted data; a determination unit that determines whether the devices are devices to be managed, on the basis of the management information received in response to the broadcast command; and an information acquisition unit that transmits, using the first communication protocol, to the devices determined by the determination unit to be devices to be managed among the plurality of devices, read data for reading information about the device in order to acquire information about the device. | 10-01-2009 |
20090248862 | Device and Computer Readable Medium - A device and a computer readable medium having a computer program stored thereon are provided. The device includes: a detecting unit configured to detect one or more host computers accessible from the device and operational states of the respective host computers; and a restricting unit configured to restrict a function of the device based on the operational states of the host computers detected by the detecting unit. | 10-01-2009 |
20090248863 | ANALYSIS APPARATUS, ANALYSIS METHOD AND RECORDING MEDIUM FOR RECORDING ANALYSIS PROGRAM - An analysis apparatus includes a history analysis part analyzing the trend based on the access log and deriving the latent trait to an access destination, a principal components analysis part analyzing principal components of the frequency distribution of the access, a classification part classifying the correlation of the principal components into plural classes, an event recording part recording the events to induce to the access destination, a first generating part generating a latent trait principal component table; a second generating part generating a class construction ratio table stored the class as the result of classification,a third generating part generating an event classification table stored the class and the contents of the event, and an analysis result recording part recording the latent trait principal component table, the class construction ratio table and the event classification table, as an event feature model of the effect on the execution of the event. | 10-01-2009 |
20090248864 | SYSTEM AND METHOD FOR TRACKING PERFORMANCE AND SERVICE LEVEL AGREEMENT COMPLIANCE FOR MULTIPOINT PACKET SERVICES - A system and method for measuring compliance with a service level agreement (SLA) for communications. A committed information rate operable to avoid contention is set. A determination is made that there is frame loss on the network. A determination is made if the CIR is exceeded in response to the determined frame loss. A determination is made that a service is noncompliant with the SLA in response to determining the CIR has not been exceeded. Noncompliance of the service with the SLA is logged. | 10-01-2009 |
20090248865 | LOAD DISTRIBUTION METHOD, LOAD DISTRIBUTION DEVICE, AND SYSTEM INCLUDING LOAD DISTRIBUTION DEVICE - A load distribution device that receives processing requests from terminals and that allocates and transfers the processing requests to at least one of a plurality of servers. The load distribution device includes a monitoring unit, a request receiving unit, an update server determining unit, a distribution ratio setting unit, a load distribution unit, a notification unit and an update completion detecting unit, whereupon receipt of a notification that the update of the server to be updated is completed, the update server determining unit determines that the update to the server to be updated is completed, determines a new server to be updated and a new server to be updated next, and instructs the distribution ratio setting unit to set the distribution ratios. | 10-01-2009 |
20090248866 | CONNECTION CONTROL METHOD AND CONNECTION SYSTEM - A connection control method includes: a transmitting step of transmitting a request for provision of a function by a transmitting unit; a first storing step of storing a task involving information having a disclosure restriction set thereon, and the site of a support device that provides a function to support execution of the task by processing the information, the task being associated with the site of the support device; a first retrieving step of retrieving the site of the support device stored in the first storing step associated with the task to be supported in response to the request; and a controlling step of restricting connections with other devices by controlling the transmitting unit to transmit the request to the support device located at the site retrieved in the first retrieving step and not to transmit the request to the other devices when the request transmitted in the transmitting step is a request for a support for execution of the task. | 10-01-2009 |
20090248867 | NETWORK SYSTEM, DEVICE, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A network system capable of autonomously changing a management configuration of a management device and managed devices in the network system. One of a plurality of devices connected to a network operates as a parent device that collects data from the other devices, and the remaining devices operate as child devices that transmit data to the parent device. When the load of the parent device becomes high, at least one of the child devices is selected and upgraded to a parent device. When the load of the original parent device decreases, the device upgraded to the parent device is automatically returned to the child device. | 10-01-2009 |
20090248868 | Contact Management in a Serverless Peer-to-Peer System - Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example. | 10-01-2009 |
20090254649 | HIGH AVAILABILITY OF INTERNET PROTOCOL ADDRESSES WITHIN A CLUSTER - A method, information processing system, and computer program storage product manage network layer addresses in a cluster multi-processing environment. Network address assignment in a cluster multi-processing environment is monitored. A network address currently assigned to a first network interface is determined, in response to monitoring network address assignment, to have been assigned to a second network interface. The first network interface is triggered to send an update message to at least one computing node communicatively coupled to the first network interface triggering in response to determining that a network address currently assigned to a first network interface has been assigned to a second network interface. The update message informs the computing node to transmit data associated with the network address to the first network interface. | 10-08-2009 |
20090254650 | TRAFFIC ANALYSIS FOR A LAWFUL INTERCEPTION SYSTEM - Methods, systems, and computer-readable media provide for analyzing data traffic captured by a lawful interception system. A first record, one or more intermediate records, and a second record are received. Each of the records contains a record of test traffic, such as a website, transmitted across a broadband network. The first record, the one or more intermediate records, and the second record are reassembled to form various versions of the website. The various versions of the website are displayed so that a visual comparison can be made to verify the operation of the lawful interception system. | 10-08-2009 |
20090254651 | VERIFYING A LAWFUL INTERCEPTION SYSTEM - Methods, systems, and computer-readable media provide for verifying a lawful interception system. A first file and a second file are received. The first file is formed by recording data traffic at a computer as the data traffic generated at the computer is transmitted from the computer to a remote network via a broadband remote access server (BRAS), saving the recorded data traffic as a first packet capture and flat file export (PCAP) file, and exporting packet summary lines from the first PCAP file. The second file is formed by intercepting the data traffic as the data traffic egresses from a mediation system to a law enforcement agency (LEA) system, saving the intercepted data traffic as a second PCAP file, and exporting packet summary lines from the second PCAP file. The first file is compared with the second file to verify an accuracy of the mediation system | 10-08-2009 |
20090254652 | RESOURCE CORRELATION PREDICTION - Embodiments of the present invention address deficiencies of the art in respect to resource mapping in a change configuration and systems monitoring solution and provide a novel and non-obvious method, system and computer program product for predictively mapping automatically discovered resources in a monitored system with a manually specified resource for the monitored system. In an embodiment of the invention, a resource mapping method for application dependency and discovery can be provided. The method can include automatically discovering resources in a monitored system, manually specifying a resource in the monitored system, filtering the automatically discovered resources to a set of resources likely to match the manually specified resource, and mapping the manually specified resource to a resource in the filtered set of resources. | 10-08-2009 |
20090254653 | Service utilization route output system, management server, service utilization route output method, and service utilization route output program - A service utilization route output system wherein an integrated search system comprises: a search execution history table storing, in a memory part, access information included in a request sent from a client PC to a search system cluster being service providing servers; a utilization route extracting part extracting a service accessed by the client on the basis of the access information and a service utilization route which is the sequence of the concerned service; a statistical information extracting part computing the number of times of extraction of service utilization routes that are the same as the service utilization route extracted with the utilization route extracting part; and a utilization route display data generating part associating the service utilization route and the number of times of extraction, and generating output information. | 10-08-2009 |
20090254654 | COMPUTER NETWORK - A peer-to-peer network operating in accordance with a service-oriented architecture is disclosed. The peers in the network request services from one another and each keep a record of the quality of service they receive from the other peers. The peers can operate in two modes of service provider selection. In a first mode, the selection is so as to favour service providers which have provided the peer with good service in the past. In a second mode, the selection is probabilistic and can therefore select service providers other than those that have provided good service in the past. Each device keeps track of the relative success of adopting the second mode of selection. By occasionally using the second mode of selection and adopting the second mode of selection more frequently should the relative success of adopting the second mode of selection rise, a more rapid adjustment by the network to changing network conditions is enabled. This leads to a better utilisation of the resources of the computers of the network than has hitherto been achieved. The invention finds particular application in distributed applications which dynamically select a Web Service to perform a function at run-time. | 10-08-2009 |
20090254655 | Generation and Control of Network Events and Conversion to SCADA Protocol Data Types - A system and method is disclosed for receiving a network event in a network format, mapping the network event into a format expected by a central monitoring system, and communicating the mapped network event to the central monitoring system. The system may employ a variety of communication protocols and physical architectures. The system may include an access controller that may connect a plurality of intelligent electronic devices and may be the primary interface with an information system or central monitoring system. The access controller may include a programmable logic engine in compliance with the IEC-61131-3 standard. The access controller may further be configured to implement rules designed to govern actions taken as a result of network information. | 10-08-2009 |
20090254656 | METHOD AND APPARATUS FOR CUSTODIAL MONITORING, FILTERING, AND APPROVING OF CONTENT - The system provides a method and apparatus for a parent or other custodian or guardian to monitor, filter, and approve of content to be accessed by a child or children on a network. In one embodiment, the system logs all activity on a network by a child and sends regular historical reports to the parent for review. The parent can set certain triggers that will provide more immediate feedback when certain events occur or when certain types of data are accessed, or an attempt is made by the child for such access. The system allows the parent to control the filters and options from a variety of sources, including via the child's computer, texting, instant messaging, cell phone, other web enabled computers, PDA's, etc. | 10-08-2009 |
20090254657 | Adaptive Bitrate Management for Streaming Media Over Packet Networks - A method including providing pseudo-streaming media data to a terminal; receiving a transport control protocol (TCP) acknowledgement from the terminal; estimating one or more network conditions of a network based at least in part on the TCP acknowledgement; determining an optimal session bitrate based on the estimated one or more network conditions; and providing pseudo-streaming media data to the terminal based on the optimal session bitrate. | 10-08-2009 |
20090259743 | DYNAMICALLY CALCULATING AN INBOUND BLOCKING FACTOR USING OPERATING-SYSTEM-LEVEL CONDITIONS - A current value of a changing operating-system-level condition can be determined, wherein the operating-system level condition is a condition of a host related to an operating system resource utilization or an operating system experienced latency. The operating-system level condition can be a condition of a layer of the OSI model above the Data Link Layer. An inbound blocking factor algorithm can execute that uses the determined current value as a variable. A value for an inbound blocking factor can be generated as a result of executing the inbound blocking factor algorithm. The generated value can be utilized as the inbound blocking factor to determine a manner in which incoming messages are to be conveyed from a network adaptor, through an adaptor interface boundary, to an operating system of the host. | 10-15-2009 |
20090259744 | System and Method for Running a Web-Based Application while Offline - A system and a method for executing a web-based application on a client computer system without a network connection to an application server that hosts the web-based application is presented. In these embodiments, the web-based application can provide functionality substantially similar to the functionality of the web-based application when the client computer system has a network connection to the application server. A system and method for synchronizing and resolving conflicts between an online and an offline web-based application is also presented. | 10-15-2009 |
20090259745 | METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - Methods and apparatus for nonintrusive monitoring of web browser usage are disclosed. An example method for monitoring web browsing disclosed herein comprises obtaining a video signal from a video output of a device implementing a web browser, processing a video image obtained from the video signal to identify a region of the video image displaying at least a portion of the web browser, determining textual information displayed by the web browser in the identified region of the video image, and using the textual information to record usage of the web browser. | 10-15-2009 |
20090259746 | NETWORK MANAGEMENT APPARATUS, NETWORK MANAGEMENT METHOD, AND MONITORING SYSTEM - A network management apparatus includes: an information acquisition section obtaining path information and link quality information from a plurality of wireless terminals operating in an ad hoc mode; and a display-information generation section generating a network configuration diagram showing a link state between the wireless terminals from the obtained path information, and changing an attribute of a display showing an established link in accordance with the link quality information. | 10-15-2009 |
20090259747 | INFORMATION COLLECTING SYSTEM - A method for connecting a storage device to an information generating device includes transferring an identifying message from the storage device to a control server via a computer network. The identifying message includes a unique identifier uniquely identifying the storage device, matching a registered information generating system to the unique identifier, and identifying at least one information generating device included in the matched information generating system. A configuration message is transferred from the control server to the storage device, and the configuration message includes an address to the identified at least one information generating device and instructions of interaction. The instructions of interaction are arranged to define how the transfer of generated information is to be performed. | 10-15-2009 |
20090259748 | SYSTEM AND METHOD FOR NETWORK VULNERABILITY DETECTION AND REPORTING - A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing. | 10-15-2009 |
20090259749 | COMPUTER SYSTEM INPUT/OUTPUT MANAGEMENT - The collection of performance data at multiple servers in a SAN and forwarding that data to a centralized server for analysis is disclosed. Remote agents and a central server application collect specific interesting negative event data to enable a picture of the operational health of the SAN to be determined. The agents are placed in servers having HBAs acting as initiators. The agents interact with the HBAs through a driver stack to collect event data. Because of the initiator function they perform, HBAs have visibility to parts of the network that other entities do not have access to, and thus are ideal locations for gathering event data. A SAN diagnostics manager then pulls the collected data from each agent so that a “picture” of the SAN can be developed. In addition to collecting initiator data, the agents also collect errors and performance data from the OS of the servers. | 10-15-2009 |
20090259750 | METHOD OF AND APPARATUS FOR COMMUNICATING DATA STRUCTURES BETWEEN DEVICES IN A NETWORKING ENVIRONMENT - The invention is an architecture, a system and a method for monitoring data structures over an IEEE 1394-1995 serial bus network. The data structures are portions of entries that are posted and stored to a descriptor mechanism. Preferably, the entries are schedule entries posted and stored to an AV/C resource schedule bulletin board subunit. According to the invention, a resource request is submitted by a requesting control device to the AV/C resource schedule bulletin board subunit, where request data is stored and posted as a schedule entry. The requesting control device also submits a corresponding notify command data frame to the AV/C bulletin board subunit. The notify command frame instructs the bulletin board subunit to monitor a specified data structure within the schedule entry. Preferably, the notify command frame also specifies the type of access activity that is monitored. When a competing control device performs the specified type of access activity on the specified data structure, the bulletin board subunit sends a notify response frame to the original requesting control device. The notify response frame provides an alert to the original requesting control device that the specified access activity has been performed on the specified data structure by a competing control device. The original requesting control device can then review that accessing activity performed on the data structure and any modifications made to the data structure to determine whether further scheduling is required. Preferably, the access activity of the competing device and modifications made to the schedule entry are stored within the memory unit of the bulletin board subunit to provide a detailed history of the schedule entry. | 10-15-2009 |
20090259751 | METHODS AND APPARATUS FOR MONITORING AND/OR CONTROL OF PROCESS CONTROL APPARATUS - A system for process control comprises a server digital data processor and a client digital data processor that are coupled by a network, such as the Internet or an Intranet. The server digital data processor, which is additionally coupled to a control/sensing device and any associated interface equipment (collectively, referred to as “process control apparatus”), includes a command processor that transfers information between the network and the process control apparatus. The client digital data processor includes an information client (e.g., a so-called Internet web browser) capable of requesting and receiving an applet from the server digital data processor. The information client, further, defines a hardware-independent and operating system-independent virtual machine environment within the client digital data processor. The client digital data processor executes, within that virtual machine environment, an applet for configuring the client digital data processor as a “process controller” that establishes communications over the network with the command processor and that monitors and/or controls the process control apparatus via those communications. | 10-15-2009 |
20090265456 | Method and system to manage multimedia sessions, allowing control over the set-up of communication channels - Managing multimedia sessions including surveying anomalies representing illicit uses of a determined signalling protocol, determining reactions in relation to the identified anomaly, collecting all requests exchanged between a client terminal and a proxy server, analysing collected requests for detection of anomalies, through the use of a plurality of indicators each associated with one of the identified anomalies, and in the event of the detection of at least one anomaly, triggering by the proxy server of a reaction corresponding to the detected anomaly, the reaction including real-time action during the communication concerned by the message containing the anomaly. The method therefore allows the real-time detection and filtering of hidden channels utilised in a signalling protocol such as SIP. | 10-22-2009 |
20090265457 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, AND DISPLAY METHOD FOR THE SAME - The device configuration of a communication system capable of wireless data communication between a plurality of terminal apparatuses is confirmed, together with the operating condition of each of the terminal apparatuses and the channel condition of wireless data communication. Whether a service that can be provided as a communication system is executable is identifiably displayed on a display based on the confirmation results. | 10-22-2009 |
20090265458 | DYNAMIC SERVER FLOW CONTROL IN A HYBRID PEER-TO-PEER NETWORK - Technologies are described herein for providing dynamic flow control of requests to a server in a hybrid peer-to-peer network. The server collects a number of metrics related to its current stability and the throughput of requests from peer-to-peer devices. These metrics, along with associated trend data, are used by the server to calculate a current stability rating and a current throughput rating. The server then imposes flow control on a proportional number of the peer-to-peer devices based upon the current ratings. This operation is run periodically, with ratings re-calculated from current metrics, and new flow control measures imposed in each cycle. | 10-22-2009 |
20090265459 | PROVIDING APPARATUS OF SERVICE INFORMATION AND PROVIDING METHOD THEREOF - A providing apparatus of service information provided over a network collects service information and/or service components provided over a network and is triggered by setting of a scenario (such as content such as a combination of service components or service information) to extract available service components for the scenario from the service information or the service components to generate integrated service information with the use of the service components based on the scenario. A scenario and a policy (selection criteria of service components) are set and the service components conforming to the policy are selected to create the integrated service information based on the scenario. | 10-22-2009 |
20090265460 | SYSTEM AND METHOD FOR TRACKING USER IDENTITY AND/OR ACTIVITY ACROSS MULTIPLE WEBSITES - A method of tracking a user and the user's activities on a telecommunications network. The method includes receiving a notification from a first web server that the user has accessed a first webpage on a first website, wherein the notification is received via a user tracking server operated by a tracking coordinator, setting a session cookie including a user tracking ID on the user's computer and/or web browser to track the user's activities on the network and storing tracking data for the user in a database associated with the user tracking server, receiving an indication from a second web server that the user has accessed a second webpage on a second website, wherein the second webpage comprises a confirmation webpage that includes transaction data for the user, retrieving the user tracking ID from the session cookie and associating the user tracking ID retrieved from the cookie with the transaction data obtained from the second webpage, and reporting the user tracking data to the first web server. | 10-22-2009 |
20090265461 | METHOD AND SYSTEM FOR CHARACTERIZATION OF ONLINE BEHAVIOR - Data about computer network traffic is collected as user website visit recording sessions. The data captured is analyzed and organized with sufficient level of detail or granularity to determine a single request from a server. Each data request is analyzed to determine if it comes from a server with which an ongoing end user interaction or open site visit is occurring. If not, a new site visit is created as a general proposition. If the data request is part of an open site visit, then the time is compared to the time of the last interaction and if the interval is sufficiently small, the data request is treated as a continuation of the visit. If the interval is large, a new site visit is created. | 10-22-2009 |
20090265462 | MONITORING APPARATUS AND STORAGE METHOD - A monitoring apparatus receives information about a storage condition of monitoring data from a management apparatus via a network, and acquires at least one of image data and audio data as the monitoring data. The monitoring apparatus detects a communication state with the management apparatus, and performs control to store the monitoring data which is determined to satisfy the storage condition into a storage device that is other than the management apparatus according to the detected communication state. | 10-22-2009 |
20090265463 | METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others. | 10-22-2009 |
20090265464 | System and method for alerting on open file-share sessions assosciated with a device - A method and system for detecting an active file-share session on a monitored device associated with a client device, alerting the user of the client device, and enabling them to terminate the file-share session, are disclosed. In accordance with the disclosed method and system, when a remote device (e.g., on a network, the internet, etc.) connects to a shared file or folder on a monitored device (e.g., a personal computer, network area storage, a game console, a storage area network, a smart telephone, etc.) the user of the client device receives an immediate, automatic alert with the specifics of the file-sharing session and data affected. The user is then presented with an option of whether to OK the file-sharing session (i.e. allow data access to proceed), or to disconnect the file-share session (i.e. cause the remote user to lose access to the monitored device's shared data). | 10-22-2009 |
20090265465 | FOOTPRINT-PROVIDING DEVICE AND FOOTPRINT-PROVIDING SYSTEM - A footprint-providing device which can put footprints on Web pages provided by various Web servers. The footprint-providing device is connected via a network to a client terminal that views a Web page with a browser. The footprint-providing device sends footprint data, which can be written on one part of the Web page that has been received by the browser of client terminal, to the browser receiving the Web page from a Web server as a response to a request that is made asynchronously with a view-request for the Web page by the browser. | 10-22-2009 |
20090271507 | SYSTEM AND METHOD FOR ASSISTED ADMINISTRATION OF REMOTE DEVICE UPDATES - The subject application is directed to a system and method for assisted administration of remote device updates. Device data is first received for each networked document processing device that includes data representing the current state of the hardware and software associated with each of the networked document processing devices. Update data is then received including the identity and availability of revised software. A comparison of the update data with the device data is performed. The compatibility of the received update data is determined based upon the comparison, and a display is generated representing each of the compatible devices. Selection data is then received corresponding to each displayed document processing device. The revised software is thereafter communicated to each document processing device identified by the selection data. The revised software is then installed on each device to which it was communicated. | 10-29-2009 |
20090271508 | METHOD AND APPARATUS FOR PROVIDING A MEASUREMENT OF PERFORMANCE FOR A NETWORK - A method and an apparatus for providing a measurement of performance for a network are disclosed. For example, the method sends a plurality of multi-objective probes on a path, and receives one or more of said plurality of multi-objective probes for the path. The method then determines a plurality of performance measurements. | 10-29-2009 |
20090271509 | PROBABILISTIC AGGREGATION OVER DISTRIBUTED DATA STREAMS - In one embodiment, a method of monitoring a network. The method includes, at each node of a set, constructing a corresponding vector of M components based on a stream of data packets received at the node during a time period, the set including a plurality of nodes of the network, M being greater than 1; and estimating a value of a byte traffic produced by a part of the packets based on the constructed vectors, the part being the packets received by every node of the set. The constructing includes updating a component of the vector corresponding to one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting a component of the vector to be updated by hashing a property of the received data packet. | 10-29-2009 |
20090271510 | NETWORK STATE PLATFORM - A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement. | 10-29-2009 |
20090271511 | AUTOMATIC CONTEXT-BASED BASELINING FOR TRANSACTIONS - Application health is determined by calculating baseline deviation for one or more transactions based on past data having the same context as current data being examined. The performance data is generated in response to monitoring one or more applications that perform transactions during a time period. The performance data may include transaction metric data and the context data describing conditions under which one or more transactions were performed. A baseline is determined by predicting current or recent transaction performance data values using past transaction performance data associated with the same context. Based on the comparison of the actual and predicted data with the same or similar context, a deviation from the baseline value is determined for the transaction and reported, for example to a user through an interface. | 10-29-2009 |
20090271512 | TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE - A packet-centric wireless point to multi-point telecommunications system includes: a wireless base station communicating via a packet-centric protocol to a first data network; one or more host workstations communicating via the packet-centric protocol to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via the packet-centric protocol over a wireless medium; and one or more subscriber workstations coupled via the packet-centric protocol to each of the subscriber CPE stations over a second network. The packet-centric protocol can be transmission control protocol/internet protocol (TCP/IP). The packet-centric protocol can be a user datagram protocol/internet protocol (UDP/IP). The system can include a resource allocation means for allocating shared bandwidth among the subscriber CPE stations. The resource allocation is performed to optimize end-user quality of service (QoS). The wireless communication medium can include at least one of: a radio frequency (RF) communications medium; a cable communications medium; and a satellite communications medium. The wireless communication medium can further include a telecommunications access method including at least one of: a time division multiple access (TDMA) access method; a time division multiple access/time division duplex (TDMA/TDD) access method; a code division multiple access (CDMA) access method; and a frequency division multiple access (FDMA) access method. | 10-29-2009 |
20090271513 | Method and system for adaptive data transfer over packet networks - There is provided a method for adaptive data transfer over packet networks. The method comprises selecting a first communication path for transferring the data to the second computer, starting to transfer the data over the first communication path to the second computer, monitoring transfer characteristics of the first communication path related to the data transfer, storing the transfer characteristics associated with the first communication path in a database, comparing the transfer characteristics against one or more previously stored transfer characteristics related to one or more prior data transfers, and determining whether to alter a transfer algorithm being utilized for transferring the data to the second computer based on the comparing. | 10-29-2009 |
20090271514 | SYSTEM AND METHOD FOR MONITORING USER INTERACTION WITH WEB PAGES - Systems and methods for monitoring usage of an electronic device are disclosed herein. A client component in stalled in a client device is operative to monitor usage of the client device in accordance with a monitoring profile, and to generate corresponding usage data. The monitoring profile typically includes information specifying which features of which application programs are to be disabled on the client device. A server component, installed on a server device in communication with the client device, provides the monitoring profile to the client device and receives the usage data from the client device. | 10-29-2009 |
20090276516 | DOWNLOAD AND DATA TRANSFER GAMING SYSTEM - A download and data transfer gaming system utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The system redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This system is much more redundant by eliminating the possibility of a client missing a download broadcast. The system alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience. | 11-05-2009 |
20090276517 | DOWNLOAD AND DATA TRANSFER GAMING METHOD - A download and data transfer gaming method utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The method redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This method is much more redundant by eliminating the possibility of a client missing a download broadcast. The method alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience. | 11-05-2009 |
20090276518 | TECHNIQUE FOR REGULATING LINK TRAFFIC - A system which regulates communication with a server is described. During operation, the system determines a retransmission rate of data packets during a first set of conversations between a group of users and the server via a peering link. Next, the system compares the retransmission rate and an historical retransmission rate of data packets during a second set of conversations between a second group of users and the server via the peering link. The system then adjusts a target acceptance rate of the server to requests to initiate conversations with additional users via the peering link based on the comparison of the retransmission rate and the historical retransmission rate. Additionally, the system accepts or rejects a request to initiate a conversation between another user and the server via the peering link based on an actual acceptance rate of the server to requests to initiate the conversations and the target acceptance rate. | 11-05-2009 |
20090276519 | Method and System for Achieving Better Efficiency in a Client Grid Using Node Resource Usage and Tracking - A system, method and computer program product for distributing task assignments on a computer network comprising a client grid having at least one server coupled to at least one client node and a plurality of client computers coupled to the client node through a plurality of monitoring agents. Each monitoring agent collects data regarding the resources a particular client computer makes available to the grid and transmits the data to the grid server when the client computer requests a grid task. The system generates a resource probability distribution based on the historical computing resource data and employs a scheduling algorithm to distribute grid tasks to the client computers using at least the probability distribution. | 11-05-2009 |
20090276520 | METHOD AND APPARATUS FOR SERVER ELECTION, DISCOVERY AND SELECTION IN MOBILE AD HOC NETWORKS - A method and apparatus for server election, discovery and selection in mobile ad hoc communication networks is disclosed. The server election method may include a server node that may elect itself as a server in network if the received server capabilities, network server lists and network specific parameters allow its election as a server in the network. A client node may discover and select a server in the network by transmitting a server discovery request to a plurality of nodes in the network, receiving advertisements from one or more servers in the network in response to the server discovery request, and selecting a server based on the received stability and connectivity information for each server from which advertisements are received. | 11-05-2009 |
20090276521 | JUDICIAL MONITORING ON PEER-TO-PEER NETWORKS - The invention relates to a procedure for judicial monitoring in peer-to-peer networks, in which participants to be monitored are marked, and in which furthermore upon setting up a peer-to-peer communication with a marked participant the connection is diverted via a monitoring server and access to the communication data takes place with an appropriate monitoring server service. This realizes the requirement for judicial monitoring in a simple way. | 11-05-2009 |
20090276522 | COOPERATIVE MONITORING OF PEER-TO-PEER NETWORK ACTIVITY - Particular embodiments include cooperative monitoring of peer-to-peer activity on a network including maintaining communication between a local monitoring process and a network monitoring process such that a process can use both network monitoring and local monitoring. The cooperative monitoring includes monitoring a local peer using local monitoring of a point in the network by monitoring packets passing through the point, monitoring the network using network monitoring by a monitoring system or agent coupled to the network, and analyzing the result of network monitoring and local monitoring to determine at least one file transfer association with the local peer. | 11-05-2009 |
20090276523 | EXPRESSION-BASED WEB LOGGER FOR USAGE AND NAVIGATIONAL BEHAVIOR TRACKING - Configurably storing data in a plurality of files based on expressions and conditions associated with the data. Logging software enables tracking of the navigation pattern of users for selected network properties under specified conditions. The logging software is configurable such that most current and future logging specifications may be fulfilled without any code changes to the logging software. | 11-05-2009 |
20090276524 | THIN CLIENT TERMINAL, OPERATION PROGRAM AND METHOD THEREOF, AND THIN CLIENT SYSTEM - A thin client terminal | 11-05-2009 |
20090276525 | METHOD AND APPARATUS FOR INTEGRATING HETEROGENEOUS SENSOR DATA IN UBIQUITOUS SENSOR NETWORK - Provided is an apparatus and method for integrating heterogeneous sensor data in a ubiquitous sensor network. The method includes steps of receiving an integrated query for heterogeneous sensor networks from a sensor network management system, disintegrating the received integrated query to be suitable for each sensor network and transmitting the disintegrated queries to each corresponding sensor network. The method further includes steps of generating responses as integrated sensor data and storing the integrated sensor data into an integrated database, when receiving responses to respective queries from each of the sensor networks, and converting the integrated sensor data stored in the integrated database into a preset data format and transmitting the converted sensor data to the sensor network management system. | 11-05-2009 |
20090282143 | TESTING OPERATION OF PROCESSORS SETUP TO OPERATE IN DIFFERENT MODES - Testing operation of processors setup to operate in different modes. In an embodiment, each tester system includes a processor setup to operate in a corresponding mode. A user sends a test request to a scheduler system indicating the mode of the processor sought to be tested, and the scheduler system forwards the test request to one of the tester systems with a processor setup to test the requested configuration. The scheduler system may maintain configuration information indicating which processors are setup to test which modes of interest, and also status information indicating which tester systems are presently available for testing. The configuration information and status information is used in determining a specific suitable tester system to which a test request is to be forwarded. | 11-12-2009 |
20090282144 | SYSTEM FOR TARGETING THIRD PARTY CONTENT TO USERS BASED ON SOCIAL NETWORKS - A method and system of providing Internet content to a user utilizing social networks is disclosed. The method comprises providing Internet usage data for a plurality of users, determining which users belong to the same social network, and providing at least one of the users access to Internet usage data for those other users who are in the same social network. | 11-12-2009 |
20090282145 | NETWORK DEVICE, METHOD FOR SPECIFYING INSTALLATION POSITION OF NETWORK DEVICE, AND NOTIFICATION DEVICE - A network device, method for specifying installation position of network device, and notification device are provided. The network device includes: a loop detecting unit configured to detect a loop caused by the network device; and a location notifying unit configured to allow the network device itself to indicate a location of the network device in response to a detection of the loop. | 11-12-2009 |
20090282146 | EQUIPMENT MANAGEMENT DEVICE, EQUIPMENT MANAGEMENT SYSTEM, EQUIPMENT MANAGEMENT METHOD, AND RECORDING MEDIUM - An equipment management device manages one or more pieces of equipment which are connected to the equipment management device via a network. The equipment management device includes a determining unit which determines whether a non-authenticated software item exists in each of the one or more pieces of equipment, and a license management unit which performs license management of one or more software items installed in each of the one or more pieces of equipment, based on a result of the determination by the determining unit. | 11-12-2009 |
20090282147 | System And Method For Harmonizing Changes In User Activities, Device Capabilities And Presence Information - A method and system utilizes presence information for a device. The method and system comprise receiving a communication indicating a change to a user activity from a first device operated by a user. The existing presence status of the user to the presence status associated with the user activity for the user of a second device is automatically changed in response to the received change to the user activity. The second device is informed of the changing of the existing presence status for the second device to automatically alter a capability of the second device based on the changing of the existing presence status and based on a stored indication from the user on how the capability is to be altered. | 11-12-2009 |
20090287811 | Configuration of network's nodes in a telecommunication system - The idea of the present invention providing a solution for configuration problems of a node is based on the following components. A problem recognition system, which analyses performance indicators and identifies root causes, so that signatures can be attached to a found problems. Furthermore there is a signature based filtering system, which looks for transactions satisfying signatures. A customer identification system labels the transactions with the subscriber identify. A solution feedback system generates feedback event to the end node according to the rule of the signature. | 11-19-2009 |
20090287812 | Network Connection Switching Unit and Network Station - The invention relates to the field of data transmission in a network of distributed stations. One problem, particularly in a UPnP based network, is that the UPNP devices need to be constantly switched on in order to be available in the network. The invention intervenes at this point and describes ways in which unused network stations can be switched off but continue to be identified as devices in the network. If a device which is switched off is needed, it is automatically switched on. This allows a considerable power saving to be achieved in the network. The invention provides for a network connection switching unit to contain “communication maintenance means” which maintain the communication for an inactivated network station at least to a restricted extent instead of the inactivated network station. A network station matched thereto is also proposed. | 11-19-2009 |
20090287813 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR ANALYZING COMMUNICATION RELATIONSHIPS - An apparatus may include a processor configured to store a record of communications with a remote device. The processor may be further configured to calculate one or more values representative of a communication relationship with the remote device over a period of time based at least in part upon the stored record of communications. The processor may be additionally configured to determine a communication relationship pattern based upon the one or more calculated values. | 11-19-2009 |
20090287814 | VISUALIZATION OF STREAMING REAL-TIME DATA - A system facilitates dynamic data visualizations. The system includes an analysis component that periodically processes one or more incoming data streams to determine a visualization form from a plurality of visualization forms. A visualization component dynamically generates the visualization form based in part on the processing of the incoming data streams. | 11-19-2009 |
20090287815 | Systems and Methods for Monitoring A Remote Network - One embodiment relates to a method for monitoring a remote network over the Internet. In the method, a monitoring request from a client is received from over the Internet at a server. The server transmits a relayed monitoring request over the Internet to a remote network monitor. The remote network monitor is adapted to passively monitor the remote network based on the monitoring request, thereby detecting whether an unfavorable communication condition is met the remote network. | 11-19-2009 |
20090287816 | LINK LAYER THROUGHPUT TESTING - A technique for testing a network path involves making use of feedback enabling parameters. Values for the feedback enabling parameters can be generated from a measurement of path performance. The technique can be implemented for wireless paths. The technique can also be implemented for multi-hop paths. | 11-19-2009 |
20090287817 | Network Device - A network device to be connected to a server via a network comprises: a cable connecting unit connected to a network cable for connection to the network; a network controller for sending/receiving signals to/from the cable connecting unit and for detecting whether the network cable is connected to the cable connecting unit; a CPU for recognizing a server connected to the network; and a signal transmission line for transmission of a detection signal indicating that the network cable is connected to the cable connecting unit. When the CPU receives an interrupt signal from the network controller, the CPU performs a process to recognize the server connected to the network. This makes it possible for the CPU (hence the network device) to automatically recognize the server immediately after the network cable is connected to the cable connecting unit without requiring a user to spend time and labor for the server recognition. | 11-19-2009 |
20090287818 | MONITORING APPARATUS AND MONITORING METHOD - A monitoring apparatus for monitoring communication configurations of a plurality of client devices connected to a server, the monitoring apparatus includes: a processor for controlling the communications between the client devices and the server in accordance with a process including: receiving from each of the client devices communication condition information and storing latest communication condition information of each of the client devices; determining at a time interval whether any of client devices became incapable of communication with the server by checking the latest communication condition information of each of client devices; and upon detection of at least one of the client devices for which obsolete communication condition information is stored, issuing a notice indicating that the at least one of the client devices are incapable of communication with the server. | 11-19-2009 |
20090292803 | Method for measuring web visitors - An apparatus and a method for tracking the number of hits to a web page is described. In one embodiment, a web browser of a client requests from a server a web page. The server redirects the web browser to a cookie counting web page, where the cookie counting web page provides a tracking cookie to the web browser. The server computes the number of unique hits to the web page without cookies based on the number of hits to the cookie counting web page without tracking cookies, the number of unique hits to the cookie counting web page with tracking cookies, the number of all hits to the cookie counting web page with tracking cookies. | 11-26-2009 |
20090292804 | CONTENT TRANSMISSION APPARATUS, CONTENT RECEPTION APPARATUS, AND CONTENT UPLOAD METHOD - According to one embodiment, a content transmission apparatus includes a data acquisition module configured to get a content item and metadata having a plurality of items for explaining details of the content, a notification module configured to notify an upload destination apparatus for the content of the metadata, a transmission module configured to encode the content and transmits the encoded content as a body of an upload request based on an HTTP POST request to an entry point created by a content reception apparatus on the basis of the metadata, a detection module configured to detect a change in metadata notified to the content reception apparatus relative to metadata newly got by the data acquisition module, and a posterior notification module configured to notify the content reception apparatus of posterior metadata containing at least a changed item in the metadata, when the detection module detects a change in the metadata. | 11-26-2009 |
20090292805 | SYSTEM AND METHOD FOR NETWORK MONITORING OF INTERNET PROTOCOL (IP) NETWORKS - A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding. | 11-26-2009 |
20090300161 | Method and system for using feedback in accessing network services - A method and system for providing or utilizing feedback information in accessing network services. In one embodiment, a client requests a set of one or more service locations for service providers from a directory service. The directory service provides the set. The client then selects a service provider and initiates a transaction. Feedback data regarding the transaction is then collected for use in providing or selecting service providers, or in improving the directory service processes. | 12-03-2009 |
20090300162 | System and method for performing mobile services, in particular push services in a wireless communication - An intermediate component is intermediate between mobile terminals requesting a service, such as a push service, and a service-providing server, such as an HTTP server. The intermediate component is a connection machine or hub that is able to open a session the first time it receives a request from a mobile terminal, by instantiating a communication channel for performing the communications with the mobile terminal and storing the data regarding the open session in a connection table. Then, the connection hub generates a request to a service-providing server, including connection data, and manages the communication with the service-providing server. The connection data are inserted in every communication between the connection hub and the mobile terminal and between the connection hub and the service-providing server. From that moment on, all the data (messages, requests) exchanged between the terminal and the service-providing server are routed on the instantiated channel, thus in a fast and efficient way. | 12-03-2009 |
20090300163 | SYSTEMS AND METHODS FOR AUTOMATIC SUBMISSION OF FORMS ON A WEB PAGE - Systems and methods for automatically submitting data entered into a web page in the event the user shifts focus away from the form may include displaying a web page to a user, the web page containing a form; receiving, from the user, at least some input corresponding to the form; detecting that the form has lost user focus; and submitting, in response to the detection, the form. | 12-03-2009 |
20090300164 | SYSTEMS AND METHODS FOR SOFTWARE APPLIANCE MANAGEMENT USING BROADCAST MECHANISM - Embodiments relate to systems and methods for managing software appliances using a broadcast mechanism. Embodiments incorporate a centralized appliance monitor that collects software appliance state information from a community of clients having software appliance installations. Software appliances can comprise a reduced-component operating system combined with pre-configured application(s), for instance distributed via optical disc or Web download. When a software appliance instantiates on a client in the network or at other times, the identity and execution state of the application is broadcast to an appliance monitor. The appliance monitor aggregates the appliance state information for all clients in the network, and manages their deployment and execution on the network. The appliance monitor can for example transmit an appliance control instruction to a client to terminate or otherwise manage an uncertified or unapproved appliance, or take other network management action. | 12-03-2009 |
20090300165 | Message Monitor, Analyzer, Recorder and Viewer in a Publisher-Subscriber Environment - A method of performing a sequence-of-events analysis in a power monitoring system includes the acts of monitoring, receiving, analyzing, and storing. The act of monitoring includes monitoring messages published by multiple power monitors over a peer-to-peer communications network. The messages include electrical power monitoring parameters. The act of receiving includes receiving the published messages in a subscriber intelligent electronic device in the power monitoring system. The act of analyzing includes analyzing at least a portion of the received messages, performing statistical analysis and/or continuously scanning for an event of interest. The act of storing includes storing at least one record including at least one of statistical data or event of interest data. | 12-03-2009 |
20090300166 | MECHANISM FOR ADAPTIVE PROFILING FOR PERFORMANCE ANALYSIS - Adaptive profiling for performance analysis of a computer system controls one or more agents to monitor a plurality of events occurring in a target computer system based on an adaptive logic. Collected data may be filtered and analyzed to determine one or more contributor events that attribute to performance of the target computer system. One or more patterns are observed or detected in said collected data, behavior of said one or more agents are adjusted based on said detected one or more patterns. The adaptive logic may be further reconfigured based on said detected one or more patterns. | 12-03-2009 |
20090300167 | NETWORKED IMAGE VISUALIZATION IMAGE QUALITY ENHANCEMENT METHOD AND SYSTEM - A method for managing medical image data transmission between computing devices is disclosed. In one embodiment, the method includes monitoring a plurality of parameters of a computer network that includes a server and a client. The plurality of parameters may include a client resource parameter, a server resource parameter, and a network operating parameter. The disclosed method may also include automatically determining a desired compression level at which to send medical image data to the client based at least in part on the client resource parameter, the server resource parameter, and the network operating parameter. Further, in one embodiment the method may include communicating the medical image data from the server to the client at the desired compression level in response to a client request for the image data. Various other methods, systems, and manufactures are also disclosed. | 12-03-2009 |
20090300168 | DEVICE-SPECIFIC IDENTITY - A device identifier (ID) is used across enterprise boundaries. A user can use the device ID to publish a device for sharing with other remote users. The remote users can discover devices that are shared by other users based on device IDs, connect to a selected device, and then verify that they have connected to the correct device based on its device ID. An account authority service may be used to manage the publication and/or discovery of the shared devices and their device IDs. | 12-03-2009 |
20090300169 | SYNCHRONIZATION THROTTLING BASED ON USER ACTIVITY - Synchronization of data across multiple endpoints in a mesh network that supports a data sharing service is throttled responsively to user activity in the network by monitoring the activity using a component in a mesh operating environment (“MOE”) runtime that is instantiated on each endpoint. The monitoring may include the collection of data that can be used to infer user activity, as well as data that explicitly indicates activity. State information is maintained so that data can be synchronized across the endpoints even when a user goes offline from the service. When the user logs on to the service, makes changes to a shared file, or the endpoint device starts up upon connection to a mesh network, throttling is performed by prioritizing work items associated with synchronization operations so that resources on the endpoint are not excessively consumed which could reduce the quality of the user experience. | 12-03-2009 |
20090300170 | TEST AND MONITORING DEVICE MANAGEMENT WITH MULTI-FACETED COMMUNICATION CAPABILITY - A routing/hub device and a data management system are provided to managing test and monitoring devices such as portable test and monitoring devices in healthcare. The routing/hub device interfaces through a variety of communication means with one or more peripheral devices collecting data and configuring those devices based on user input or input from the data management system. Collected data is provided to the data management system for actions such as analysis, reporting, and the like. Alerts and messages may also be provided to designated recipients directly or through the data management system based on predefined rules for collected data. | 12-03-2009 |
20090300171 | REMOTELY MANAGED TEST AND MONITORING DEVICE FUNCTIONALITY WITH MULTI-FACETED COMMUNICATION CAPABILITY - A routing/hub functionality software and associated hardware platforms are provided for managing test and monitoring devices such as portable test and monitoring devices in healthcare. The routing/hub functionality software can be executed on custom or generic computing platforms and interface through a variety of communication means with multiple peripheral devices collecting data. The software may also configure those devices based on user input or input from the data management system. Collected data is provided to the data management system for actions such as analysis, reporting, and peripheral device configuration. Alerts and messages may also be provided to designated recipients directly or through the data management system based on predefined rules for collected data. | 12-03-2009 |
20090300172 | Relay apparatus, relay method, and monitoring apparatus - A relay apparatus receives connection check mail transmitted from a plurality of terminal apparatuses connected to the relay apparatus to a monitoring apparatus when the configuration or settings of the terminal apparatuses changes. The relay apparatus attaches a relay apparatus ID that uniquely identifies the relay apparatus to the header of the connection check mail. The relay apparatus transmits the connection check mail with the relay apparatus ID attached thereto to the monitoring apparatus. When stopping the monitoring of the terminal apparatus under the control of the relay apparatus, the relay apparatus transmits to the monitoring apparatus monitoring stop instruction mail with the relay apparatus ID attached thereto. | 12-03-2009 |
20090300173 | Method, System and Apparatus for Managing, Modeling, Predicting, Allocating and Utilizing Resources and Bottlenecks in a Computer Network - A method and apparatus for managing, modeling, predicting, allocating and utilizing resources and bottlenecks in a computer network managing, predicting and displaying of capacity, allocating and utilizing of resources, as well as actual and potential performance-degrading resource shortages in a computer network, is provided. Specifically, exemplary implementations of the present invention provide a method, system and apparatus for calculating, detecting, predicting, and presenting resource allocation, utilization, capacity bottlenecks and availability information, in a computer network, particularly in a virtualized computer environment. | 12-03-2009 |
20090300174 | SPACE MANAGEMENT SYSTEM AND METHOD - A space management system for analyzing the utilization of a space by one or more persons is provided. The space management system includes a data collector configured to collect information output by an identifier distributed in or around the space. The information indicates presence of the one or more persons in the space. The data collector is further configured to store occupancy data for the space based on the collected information. A data analyzer coupled to the data collector is configured to generate a graphical report or user interface based on the occupancy data. | 12-03-2009 |
20090300175 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM OF STORING COMPUTER PROGRAM TO PERFORM CONTROL METHOD - In a search server, a search request for searching for a device is received from a client PC, the device satisfying a search condition included in the received search request is searched for, and a searched result is transmitted to the client PC. Further, it is judged whether or not an apparatus at a transfer destination to which the search request is transferred has been registered in the search server. If it is judged that the apparatus at the transfer destination has been registered in the search server, the search request is transferred to the registered apparatus at the transfer destination based on the received search request. | 12-03-2009 |
20090300176 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus connected via a network to a plurality of devices and a DHCP server adapted to assign an IP address to each of the devices includes a storage unit that stores device information for each of the devices, a receiving unit that receives from a second information processing apparatus a search request for searching for a device, a search unit that searches for a device in response to the search request received by the receiving unit, a sending unit that sends a search result obtained by the search unit to the second information processing apparatus, and a control unit that updates, when a device is no longer capable of communicating via the network, device information corresponding to the device among the device information stored in the storage unit and that sends a notification for releasing the IP address assigned to the device to the DHCP server. | 12-03-2009 |
20090300177 | System and Method For Detection of Aberrant Network Behavior By Clients of a Network Access Gateway - A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway. | 12-03-2009 |
20090300178 | NETWORK INCLUDING SNOOPING - A computer network including:
| 12-03-2009 |
20090307344 | WEB PAGE RANKING METHOD AND SYSTEM BASED ON USER REFERRALS - A system and method for ranking web pages based on referrals sent from one user to another. Web pages that are sent to other users are tracked and their information is stored in a referral depository coupled to a referral server. Referral messages are also tracked when the recipient accesses the referred web page and when the recipient further refers the web page to another user. A ranking server can respond to a query regarding accessed web pages by accessing the referral depository and analyzing its contents. | 12-10-2009 |
20090307345 | AUTOMATED DIGITAL MEDIA CONTENT FILTRATION BASED ON RELATIONSHIP MONITORING - An apparatus, system, and method are disclosed for automated digital media content filtration based on relationship monitoring. The method determines a plurality of user relationships based at least in part on an online association between a user and a content producer. The method monitors each user relationship with each content producer for a relationship interaction between the user and the content producer. Furthermore, the method also identifies digital media content published by a content producer having a relationship with the user. A determined relevancy may be based on a strength factor derived at least in part on monitored relationship interactions between the user and the content producer that published the digital media content. The digital media content is presented to the user, with that having a greater relevancy weight having a higher priority than other digital media content available to the user from other content producers. | 12-10-2009 |
20090307346 | ADAPTIVE ASSET INFORMATION COLLECTION AND STORAGE - A network management device which registers for any state change notifications from the devices in the network. The network management device updates its status and values of the devices associated with each state change notification by querying the device. In this manner the management device can make a more timely update for a particular device and need not keep querying devices that have not changed, thus eliminating many unnecessary transactions. In certain embodiments polling is still performed. As a result, the management device is both more current in its displayed data and has fewer network transactions. | 12-10-2009 |
20090307347 | Using Transaction Latency Profiles For Characterizing Application Updates - One embodiment is a method that determines transaction latencies occurring at an application server and a database server in a multi-tier architecture. The method then analyzes the transaction latencies at the application server with Central Processing Unit (CPU) utilization during a monitoring window to determine whether a change in transaction performance at the application server results from an update to an application. | 12-10-2009 |
20090307348 | SYSTEMS FOR DISTRIBUTING DATA OVER A COMPUTER NETWORK AND METHODS FOR ARRANGING NODES FOR DISTRIBUTION OF DATA OVER A COMPUTER NETWORK - Various embodiments of the present invention relate to a system for distributing data (e.g., content data) over a computer network and a method of arranging receiver nodes in a computer network such that the capacity of a server is effectively increased (e.g., the capacity of a server may be effectively multiplied many times over; the capacity of the server may be effectively increased exponentially). In one embodiment the present invention may take advantage of the excess capacity many receiver nodes possess, and may use such receiver nodes as repeaters. The distribution system may include node(s) having database(s) which indicate ancestor(s) and/or descendant(s) of the node so that reconfiguration of the distribution network may be accomplished without burdening the system's primary server. An embodiment of the present invention may include a process for configuring a computer information distribution network having a primary server node and user nodes docked in a cascaded relationship, and reconfiguring the network in the event that a user node departs from the network. In one example (which example is intended to be illustrative and not restrictive), the process may include the steps of providing a new user node (or connection requesting user node) with a connection address list of nodes within the network, having the new user node (or connection requesting user node) go to (or attempt to go to) the node at the top of the connection address list, determine whether that node is still part of the distribution network, and connect thereto if it is, and if it is not, to go to (or attempt to go to) the next node on the connection address list. In another example (which example is intended to be illustrative and not restrictive), when a user node departs from the distribution network, a propagation signal may be transmitted to the nodes below it in the network, causing them to move up in the network in a predetermined order. In another example (which example is intended to be illustrative and not restrictive), the present invention may provide a decentralized approach which provides, to each new user node (or connection requesting user node) a path back to the root server. | 12-10-2009 |
20090307349 | SYSTEM AND METHOD FOR COMMUNICATION BASED ON AN AVAILABILITY OF A USER - The present invention provides a system and method for communication based on an availability level of a presence entity in a communication network that includes a first step ( | 12-10-2009 |
20090307350 | IN-KERNAL CONTENT-AWARE SERVICE DIFFERENTIATION - The increasing number of Internet users and innovative new services such as e-commerce are placing new demands on Web servers. It is becoming essential for Web servers to provide performance isolation, have fast recovery times, and provide continuous service during overload at least to preferred customers. The invention describes a kernel-based architecture for content-aware service differentiation that protects Web servers against overload by controlling the amount and rate of work entering the system. We have invented a mechanism that provides admission control and service differentiation based on connection and application level information. The application header-based connection control uses application-level information (such as URIs and cookies for HTTP) to define different service differentiation actions. The present invention provides the kernel mechanisms that are more efficient and scalable than application level controls implemented in current Web servers. | 12-10-2009 |
20090307351 | SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm. | 12-10-2009 |
20090313369 | Network-Assisted Remote Media Listening - Improved approaches for media listening amongst different users are disclosed. For example, methods, systems or computer program code can enable users to have a remote listening experience in real time. Advantageously, a remote user at a remote client device can in effect listen to a particular digital media asset that is being played at a local client device of a local user. Media information and/or user profiles can also be provided about themselves and shared with other users. | 12-17-2009 |
20090313370 | SPACE-TIME CALIBRATION SYSTEM AND METHOD - A space-time calibration system and method implement space-time solutions, in which, in one preferred embodiment, a single node determines its own space-time solutions based on other network nodes with which the single node communicates. In other preferred embodiments, space-time solutions for the node can be generated using other resources in the network. The disclosed system and method enable reliable, precise object positioning particularly for environments where the Global Positioning System (GPS) is blocked or subject to interference such as within the urban core. | 12-17-2009 |
20090313371 | ACCELERATED AND REPRODUCIBLE DOMAIN VISITOR TARGETING - A device, system, and method are directed towards managing and tracking of cross-domain user activities through use of a beacon. As a user of a client device requests content from different domain services managed by a common entity, they may receive a Uniform Resource Locator (URL) to a beacon in at least one of the different domains. In one embodiment, the beacon is a single pixel image. The client device may also receive a Match-ID. A beacon server in one of the other domains may receive the request for the beacon, and store in a domain log the Match-ID, and other information about the client device, which domain service provided the URL, and/or other related user activities. The different domain logs may then be employed for use in searching for matching Match-IDs, joining common user or client device activities, and for tracking other cross-domain user activities. | 12-17-2009 |
20090319653 | SERVER CONFIGURATION MANAGEMENT METHOD - A method for monitoring changes in at least two servers, that creates difference results that encapsulate effects of changes applied to file systems of at least two servers. These differences results are defined by predetermined creation rules. The method includes comparing the difference results between the at least two servers to detect differences in the respective difference results. These detected differences are defined in accordance with predetermined comparison rules. The method further includes: analyzing the detected differences in comparison results in accordance with predetermined analysis rules and indicating potential problems from the analyzed and detected differences. | 12-24-2009 |
20090319654 | METHOD AND SYSTEM FOR USER BASED NETWORK ANALYSIS AND PLANNING - A system and method are provided for converting individual technical metrics into a single relevant metric understood and accepted by both technical and non-technical components of a business venture. An example system and/or method includes measuring current technical utilizations and capacities, translating those into a supportable users metric, forecasting future utilization levels, translating those into future network component and/or hardware requirements, and expanding/scaling technical capacity based on those values and the predetermined capacity levels of additional components and/or hardware. | 12-24-2009 |
20090319655 | PRESENCE SYSTEM AND A METHOD FOR PROVIDING A PRESENCE SERVICE - A presence system and method are disclosed. The system comprises, intercommunicated: presentities E | 12-24-2009 |
20090319656 | APPARATUS AND METHOD FOR MANAGING A NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to perform a first query of a network device by way of a wired connection with the network device, perform a second query of the network device by way of a wireless connection with the network device, detect an undesired condition associated with at least one of the network device and the wired connection with the network device based at least in part on the first and second queries, and discern between the undesired condition being associated with the network device and being associated with the wired connection based at least in part on the first and second queries. Other embodiments are disclosed. | 12-24-2009 |
20090319657 | SIP TERMINAL, METHOD AND SYSTEM FOR REPORTING STATUS THEREOF, AND SIP SERVER - A session initiation protocol (SIP) terminal, a method and system for reporting status thereof, and an SIP server are provided. The present invention relates to the field of communications, and is capable of enabling the SIP terminal to initiatively report status information to the SIP server, thereby ensuring a normal connection of an SIP call. The method includes: detecting whether status of the SIP terminal changes; generating status reporting information when the status of the SIP terminal changes; and sending current status of the SIP terminal to the SIP server in the form of the status reporting information. The present invention is mainly applied to the SIP technology. | 12-24-2009 |
20090319658 | METHOD AND SYSTEM TO MONITOR EQUIPMENT OF AN IT INFRASTRUCTURE - The invention relates to a method for monitoring and analyzing IT infrastructures in a telecommunication system, the system comprising a controller node and a plurality of IT infrastructures, the method comprising for the controller node the acts of distributing a monitoring agent to each IT infrastructure through the telecommunication system, the IT agent being adapted to monitor performance parameters of the IT infrastructure and forward performance data corresponding to the performance parameters to the controller node, receiving for at least one of the IT infrastructures the performance data, gathering for at least one performance parameter an IT infrastructure filter and a set of rules, the IT infrastructure filter defining a subset of the performance data, and the set of rules defining computational rules to be applied to the subset of data, and calculating statistics for the at least one performance parameter based on the set of rules applied to the subset of data. | 12-24-2009 |
20090319659 | SOURCE DETECTION DEVICE FOR DETECTING A SOURCE OF SENDING A VIRUS AND/OR A DNS ATTACK LINKED TO AN APPLICATION, METHOD THEREOF, AND PROGRAM THEREOF - An original attacker which has set a computer as a springboard is detected by detecting a source of a virus or a DNS attack linked to an application, which attacks other computers. A source detection device for detecting a source of a virus or a DNS attack captures packets from a network under setting conditions, and extracts required information. The source detection device stores data such as information concerning behaviors and/or features of viruses and/or DNS attacks, and/or logs of respective servers, which are required for an application traceback. Linkage of a virus or a DNS attack is determined from an application traceback processing result stored in a database and from various data, and new conditions are set accordingly. Under the new conditions, source detection is carried out for a virus or a DNS attack. Data is updated and accumulated accordingly, and linkage and a relationship between a behavior of an attack and a virus or a DNS attack is determined, thereby to detect a source of the attack. | 12-24-2009 |
20090327475 | METHOD FOR MANAGING A COUNTER STATUS ALLOCATED TO A PAIR COMPRISING A COMMUNICATION TERMINAL AND A BASE STATION - A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved. | 12-31-2009 |
20090327476 | Dynamic Infrastructure for Monitoring Service Level Agreements - A dynamic infrastructure for monitoring service level agreements (SLAs) is described. In an embodiment, the infrastructure comprises three types of functional elements: probes, metrics and audits and a small number of primitive actions for manipulating these elements. The elements are connected by streams which store data for processing and transport data between functional elements. The primitive actions, which are duplicating and removing functional elements as well as splitting and joining metrics, are arranged such that the functional elements can be optimized dynamically in responses to changes in the service and/or the hardware without losing any data. | 12-31-2009 |
20090327477 | MODULAR INTEGRATED COMPUTING AND STORAGE - A modularized computing system includes a plurality of modular components that are coupled together forming a network. Each modular component includes a standard network interface. The system further includes an initialization module, a monitor module, a storage medium, and a management module. As a module unit is coupled to the network, the initialization module automatically configures the component to an operable state. The monitor module monitors network operations including performance parameters of each modular component based on a plurality of system policies. Based on information gathered by the monitor module, the management module actively modifies network structure and resource allocation to optimize network performance. | 12-31-2009 |
20090327478 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A system that facilitates selecting a sensor from amongst a plurality of sensors from which to request data is described. The system includes a receiver component that receives a value of information for data that corresponds to a segment of a phenomenon model that models a phenomenon. The receiver component also receives user-defined preferences regarding sharing data from at least one sensor. The system further includes a selector component that selects the at least one sensor from amongst a plurality of sensors based at least in part upon the value of information and the preferences. The determination of the value ascribed to sensors may include considerations of the utilitarian benefit of reduction of uncertainty to a population of people. | 12-31-2009 |
20090327479 | USER-BASED WIDE AREA NETWORK OPTIMIZATION - An improved user experience at a local client computer that is coupled to one or more remote servers over a WAN is provided by an arrangement in which data and files that are likely to be needed by a user during a work session are identified through the application of one or more heuristics and then pre-fetched to be made available in advance of the session's start. The pre-fetching of the data and files may be performed as the client computer goes through its startup or boot process. When the startup is completed and the desktop applications become ready for use, the data and files that the user needs to immediately begin work are already available at the local client computer. | 12-31-2009 |
20090327480 | METHOD AND SYSTEM FOR DISCOVERING MANAGED SYSTEMS IN A NETWORK - A method for discovering managed systems in a network including classifying a first managed system associated with a first active Internet Protocol (IP) address in the network using a plurality of network protocols, identifying a set of drivers using the classification, where the set of drivers are configured to obtain first management information about the managed system, obtaining a first set of drivers, populating a data model with the first management information obtain using at least one of the first set of drivers, and managing the first managed system using the data model. | 12-31-2009 |
20090327481 | ADAPTIVE DATA THROTTLING FOR STORAGE CONTROLLERS - A method for minimizing latency of data transfer between the redundant storage controllers in a network-based storage controller system that utilizes adaptive data throttling. Each redundant storage controller monitors latency for round trip communications between the redundant controllers by calculating a time required to mirror a write to the other controller and receive a write acknowledge. An average latency for round trip communications between the redundant controllers during a fixed monitoring period is calculated, and at the end of each fixed monitoring period, the average latency is compared to a fixed latency to access the average time latency for mirroring writes is good, acceptable or unacceptable. If the average time latency is good, the one controller reduces or disables throttling for data transfers between the one controller and the server, and between the one controller and back-end storage, increasing a number of this type of data transfer that can be executed in parallel. If the average time latency is acceptable, the one controller does not adjust throttling for data transfers between the one controller and the server, and between the one controller and back-end storage. If the average time latency is unacceptable, the one controller increases data throttling for data transfers between the one controller and the server, and between the controller and the back-end storage, decreasing a number of this type of data transfer that can be executed in parallel. | 12-31-2009 |
20090327482 | RELIABLE AND ACCURATE USAGE DETECTION OF A SOFTWARE APPLICATION - Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds. | 12-31-2009 |
20090327483 | Web services enabled device and browser gadgets coupled with data storage service and web portal - A method of presenting structured information, via software gadgets, based on monitored data in a utility monitoring system. First monitored data is exposed to a network to produce, via a first web service, first structured data. The first monitored data is indicative of utility characteristics measured by a first IED in the utility monitoring system. The first structured data is received over the network and second structured data is received from a network-accessible data storage service. The data storage service has a second web service that exposes second monitored data to produce the second structured data. The first structured data is manipulated, in at least one of the software gadgets, to produce structured information based on the first monitored data, and the structured information is communicated from the at least one software gadget to a web browser for display in a web page by the web browser. | 12-31-2009 |
20090327484 | SYSTEM AND METHOD FOR ESTABLISHING PERSONAL SOCIAL NETWORK, TRUSTY NETWORK AND SOCIAL NETWORKING SYSTEM - The present invention provides a communication method of a community system, comprising the steps of: receiving a message from a member of a first environment by an apparatus; according to a community descriptive element of the message, examining whether the member of the first environment belongs to a first personal social network corresponding to the message; and if affirmative, providing a service according to the acquirement of the message. | 12-31-2009 |
20090327485 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR COLLECTING SNMP BANDWIDTH DATA - A method, system, and storage medium for collecting bandwidth data is provided. The method includes producing master and slave text files in response to simultaneous collection of data samples from a network device by servers. The method also includes generating a clean data file by sorting data in the master and slave text files by the network device port, sorting data samples for the port by collection time, and for each of the samples: adding a designated interval of time to a time on the network device resulting in a target network device time whereby the time on the network device corresponds to a time the data sample was collected, examining data samples in the master and slave text files corresponding to the time the respective data samples were collected, selecting from one of the master and slave text files the sample with a collection time most closely matching the target network device time, and storing the selected sample in the clean data file. | 12-31-2009 |
20090327486 | PROVIDING ACCESS BY A CLIENT APPLICATION PROGRAM OVER AN INTERNET PROTOCOL (IP) NETWORK TO A SERVER APPLICATION PROGRAM INSTANCE - A method, apparatus and software is disclosed in which a temporary IP address is assigned to a selected instance of a server application program so as to provide processing continuity for processing with a client application program. | 12-31-2009 |
20090327487 | METHOD AND SYSTEM FOR DISCOVERING DNS RESOLVERS - A system and method for proactively discovering DNS resolvers in a network, comprising: sending IP addresses in the network to a scanning application; directing the scanning application to query each computer that corresponds to each IP address for information indicating whether each computer is a DNS resolver or a non DNS resolver; and identifying each computer as a DNS resolver or a non DNS resolver based on the information. | 12-31-2009 |
20090327488 | Method and System for Implementing Consumer Choice in a Targeted Message Delivery System - Embodiments are directed to a method and system of providing a centralized consumer choice process covering multiple Internet-based content services. The method comprises transmitting a consumer choice notification message to a user, receiving an indication of consumer choice with regard to gathering, storing or sharing of consumer information and activity during user Internet activity, wherein the consumer choice may comprise one of an opt-out or opt-in selection, storing the indicated consumer choice in a customer relationship management module, and setting a protocol in a network routing device to tag network traffic bound for a remote Internet-based content service indicating the user's choice. In one embodiment, reception of the tag indicates to the Internet-based content services that the user has agreed to participate in the gathering, storing, or sharing of defined user information, and the absence of a tag indicates that the user has declined to participate in the gathering, storing, or sharing of defined user information. Alternatively, two different types of tags may be provided to indicate the user's choice with respect to opt-in or opt-out. | 12-31-2009 |
20090327489 | GLOBAL TRAFFIC MANAGEMENT SYSTEM USING IP ANYCAST ROUTING AND DYNAMIC LOAD-BALANCING - A method and apparatus for serving content requests using global and local load balancing techniques is provided. Web site content is cached using two or more point of presences (POPs), wherein each POP has at least one DNS server. Each DNS server is associated with the same anycast IP address. A domain name resolution request is transmitted to the POP in closest network proximity for resolution based on the anycast IP address. Once the domain name resolution request is received at a particular POP, local load balancing techniques are performed to dynamically select the appropriate Web server at the POP for use in resolving the domain name resolution request. Approaches are described for handling bursts of traffic at a particular POP, security, and recovering from the failure of various components of the system. | 12-31-2009 |
20090327490 | DATA PROCESSOR, DATA MONITORING METHOD THEREOF, AND RECORDING MEDIUM STORING DATA MONITORING PROGRAM THEREOF - A data processor in which data processing is managed by an administrator and in which data processing including installation of software by a user is enabled. The data processor includes a processing unit to monitor the data processing executed by the user and to generate an execution history of the data processing, and a recording unit to record the execution history of the data processing. | 12-31-2009 |
20100005166 | NETWORK DEVICE - The present invention discloses a network device which can access a home network system and perform network communication based on a predetermined protocol, by using a minimum number of resources of an embedded microcontroller The network device communicates with at least one electric device through a network. The network device adopts a protocol consisting of an application layer for processing a message for controlling or monitoring the electric device, a network layer for performing network connection to the electric device, a data link layer for accessing a shared transmission medium, and a physical layer for providing a physical interface with the electric device. The application layer further includes an application sublayer for performing a network management function or managing device information. | 01-07-2010 |
20100005167 | JOB PROCESSING APPARATUS, METHOD FOR MANAGING JOB LOG IN THE JOB PROCESSING APPARATUS, AND SYSTEM FOR MANAGING JOB HISTORY - A job processing apparatus connectable to another job processing apparatus via a network, and if an instruction is given to execute a job including a first job and a second job using the job processing apparatus itself and a second job processing apparatus, then the first job is executed and history information on the first job is created by the job processing apparatus itself, and an instruction to execute the second job is given to the second job processing apparatus via the network. Then, if the history information on the second job executed by the second job processing apparatus is received by the job processing apparatus itself via the network, the history information on the first and second jobs are stored in a log database in association. | 01-07-2010 |
20100005168 | SYSTEMS AND METHODS FOR UNIFICATION OF LOCAL AND REMOTE RESOURCES OVER A NETWORK - The system and methods disclosed herein, according to one or more embodiments, utilize locally stored resources in a secure manner within a network-based application, while allowing locally stored resources to be shared over a network. In one embodiment, a system and method for facilitating information transactions over a network include communicating with a user device and one or more distribution channels via the network, installing a local network server on the user device, monitoring user drop events, generating resource mapping of media resources based on the user drop events, and uploading media resources. | 01-07-2010 |
20100005169 | Method and Device for Tracking Interactions of a User with an Electronic Document | 01-07-2010 |
20100011099 | METHOD AND APPARATUS FOR MONITORING AND LOGGING COMMUNICATION SESSIONS - Embodiments of the invention generally provide a method and apparatus for logging and monitoring communication sessions terminating and originating in a home network. One embodiment of a method for monitoring a communication session within a home network includes routing the communication session to a device in the home network via a residential gateway, the residential gateway being equipped with Universal Plug and Play and Session Initiation Protocol capabilities, and storing data related to the communication session in a database coupled to the residential gateway. | 01-14-2010 |
20100011100 | Health Check System, Server Apparatus, Health Check Method, and Storage Medium - According to one embodiment, an information processing apparatus includes a transmission module configured to acquire a status information of a plurality of devices and transmit the status information to a server apparatus via the network. The server apparatus includes a storage module configured to predetermine a condition corresponding to items of status information of the devices or a combination of the items of status information of the plurality of devices and store feedback information defined in correspondence with each condition, and a notification module configured to, when the status information or the combination transmitted by the transmission module matches the predetermined condition, notify, via the network, the information processing apparatus of the feedback information corresponding to the condition and stored in the storage module. | 01-14-2010 |
20100011101 | APPARATUS AND METHOD FOR BIASED AND WEIGHTED SAMPLING OF NETWORK TRAFFIC TO FACILITATE NETWORK MONITORING - An apparatus is described that performs biased and weighted sampling of network traffic to facilitate network monitoring. One embodiment of the apparatus includes a plurality of microcode controlled state machines, and a distribution circuit that routes input data to the plurality of microcode controlled state machines. A first individual microcode controlled state machine applies a first rule to the input data to determine first instructions associated with a first subset of the input data based on first sampling information associated with the first rule. A second individual microcode controlled state machine applies a second rule to the input data to determine second instructions associated with a second subset of the input data based on second sampling information associated with the second rule. The second sampling information differs from the first sampling information. This embodiment further includes a first circuit that generates first routing instructions for the first subset of the input data based on the first instructions, and that generates second routing instructions for the second subset of the input data based on the second instructions. This embodiment further includes a second circuit that routes the input data based on the first routing instructions and the second routing instructions. Advantageously, the apparatus provides an architectural framework well suited to a low cost, high speed, robust implementation of flexible, advanced network security and monitoring features and network traffic analysis. | 01-14-2010 |
20100017506 | SYSTEMS AND METHODS FOR MONITORING DATA AND BANDWIDTH USAGE - Access to a communications network may be provided via a data provider that may charge for access. In some cases, the access fee may be related to the amount of network resources consumed (e.g., amount of data downloaded or bandwidth used). In some cases, a user may have access to a particular amount of data provider resources and be required to pay an additional fee for using resources in excess of the particular amount. To assist the user in managing his data resource consumption, a resource utilization component may provide different alerts and notices informing the user of current consumption, expected future consumption, and recommendations for reducing data provider resources consumed (e.g., stopping particular processes or data provider requests, such as downloading media). If several electronic devices in a network are connected to the same data provider resources, a network component may manage the data provider resource use among the several electronic devices (e.g., allow only particular users or devices access). | 01-21-2010 |
20100017507 | METHOD AND APPARATUS OF COMBINING MULTIPLE PACKETS INTO PROTOCOL TRANSACTIONS WITH REQUEST AND RESPONSE DETAIL FOR ENHANCED TROUBLESHOOTING IN A LINE RATE NETWORK MONITORING DEVICE - Multiple packets are combined into protocol transactions with request and response detail for enhanced troubleshooting in a network monitoring device. The analysis may be done at a line rate, in an always on operation mode, providing constant gathering of analysis data and information. | 01-21-2010 |
20100017508 | Method for monitoring events in a communication network - There is described a method for monitoring at a management terminal events of a given type occurring in a communication network. The communication network comprises a plurality of network elements. The management terminal has a browser suitable for supporting a web like management graphic interface. The method comprises: at one of the network elements, providing a monitoring module; at the management terminal, transmitting to the monitoring module a request for monitoring the events of the given type, the request including an access token suitable for obtaining authorization to access a monitoring channel between the monitoring module and the management terminal; at the monitoring module: listening for possible management information relative to the events, each time the management information are received, processing it to generate updating data, using the access token for accessing the monitoring channel and transmitting the updating data to the management terminal through the monitoring channel. | 01-21-2010 |
20100017509 | HANDLING ANNOUNCEMENT MEDIA IN A COMMUNICATION NETWORK ENVIRONMENT - In order to efficiently handle the switch between user media and announcement media, a basic step is to first determine a configuration of the user media. Next, a configuration of the announcement media to be presented is determined based on the determined user media configuration. Subsequently, the announcement media is configured according to the announcement media configuration, and the configured announcement media is finally sent to the intended user. In this way, the overall appearance or sound of the announcement will be virtually the same as or at least similar to the overall appearance or sound of the user media, preferably without distortions. This allows the user to perceive the announcement as clearly as possible. | 01-21-2010 |
20100017510 | MULTI-LAYERED MEASUREMENT MODEL FOR DATA COLLECTION AND METHOD FOR DATA COLLECTION USING SAME - A method and system are described for collecting information from a device in a network at a collection interval. According to an exemplary embodiment, a method for collecting the information includes determining data needed from the device at the collection interval to evaluate the information. A measurement request is defined for collecting the data from the device at the collection interval. The measurement request is merged with other measurement requests for collecting the data from the device at the collection interval into a single merged measurement request at the collection interval. The measurement request is also merged with other measurement requests for collecting the data from the device at different collection intervals having a common integral divisor into a single merged measurement request at a highest of the different collection intervals. | 01-21-2010 |
20100023613 | Managing Pluggable Modules Of A Network Element - Managing pluggable modules of a network element includes receiving an approved pluggable module list for the network element. A pluggable module is received at the network element, and a component identifier of the pluggable module is determined. If the component identifier is on the approved pluggable module list, the pluggable module is approved for operation with the network element. If the component identifier is not on the approved pluggable module list, the pluggable module is rejected for operation with the network element. | 01-28-2010 |
20100023614 | SERVER LOCATION MAPPING - Embodiments of a method for determining locations of computers in a group of computers, which may be performed by a system, are described. During operation, the system receives a location of a first computer in the group of computers. Then, the system determines locations of one or more additional computers in the group of computers relative to the first computer based on vibration spectra associated with the first computer and the one or more additional computers. | 01-28-2010 |
20100023615 | REDIRECTING WEB DOWNLOADS - One or more downloads of web content from one or more web content servers are monitored. A swarm is defined including one or more previous downloaders of the web content from the one or more web content servers. The one or more previous downloaders of the web content include one or more web content caches including at least a portion of the web content. Stored web content within the one or more web content caches of the swarm is tracked. A new downloader of the one or more web content servers is redirected to the one or more web content caches of the swarm. | 01-28-2010 |
20100023616 | Information processing and transmission systems - Disclosed are systems and methods for transmitting information from a remote location to a financial decision system. In certain representative transmission methods machine readable content is generated that is adapted to be received by a financial decision system. The machine readable content is transmitted using a first protocol or standard. The transmission of machine readable content is received and converted from the first protocol to a second protocol or standard. The machine readable content is then transmitted using the second protocol. The first protocol can be a non-packet switched serial protocol, such as RS-232. The second protocol can be a packet-switched Internet Protocol (IP), such as for example, User Datagram Protocol (UDP) or Transmission Control Protocol (TCP). | 01-28-2010 |
20100023617 | Method and Apparatus for Ensuring IPv6 Uniqueness in a Mobile Subnetted Environment - A method and apparatus for ensuring network address uniqueness is described herein. An address manager determines whether any link-local addresses associated with peripheral devices connected to a mobile device would conflict with a network assigned global address. The address manager negotiates with the network to avoid conflicts. | 01-28-2010 |
20100023618 | SYSTEM AND METHOD FOR SUPPLICANT BASED ACCOUNTING AND ACCESS - The method of the present invention comprises initiating a connection to a port on an access device by a supplicant and associating supplicant identification information with the port. The access device may comprise any network connectivity device, including a wireless access point. Data packets transmitted over the port by the supplicant are statistically sampled as they are transmitted, with each of the sample data packets also associated with the supplicant identification information. The sample data packets are stored according to their associated supplicant identification information in order to perform accounting. The sample data packets, with the supplicant identification information, are sent to a network management system where the data is archived and presented in a human readable form, e.g., charts, etc. | 01-28-2010 |
20100023619 | OPERATION MANAGEMENT SYSTEM, MANAGEMENT APPARATUS, MANAGEMENT METHOD AND MANAGEMENT PROGRAM - A management apparatus has a control unit for realizing a management function through a comprehensive process of characteristic information of a storage apparatus, a connecting apparatus and a computer. The management apparatus also has an interface for receiving characteristic information from the storage apparatus, connecting apparatus and computer, depending on the standard protocol among the management apparatus, storage apparatus, connecting apparatus and computer. Moreover, an integrated management apparatus is also provided for integrated management based on the result of realization of a plurality of management functions. This integrated management apparatus includes an interface for receiving the result of realization of the management function from the management apparatus, depending on the standard protocol between the management apparatus and integrated management apparatus. | 01-28-2010 |
20100030887 | SYSTEM AND METHOD OF MANAGING INFORMATION DISTRIBUTION TO MOBILE STATIONS - A system and method for distributing information from a host service in communication with, a computer network to a mobile station in communication with a wireless network is provided. A data item associated with the mobile station is received at the host service. The host service then determines whether a network resource of the wireless network is currently associated with the mobile station. If the network resource of the wireless network is not currently associated with the mobile station, then the host service transmits a resource request message to the mobile station to instruct the mobile station to acquire the network resource. Subsequently to acquiring the network resource, the host service is then able to transmit the data item to the mobile station using the network resource. | 02-04-2010 |
20100030888 | APPARATUS, AND ASSOCIATED METHOD, FOR MONITORING SYSTEM EVENTS - An apparatus, and an associated method, for facilitating monitoring of a system, such as a system formed of an IT infrastructure. A detector detects the occurrence of system events, such as system faults or other anomalies. The detected events are matched with a set of rules, such by correlating attributes of the detected system events, to determine which events are related. Related events are grouped together into a group. An identification of the group is generated and displayed upon a display monitor. The individual events that comprise the group are hidden from view, i.e., collapsed behind the group identification. | 02-04-2010 |
20100030889 | Representing Aggregated Rich Presence Information - Techniques for relaying presence information of an entity to a user, wherein the entity is known to the user via one or more communications networks, are provided. At least one portion of the presence information of the entity is obtained from one or more servers associated with the one or more communications networks. An image is generated in accordance with the at least one portion of the presence information of the entity. The image summarizes the presence information of the entity. Further, the image assists the user in the selection of a communication option when contacting the entity from a plurality of communication options of the entity. | 02-04-2010 |
20100030890 | Provisioning Artifacts For Policy Enforcement Of Service-Oriented Architecture (SOA) Deployments - A system provisions artifacts for policy enforcement of service-oriented architecture (SOA) deployments. The system comprises a computer-executed program code that creates a model of a SOA deployment by collecting information about SOA artifacts and mapping between business-centric applications and underlying SOA artifacts. The system further comprises a computer-executed program code that converts the model into actionable artifacts which are provisioned to SOA policy enforcement points. | 02-04-2010 |
20100030891 | WEB-BASED TRACEBACK SYSTEM AND METHOD USING REVERSE CACHING PROXY - Provided are a web-based traceback system and method using reverse caching proxy, which can effectively protect a web server against various attacks launched by illegitimate user by acquiring network information and location information of users who attempt to access the web server through an anonymous server, without a requirement of installing any agent program in the users' clients. The web-based traceback system may include a reverse caching proxy server receiving a hypertext transfer protocol (HTTP) packet transmitted to a web server by a client, analyzing the header of the HTTP packet and determining whether the client has attempted to access the web server through an anonymous server based on the results of the analysis; and a web tracking server generating a response page for the HTTP packet upon receiving the results of the determination performed by the reverse caching proxy server, inserting a tracking code in the response page, and providing the response page to the client through the reverse caching proxy server, wherein the tracking code is automatically executed in a web browser of the client and thus provides network information of the client to the web tracking server. | 02-04-2010 |
20100030892 | GIS BASED NETWORK INFORMATION MONITORING-SYSTEM - Disclosed is a GIS based network information monitoring system that intuitively combines GIS based geographic information with traffic information and a security event, expresses the combined geographic information on a display, and does not need position calibration of network information when the traffic information and the security event are expressed. The GIS based network information monitoring system includes: a geographic information processing module receiving network information from an external network device, containing GIS based geographic information, and creating geographic information corresponding to location information in response to the location information; and a network information processing module mapping the network information to geographic information corresponding to the location information to express the mapped network information, connecting an attack site of a packet causing a security problem, an intermediate site, and a target site using lines, and intuitively expressing the network information by varying the widths and colors of the lines according to the attack type and danger level of the packet. | 02-04-2010 |
20100030893 | AUTOMATED DISCOVERY OF A TOPOLOGY OF A DISTRIBUTED COMPUTING ENVIRONMENT - This invention provides an extensible means of defining the mechanism to find one or more type(s) or instance(s) of existing resources (files, databases, repositories, etc.) and automating their linkages to the artifacts to be created, based on the customizable matching rules. | 02-04-2010 |
20100030894 | COMPUTER PROGRAM PRODUCT AND METHOD FOR ESTIMATING INTERNET TRAFFIC - Site metrics are presented in association with search results. The site metrics are derived from site analytics that uses clickstream data collected from a panel of internet users to generate and present internet activity metrics. Data collected from a community of internet users may be augmented by clickstream data store content, third party content, search results, and other sources to form estimates of internet activity, such as traffic, that is structured and analyzed to produce metrics of nearly any internet web site or domain. The data may be further augmented with ratings, such as web site trust ratings, retail deals, and analysis of web site content to form a comprehensive set of data that is mined to formulate various metrics of internet activity about web sites. Metrics of internet activity, a.k.a. site analytics, provides analysis that represents aspects of internet user access to a web site. Such aspects may include activity related to visitors, engagement, growth, trust, deals, and the like. | 02-04-2010 |
20100030895 | SYSTEM FOR REMOTELY MANAGING AND SUPPORTING A PLURALITY OF NETWORKS AND SYSTEMS - Converged network management application and system is provided that delivers a management platform as a service that can view and/or manage all managed networks in the aggregate, or any one of them individually (including individual devices within the managed networks), in a secure and efficient manner, providing continuously available intelligence in real time on the managed networks and systems, and overcoming integration issues including conflicting address schemas, the need to avoid unnecessary infrastructure, and the need acquire all necessary information in real time within applicable memory and bandwidth constraints. | 02-04-2010 |
20100030896 | ESTIMATING LATENCIES FOR QUERY OPTIMIZATION IN DISTRIBUTED STREAM PROCESSING - A “Query Optimizer” provides a cost estimation metric referred to as “Maximum Accumulated Overload” (MAO). MAO is approximately equivalent to maximum system latency in a data stream management system (DSMS). Consequently, MAO is directly relevant for use in optimizing latencies in real-time streaming applications running multiple continuous queries (CQs) over high data-rate event sources. In various embodiments, the Query Optimizer computes MAO given knowledge of original operator statistics, including “operator selectivity” and “cycles/event” in combination with an expected event arrival workload. Beyond use in query optimization to minimize worst-case latency, MAO is useful for addressing problems including admission control, system provisioning, user latency reporting, operator placements (in a multi-node environment), etc. In addition, MAO, as a surrogate for worst-case latency, is generally applicable beyond streaming systems, to any queue-based workflow system with control over the scheduling strategy. | 02-04-2010 |
20100036938 | WEB BROWSER SECURITY - A web browser security system including a network detector configured to detect when a computer attempts to connect to a computer network, and a data protector configured to move any data predefined as being private data from any private data areas that are accessible to a web browser on the computer to a secure data repository that is not accessible to the web browser, where any of the network detector and the data protector are implemented in either of computer hardware and computer software and embodied in a computer-readable medium. | 02-11-2010 |
20100036939 | APPARATUS AND METHOD FOR MANAGING A NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server comprising a controller to monitor a physical layer, a data link layer and a network layer of an Internet Protocol Television (IPTV) network, obtain a plurality of alarm signals from one or more of the physical layer, the data link layer and the network layer that are associated with an undesired condition of the IPTV network, synthesize the plurality of alarm signals to determine a correlation, obtain topology information associated with network devices in the IPTV network, and isolate the undesired condition to a network component in the IPTV network using the correlation and the topology information. Other embodiments are disclosed. | 02-11-2010 |
20100036940 | Data Processing In A Hybrid Computing Environment - Data processing in a hybrid computing environment that includes a host computer and an accelerator, the host and the accelerator adapted to one another for data communications by a system level message passing module and a plurality data communications fabrics of at least two different fabric types, the data processing including: monitoring data communications performance for a plurality of data communications modes; receiving, from an application program on the host computer, a request to transmit data according to a data communications mode from the host computer to the accelerator; determining, in dependence upon the monitored performance, whether to transmit the data according to the requested data communications mode; and if the data is not to be transmitted according to the requested data communications mode: selecting, in dependence upon the monitored performance, another data communications mode for transmitting the data and transmitting the data according to the selected data communications mode. | 02-11-2010 |
20100036941 | PARTIAL SUBSCRIPTION/EVENTING AND EVENT FILTERING IN A HOME NETWORK - In one embodiment, a method for monitoring events in a home network is provided. The method includes receiving a subscription request from a control point, wherein the subscription request indicates one or more event variables to monitor for the control point. Then a change is detected in an event variable. Then, it is determined if the event variable has been indicated by the control point as an event variable to monitor for the control point. If so, then the control point is notified of the change in the event variable. | 02-11-2010 |
20100036942 | METHOD FOR INDICATING A SERVICE INTERRUPTION SOURCE - The present invention relates to a method used to indicate a service interruption source, in a client device of said service comprising an interface to a first network, said device being connected to a remote server by means of a gateway to which said device is connected by means of said first network; comprising the steps for starting up a downloading session from said remote server of a content, the end of the session requiring an acknowledgement from the user, detecting the connection loss between the device and the gateway, detecting the connection recovery between the device and the gateway, sending information (S | 02-11-2010 |
20100036943 | METHOD OF NETWORK MANAGEMENT - A network management system comprises a unit for identifying a node, whose settings are to be modified, from design pattern information about a network to be managed; a unit for finding values of various timers included in the network management system and in the node whose settings are to be modified about the identified node based on a template for timer control; and a unit for causing the found values of the timers to be reflected simultaneously in the network management system and in the node whose settings are to be modified. | 02-11-2010 |
20100036944 | Unified Web Hosting and Content Distribution System and Method for Assuring Predetermined Performance Levels - A service model, integrated system, and method for enabling a service provider to deliver an integrated web hosting and content distribution service offering, which affords assured operational performance service levels, regardless of whether the customer's web site is served by the service provider's hosting center, the service provider's content distribution network (CDN), by a third party web host, or by a third party CDN. A monitoring system of the primary service provider receives detailed capacity and health statistics from any CDN under the operational control of the primary service provider, receives aggregate capacity and health statistics from other CDNs not under the operational control of the primary service provider. A redirection system then decides to which web host, content distribution network, or combination thereof, user requests for content are directed in order that operational performance service levels are maintained. | 02-11-2010 |
20100036945 | Method and system for controlling and auditing content/service systems - An improved interactive network system is provided that allows the Network Operator to control the transfer of information to and from the network end users, the system preferably using triggers or markers embedded within the programming broadcast to users via the network. As a consequence of this system, the Network Operator is able to efficiently garner revenues from third parties transacting business over the network and to control the look and feel of programming offered to network users. Additionally the system can be used as a means of limiting network access, filtering programming, providing on-screen graphics or audible signals for particular programming types or providers, bookmarking programming, profiling network users, targeting advertising, and simplifying network transactions. | 02-11-2010 |
20100042715 | METHOD AND SYSTEMS FOR REDUNDANT SERVER AUTOMATIC FAILOVER - A method and systems for a redundant server automatic fail-over system is provided. The system includes a plurality of client devices communicatively coupled to a network wherein the plurality of client devices each includes an active server identification location. The system also includes a first server system communicatively coupled to the network that is configured to operate as the active server on the network wherein messages sent to the first server system are addressed to the first server system using the active server identification location on each client device. The system further includes a second server system communicatively coupled to the network that is configured to operate as a standby server on the network and is configured to switch to being the active server on the network when it is determined that the first server system is unable to operate as the active server. | 02-18-2010 |
20100042716 | ADAPTIVE CLUSTERING FRAMEWORK IN FREQUENCY-TIME FOR NETWORK MIMO SYSTEMS - A method for wireless communications is provided. The method includes analyzing a set of network parameters and automatically forming a set of network clusters based in part on the network parameters. This includes dynamically selecting at least one network cluster from the set of network clusters to provide wireless service to a subset of user equipment. | 02-18-2010 |
20100042717 | Sharing of Media Using Contact Data - Media sharing using contact data involves identifying contact records on a personal electronic device of a user. Each of the contact records includes a contact address of a person associated with the respective contact record. The contact records are communicated to a media sharing service via a network. Media items of the user are sent to the sharing service. One or more of the contact records are associated with each of the media items. A notification is sent to the persons associated with the one or more contact records. The notification describes sharing of the media items associated with the contact records. The sharing service facilitates access to the media items by the persons associated with the contact records in response to the persons receiving the notification. | 02-18-2010 |
20100042718 | System And Method For Tracking User Activity Related To Network Resources Using A Browser - A method and system are described for tracking user activity related to network resources using a browser. According to an exemplary embodiment, a user-initiated activity related to a network resource is detected in the browser. The detected user-initiated activity is associated with the network resource to form an activity-resource pair. The activity-resource pair is associated with a record in a data store related to the detected activity or the network resource. By associating the activity-resource pair with records in the data store that relate to the network resource and/or the detected activity, the information in the data store can be used to add context to and provide insight into users' browsing activities. | 02-18-2010 |
20100049845 | COMPUTER SYSTEM AND A METHOD FOR MANAGING LOGICAL VOLUMES - A computer system manages logical volumes as operation map including a volume ID of the logical volume and a plurality of pieces of a predetermined operating information (for example, a path setting, main-volume, sub-volume, permanent storage setting, and storage period setting), when an operation is added to the logical volume, corresponding operating information is set to addition and when the operation is released, the information is set to release, and at a time when a predetermined operating information is all set to release, a corresponding logical volume to the volume ID is detected as being deletable, thereby detecting the deletable the logical volume automatically. | 02-25-2010 |
20100049846 | PEER TO PEER NETWORK - Peer-to-peer networks employing simple peers and super peers strike a balance between centralized (client-server based) and entirely flat peer-to-peer approaches. They introduce hierarchy into peer-to-peer networks in the form of super peer nodes, peers which have extra capabilities and duties in the network. There are problems in the identification and election of peers to take the role of super peer: in particular, the need for regular update messages to communicate peer availability across the network significantly impacts discovery times (when a simple peer attempts to advertise a service or requests a service from another peer). A presence server is implemented in the network in order to monitor the availability of each peer. A device called the “super peer elector” subscribes to receive updated availability information from the presence server and assigns super peer status to the most appropriate, and available, simple peer. | 02-25-2010 |
20100049847 | System and Method for Monitoring and Analyzing Internet Traffic - A system and method for monitoring and analyzing Internet traffic is provided that is efficient, completely automated, and fast enough to handle the busiest websites on the Internet, processing data many times faster than existing systems. The system and method of the present invention processes data by reading log files produced by web servers, or by interfacing with the web server in real time, processing the data as it occurs. The system and method of the present invention can be applied to one website or thousands of websites, whether they reside on one server or multiple servers. The multi-site and sub-reporting capabilities of the system and method of the present invention makes it applicable to servers containing thousands of websites and entire on-line communities. In one embodiment, the system and method of the present invention includes e-commerce analysis and reporting functionality, in which data from standard traffic logs is received and merged with data from e-commerce systems. The system and method of the present invention can produce reports showing detailed “return on investment” information, including identifying which banner ads, referrals, domains, etc. are producing specific dollars. | 02-25-2010 |
20100049848 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA INDICATOR EMBEDDED WITH DNS REQUEST - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 02-25-2010 |
20100049849 | System and a Method for Remote Monitoring Customer Security Systems - There is provided a system for remote monitoring a plurality of security systems connected to the Internet, the security systems being assigned dynamic IP addresses, each of the security systems comprising a remote monitoring server module, the system comprising a central alarm monitoring service connected to the Internet for periodically communicating with the plurality of security systems and determining a status thereof to generate an alarm signal as a function of the status, the alarm monitoring service storing a current IP address of the plurality of security systems in an IP address database, and a remote monitoring gateway providing authenticated or unauthenticated dynamic domain name service (DDNS) server functionality to connect a given remote monitoring client to a desired one of the security systems, the gateway being connected to the IP address database and to the Internet. There is further provided a method of remote monitoring a security system. | 02-25-2010 |
20100057902 | Scal-free management networks - Methods and apparatus involve production servers in a data center of an enterprise and management servers arranged in a scale-free manner to monitor, for instance, the health and general service status and availability of the production servers. Representatively, the production servers are first identified and then the management servers are analyzed to see if they can be deployed in a scale-free arrangement therewith. If so, the scale-free arrangement satisfies the proportionality equation P(k)˜k | 03-04-2010 |
20100057903 | NETWORK MONITORING BY USING PACKET HEADER ANALYSIS - A computer method and a system for detecting the file type of an electronic file, the method including the steps of: (a) using a predetermined number of bytes at the beginning of the file to create a list of probable file types; (b) testing the file against a detection rule for each file type in the list until a match is found; if no match is found (c) testing the file against other known detection rules for file types to find a match. | 03-04-2010 |
20100057904 | DEVICE MANAGING APPARATUS, DEVICE MANAGING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM FOR THE DEVICE MANAGING METHOD - A device managing apparatus for monitoring and managing a device connected to a data transmission path includes an obtaining part configured to obtain power consumption status data from the device, the power consumption status data indicating a power consumption status of a communication unit included in the device, a selecting part configured to select a communication method according to the power consumption status data obtained from the obtaining part, and a communicating part configured to perform data communications with the device by using the communication method selected by the selecting part. | 03-04-2010 |
20100057905 | SYSTEM AND METHOD FOR SOFTWARE USAGE DISCOVERY - A method of obtaining information about usage of application executable files and associated software program in a network of computers or on an individual computer is provided. The method involves collecting information about last use of software programs, and associated executable files, on a computer or a set of managed computers from various resources on the computers. The information that is collected includes file name, directory, date and time the executable was last started, a security identifier of the last user, the method of last use, whether the executable was found to be running at the time it was found, and whether the executable is registered to run as a service. From this information, a list is generated regarding software items, and the list is merged such that a given executable has a single software item on the list. Reports are produced detailing information about one or more software items on the list. The reports may be displayed in a graphic user interface designed for that purpose. | 03-04-2010 |
20100057906 | METHOD AND APPLICATION FOR A REACTIVE DEFENSE AGAINST ILLEGAL DISTRIBUTION OF MULTIMEDIA CONTENT IN FILE SHARING NETWORKS - A system for external monitoring of networked digital file sharing to track predetermined data content, the system comprising: at least one surveillance element for deployment over said network, said surveillance elements comprising: surveillance functionality for searching said digital file sharing and identification functionality associated with said search functionality for identification of said predetermined data content, therewith to determine whether a given file sharing system is distributing said predetermined data content. | 03-04-2010 |
20100057907 | SYSTEM SECURITY AGENT AUTHENTICATION AND ALERT DISTRIBUTION - An aggregation agent may combine and correlate information generated by multiple on-host agents and/or information generated in response to multiple security events. The aggregation agent may transmit the combined information to a security console. The security console may check the identity of the aggregation agent to determine whether to accept the information. The security console may map information to one or more consoles. | 03-04-2010 |
20100064039 | Event monitoring and management - Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application. | 03-11-2010 |
20100064040 | CONTENT RECOMMENDATIONS BASED ON BROWSING INFORMATION - Architecture for dynamically tracking information about a first-time or inactive user to a website and expeditiously presenting targeted content back to the user to maintain the user interest in the website. A visceral connection is created with the user based on immediately relevant content and functionality, and without requiring user-entered profile information about the user. Based on a few pieces of browsing information collected while at the website an action-oriented initial scenario is provided that is interesting to the user, and gets the user invested in the content (e.g., product) as a whole. Services can be recommended to users in the context of a social application or an online service provider, for example. The architecture also facilitates the up-selling, cross-selling of services, features, and products, for example, to users based on the current user browsing activity. | 03-11-2010 |
20100064041 | Linear assets inspection system - The invention provides a graphical user interface implemented on a computer including an information area for displaying to a user at the computer inspection status information in connection with one or more components of a linear asset infrastructure. The graphical user interface also includes a control component operable by the user at the computer to cause the graphical user interface to display additional information on the one or more components of the linear asset infrastructure. | 03-11-2010 |
20100070620 | SYSTEM AND METHOD FOR DETECTING INTERNET BOTS - Apparatuses, methods, and systems directed to detect Internet bots in communication networks. Some embodiments of the present invention allow an agent of a server to periodically record interaction events on a client system. The recorded interaction events are sent to a server and validated by a statistical test. Some embodiments of the present invention may be used to detect bots using server logs. In other embodiments, an agent of a server is able to detect and validate interaction events on a client system and the server periodically polls the agent to determine whether bots are detected on the client system. | 03-18-2010 |
20100070621 | PASSIVE PARAMETER BASED DEMOGRAPHICS GENERATION - A method for characterizing website visitors based on visitor passive parameters and using the characterization to select and/or market website content. The passive visitor parameters include data in the browser agent, time of a website visit, IP address, etc. Such visitor passive parameters are available each time a visitor visits a website. In a first step, a first embodiment of the method anonymously compares the visitor passive parameters with known demographics, for example, at financial websites, to create a statistical mapping between the visitor passive parameters and the demographics. In a second step, the mapping is used to estimate demographics data for future website visitors and then site content provided to the future website visitors is based on the estimated demographics. | 03-18-2010 |
20100070622 | SYSTEM AND METHOD FOR UTILIZING SYSTEM LAG TO SEND FACTS TO AN END USER - A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length. | 03-18-2010 |
20100070623 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM AND COMPUTER READABLE MEDIUM - An information processing apparatus includes: a detecting unit that detects a change of a real IP address of the information processing apparatus; and a change notification transmitting unit that generates, when the detecting unit detects the change of the real IP address of the information processing apparatus during communication with a communication partner, a change notification packet, and transmits the generated change notification packet to the communication partner. The charge notification packet includes a header portion and a data portion. The real IP address before the change is included as a source IP address in the header portion of the charge notification packet, and a real IP address after the change is included in the data portion of the charge notification packet. | 03-18-2010 |
20100070624 | Arrangement and a Method Relating to Performance Management by Distributed Processing - The present invention relates to an arrangement for performance management in a communication network comprising a managing system and a number of managed systems. The arrangement comprises collecting means for collecting traffic measurement data and primary processing means for primary processing of measurement data. Said primary processing means are adapted to be distributed and comprise first primary processing means provided in the managing system and a number of second primary processing means provided in a number of managed systems. The arrangement also comprises processing control means for controlling at least allocation of primary processing of measurement data to a first or to a second primary processing means. | 03-18-2010 |
20100070625 | Supplying Data Files to Requesting Stations - Data files are supplied to a plurality of requesting stations ( | 03-18-2010 |
20100070626 | Method And System For Resolving Indeterminate or Inconsistent Information For Information Consumers - A method and apparatus for resolution of indeterminate or inconsistent information on behalf of an information consumer, the method using a processor of a middleware component to determine whether information for the information consumer is resolvable; and if the information is determined to be unresolvable, utilizing at least one of rules, policy types and policy values specified by a context to resolve the information. | 03-18-2010 |
20100070627 | MONITORING APPARATUS, MONITORING METHOD, AND STORAGE MEDIUM - A monitoring apparatus which monitors an operating state of a monitored apparatus, the monitoring apparatus includes a signal acquiring unit that acquires signals output from the monitored apparatus; a communication amount acquiring unit that acquires a communication amount by which the monitored apparatus performs communication in a specific time based on information included in the plurality of signals that the signal acquiring unit acquires at a specific time interval; and a state determining unit that determines the operating state of the monitored apparatus based on the communication amount acquired by the communication amount acquiring unit. | 03-18-2010 |
20100070628 | SYSTEMS AND METHODS FOR AUTOMATIC DETECTION AND COORDINATED DELIVERY OF BURDENSOME MEDIA CONTENT - A networked computing system that is capable of detecting and coordinating the distribution of burdensome media content. The networked computing system includes one or more sending devices, one or more receiving devices, and a data communications network capable of facilitating data communications amongst all networked computing devices. In response to a sending or receiving device generating a data transfer request, an automatic determination is made as to whether the media content is burdensome to a portion of the data communications network over which the media content is to be transferred. The automatic determination may be made by a sending device, a receiving device, or another local network resource (such as a gateway). The determining device may then coordinate the media content transfer based on characteristics of the media content and available network resources. | 03-18-2010 |
20100070629 | Management device, management method, and recording medium - A first acquisition unit acquires an event notification from an MFP and updates first device-status information. A transmission unit transmits the event notification and first reference-destination information. A switching unit switches a first access to the first reference-destination information to a second access to second reference-destination information. A second acquisition unit issues an acquisition request at a first interval, issues an acquisition request at a second interval in response to the event notification, acquires the second device-status information, and update the first device-status information. | 03-18-2010 |
20100070630 | SUPPORTING MULTIPLE SERVICE DISCOVERY PROTOCOLS ON A DEVICE - Techniques for supporting multiple service discovery protocols (SDPs) on a network-enabled device (NED) are provided. The NED includes a plurality of SDP services, a plurality of SDP adapters, and a device service management system (DSMS). Each SDP service interfaces with one SDP adapter. Each SDP adapter interfaces with the DSMS. Each SDP adapter translates messages from its corresponding SDP service into a format the DSMS understands, and vice versa. The DSMS manages service metadata information about one or more services hosted (or provided) by the NED. In response to a request, from a client, for metadata of one or more services hosted by the NED, a SDP service requests the metadata from its corresponding SDP adapter. The SDP adapter requests the metadata from the DSMS, which responds to the SDP adapter with the metadata. The SDP adapter sends the metadata to the SDP service, which sends the metadata to the client. | 03-18-2010 |
20100077071 | METHOD AND SYSTEM FOR AUTOMATIC NETWORK CONNECTION ESTABLISHMENT IN CASE OF NETWORK ADDRESS RENEWAL - A method and system for maintaining a connection in a communication network is provided. One implementation involves activating a first network interface for obtaining a first network address for communication over the network; monitoring the network and determining a first lease time for the first network address; activating a second network interface for obtaining a second network address for communication over the network upon approaching end of the lease time, thereby maintaining communication over the network via the second network address; and deactivating the first network interface. | 03-25-2010 |
20100077072 | Test Driven Deployment and Monitoring of Heterogeneous Network Systems - A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly. | 03-25-2010 |
20100077073 | EXECUTING RESOURCE CONSUMPTION CONTROL LIMITS - A resource consumption control execution method and system. The method includes a computing system receiving a resource consumption rate limit value for a portlet/servlet and action data associated with the resource consumption rate limit value from a portlet/servlet. The computing system receives monitor data associated with a resource consumed by the portlet/servlet. The monitor data comprises a resource consumption rate value for the portlet/servlet. The computing system compares the resource consumption rate value to said resource consumption rate limit value. The computing system determines if the resource consumption rate value exceeds the resource consumption rate limit value. The computing system stores data indicating whether the resource consumption rate value exceeds the resource consumption rate limit value. | 03-25-2010 |
20100077074 | TECHNIQUES FOR HIERARCHICAL REPORT TOOL SESSION MANAGEMENT - Techniques are presented for hierarchical report tool session management. A user interacts with a hierarchical reporting tool during a first session and reaches a specific nested level within the tool for a particular hierarchy being accessed by the user. At some point in time the user exits the tool (normally or abnormally). The specific nested level is maintained on behalf of the user. So, when the user initiates a second and subsequent session with the tool, the user is presented with the specific nested level when the tool is started for that subsequent session. | 03-25-2010 |
20100077075 | Network Diagnostic Systems and Methods for Collecting Data From Network Nodes - A system may comprise a network diagnostic device. The network diagnostic device may be configured to instantiate objects of data collection classes. The data collection classes may be configured to collect data from nodes of a network. The data collection classes may, for instance, inherit an interface object from an ancestor data collection class, and the interface object may be configured to use a protocol to collect data from nodes of a network. The network diagnostic device may be configured to automatically detect a node type associated with a node of a network. The network diagnostic device may also be configured to instantiate a node-specific data collection object associated with the detected node type. The node-specific data collection object may be configured to collect data from nodes of the detected node type at intervals less than or equal to fifteen seconds. | 03-25-2010 |
20100077076 | MANAGEMENT APPARATUS AND METHOD THEREOF - A management apparatus determines whether or not another management apparatus exists on a network, and if it is determined that the another management apparatus exists, acquires information on a device searched by the another management apparatus from the another management apparatus. The management apparatus searches a device on the network and determines whether or not the searched device is searched by the another management apparatus, and acquires information from the device, that is not acquired among information on the device, in a case that it is determined that the device is not searched by the another management apparatus. | 03-25-2010 |
20100077077 | Arrangement and a Method Relating to Performance Monitoring - The present invention relates to an arrangement for monitoring performance in a network comprising a number of network devices or nodes, services and users, in real-time. The arrangement comprising information collecting means, generating means for generating performance KPI indicators depending on a number of definition performance parameters for one or more of said network nodes. The generating means comprise or communicate with decision graph generating means adapted to generate decision graph structures representing respective KPI values and combination probabilities in dependence of KPI definition performance parameters and in dependence of additional or correlation parameters. The generating means comprise decision graph content updating means adapted to update the decision graph structure or structures using said collected information to enable prediction of KPI status/behavior and message sending means are provided which are adapted to send out messages or notifications relating to one or more prediction results. | 03-25-2010 |
20100077078 | NETWORK TRAFFIC ANALYSIS USING A DYNAMICALLY UPDATING ONTOLOGICAL NETWORK DESCRIPTION - Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description. | 03-25-2010 |
20100082798 | VIRTUAL UNIVERSE AVATAR ACTIVITIES REVIEW - Methods, services, program products and devices are provided for tracking avatar activities within a virtual universe domain. A proximity threshold of an avatar is defined with respect to proximity to an artifact located within a virtual universe domain. Activity by the avatar within the virtual universe domain is tracked, with activity data generated from the tracking. The activity data is analyzed to determine proximity of the avatar to the artifact within the proximity threshold, and a report is generated from the analyzing, the report noting a determined proximity of the avatar to the artifact within the proximity threshold. In one aspect, the report is provided to a supervisory entity. | 04-01-2010 |
20100082799 | METHODS AND SYSTEMS FOR MANAGING NETWORK CONNECTIONS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can manage network connections in the software provisioning environment. The provisioning server can maintain a network record of network configurations for the networks served by the provisioning server. The network record can include information describing the structure, hardware, software, and configuration of the networks served by the provisioning server. The provisioning server can manage and configure existing networks and instantiate new networks or sub-networks associated with the provisioning server. The network configuration module can retrieve the network configurations maintained in the network record to manage, configure, and instantiate existing or new networks. | 04-01-2010 |
20100082800 | CLASSIFICATION AND CLUSTER ANALYSIS SPAM DETECTION AND REDUCTION - Multiple features of email traffic are analyzed and extracted. Feature vectors comprising the multiple features are created and cluster analysis is utilized to track spam generation even from dynamically changing or aliased IP addresses. | 04-01-2010 |
20100082801 | METHOD AND APPARATUS FOR NETWORK TO RECOMMEND BEST MODE FOR USER COMMUNICATION - The present disclosure generally provides techniques and apparatuses for producing, for an initiating end user, a recommended mode of communication corresponding to a targeted end user in a network environment, based on a plurality of network accessible or determinable inputs. For example, the identity of an initiating end user, the identity of a targeted end user, the current activity of the targeted end user, the communication preferences of the targeted end user, information from available databases, and other available or determinable data may be used by a contact liaison to produce a recommended mode of communication. | 04-01-2010 |
20100082802 | Stabilization of distributed systems - One or more embodiments, described herein, are directed towards a technology for analyzing a distributed system in order to determine one or more inconsistencies placing the distributed system in an unstable state. Once the one or more inconsistencies are determined, one or more operations reconciling the inconsistencies are defined in order to stabilize the distributed system. | 04-01-2010 |
20100082803 | FLEXIBLE COMPLIANCE AGENT WITH INTEGRATED REMEDIATION - A flexible compliance system is described herein that provides a deployable meta-agent and automated remediation of computer system compliance failures based on configurable compliance rules. An administrator defines one or more rules that represent compliance elements that the flexible compliance system will enforce. The flexible compliance system reads the rules defined by the administrator like a flexible set of conditions to check, and correlates the outcome of the conditions to the rules. The flexible compliance system may take various actions with respect to a computer system in violation of a rule, including attempting to resolve the violation or quarantining the computer system to avoid interaction with other computer systems. Administrators can use the flexible compliance system to define these and many other types of actions to automatically remediate non-compliant computer systems and protect the health of the organization's resources. | 04-01-2010 |
20100082804 | MEASURED CLIENT EXPERIENCE FOR COMPUTER NETWORK - Routing network traffic on a computer network is described. In one embodiment, a method is presented which includes transmitting instructions to a client, the instructions executable by the client to request content from two or more content servers, measure two or more network performance characteristics associated with the two or more different content servers, and issue a report to an administrative server. The report may include a first network performance characteristic and a second network performance characteristic. The method may further include selecting a target content server from one of two or more content servers based on comparison of the two or more network performance characteristics; and transmitting routing instructions to an intermediate routing system, the routing instructions executable by the intermediate routing system to direct subsequent content requests transmitted by the client to the target content server. | 04-01-2010 |
20100082805 | MICROCONTROLLER NETWORK DIAGNOSTIC SYSTEM - A network diagnostic device is provided, which comprises a passive real-time measurement tool that is useful for, among other things, expediting fault identification, isolation, and repair of a communication network or bus. The device also facilitates prediction of failures by identifying marginal operating conditions. The device analyzes data flowing through the communication network, including through an analysis of variations in bit waveform shape carried by the network physical interconnect media. In one embodiment, an implementation of the network diagnostic device is particularly useful in a DeviceNet-compatible network or, more generally, a Controller Area Network (CAN). The device identifies faults by comparing measurements made on the actual DeviceNet bus with worst-case acceptable criteria. The device interfaces with a remote monitoring computer via an Ethernet compatible medium to display parsed bit-level waveforms, network warnings and errors, as well as an overall network health index. | 04-01-2010 |
20100082806 | STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A storage network system includes computers, storage systems, connection devices that control connection relations between the computers and the storage system, and a managing device that manages the computers, the storage system and the connection devices. The managing device includes a control section that specifies connection ports of the computers, the storage system and the connection devices that compose the storage network system. Further, the control device of the managing device displays on a display section a data traffic amount at each of the connection ports for each connection path from the computer to the storage system. | 04-01-2010 |
20100082807 | CONTINUITY CHECK METHOD, MAINTENANCE END POINT AND SYSTEM THEREOF - A continuity check method includes the following steps. A maintenance domain (MD) group is maintained in a network, in which the MD group includes a plurality of maintenance end points (MEPs) in the network, and an MD group information base is configured, and the MD group information base stores information about the plurality of MEPs. According to the information stored in the MD group information base, a continuity check message is initiated, and then, the continuity in the network is determined according to information returned from the plurality of MEPs in the MD. An MEP network system is further provided. Through the method and the system, no mis-check of the continuity will occur when the MEPs in the MD group initiate the continuity check. | 04-01-2010 |
20100082808 | SYSTEM AND METHOD FOR AUTOMATICALLY DELIVERING RELEVANT INTERNET CONTENT - This invention discloses a system and method for automatically delivering relevant Internet content to a browser, the system comprises a webpage embedded with a generic pixel tag stored in a first server, the generic pixel tag being configured to cause a retrieval of at least one predetermined attribute of the webpage from a browser that is viewing the webpage; and a rule engine residing in a second server for determining one or more Internet contents based on the predetermined attribute for being sent to the browser, wherein linkages between the webpage and the one or more Internet contents are not hard coded in the webpage. | 04-01-2010 |
20100082809 | Network system, information processing device, information processing method, and recording medium - A network system is provided in which a plurality of information processing devices are mutually connected through a network. | 04-01-2010 |
20100088403 | DIRECTORY MANAGEMENT SYSTEM AND METHOD - A method and computer program product for defining at least one target system. The at least one target system is accessed to identify one or more web services available via the at least one target system, thus defining one or more available services. Information concerning the one or more available web services is identified. At least a portion of the information concerning the one or more available web services is published within a web services directory. | 04-08-2010 |
20100088404 | MONITORING RELATED CONTENT REQUESTS - Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction. | 04-08-2010 |
20100088405 | Determining Network Delay and CDN Deployment - Charting a content distribution system (CDN) involves identifying a set of DNS servers that may be used as vantage points to test delay performance to a CDNs content server. As provided herein, to identify potential vantage point DNS servers, a set of authoritative name servers is identified and, from that set, those authoritative name servers that respond to a DNS query are identified as responsive authoritative name servers. Identifying a CDN content server that serves a particular vantage point DNS server involves retrieving an IP address for the CDN content server from a DNS query to the DNS server corresponding to the vantage point. The delay performance between the vantage point DNS server and the CDN content server can then be determined. Further, one can determine locations to deploy new data centers for a CDN based on delay performance, A delay from one or more vantage points to an existing CDN's DNS servers can be measured, and desired rank of locations can be generated. A location of a new data center can be selected based on a desired delay performance ranking. | 04-08-2010 |
20100088406 | METHOD FOR PROVIDING DYNAMIC CONTENTS SERVICE BY USING ANALYSIS OF USER'S RESPONSE AND APPARATUS USING SAME - A method of providing a dynamic content service using an analysis of a user's response, the method including: monitoring the response of the user watching and/or listening to first content; analyzing preference information with respect to one or more scenes included in the first content, based on the monitored user's response; transmitting, to an external server, metadata of the analyzed preference information; receiving, from the external server, second content generated based on the metadata of the analyzed preference information; and outputting the received second content onto a screen. | 04-08-2010 |
20100088407 | INFORMATION DISTRIBUTION SYSTEM, INFORMATION DISTRIBUTION METHOD, AND INFORMATION DISTRIBUTION PROGRAM - An information distribution system includes a visit determination unit ( | 04-08-2010 |
20100088408 | STATUS REPORTING APPARATUS, IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM STORING CONTROL PROGRAM - A status reporting apparatus for reporting a status of an image processing apparatus operating in connection with a network includes a status detector, a status report destination information obtainer, and a status reporting unit. The status detector detects a status of the image processing apparatus. The status report destination information obtainer obtains information on at least one report destination to which the status detected by the status detector is to be reported in accordance with status report destination information in which the status of the image processing apparatus is associated with the information on the at least one report destination. The status reporting unit reports the status detected by the status detector to the at least one report destination on which the information is obtained by the status report destination information obtainer. | 04-08-2010 |
20100088409 | MANAGEMENT SYSTEM, MANAGING METHOD AND CONTROL PROGRAM - Disclosed is a management system, which makes it possible to securely maintain the communication between the managing apparatus (host) and the managed apparatus (device) even when a certain malfunction has occurred in the network or the server. When the device cannot receive the request sent from the host, the device changes the communication mode from the bilateral communication mode to the unilateral communication mode, and then, when it becomes possible to receive the request, the device changes the communication mode from the unilateral communication mode to the bilateral communication mode to transmit the response to the host. Further, when the host cannot transmit the request to the device, or when the host cannot receive the response to the request, the host suspends an operation for transmitting the request, and then, when it becomes possible to receive the response to the request, the host resumes the operation for transmitting the request. | 04-08-2010 |
20100088410 | Wireless Broadband Network Management - This invention concerns the management of wireless broadband networks. In particular the invention concerns a wireless broadband network management system comprising a data collection engine to collect data concerning traffic levels through the network base transceiver stations (BTSs), and the BTSs to which particular customer premise equipment (CPE) can connect; and a processor to correlate the data collected; to monitor overall network performance; to aggregate performance of one or more CPEs and BTSs; to detect underperforming BTSs and CPEs; and to automate CPE connections and disconnections to improve network performance in real time. In another aspect, the invention is a method for managing broadband networks. In further aspect, the invention is a software to implement the method. | 04-08-2010 |
20100088411 | METHOD AND APPARATUS FOR DETERMINING APPLICATION RESPONSIVENESS OVER A NETWORK - Application responsiveness over a network, such as for a web site or web-based application, is monitored and optionally recorded by tracking actual end users interacting with the application and the time it takes for their requested web pages to load. The process involves a web server that sends instrumented web pages or pointers to such instrumentation code in response to browser requests. This instrumentation causes scripting code on the client browser to gather data sufficient to enable determination of how long the page took to load, with separate measurements for latency time and/or intra-page load time, and to classify the type of request for which the measurements correspond. The scripting code can report the values to a record keeper or an external process. In one embodiment, Page Lifecycle Events are used to track and update a Marker and Timestamp from which the page load times and classifications are derived. | 04-08-2010 |
20100094987 | Method For Activation of at Least One Further Eavesdropping Measure in at Least One Communication Network - In a packet-switching and/or cell-switching communication network which comprises a plurality of switching nodes and in which the individual switching nodes in the communication network are each allocated a unique identification, eavesdropping measures are provided in order to eavesdrop on at least one data link that has been formed between two communication subscribers, in which case one of the two communication subscribers is identified by means of at least one eavesdropping measure as a communication subscriber to be eavesdropped on. The switching nodes which are intended for activation of eavesdropping measures are each allocated at least one activation database which has the identifications of the switching nodes which are enabled for activation of further eavesdropping measures. In this case, a further eavesdropping measure is activated in the switching node to be eavesdropped on only if the identification of the switching node to be eavesdropped on matches at least one identification which is contained in the activation database. | 04-15-2010 |
20100094988 | AUTOMATIC DISCOVERY FRAMEWORK FOR INTEGRATED MONITORING OF DATABASE PERFORMANCE - Provided are techniques for monitoring information. In response to a database process starting, a monitoring agent is loaded under control of the database process, wherein the monitoring agent invokes a discovery service to discover a central server and monitoring service. Under control of the monitoring agent, monitor information about the database process is sent to the central server and monitoring service. | 04-15-2010 |
20100094989 | METHODS AND APPARATUS TO ALLOCATE BANDWIDTH BETWEEN VIDEO AND NON-VIDEO SERVICES IN ACCESS NETWORKS - Example methods and apparatus to allocate bandwidth between video and non-video services in access networks are disclosed. An example system comprises a customer-premises device, a digital subscriber line access multiplexer (DSLAM) to transmit to the customer-premises device a signal having a non-video portion and a video portion, a usage monitor at the customer-premises device to monitor a usage of the video portion and to send a parameter representative of the usage of the video portion to the DSLAM, and a policy manager at the DSLAM to adjust at the DSLAM a bandwidth allocation between the video portion and the non-video portion based on the parameter. | 04-15-2010 |
20100094990 | Platform-level Indicators of Application Performance - A method for monitoring performance includes monitoring packet traffic on at least one socket that is associated with an application running on a computer and is communicated over a data network. First and second instances of a performance indicator of the packet traffic are measured respectively during first and second monitoring intervals. An alert is issued upon making a determination that a change between the first instance and the second instance exceeds a predetermined threshold. | 04-15-2010 |
20100094991 | Automated Role Based Usage Determination for Software System - A usage data collection and evaluation mechanism may collect usage information from various sources and summarize the usage information to determine a role for a system. The role and usage information may be transmitted to a centralized server for aggregation and analysis. The collection and transmission of usage data may be governed by and conform to a privacy agreement and may be collected when an end user agrees to such collection. Role determination may be performed using data collected from a single device, multiple devices, or from a network monitoring system. The usage data collection and evaluation mechanism may determine an installed role base and any changes in the installed role base since a previous report. | 04-15-2010 |
20100094992 | Capacity Planning Of Multi-tiered Applicatons From Application Logs - One embodiment collects performance data for an application server that processes transactions received from a client computer to a database server. An application log is created from the performance data and used for capacity planning in a multi-tiered architecture. | 04-15-2010 |
20100094993 | Use of Persistent Sessions by a Presence Access Layer - A method for a watcher to receive presence information. The method includes the watcher requesting presence information from a presence access layer and then disconnecting from the presence access layer. The method further includes the presence access layer receiving the requested information through a persistent session with a presence server, storing the requested information, and delivering the requested information to the watcher after the watcher reconnects to the presence access layer. | 04-15-2010 |
20100094994 | NETWORK STRUCTURE INFORMATION ACQUIRING METHOD AND DEVICE - A method for acquiring information about connection relationships in a network as a tree structure having a predetermined network device as a root node, includes the steps of acquiring information about the ports held by each of the network devices, and the network devices connected to each of the ports from each of the network devices; and determining connection relationships in the network, based on the fact that an arbitrary partial tree in the tree structure is smaller than an upstream partial tree containing the arbitrary partial tree. | 04-15-2010 |
20100094995 | Silent Probes in a Communication Network - A system, device and process to enable a “silent probe” on a network to facilitate network analysis by nodes within a network. A network node requests the silent probe. During the silent probe, all nodes remain silent so that all nodes can listen, hear, and/or analyze the spectrum of the communications medium. | 04-15-2010 |
20100094996 | System and method for a server-based files and tasks brokerage - A server-based files and tasks brokerage system and method are disclosed. In response to receiving a request from a requesting computing device, the server posts the request to a request queue. The request is for a requested mobile telephonic device to perform a task. The server posts a first notification to a first notification queue, in response to receiving the request. The server pushes the first notification to the requested device upon confirming a connection. Upon detecting a first condition of the task being for the requested device to receive a file, the server transfers the file from a file repository. Upon detecting a second condition of the task being for the requested device to send a file, the server transfers the file to the file repository. In response to confirming task completion, the server posts a second notification to a second notification queue associated with the requesting device. | 04-15-2010 |
20100094997 | Event logging techniques for broadband wireless access networks - An apparatus, system, method, and article for event logging for broadband wireless access networks are described. The apparatus may include a managed node to store a managed object associated with an event and to provide the managed object to a network management system. The managed object may include an event table to store an event table entry defining an event at the managed node and including an event severity attribute. The managed object may include an event log table to store an event log table entry when the event severity attribute is greater than or equal to a severity threshold. Other embodiments are described and claimed. | 04-15-2010 |
20100094998 | COMPUTER RESERVATION AND USAGE MONITORING SYSTEM AND RELATED METHODS - A computer network may include a host computer and a plurality of computer workstations selectively connectable thereto at which user work sessions may be initiated. Each computer workstation when disconnected from the host computer (e.g., due to server outage, etc.) may advantageously initiate a user session responsive to a user request and store session information for updating the respective user account balance when reconnected with the host computer. Additionally, when the computer workstations are connected to the host computer they may copy respective user account balances from the host computer upon initiation of user sessions, and update the copied account balances based upon computer usage during the respective user sessions. The computer network may also include at least one reservation computer for cooperating with the host computer to schedule user session reservations and provide a requesting user an estimated time before a user session will be made available. | 04-15-2010 |
20100100617 | System for Assignment of a Service Identifier as a Mechanism for Establishing a Seamless Profile in a Contextually Aware Presence Access Layer - A method for providing presence-related information is provided. The method includes creating a template of presence parameters for an application, storing the template, a presence access layer retrieving the template, the presence access layer using the template to create a profile of at least one presence parameter for the application, and the presence access layer using the profile to specify a presence-related action for the application. | 04-22-2010 |
20100100618 | Differentiating a User from Multiple Users Based on a Determined Pattern of Network Usage - In one embodiment, a method comprises detecting, by an apparatus, first network activity within a time interval on at least a first user device at a user premises, the first user device usable by first and second users; determining from the first network activity a first pattern of network usage associated with the first user and a second pattern of network usage associated with the second user, the second pattern distinct from the first pattern; detecting, by the apparatus, second network activity on the first user device at the user premises following the time interval; and selectively identifying the second network activity as performed by the first user based on a determined correlation between the second network activity and the first pattern of network usage. | 04-22-2010 |
20100100619 | METHOD AND APPARATUS FOR VISUALIZING NETWORK SECURITY STATE - There are provided a network security state visualization device and method, the device including: a security event collector collecting original security event information from network security apparatuses; a security event analyzer analyzing the original security event information collected by the security event collector and extracting characteristic data corresponding to a security event; and a three-dimensional visualization display unit visualizing a correlation between the characteristic data extracted by the security event analyzer as a three-dimensional screen to be displayed. | 04-22-2010 |
20100100620 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING COMPOSITE CAPABILITY INFORMATION FOR DEVICES IN DISTRIBUTED NETWORKS - An apparatus for providing distribution of composite capability information for devices within a distributed network may include at least one processor and at least one memory including computer program code. The memory and the computer program code may be configured to, with the processor, cause the apparatus at least to receive local capability information from a participant device in a distributed network in which the local capability information describes the capabilities of the participant device, combine the local capability information from the participant device with other capability information defining capabilities of other participant devices to produce composite capability information, generate differential information indicating differences between the local capability information and the composite capability information, and provide the differential information to the participant device. A corresponding method and computer program product are also provided. | 04-22-2010 |
20100100621 | SHARING STATUS INFORMATION ACROSS A PLURALITY OF COMMUNICATION NETWORKS - A method and system for sharing status information across a plurality of communication networks is presented. Such a method and system is adapted to collect and make available network session status information and to collect and make available network user status information. | 04-22-2010 |
20100100622 | METHOD, COMPUTER PROGRAM PRODUCT, AND APPARATUS FOR PROVIDING A DISTRIBUTED ROUTER ARCHITECTURE - An apparatus for providing distributed router architecture includes a processing element and a resource availability element. The processing element may be configured to receive indications of receipt of data associated with a service for routing to a destination address. The resource availability element may be in communication with the processing element and may be configured to monitor resource usage over a plurality of distributed resource planes. The processing element may be further configured to allocate a resource associated with routing the data based on the monitored resource usage. | 04-22-2010 |
20100100623 | SYSTEM AND METHOD FOR MONITORING A MOBILE COMPUTING PRODUCT/ARRANGEMENT - Described is a system and method for monitoring a mobile computing Arrangement. The arrangement may include a sensor and a processor. The sensor detects first data of an event including a directional orientation and a motion of the arrangement. The processor compares the first data to second data to determine if at least one predetermined procedure is to be executed. The second data may include a predetermined threshold range of changes in the directional orientation and the motion. If the predetermined procedure is to be executed, the processor selects the predetermined procedure which corresponds to the event as a function of the first data. Subsequently, the predetermined procedures is executed. | 04-22-2010 |
20100106818 | SYSTEM AND METHOD FOR MANAGING SYSTEM RESOURCES IN A NETWORK ENVIRONMENT - A method for managing system resources in a network environment. The method begins by reading from a first log timestamp T | 04-29-2010 |
20100106819 | Script Based Computer Health Management System - A management system may use a human readable script in which is defined executable statements that may gathers status information from various services. The status information may be displayed within a management user interface, which may also include various summary statistics including an overall security state. The services may be locally running services, and services provided or accessible over a local area network or wide area network. In some cases, the human readable script may include statements for starting or resuming the services, querying a running service, or querying a database related to a service. The user interface may be refreshed when the human readable script is updated and re-executed. The services may include security related services, among others. | 04-29-2010 |
20100106820 | QUALITY OF SERVICE MANAGEMENT - A method and system for providing quality of service to a plurality of hosts accessing a common resource is described. According to one embodiment, a plurality of IO requests is received from clients executing as software entities on one of the hosts. An IO request queue for each client is separately managed, and an issue queue is populated based on contents of the IO request queues. When a host issue queue is not full, a new IO request is entered into the host issue queue and is issued to the common resource. A current average latency observed at the host is calculated, and an adjusted window size is calculated at least in part based on the current average latency. The window size of the issue queue is adjusted according to the calculated window size. | 04-29-2010 |
20100106821 | MANAGING CONFIGURATION ITEMS - There is provided a method for managing a plurality of configuration items that includes a repository that holds, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item and a discovery section that detects information on configuration items. The method includes creating at least one new set of data from information detected by the discovery section. The method also includes storing the new set of data in the repository and managing the new set of data as a combined configuration item. | 04-29-2010 |
20100106822 | Monitoring-target-apparatus management system, management server, and monitoring-target-apparatus management method - If both of LUN security information on storage apparatuses and configuration information on an iSNS server are acquirable, a management server makes reference to configuration situation of the LUN security acquired from a monitoring-target storage apparatus, thereby acquiring iSCSI initiator names which are permitted to access the storage apparatus. Moreover, the management server acquires, from the iSNS server, IP address of an iSCSI initiator name which does not exist on a monitoring-target host out of the iSCSI initiator names, then adding the IP address into monitoring-target nodes. Meanwhile, when an access from the management server to a monitoring-target node becomes impossible for a certain constant time-period due to a reason such that the monitoring-target node has been excluded from the network, the management server is capable of excluding the monitoring-target node from the monitoring targets on a GUI. | 04-29-2010 |
20100106823 | CONFIGURATION SYNCHRONIZATION BETWEEN ELECTRONIC GAMING MACHINES AND A SUPPORTING SERVER - An illustrative method manages configuration information of electronic gaming machines (EGMs) and maintains server configuration information at a server that supports EGMs in a server-client relationship. The server configuration information contains stored information about the configuration of each EGM. EGM configuration information transmitted from the EMGs is received at the server. The server and EGM configuration information each contains corresponding fields with values representing information about predetermined factors. The values in the fields of the server configuration information are compared with the values in corresponding fields of the EGM configuration information. A report is generated based on the comparison. | 04-29-2010 |
20100106824 | METHOD AND DEVICE FOR DETERMINING NETWORK DEVICE STATUS - Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints. | 04-29-2010 |
20100106825 | METHOD AND SYSTEM FOR MANAGING RELATED-PATIENT PARAMETERS PROVIDED BY A MONITORING DEVICE | 04-29-2010 |
20100106826 | SERVER FUNCTION SWITCHING DEVICE, METHOD AND PROGRAM, AND THIN CLIENT SYSTEM AND SERVER DEVICE - Provided is a thin client system that automatically allows two types of user terminals, a network-boot-type user terminal and a screen-transfer-type user terminal, to share the same execution environment. A screen-transfer/network-boot switching system serves as a server function switching device used in the thin client system, including a server function switching section and a terminal process proxy execution section. The server function switching section accepts a connection request from the user terminal, and determines attribute of the user terminal. If the user terminal is the network-boot-type user terminal, the boot image transfer section transfers a boot image to the user terminal. If the user terminal is the screen-transfer-type user terminal, the boot image transfer section transmits a boot image to the terminal process proxy execution section. Moreover, the terminal process proxy execution section transmits screen information to the user terminal. | 04-29-2010 |
20100106827 | METHOD AND APPARATUS FOR RECOMMENDING CONTENT - Provided is a content recommending method including receiving from second users meta data regarding content belonging to each of the second users having a content preference similar to a content preference of a first user, detecting based on the received meta data a plurality of pieces of recommended content similar to content that the first user is currently using, and outputting information regarding the respective pieces of detected recommended content. | 04-29-2010 |
20100106828 | METHOD AND APPARATUS FOR INTERFERENCE REPORTING IN A N-MIMO COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate interference measurement and reporting in a network multiple-in-multiple-out (N-MIMO) communication system. As described herein, a network device can measure and report interference corresponding to network nodes outside a designated set of nodes that can cooperatively serve the device. Respective interference reports can additionally identify dominant interfering nodes, correlation between transmit antennas of respective nodes, or the like. Subsequently, respective interference reports can be combined with per-node channel information to manage coordination and scheduling across respective network nodes. As further described herein, interference from a network node can be measured by observing reference and/or synchronization signals from the network node. To aid such observation, respective non-interfering network nodes can define null pilot intervals in which transmission is silenced or otherwise reduced. As additionally described herein, loading information broadcasted by respective interfering network nodes can be identified and utilized in connection with interference calculation. | 04-29-2010 |
20100106829 | Device Status Notification Device - There is provided a device status notification device that notifies a notification destination, which is connected to a network, of a status change in a device connected to the network through the network. The device status notification device includes a notification destination information table in which a notification destination, to which the status change in the device is notified in a case where there is the status change in the device, is registered, a notification destination validity checking unit that checks whether the notification destination registered in the notification destination information table exists with validity, and a registration deleting unit that deletes the notification destination, of which valid existence cannot be checked by the notification destination validity checking unit, from the notification destination information table. | 04-29-2010 |
20100106830 | METHOD AND APPARATUS FOR COLLECTING AND DELIVERING STATISTICAL DATA - A statistical-data collecting-and-providing apparatus receives, through a statistical-data-acquisition-criterion setting interface, setting of a statistical-data acquisition criterion and setting of a notification destination, which is a destination of statistical data delivery. Subsequently, the statistical-data collecting-and-providing apparatus collects statistical data based on the thus-received statistical-data acquisition criterion. Thereafter, the statistical-data collecting-and-providing apparatus delivers the thus-collected statistical data to a service-providing application server, which is the notification destination received through the statistical-data-acquisition-criterion setting interface. | 04-29-2010 |
20100115082 | POWER USAGE REDUCTION SYSTEM AND METHOD - A computer implemented method includes collecting information from multiple network devices regarding utilization over a predetermined period of time. Unused device resources are identified, along with device resources that may be consolidated. Such identifications are provided to a user for use in consolidating the network to reduce power consumption. | 05-06-2010 |
20100115083 | NETWORK SELECTION MECHANISM - A terminal device includes multiple interfaces having links to various networks. When a trigger event occurs, the terminal device selects a target link to a network to transition from its current link. A candidate link selection function determines candidate links that are filtered to remove links not meeting connectivity criteria. A target link selection function is then executed to select a target link from the filtered candidate links. Thus, the target link selection function is not run for every possible link, but only those meeting the criteria. | 05-06-2010 |
20100115084 | POWER MANAGEMENT FOR A COMMUNICATIONS SYSTEM - Described herein is a method and system for facilitating power management in a communications system. The communications system includes a server and one or more communications devices operably coupled to a network, each communications device being operable to enter a low power state in response to a “hibernate” command. The “hibernate” command may be provided by a power management unit in the server in response to, for example, a change in routing preference, location or availability status of the user. | 05-06-2010 |
20100115085 | COMPUTER NETWORK - A peer-to-peer network operating in accordance with a service-oriented architecture is disclosed. The peers in the network request services from one another and each keeps a record of the quality of service they receive from the other peers. The peers share quality of service information with one another in order to take advantage of the improvement in the overall efficiency of the use of resources in the network offered by such information sharing. However, the invention provides a further improvement in that peers do not report the quality of service offered by the peers they have received the best quality of service from. This is found to increase the overall level of service still further since it prevents the peers converging on a favourite service provider and thereby overloading it. The invention finds particular application in distributed applications which dynamically select a Web Service to perform a function at run-time. | 05-06-2010 |
20100115086 | UNIT AND METHOD FOR MANAGING AT LEAST ONE CHANNEL IN AN ACCESS SESSION FOR ACCESSING A SERVICE IN A NETWORK | 05-06-2010 |
20100115087 | APPARATUS AND METHOD FOR DETECTING KEY WORDS WITHIN DATA FEEDS - An apparatus such as a cordless telephone handset is capable of detecting key words within received data feeds. According to an exemplary embodiment, the apparatus includes an input for receiving a data feed, and a controller for determining whether content of the received data feed includes a key word. If the controller determines that the content includes the key word, a signal is generated to notify a user. | 05-06-2010 |
20100115088 | CONFIGURATION-INFORMATION GENERATING APPARATUS AND CONFIGURATION-INFORMATION GENERATING METHOD - From each server configuring an IT system, process information about a process operating on the server is obtained before a series of processes including a process corresponding to an application for providing an IT service is started in any of the servers. Also, the process information is obtained over a plurality of number of times from start to end of performing the series of processes. Then, from out of the process information during the series of processes, process information corresponding to the process information before the series of processes is started is removed, and then process information while the series of processes including the process corresponding to the application is being performed is specified. From the specified process information, a process name and identification information of a server where the process is performed are extracted, and the extracted process name and identification information are tied together, thereby generating configuration information. | 05-06-2010 |
20100115089 | Identifying Participants in a Conference - A method of obtaining data about all the participants in a Binary Floor Control Protocol (BFCP) conference is provided. The method comprises sending a query message from a floor participant or floor chair to a floor control server, the query message requesting information about all of the participants in the conference, and sending at least one status message from the floor control server to the floor participant, the at least one status message including information about all of the participants in the conference. These operations are performed within BFCP. | 05-06-2010 |
20100115090 | Ordering Tracing of Wireless Terminal Activities - According to the invention a core network management device ( | 05-06-2010 |
20100115091 | METHOD, SYSTEM AND RECORDING MEDIUM FOR COLLECTING CONTENTS USAGE INFORMATION - Disclosed is a method, a system, and a recording medium for collecting content usage information. The method includes the steps of transmitting a usage tracking report message from a DCD client of the terminal to the DCD server; and receiving the usage tracking report message in the DCD server. The usage tracking report message includes first information for identifying a corresponding session, second information including a transaction identifier, third information for identifying a corresponding application, and fourth information including content usage information. Advantageously, the DCD server collects content usage information so that users are provided with highly-preferred contents. The fact that the DCD server collects content usage information and transmits no contents unnecessary to users avoids wasting the network bandwidth and improves content delivery efficiency of the terminals, CP, and DCD server. | 05-06-2010 |
20100115092 | Mobile device or computer theft recovery system and method - A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall. | 05-06-2010 |
20100115093 | MONITORING APPARATUS AND SYSTEM - An individual signal unit; each said individual signal unit including: (i) a transceiver module, (j) a power supply, (k) a logic circuit, (l) at least one of a number of external event sensors, and wherein a signal from a said individual signal unit to a central control facility causes said central control facility to execute one or more predefined steps; at least some of said predefined steps configured or reconfigurable by an owner of said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties. Also provided is a monitoring system including an individual signal unit; said individual signal unit communicating with a central control facility when an event sensor activates said individual signal unit; said central control facility executing a number of predefined steps on receipt of a communication from said individual signal unit; at least some of said predefined steps configured or reconfigurable by an owner of, said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties. | 05-06-2010 |
20100121947 | System and Method for Managing the Offload Type for Offload Protocol Processing - A method for determining the offload type for the processing of the protocol of a network connection is disclosed. An offload policy manager in a server node determines the offload type on the basis of a number of factors, including the application type of the network connection, the traffic priority of the network connection, and the port of the network connection. After the offload policy manager selects the offload type of the network connection, the offload policy manager identifies the offload type to the offload engine, which processes the protocol of the network connection according to the offload type selected by the offload policy manager. The offload policy manager is able to access a number of application-specific tables. The offload policy manager selects an offload type by cross-referencing on an application-specific table the traffic priority of the network connection against the port of the network connection. | 05-13-2010 |
20100121948 | REMOTE MONITORING OF USER APPLIANCES - A method for operating a server of a communication system includes at least one user appliance and a monitoring device adapted to perform a remote monitoring of the at least one user appliance through the intermediation of the server, the at least one user appliance being associated with a list of attributes that can take predetermined values. The method includes: 1) receiving the list of attributes associated with the at least one user appliance, and the values that can be taken by each of said attributes; 2) storing at the server the list of attributes with the related values received in 1); and 3) sending said list of attributes with the related values to the monitoring device. | 05-13-2010 |
20100121949 | MANAGEMENT SERVER AND METHOD OF DISCOVERING NETWORK DEVICE THEREOF - A method of discovering a network device includes setting a number of network devices to be discovered, and repeatedly discovering at least one network device with one or more different discovering methods until the set number of network devices are discovered. Accordingly, a network device to be discovered is discovered from non-discovered network devices more effectively through repetitive discovering operations. | 05-13-2010 |
20100121950 | SYSTEM AND METHOD FOR IDENTIFYING REAL USERS BEHIND APPLICATION SERVERS - The present invention provides a monitoring device and method for identifying the identity of users requesting database accesses. The data request from application servers to an application server are monitored and parsed. The SQL statements associated with the data request from the application server are also monitored and parsed, so are the SQL responses from the database server. The SQL responses are sent back to the user as data responses. The data responses are also monitored and parsed. The monitoring device matches the parsed data request with the parsed SQL statements, the parsed SQL responses, and the parsed data responses. By matching the string portion of these parsed data, the monitoring device can then identity the identity of the user making such data base quest. | 05-13-2010 |
20100121951 | Method and arrangement for diagnosing networks including field bus systems - A method for diagnosing networks including networks of field bus systems utilizes an arrangement for diagnosing the networks. The arrangement includes at least two field bus diagnostic apparatuses with each of the field bus diagnostic apparatuses being assigned to a corresponding field bus. The method is carried out with the steps of: causing each of the field bus diagnostic apparatuses to detect current data traffic of the corresponding one of the field busses as a data record and storing the data record on an allocated storage medium; diagnosing the detected data record in an evaluation unit integrated into the corresponding field bus diagnostic apparatus and storing the diagnosed data record in the storage medium allocated to the corresponding field bus diagnostic apparatus; making the detected, diagnosed and stored data record available in the network via a server integrated into each of the field bus diagnostic apparatuses; causing the field bus diagnostic apparatuses to exchange the data records with each other via the servers thereof and the network and storing the exchanged data records on the storage mediums of corresponding ones of the field bus diagnostic apparatuses so that, on each of the storage mediums, the exchanged data records of all other field bus diagnostic apparatuses are stored in addition to the detected, diagnosed and stored data records of the field bus diagnostic apparatus; and, inspecting the detected, diagnosed and stored data records via at least one output unit with each output unit being connected via a client to the network and the data records being made available in the network by at least one arbitrary server. | 05-13-2010 |
20100121952 | COMMUNICATION UNIT, METHOD OF CONTROLLING COMMUNICATION UNIT AND COMPUTER PROGRAM - Conventionally, when a communication unit needed to apply an authentication process to other communication units, a problem arose in that the communication unit could not be quickly connected to a communication unit near a user and to which the user wishes the communication unit to connect. In this invention, a station measures a range to other communication units in the surrounding area and possesses a trigger, which is initiated by a user, for beginning an authentication process; when initiated, the station selects the nearest communication unit based on the result of the measurement and applies the authentication process to it. | 05-13-2010 |
20100121953 | GEO-INTELLIGENT TRAFFIC REPORTER - A traffic reporter gathers real-time information on traffic conditions within a network and sends out traffic reports to traffic managers. The traffic reporter analyzes the network and also gathers network information from the traffic managers and analyzers dispersed throughout the network. These traffic reports provide real-time information on network conditions to allow the traffic managers to route network traffic in the most efficient, reliable, and fastest manner. | 05-13-2010 |
20100125656 | System and Method for Request Routing Optimization - A system includes a monitoring module, a request allocation module, and a request distribution module. The monitoring module is configured to determine a resource utilization of a preferred server and a non-preferred server. The request allocation module is configured to modify an allocation scheme in response to the resource utilization of the preferred server and the non-preferred server. The request distribution module is configured to distribute a plurality of requests from a plurality of users according to the allocation scheme. | 05-20-2010 |
20100125657 | System for Collecting Computer Application Usage Data from a Plurality of Client Devices - A system and method for collecting computer application usage data from a plurality of client devices. The system may include a monitoring program executable on each of the plurality of client devices. The monitoring program may be configured to receive from a server via a computer network monitoring data including one or more application identifiers, and to identify one or more target application programs executed on the client device as matching one of the identifiers. The monitoring program may further be configured to gather usage data for the target application program over a period of time, and send a message back to the server including the usage data. Reports may be generated based on the usage data. | 05-20-2010 |
20100125658 | METHOD AND SYSTEM FOR MULTIMEDIA CONTENT CONSUMPTION ANALYSIS - A method and system for analyzing consumption of multimedia content provided by a multimedia content delivery network are disclosed. The multimedia content may be selected by a user using an electronic programming guide on customer premises equipment (CPE). A historical log of content selection events may be recorded. The historical log is analyzed to generate consumption statistics and consumption patterns for the user. The consumption statistics may be generated for different content types. The analysis may be performed locally on CPE or by a remote server. The consumption statistics may be compared with a user subscription for multimedia content. A consumption metric may be generated for recommending a more cost-effective subscription package to the user. Consumption data may be provided to third parties for data mining. | 05-20-2010 |
20100125659 | Method and Apparatus Regarding the Automatic Transmission of Operational State Event and Time Information - A network element ( | 05-20-2010 |
20100125660 | RECORDING APPARATUS, METHOD, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREOF - When the communicator sends a communication message for Web access, the monitor suspends the sending process of the communication message in the communicator. The start determiner instructs the operation recorder to start the recording process of data indicative of user operations. The monitor allows the communicator to resume the sending process of the communication message. The operation recorder sets a capture interval to the timer. When the user performs input operations, the operation recorder records the input data. If the remaining time of the timer is 0, the operation recorder captures and records the screen data, and sets the capture interval to the timer. If the end determiner has instructed to end the recording process, the operation recorder closes the file for storing the operation data and stores the file in the operation storage. | 05-20-2010 |
20100125661 | ARRANGEMENT FOR MONITORING PERFORMANCE OF NETWORK CONNECTION - A method, apparatus, system, and computer program for analyzing properties of an application-specific end-to-end communication connection are presented. In a connection performance analysis apparatus, measurement data messages are received from a plurality of traffic-monitoring nodes arranged at selected intermediate points in a plurality of network segments of the application-specific end-to-end communication connection and from at least one end node of the end-to-end communication connection, wherein a measurement data message comprises information related to a travel time of at least one data packet of the end-to-end communication connection to the traffic-monitoring node or to the end node transmitting the respective measurement data message. Then, the connection performance analysis apparatus analyzes the received measurement data messages in order to determine a bottleneck of the end-to-end communication connection. | 05-20-2010 |
20100125662 | Methods, Systems, Devices and Computer Program Products for Protecting a Network by Providing Severable Network Zones - Provided is a computer network that includes computer network devices that are grouped into severable computer network zones and that are operable to detect non-compliant network activity in another of the severable computer network zones. The computer network includes multiple intra-network communication connections that are operable to communicatively couple the severable computer network zones to one another and to be selectively disconnected responsive to the detection of non-compliant network activity in a first zone of the severable computer network zones to isolate the first zone from other of the severable computer network zones. | 05-20-2010 |
20100125663 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 05-20-2010 |
20100125664 | System, Method, and Software for Integrating Cloud Computing Systems - A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources. | 05-20-2010 |
20100125665 | SYSTEM AND METHOD FOR PERFORMANCE DATA COLLECTION IN A VIRTUAL ENVIRONMENT - A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides a data consumer that manages a plurality of data collectors, wherein each data collector resides on one of the plurality of virtualized and non-virtualized machines in the computing environment and extracts performance data from a set of Virtual Machines running on a specific compute resource using an operating contract. The operating contract includes one or more metric descriptors, wherein each metric descriptor specifies one or more resources associated with the set of Virtual Machines. In addition, a push manager allows the data consumer to register performance data items that need to be handled, wherein the push manager calls the data consumer to process the performance data items at each time the periodic interval elapse. | 05-20-2010 |
20100131635 | AGE BIASED DISTRIBUTED COLLISION RESOLUTION WITHOUT CLOCKS - A method resolves collisions in a networking system that includes a plurality of entities operable to transmit an intention to reserve a resource. A first request to reserve resources, which includes a listing of the resources along the first transmission path and a first intention priority value, is broadcast through the networking system. The first intention priority value is determined as a function of other intention priority values previously broadcast through the networking system. A second request is received. The second request includes a second intention priority value and at least one of the same resources included in the first request, thereby indicating a collision. The collision is resolved by comparing the first intention priority value to the second intention priority value. If the collision is resolved in favor of the first request, data is routed through the networking system using the resources along the first transmission path. | 05-27-2010 |
20100131636 | APPLICATION DELIVERY CONTROL MODULE FOR VIRTUAL NETWORK SWITCH - A virtualized platform includes a virtual switch connected to the virtual network interface cards (vNICs) for a group of virtual machines running the same application program that is associated with multiple software ports. A module in the virtualized platform monitors the virtual switch's receipt of a network packet that includes control information relating to the application program and its software ports. The module applies a load balancing algorithm to select a vNIC from the vNICs connected or connectable to the virtual switch, based on the rate of processing of previous network packets by each the vNICs (e.g., as measured by the size of a network packet queue). The module might also apply the load balancing algorithm to select a software port for the application. The module then causes the virtual switch to route the network packet to the selected vNIC and software port. | 05-27-2010 |
20100131637 | Detecting Hidden Shared Dependencies Through Covert Channels - According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times. | 05-27-2010 |
20100131638 | Systems and Methods for GSLB Remote Service Monitoring - The present invention provides improvements to the integration between a metric exchange protocol and a monitoring mechanism supporting load balancing by a Global Server Load Balancing (GSLB) appliance in a GSLB hierarchy of appliances, using a method for triggering a monitor on a remote service. The method includes receiving, by a first appliance, metrics of a second appliance via a metric exchange connection between the first and second appliances. The first appliance includes a GSLB service and identifies a service provided via the second appliance as a remote service for GSLB. The first appliance may identify via the metrics that a state of the service is up, and determine that the metric exchange connection is down. Responsive to the determination, the first appliance may trigger a monitor to monitor the status of the service. Further, the first appliance may obtain via the monitor a second status of the service. | 05-27-2010 |
20100131639 | Systems and Methods For GSLB Site Persistence - The present invention provides systems and methods for maintaining site persistence in a hierarchical Global Server Load Balancing (GSLB) deployment. Via configuration of GSLB services locally and remotely on each of the GSLB appliances and LB appliances at a site, a site appliance identifies and associates requests from the GSLB with the site. Furthermore, the site appliance may receive a GSLB cookie with the client request and confirms the request is from the expected GSLB in the site hierarchy. When the load balancers receives a response from a server, the appliance may include the GSLB cookie with the response back to the client. The appliance may also include an LB cookie to identify the server selected by the LB. When the client sends another request, the request may include the GSLB and LB cookie. With this information, the GSLB and LB appliance may maintain site persistence for the client as well as server persistence at the site. | 05-27-2010 |
20100131640 | TECHNIQUES FOR IDENTIFYING AND LINKING RELATED CONTENT - Techniques for identifying and linking related content are provided. A principal content network node is received having principal-defined content organized around a principal-defined topic. Local content of the principal is also acquired. The principal-defined content and the local content are evaluated to derive relationships associated with principal identities, principal reputations, and the principal-defined topic. A content network is established that links the principal content network node to other content network nodes having the local content; the links are maintained in response to the relationships. | 05-27-2010 |
20100131641 | SYSTEM AND METHOD FOR IMPLEMENTING A WIRELESS QUERY AND DISPLAY INTERFACE - System and method for implementing a wireless query and display interface are disclosed. In one embodiment, the system includes a machine to be monitored and an end-point associated with the machine and comprising an interface, the end-point for connecting to the machine to be monitored via the interface. The system further includes a consolidator comprising an identity service and a Global Device Identity Listing (“GDIL”), the GDIL for maintaining a list of machines to be monitored using the system and a wireless device for viewing the list maintained by the GDIL and for issuing commands and queries related to one or more of the machines on the list. The end-point, the consolidator, and the wireless device are capable of wirelessly communicating with one another. | 05-27-2010 |
20100131642 | SYSTEM FOR MONITORING THE USE OF CONTENT IN A VEHICLE - A content monitoring system having a vehicle content module for monitoring the use of a content player in a vehicle. The vehicle module includes an interface to a data communications network of the vehicle and a data collector for monitoring data on the data communications network to access in real time player data representing use of the player. The content can include self-loaded content, such as that of a CD, DVD, an ipod, and an mp3 file and broadcast content, such as that of an FM radio broadcast. The content monitoring system also includes a transmission module for transmitting the player data from the vehicle and a server system including an analysis module for receiving and processing the player data from the data collector to generate content usage report data, e.g. representing an audience or ratings survey. | 05-27-2010 |
20100131643 | REMOTELY MANAGED DEVICE - A remote management server creates a data set-up instruction telegram to be sent to a remotely managed device. A control program extracts the data set-up instruction from the telegram, and outputs same to a communication control bundle. The communication control bundle outputs the data set-up instruction to a basic data management bundle. The basic data management bundle, based on the data set-up instruction, fetches the data to be set in the remotely managed device, and determines whether this data is basic data or extended data. If the data is basic data, the basic data management bundle executes this data set-up process. If the data is extended data, an extended data management bundle executes the data set-up process. | 05-27-2010 |
20100131644 | RESOURCE ALLOCATION METHOD IN WIRELESS NETWORK - Provided is a resource allocation method performed in a wireless network formed of a plurality of nodes, the resource allocation method including the operations of forming clusters and electing cluster heads respectively for the clusters; determining whether a node from among the plurality of nodes forming the wireless network is an edge node; if the node is not the edge node according to a result of the determining, collecting link information related to other nodes in a cluster that comprises the node, and delivering the link information to a cluster head of the cluster; and if the node is the edge node according to a result of the determining, otherwise, obtaining link information and scheduling information from an edge node of another cluster within a communication range with the cluster comprising the edge node, and delivering the link information and scheduling information to the cluster head. The resource allocation method decentralizes a load of calculations to several nodes, wherein the load may be centralized to one node in a large ad-hoc network, so that an energy efficiency of the node may be increased, and since the several nodes sequentially perform simple calculation, a total of the resource allocation time may be reduced. | 05-27-2010 |
20100131645 | SYSTEM AND METHOD FOR GENERATING AND USING FINGERPRINTS FOR INTEGRITY MANAGEMENT - A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event. | 05-27-2010 |
20100138528 | Determining the graphic load of a virtual desktop - The graphics load of a virtual desktop is estimated to determine the capacity of a virtual desktop system. In one embodiment, the graphics load of a physical desktop is measured by a remoting agent installed on the physical desktop. The graphics load can be used as an estimate of the load that would be created by a deployed virtual desktop. The remoting agent on the physical desktop mimics host operations that are necessary to direct graphics data to a remote site. The remoting agent also measures the graphics load incurred by the host operations to determine a capacity of a virtual desktop system prior to deployment of the virtual desktop system. | 06-03-2010 |
20100138529 | Variance-Optimal Sampling-Based Estimation of Subset Sums - The present invention relates to a method of obtaining a generic sample of an input stream. The method is designated as VAR | 06-03-2010 |
20100138530 | COMPUTING COMPONENT AND ENVIRONMENT MOBILITY - Methods, services, devices, and programmable code are provided for moving computing processes without loss of service. Powered components supporting a computing infrastructure executing computing processes are monitored for thermal characteristics, each associated with at least one of the deployed components. A thermal characteristic rule set comprising a threshold is applied to the monitored characteristics, and in response to an association with a monitored characteristic correlating with the threshold, a computing process is moved from one powered component to another having a monitored thermal characteristics not correlated with the threshold, the moving in real-time and without causing an interruption of service to an end user using the moved process. | 06-03-2010 |
20100138531 | REAL TIME PROTOCOL STREAM MIGRATION - A method for monitoring and migrating a primary server transmitting a real time streaming protocol (RTSP) stream is provided. Backup servers monitor at least one primary server to determining whether the primary server is active. Upon determining that a primary server is inactive, the backup servers take over the connection on which the inactive primary server was streaming data and then take over the transmission of the RTSP stream. The backup server can further derive the position in a file of the next data needed to be transmitted. | 06-03-2010 |
20100138532 | Method of operating a network subnet manager - The invention relates to a method of operating a network subnet manager, in particular Infiniband network subnet manager in a subnet of a network. | 06-03-2010 |
20100138533 | METHOD OF IDENTIFYING A ROOT CAUSE OF A NETWORK EVENT - A method of identifying a root cause of an event in a network of linked entities. The method comprises: defining a plurality of signatures, each signature comprising one or more classes, the classes being categorized by a taxonomy of classes; receiving a first message from the network; assigning one or more of the signatures to the first message; establishing a set of one or more hypotheses, each hypothesis identifying:a respective root cause; and one of the signatures assigned to the first message; receiving one or more subsequent messages from the network; determining whether each subsequent message matches a signature identified by a previously hypothesis; and generating an output based on the determination. | 06-03-2010 |
20100138534 | SYSTEMS AND METHODS FOR MONITOR AN ACCESS GATEWAY - The present invention is directed towards systems and methods for monitoring an access gateway. The systems and methods include monitors on appliances that generate and send requests to logon agents or login page services on access gateways. Based on the responses from the logon agents or login page services, the monitors determine whether the logon agents or login page services are available. | 06-03-2010 |
20100138535 | NETWORK SERVICE ZONE LOCKING - A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network | 06-03-2010 |
20100146099 | Network Address Translators (NAT) Type Detection Techniques - Techniques described herein enable peers to determine each peer's NAT type much more efficiently and quickly than when compared with existing techniques. To do so, a peer simultaneously sends multiple test messages to a server. The peer then waits to either receive a response for each of the multiple test messages or may store an indication that no response has been received after a predetermined timeout period. The peer then analyzes the received responses and/or the stored timeout indications to determine the peer's NAT type or to determine that the peer is operating free from concealment by a NAT/firewall device. By simultaneously sending the multiple test messages, the peer may determine the NAT type within a maximum time defined by the predetermined timeout period or a roundtrip time period that is required for communication between the peer and the server. As such, the tools allow for efficient NAT-type detection. | 06-10-2010 |
20100146100 | Flexible Application Classification - A system includes an information storage module and an inspection module. The information storage module is configured to store a plurality of tags. Each tag is associated with a known set of traffic types of a plurality of known sets of traffic types. The inspection module is configured to compare a traffic flow to a set of traffic types to determine a matching set of traffic types, request a tag from the information storage module, and mark the traffic flow with the tag. The tag corresponds to the matching set of traffic types. | 06-10-2010 |
20100146101 | Method And System For Binding A Watcher Representing A Principal To A Tuple Based On A Matching Criterion - Methods, systems and computer program products are described for dynamically binding a watching principal to a tuple. In one aspect, a system comprises a message router component configured to receive a watcher matching criterion to bind a watcher representing a principal to a tuple, and an attribute manager component configured to receive an attribute of a first principal represented by a first watcher in a publish/subscribe client. The system also includes a matcher component configured to determine whether the first watcher satisfies the watcher matching criterion when an update to a tuple is detected, where the determination is based on an evaluation of the watcher matching criterion and the attribute of the first principal, and a binder component configured to bind the first watcher to the updated tuple by providing at least a portion of the updated tuple information to the first watcher when the matching criterion is satisfied. | 06-10-2010 |
20100146102 | PROVIDING REPORTS OF RECEIVED MULTIMEDIA PROGRAMS - Selections of multimedia programs are monitored and indications of the selections are included in a report if user specified criteria are met. Example criteria include a minimum presentation duration, a report condition, and a maximum retention period. Access to the reports may be limited to administrators. | 06-10-2010 |
20100146103 | PERFORMANCE MANAGEMENT SYSTEM, INFORMATION PROCESSING SYSTEM, AND INFORMATION COLLECTING METHOD IN PERFORMANCE MANAGEMENT SYSTEM - Provided is a performance management system | 06-10-2010 |
20100146104 | SYSTEM AND METHOD FOR DETECTING A REMOTE APPARATUS - A system for detecting a remote apparatus includes a host and a remote interface device connected to the host via a network. The remote interface device includes at least one serial port configured for connecting to a serial port apparatus. The remote interface device detects the connection status of the serial port using a filter rule provided by the host. When the connection status is changed, the remote interface device sends an event notification to the host. The host adds or removes virtual port objects, which are used by application software and are configured to control the remote apparatus, according to the received event notification. Using the mechanism described above, the host can have remote plug and play feature on a remote serial port apparatus. | 06-10-2010 |
20100146105 | BROADBAND SERVICE DELIVERY - Service is delivered from a service provider to a customer in a network system having a plurality of service providers and a network control and provisioning system through which connection of the customer and service provider is controlled. The service provider is connected to the control and provisioning system via a service manager application which contains predetermined values of conditional data parameters for services to be provided to the customer and the customer's connection to the network is interrogated by the service manager to determine the current values of conditional data parameters. The current values are compared with the predetermined values to determine whether or not conditions for provision of the requested services are met. The results of the comparison are communicated to the service provider. | 06-10-2010 |
20100146106 | Method For Context Based Discovery And Filtering Of Portable Collaborative Networks - A peer-to-peer collaborative network system is described. The peer-to-peer collaborative network system allows for the existence of a number of collaborative networks. Within the collaborative networks, users can interact in ways such as messaging, file sharing, resource sharing, and the like. The user will query other users on the network to determine which collaborative networks are active. The user can then select an active collaborative network without having to be invited there. | 06-10-2010 |
20100146107 | Bandwidth Measurement - Methods for testing network bandwidth availability in a non-intrusive manner. By implementing occasional, base-line bandwidth testing, a more accurate indication of actual transfer rate results. When an application dependent upon network bandwidth is first executed, a series of file transfers takes place utilizing a series of different sized pieces of content. | 06-10-2010 |
20100146108 | RATE-CONTROLLABLE PEER-TO-PEER DATA STREAM ROUTING - Difficulties associated with choosing advantageous network routes between server and clients are mitigated by a routing system that is devised to use many routing path sets, where respective sets comprise a number of routing paths covering all of the clients, including through other clients. A server may then apportion a data stream among all of the routing path sets. The server may also detect the performance of the computer network while sending the data stream between clients, and may adjust the apportionment of the routing path sets including the route. The clients may also be configured to operate as servers of other data streams, such as in a videoconferencing session, for example, and may be configured to send detected route performance information along with the portions of the various data streams. | 06-10-2010 |
20100146109 | SYSTEM AND METHOD FOR NETWORK VIRTUALIZATION - A context-aware server is provided. The context-aware server includes an integrated interface unit and a virtualization information generating unit. The integrated interface unit receives context information of a terminal, user profile information, and network state information. The virtualization information generating unit generates virtualization information including network resource information allocated by using the network state information and at least one of the context information and the user profile information. | 06-10-2010 |
20100146110 | METHOD FOR COLLECTING HUMAN EXPERIENCE ANALYTICS DATA - A method for collecting human experience analytics data for visitors browsing a Web site and a web analytics data collection engine are disclosed. The method comprises the steps of registering an action performed by a visitor browsing the Web site, categorizing said registered action as a navigation action between web pages of the Web site and/or as an event action within a web page of the Web site. In the case that the registered action is categorized as an event action, the event is associated with a web page of the Web site, and the action is recorded as an event within the associated web page. In the case that the registered action is categorized as a navigation action, the action is either recorded as a navigation from a current web page to a subsequent web page, or recording of the action is cancelled, based on previously defined criteria. Finally, the recorded events and navigations are stored in a data storage facility. | 06-10-2010 |
20100146111 | EFFICIENT COMMUNICATION IN A NETWORK - A connection may be established between a first device and a second device in a network. Thereafter, the first device may be monitored for one or more performance parameters. Subsequently, full state information of an application may be processed at the first device based on the performance parameters, and the processed full state information may be transmitted by the first device to the second device. Thereafter, one or more state changes of the application may be processed at the first device based on the one or more performance parameters while the connection is active. Subsequently, one or more processed state changes of the application may be transmitted sequentially by the first device to the second device. | 06-10-2010 |
20100146112 | EFFICIENT COMMUNICATION TECHNIQUES - Embodiments of techniques that may be used to improve communication efficiency in a network are provided. One or more versions of one or more communication protocols in the network may be monitored. A document object model of data may be processed at a device to generate raw data. Subsequently, the raw data may be transmitted by the device on the network based on the versions of the communication protocols. | 06-10-2010 |
20100146113 | DIRECTOR DEVICE WITH VISUAL DISPLAY ARRANGEMENT AND METHODS THEREOF - A director device arrangement for performing a plurality of monitoring functions on data traffic traversing through a network is provided. The director device arrangement includes a power module, a processor module, a set of network ports, a set of switch modules, and at least one monitoring ports. The set of switch modules is configured to include at least a first switch module and a second switch module that interact with one another to perform the plurality of monitoring functions on the data traffic received. The at least one monitoring port is configured to receive at least one of the data traffic traversing through the network, whereas the data traffic is configured to traverse the director device arrangement between the set of network ports irrespective whether power is provided to the circuitry, the processor module, and the set of switch modules of the director device arrangement. | 06-10-2010 |
20100153536 | PARTICIPATING WITH AND ACCESSING A CONNECTIVITY EXCHANGE - Methods for integrating with and participating in a connectivity exchange are described herein. Service providers and users access the Internet via the exchange using one or more devices. These devices include user devices for accessing the Internet via the exchange and devices for service providers offering services to users via the exchange. | 06-17-2010 |
20100153537 | METHOD AND APPARATUS FOR PROVIDING DETECTION OF INTERNET PROTOCOL ADDRESS HIJACKING - A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix. | 06-17-2010 |
20100153538 | System and Method for Communication Handling and Handoff - A system and method handles communications and handoffs communications. A network component for the communication system comprises a memory and a processor. The memory stores a table of data relating to devices disposed in the communication system. The data includes locations of the devices. The processor is configured to determine a destination for an incoming communication. The processor is further configured to determine a pathway to forward the incoming communication to the destination as a function of the table. The communication system includes a first region in which the network component is configured to manage and a second region in which a further network component is configured to manage. | 06-17-2010 |
20100153539 | ALGORITHM FOR CLASSIFICATION OF BROWSER LINKS - A method or algorithm for classifying downloaded links or URL's based on the reason behind the download. Downloads are classified into categories, for example, a “visited” URL or an “embedded” URL. Categorizing these downloads allows other applications to collect information for storage, upload, or other action. This algorithm uses information from the browser history and packet streams to obtain and categorize the links or URL's for classification. | 06-17-2010 |
20100153540 | GEOLOCATION MAPPING OF NETWORK DEVICES - A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a client a list of area landmark servers (ALS) with known geographic locations. The client probes ALSs, measures response delays, and provides results to the coordination server. The coordination server then provides to the client a list of additional city landmark servers (CLS) within the area. The client probes the CLSs and provides results to the coordination server which then determines the geographic location of the client. | 06-17-2010 |
20100153541 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON PROCESSOR WORKLOAD - A technique for operating a high performance computing (HPC) cluster includes monitoring workloads of multiple processors included in the HPC cluster. The HPC cluster includes multiple nodes that each include two or more of the multiple processors. One or more threads assigned to one or more of the multiple processors are moved to a different one of the multiple processors based on the workloads of the multiple processors. | 06-17-2010 |
20100153542 | TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON BROADCAST INFORMATION - A technique for operating a high performance computing cluster (HPC) having multiple nodes (each of which include multiple processors) includes periodically broadcasting information, related to processor utilization and network utilization at each of the multiple nodes, from each of the multiple nodes to remaining ones of the multiple nodes. Respective local job tables maintained in each of the multiple nodes are updated based on the broadcast information. One or more threads are then moved from one or more of the multiple processors to a different one of the multiple processors (based on the broadcast information in the respective local job tables). | 06-17-2010 |
20100153543 | Method and System for Intelligent Management of Performance Measurements In Communication Networks - A system and method operable to monitor a parameter of a node of a communications network, enable one of a plurality of performance measurements for the node based on an enable threshold of the parameter and disable the one of the performance measurements based on a disable threshold of the parameter. | 06-17-2010 |
20100153544 | Content rendering control system and method - A system and method for controlling of rendering of content via electronic networks, whereby content is rendered at a content page only when and to the extent that a pre-defined area of the content page is within the viewer's browser window dimensions and scrolling position, or within a pre-defined distance outside of said browser window dimensions and scrolling position. When a viewer accesses a content page and as the viewer scrolls up or down or left or right on the page, or increases or decreases the dimensions of the viewer's browser window, content that has been designated to render in the content page area corresponding to the viewer's then current browser window dimensions and scrolling position is rendered. Content relating to areas of the content page that are not within (or within such pre-defined distance from) the viewer's browser window dimensions and scrolling position is not rendered unless or until such area is within such browser window dimensions and scrolling position or said pre-defined distance outside of same. | 06-17-2010 |
20100153545 | METHOD OF ASSIGNING SERVICE AND INFORMATION PROCESSING APPARATUS FOR IMPLEMENTING THE METHOD - To provide a method for assigning a service wherein power consumption can be reduced, and an information processing apparatus for implementing the method. The method includes: receiving a request of a service provided by a device connected to a network; checking whether or not a device providing the requested service is in a sleep state; selecting a device to be used based on the checked sleep state of the device, a service table that stores a combination of a service provided via the network and a device connected to the network and providing the service, and a power consumption table that stores a device connected to the network and power consumption of the device, under conditions of a time until the service is provided and power consumption; and issuing an instruction of providing the service to the selected device. | 06-17-2010 |
20100153546 | System and method to publish information from servers to remote monitor devices - To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page. | 06-17-2010 |
20100153547 | COMMUNICATION METHOD, SERVER AND MEDIUM ON NOTIFICATION OF SESSION STATUS - A first server receives the notification of connection ready from each of a plurality of second terminals for executing second communication, notifies the connection ready of each of the second terminals to a second server, detects connection by first communication between a plurality of first terminals, and notifies the detected connection by the first communication to the second server. The second server, upon recognizing the connection ready between the second terminals and the connection by the first communication between the first terminals, provides a service by the second communication between the second terminals. | 06-17-2010 |
20100153548 | METHOD AND SYSTEM FOR TRACKING SCREEN ACTIVITIES - Techniques to facilitate a system to capture, process, and archive a series of user interactive events and subsequently retrieve the stored user interactive events are disclosed. The captured information is indexed and stored for future access either on a terminal device or an accessible remote server device. | 06-17-2010 |
20100153549 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO A RESOURCE MANAGER - A method, system, and program product for communicating with machines connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if urgent service is needed by the device. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information to the resource administrator using e-mail. | 06-17-2010 |
20100161783 | SOCKET CONNECTION-BASED PRINTER DISCOVERY METHOD USING A THREAD MANAGEMENT SCHEME - A targeted TCP socket connection-based printer discovery method is disclosed. It does not use network broadcasts; rather, single packets are sent to each IP address. A multi-threaded method is implemented so that each child thread attempts a TCP socket connection with one IP address, and multiple child threads executes simultaneously. If a connection is successful, the child thread records the corresponding IP address in a local record table. After all child threads exits, the parent thread examines each IP address in the local record table to determine whether the IP address is a supported printer not already in the discovered printer list, and adds the IP address to the discovered printer list if appropriate. Alternatively, the steps of determining whether the IP address is supported printer not already in the discovered printer list may be performed by the child threads. | 06-24-2010 |
20100161784 | Dynamic Fusion Management - A system and method for managing a network of nodes that share sensor data is presented. In one embodiment, the system and method clusters groups of nodes into subnets. Nodes in a common subnet share sensor data with other nodes in the subnet at one rate, while nodes that are not in a common subnet share sensor data at a second substantially reduced rate. | 06-24-2010 |
20100161785 | METHOD AND SYSTEM FOR MINING WEBSITES - One website mining embodiment is for characterizing first time users of a website, collecting user session data of the users visiting the website and identifying first time visitors, determining features of the first time visitors utilizing the user session data, determining rules utilizing the features of the first time visitors, monitoring actions of the first time visitors on the website, updating the rules utilizing the monitored actions of the first time visitors and recommending web content utilizing the rules to the first time visitor. | 06-24-2010 |
20100161786 | QOS CONTROL METHOD FOR ISCSI - A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced. | 06-24-2010 |
20100161787 | WEB PAGE RESPONSE MONITORING - A device receives a list of uniform resource locators (URLs), selects a web page URL from the list of URLs, and requests, via a browser application, content corresponding to the selected web page URL. The device also receives, via a packet capture, a web page associated with the selected web page URL, derives performance information associated with the packet capture, parses the packet capture to extract page level statistics, connection level statistics, and inline object level statistics, and stores the page level statistics, the connection level statistics, and the inline object level statistics to output files. | 06-24-2010 |
20100161788 | MONITORING USER DEMOGRAPHICS WITHIN A VIRTUAL UNIVERSE - An invention that provides discovery and transfer of assets in a virtual universe is provided. In one embodiment, there is an asset transfer utility, including an inventory component configured to display to a user within a virtual universe an inventory containing a plurality of assets owned by other users within the virtual universe, each of the plurality of assets listed anonymously. A search component is configured to search the inventory containing the plurality of assets. A selection component is configured to select a set of assets from the plurality of assets based on the search. A transfer component is configured to transfer the set of assets between the user and an owner of each of the set of assets. | 06-24-2010 |
20100161789 | TECHNIQUES FOR GAUGING PERFORMANCE OF SERVICES - Techniques for gauging performance of services are provided. A client agent is configured to process on a client. The client agent simulates operations of a transaction as instructed by a server agent. The client agent also gathers metrics for each of the operations as they process on the client and passes the metrics back to the server agent. The server agent analyzes the metrics in accordance with a policy and takes one or more actions in response thereto. | 06-24-2010 |
20100161790 | Lawful Intercept for Multiple Simultaneous Broadband Sessions - Identifying information associated with a user under surveillance is received. A first intercept is provisioned on a first network element to intercept the data traffic according to the identifying information. A database is queried based on a login identifier associated with the user. A query result is received from the database. The query result may include a network element identifier and circuit information associate with the login identifier. A determination is made as to whether the network element identifier contained in the query result is the same as a network element identifier contained in information of record. In response to determining that the network element identifier contained in the query result is different from the network element identifier contained in the information of record, a second intercept is provisioned on a second network element to intercept the data traffic according to the network element identifier contained in the query result. | 06-24-2010 |
20100161791 | SYSTEM AND METHOD FOR SAMPLING NETWORK TRAFFIC - Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value. | 06-24-2010 |
20100161792 | Alternate media identification/selection based upon rendered media meta-data - A technique to identify and characterize meta-data associated with an original content that is being transferred from a source to a renderer in a home network, in which the original content is to be rendered by the renderer. Instead of making available for rendering the original content, an alternate content for delivery to the renderer is located, wherein the alternate content is identified by associating the alternate content to the original content via characterization of the meta-data. Then, the alternate content is rendered instead of the original content or rendered in addition to the original content. | 06-24-2010 |
20100161793 | METHOD FOR COMPOSING ON-CHIP NETWORK TOPOLOGY - A method for optimizing a binary tree includes: sequentially searching a binary tree having IP modules of an on-chip network as the lowermost child nodes in a direction from the lowermost node to the uppermost node, and checking whether or not a search target node has child nodes; if the search target node does not have a child node, directly obtaining a minimum solution of the search target node, while if the search target node has child nodes, obtaining the minimum solution of the search target node by using the minimum solutions of the child nodes; and if the search target node is an intermediate node, continuously searching the binary tree, and if the search target node is a root node, optimizing the binary tree by merging nodes of the binary tree according to the minimum solution. | 06-24-2010 |
20100161794 | MAINTAINING CLOSED SUBSCRIBER GROUP INFORMATION FOR ACCESS CONTROL - Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list. | 06-24-2010 |
20100161795 | APPARATUS AND METHOD FOR MULTI-USER NAT SESSION IDENTIFICATION AND TRACKING - A method and apparatus are provided for identifying and tracking multiple computer user sessions associated with a network address translation (NAT) device coupled to a computer network. Data packets originating from the NAT device containing a request to a destination server coupled to the computer network are received. A client source address associated with the data packets is determined where the source address associated with the NAT device. One or more session entries associated with the client source address can then be determined, wherein the session entries are stored in system state information. A session signature can then be determined based one or more characteristics defined by the data packet header information and/or request header information in the one or more data packets, the session signature uniquely identifying one of the multiple computer user sessions coupled to the NAT device. | 06-24-2010 |
20100161796 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO USERS - A method, system, and program product for communicating with machines and end users connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and an end user or a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device by an end user to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if an urgent need of the end user is indicated, so that a communication may be sent either directly to the end user or to a device driver so that the device driver may communicate the message to the end user. For example, an end user may have exceeded a predetermined limit of resource usage, and needs to be informed. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information. such as summary information regarding usage of network resources to the end user using e-mail. | 06-24-2010 |
20100169472 | Web Access Monitoring Method and Associated Program - A centralized control server for controlling each computer includes a step for setting monitoring rules including warning conditions and processing forms at the time of warning for web accesses which are improper from a business or educational point of view. A client computer is provided with a filtering module for monitoring web accesses. Said filtering module includes a step for analyzing the communication contents of the client computer and detecting the occurrence of a web access to an object to be monitored prescribed by the monitoring rules, a step for counting an access quantity at the time of detection of the web access, and a step for issuing warning processing in real time to a user or an administrator in accordance with the processing forms at the time of warning when it is judged that the access quantity has reached an upper limit value prescribed by the warning conditions. | 07-01-2010 |
20100169473 | Terminal, network apparatus, network apparatus searching system including the terminal and the network apparatus, and network apparatus searching method - The present invention has as its object providing a terminal capable of accurately searching for an apparatus installed near a user. The terminal connected to a network apparatus through a network includes a display section which performs a displaying operation and position searching means which, on receiving an instruction to make a search for the network apparatus, transmits a signal indicating specific content and then, on receiving a response signal from the network apparatus that receives the signal through the network, causes the display section to display information that shows that the network apparatus transmitting the response signal has received the signal. | 07-01-2010 |
20100169474 | Methods, Devices and Computer Program Products for Regulating Network Activity Using a Subscriber Scoring System - Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned. | 07-01-2010 |
20100169475 | SYSTEM AND METHOD FOR MANAGING A BROADBAND NETWORK - A process for managing usage on a broadband network, said process comprising: (a) monitoring a subscriber's broadband usage; (b) determining if said usage rises to a level indicative of an event; (c) determining if said event is consistent with heavy usage or with a security incident; (d) if said event is consistent with heavy usage, offering said subscriber at least one of a plan for an upgraded subscription, or an incentive to concentrate usage in nonpeak time; and (e) if said event is consistent with a security incident, exercising security measures to minimize unintended usage. | 07-01-2010 |
20100169476 | METHOD AND SYSTEM FOR DETECTING AND REDUCING BOTNET ACTIVITY - A method and system for detecting and reducing botnet activity includes tracking the number of connections to a destination address over predetermined periods of time. A persistence value is assigned to the destination address based on the number of time periods during which the destination address was connected. The persistence value is compared to a threshold value and an alert is generated if the persistence value is greater than the threshold value. Known safe destinations may be entered into a whitelist. | 07-01-2010 |
20100169477 | SYSTEMS AND METHODS FOR DYNAMICALLY PROVISIONING CLOUD COMPUTING RESOURCES - In one embodiment the present invention includes a computer-implemented method comprising specifying configuration information for creating one or more software servers as images on a cloud computing system, specifying a processing load threshold, and continuously monitoring a processing load on one or more software servers. If the monitored load exceeds the processing load threshold, a request to the cloud computing system may be generated to instantiate an instance of one of said images. The method further includes creating a server instance on the cloud in response to the request, distributing the processing load across the one or more servers and the server instance, and monitoring the processing load on the one or more servers and the server instance. | 07-01-2010 |
20100169478 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ADAPTIVELY ADJUSTING A REGISTRATION INTERVAL OF AN ENDPOINT - Methods, systems, and computer program products for adaptively adjusting a registration interval of an endpoint are provided. In an embodiment of the subject matter disclosed herein, a method of adaptively adjusting a registration interval of an endpoint comprises determining a registration interval for an endpoint associated with a binding defined at a network address translation device. The method also comprises determining a stability of the binding based on a message received from the endpoint. Further, the method comprises adjusting the registration interval for the endpoint based on the determined stability of the binding. A message can be sent to the endpoint for indicating the adjusted registration interval. | 07-01-2010 |
20100169479 | Apparatus and method for extracting user information using client-based script - Provided are an apparatus and method for extracting user information using a client-based script in which user information including the internet protocol (IP) addresses of an attacking host and an anonymous proxy server used by the attacking host can be collected using a client-based script that can be automatically executed in the web browser of the attacking host. According to the apparatus and the method, it is possible to detect the location of an attacking host without alerting the attacking host by using a script that can be automatically executed in a web browser of the attacking host without any program installation. In addition, according to the apparatus and the method, it is possible to collect the IP addresses of an attacking host and an anonymous proxy server, if any, used by the attacking host by directly connecting the attacking host and a monitoring server. | 07-01-2010 |
20100169480 | Systems and Methods for Monitoring Messaging Applications - The present inventions relate systems and methods for monitoring and managing electronic messages in one or more computer networks. More particularly, the systems and methods of the present invention provide a substantially global or unified approach to messaging management within one or more computer networks that allows network administrators or other authorized users to define and identify electronic messages of interest within the network and store selected messages such that they can be retrieved and examined in connection with an audit or other inquiry. | 07-01-2010 |
20100169481 | TEST SYSTEM FOR SEMICONDUCTOR DEVICES BASED ON NETWORK MONITORING - A test system for semiconductor devices based on network monitoring is disclosed. The test system includes a testing apparatus, a test system server and one or more control terminals. The test system server wirelessly receives the test request transmitted from the testing apparatus, the control terminals, the designing apparatus or the manufacturing apparatus. According to the test request, the test system sever wirelessly transmits the test information to the testing apparatus to proceed with a test process for a semiconductor device. | 07-01-2010 |
20100169482 | Method And An Apparatus For Monitoring Multimedia Data - The present invention discloses a method for monitoring network multimedia data, comprising: analyzing network packets, identifying multimedia data carried in the packets; separating the multimedia data from the packets, and saving the data and the associated access information to a monitoring information base to be utilized for illegal information detection. This invention also discloses a monitoring apparatus to implement the network multimedia monitoring. The method and apparatus in this invention implement monitoring of the multimedia information travelling in the network. | 07-01-2010 |
20100169483 | Capability Service in Communications System - According to the present solution, a capability service is provided to a user terminal (T | 07-01-2010 |
20100174812 | SECURE REMOTE MAINTENANCE AND SUPPORT SYSTEM, METHOD, NETWORK ENTITY AND COMPUTER PROGRAM PRODUCT - A remote, secure maintenance and support system, method, network entity and computer program product are provided. The system can include site terminal(s) and/or a site server (collectively “site device(s)”), a data center in communication with the site device(s) over a first secure tunnel, and at least one client terminal in communication with the data center over a second secure tunnel. The site device(s) can be configured to periodically transmit to the data center one or more error messages over the first secure tunnel. The data center can, in turn, be configured to make the error messages accessible to at least one authorized technician operating one of the client terminals. The client terminal can be configured to retrieve at least one of the error messages over the second secure tunnel and to take an action associated with resolving the error message. | 07-08-2010 |
20100174813 | METHOD AND APPARATUS FOR THE MONITORING OF RELATIONSHIPS BETWEEN TWO PARTIES - A computer implemented method and data processing device for assessing electronically mediated communications is described. A plurality of messages sent by a first party are captured. The content of the messages is processed to determine a quantitative metric reflecting a first property. The behavior over time of the quantitative metric is analyzed to assess the nature of a relationship involving the first party. | 07-08-2010 |
20100180023 | Automatic protocol detection - A method and corresponding device provides for automatically detecting a protocol for a load testing routine. The method includes the steps of, for an application to be load tested, executing the application and recording communications between a first tier and a second tier during the execution. The recording step includes recording modules loaded by the application, recording network traffic and Web traffic, comparing the recorded modules, network traffic and Web traffic to a rule set, and based on the comparing step, selecting one or more protocols appropriate for load testing the application. Finally, the method includes the step of generating a script based on the recorded communications and the protocols, where the script specifies the protocols. | 07-15-2010 |
20100180024 | REDUCING OCCURRENCES OF TWO-PHASE COMMITS IN A MULTI-NODE COMPUTING SYSTEM - Techniques are disclosed for reducing the number of two-phase commits required to perform atomic transactions in a multi-node system. By monitoring atomic operations that require two-phase commit protocols, a system may identify when it would be beneficial to consolidate data onto single (or at least fewer) compute node(s). In doing so, a less compute intensive commit protocol, such as a one-phase commit protocol may be used. Moreover, in situations where data consolidation is not available, the data may be migrated to compute nodes having a closer proximity. Thus, in such cases, network response times for two-phase commits required for an atomic operation may be reduced, thereby increasing the performance of a multi-node system. | 07-15-2010 |
20100180025 | DYNAMIC LOAD BALANCING BETWEEN CHASSIS IN A BLADE CENTER - A computer-implemented method, system and computer program product for load balancing between different blade chassis within a blade center are presented. Each blade chassis is monitored for total data traffic to and from that blade chassis. If a first blade chassis within the blade center is overworked, then a most overtaxed blade within that first blade chassis is disabled. A less utilized second blade chassis within the blade center is then identified, and a least taxed blade within the second blade chassis is assigned to take over the workload of the disabled blade from the first blade chassis. | 07-15-2010 |
20100180026 | RECYCLING ITEMS IN A NETWORK DEVICE - A network device includes a data structure and an ager. The data structure includes a group of positions. One or more of the positions are associated with at least one item. The ager is configured to sequentially analyze each position of the group of positions, and recycle, at each analyzed position, any item associated with the analyzed position. | 07-15-2010 |
20100185760 | Overlay network traffic detection, monitoring, and control - An overlay network traffic detection system deploys traffic measurement units at multiple points on a network, creates profiles of the network traffic measured at each point, and then compiles the traffic profiles obtained at different points. The compiled profile of outbound traffic originating at a node is compared with the compiled profile of inbound traffic addressed to the same node. A strong correlation between the two profiles indicates that the node is relaying overlay network traffic. Further information can be gained by profile screening, by active interference in the traffic flow, by launching known information into the network at known times and observing its effect on the traffic profiles, and by observing keyword distributions in non-encrypted traffic. | 07-22-2010 |
20100185761 | SERVICE PROVIDER NODE, AND COMPUTER-READABLE RECORDING MEDIUM STORING SERVICE PROVIDER PROGRAM - A computer-readable recording medium storing a verification support program is provided. The computer-readable recording medium storing a service provider program that causes a computer to execute: providing a service through acceptance of a service request; establishing a process-to-process communications by waiting for a process to be a destination of the service; stopping provision of the service corresponding to the service request accepted by the providing after the process-to-process communications is established; transmitting, while the provision of the service is being stopped, information for use by the providing to provide the service, to the process by the process-to-process communications; and ending, after the information is completely transmitted by the transmitting, the acceptance of the service request by the providing. | 07-22-2010 |
20100185762 | ABNORMAL POINT LOCATING APPARATUS, METHOD, AND STORAGE MEDIUM - An abnormal point locating method includes: a link primary abnormality judgment procedure that acquires information on a link through which each observation flow passes, locates a link through which an observation flow observed at an observation point passes, and judges whether the located link is normal or abnormal based on the observation flow; and a link secondary abnormality judgment procedure that judges a probability of abnormality based on a result of the link primary abnormality judgment procedure by using a connection relationship as seen from each observation point. | 07-22-2010 |
20100191844 | CLUSTER-BASED FRIEND SUGGESTION AGGREGATOR - Techniques are described to generate a list of suggested friends for a client of a social networking service. In an implementation, a cluster of clients is identified from among the clients of the social networking service. The cluster of clients includes the client for which the list of suggested friends is to be generated. The list of suggested friends for the client may then be generated and may include one or more clients of the social networking service selected based on connections with the cluster of clients. The list indicates at least one other client of the social networking service that is suggested as a friend. | 07-29-2010 |
20100191845 | SPECULATIVE VIRTUAL MACHINE RESOURCE SCHEDULING - A speculative virtual machine (“VM”) resource scheduler for a VM that is hosted by a primary host server initiates the creation of at least one duplicate VM on a secondary host server. The VM and the duplicate VM are run substantially in lockstep while the scheduler monitors resources on the primary host server and the secondary host server. The scheduler then determines an advantageous host server among the primary host server and the secondary host server and, based at least in part on the determination, initiates the powering down of either the VM on the primary host server or the duplicate VM on the secondary host server. | 07-29-2010 |
20100191846 | Verifiable service policy inplementation for intermediate networking devices - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, an intermediate networking device acts as a service intermediary or intermediate connection between a network and one or more communications devices; implements a service policy set for assisting control of the intermediate networking device use of a service set on the network, the service policy set including one or more service policies associated with the intermediate networking device or one or more communications devices connected to the intermediate networking device, the service set being one or more network services used by the intermediate networking device or one or more communications devices; and monitors use of the service set based on the first service policy set, in which the implementation of the service policy set is verified. | 07-29-2010 |
20100191847 | Simplified service network architecture - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a network device collects a plurality of service usage measurements for a communications device use of a service on a network; and compares the plurality of service usage measurements to a device assisted implementation of a service policy to verify the device assisted implementation of the service policy. | 07-29-2010 |
20100191848 | INFORMATION SHARING METHOD BETWEEN NEIGHBORING NODES, NODE AND INFORMATION SHARING PROGRAM - A load caused by an information sharing message in an upper layer is reduced. | 07-29-2010 |
20100191849 | COMMUNICATION METHOD, COMMUNICATION SYSTEM, SERVER AND STORAGE MEDIUM STORING PROGRAM RELATED TO TRANSFER OF SESSION MANAGEMENT - A first server detects a condition that requires a service to be invoked, and the detection of this condition triggers it to establish a connection with a second server. The first server relays data relevant to a first communication between first and second terminals and the second server over the established connection. The first server also relays data relevant to a second communication between the first and second terminals and the second server, or between third and fourth terminals and the second server. Alternatively, the second server both receives and returns the data relevant to the first communication from/to the first server over the established connection. | 07-29-2010 |
20100191850 | SYSTEM AND METHOD FOR DETECTION OF ABERRANT NETWORK BEHAVIOR BY CLIENTS OF A NETWORK ACCESS GATEWAY - A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway. | 07-29-2010 |
20100191851 | METHOD AND APPLIANCE FOR USING A DYNAMIC RESPONSE TIME TO DETERMINE RESPONSIVENESS OF NETWORK SERVICES - In a method and appliance for determining responsiveness of a service via a particular protocol, a device intermediary to a plurality of clients and a plurality of services determines response times from each of a plurality of services to respond to requests via a first type of protocol of a plurality of protocols. The device calculates an average response time for the first type of protocol from each of the response times of the plurality of services. The device establishes a predetermined threshold for which a response time of a service for the first type of protocol may deviate from the average response time. The device identifies a service as available responsive to determining that a deviation of the response time of the service from the average response falls within the predetermined threshold. | 07-29-2010 |
20100198959 | SYSTEM AND METHOD FOR TRACKING INDIVIDUALS ON A DATA NETWORK USING COMMUNITIES OF INTEREST - The current invention relates to a system and method for tracking or locating a target entity on a data network, such as the public Internet, by analyzing network traffic and communication among interacting network nodes. The invention describes a system of creating an information set of data related to the traffic patterns associated with a specific entity over a time period, and comparing the information set to other information related to the traffic patterns associated with a group of entities over the same time period. By excluding information that is common to both the specific entity and the group of entities from the information set, the information set is left with only the information that helps identify the specific entity on the network. | 08-05-2010 |
20100198960 | AUTOMATED TEST EXECUTION IN A SHARED VIRTUALIZED RESOURCE POOL - In a computer-implemented method for automated test execution in a shared virtualized resource pool, a test description containing at least one model for a service under test (SUT) is received and one or more infrastructure configurations to be tested by resources in the shared virtualized resource pool based upon the test description are identified. In addition, a service lifecycle management (SLiM) tool is interacted with to cause the SUT and a load source to be created, the SLiM tool is directed to instantiate the SUT and the load source on the one or more infrastructure configurations in the shared virtualized resource pool for the SUT, and the SLiM tool and the load source are interacted with to receive performance data related to performance of the SUT under one or more loads generated by the load source. | 08-05-2010 |
20100198961 | MULTI-THREADED METHOD AND SYSTEM FOR AUTOMATED REMOTE SUBMISSION OF JOBS TO MAINFRAME AND UNIX SYSTEMS FROM THE WINDOWSTM PLATFORM - A method and system for automated remote submission of jobs to host systems generate a single executable file having a user program specified in a command line. A separate thread is used to submit the single executable file to the host system. The separate thread monitors progress of the single executable file on the host system and posts information associated with the monitored progress of the single executable file. | 08-05-2010 |
20100198962 | METHOD FOR MONITORING A REMOTE MACHINE - A method used for monitoring a remote machine by a local computer via a computer network. The remote machine is installed with web server programs and has parameter settings reconfigured by updating an Electronic Data Sheet. The method comprises initiating a browser at the local computer and establishing the computer network link to the remote machine via the computer network; downloading a JAVA applet from the remote machine to the local computer; and accessing an Electronic Data Sheet corresponding to the remote machine with the JAVA applet stored in the local computer and displaying the content of the Electronic Data Sheet at the local computer. | 08-05-2010 |
20100198963 | NOTIFICATION INFRASTRUCTURE FOR SENDING DEVICE-SPECIFIC WIRELESS NOTIFICATIONS - A data store is monitored for a change in the data store. A notification communication is generated upon detecting that the change has occurred. The notification communication is formatted based on a wireless device associated with the data store. The notification communication is sent to the wireless device associated with the data store. | 08-05-2010 |
20100198964 | COMPUTER SYSTEM, MANAGING APPARATUS AND COMPUTER SYSTEM MANAGING METHOD - A resource usage analysis tool ( | 08-05-2010 |
20100198965 | NETWORK CONTROL DEVICE, IMAGE DISPLAY DEVICE AND NETWORK CONTROL METHOD - In order to easily ensure service quality by reducing network traffic, a network monitoring section ( | 08-05-2010 |
20100198966 | MANAGEMENT SERVER, MONITORING APPARATUS, AND METHOD FOR MANAGING IMAGE FORMING APPARATUS AND CONTROLLING MONITORING APPARATUS - A management server receives identification information including an IP address, MAC address, and product number of an image forming apparatus together with operation information thereof such as counter information via a network. Then, the management server determines whether the received identification information coincides with registration information. When the management server determines that the received identification information coincides with the registration information, the management server stores the operation information in association with a registered image forming apparatus. | 08-05-2010 |
20100198967 | IMAGE FORMING APPARATUS, MANAGEMENT APPARATUS, AND MANAGEMENT SYSTEM FOR MANAGING IMAGE FORMING APPARATUS - In an image forming apparatus, when a plurality of events are detected within a predetermined period of time, event relevant information is not transmitted for all of the detected events and the same event ID is set for event information so that event relevant information which is transmitted at least once can be associated with the plurality of events. In a management apparatus, the event information and the event relevant information which have the same event ID are managed in association with each other. | 08-05-2010 |
20100205291 | SYSTEMS AND METHODS FOR ENFORCING POLICIES IN THE DISCOVERY OF ANONYMIZING PROXY COMMUNICATIONS - In embodiments of the present invention improved capabilities are described for systems and methods that enforce policies with respect to proxy communications. | 08-12-2010 |
20100205292 | SYSTEM AND METHOD FOR NETWORK OPTIMIZATION THROUGH PREDICTIVE DOWNLOADING - As more internet service providers have more customers with high-speed internet access accounts and these customers access more multi-media rich data (such as videos), the network infrastructure of internet service providers becomes saturated. Thus, internet service providers are facing pressure to upgrade their networks. Thus, internet service providers need to optimize the usage of their existing networks. To optimize the usage of existing networks, a system of performing predictive downloading for data caches is proposed. The system for performing predictive downloading examines network traffic conditions and does not issue predictive download requests if the network is busy. By restricting predictive downloads to times when the network is not busy, the system utilizes an under used resource. Accurate predictions will reduce future network traffic. Incorrect predictions cause no harm since the transfers only occur when free network bandwidth is available. | 08-12-2010 |
20100205293 | COMPREHENSIVE POLICY FRAMEWORK FOR CONVERGED TELECOMMUNICATIONS NETWORKS - The subject innovation relates to systems and/or methodologies for comprehensive policy based service delivery. A policy plane is provided as a comprehensive way to manage operator policies for most all IP and/or service flows (e.g., IMS and non-IMS) under varying network conditions, while keeping in view user preferences, user subscriptions, service requirements, terminal capabilities (e.g., including converged terminals), network capabilities (e.g., 3gpp and non-3gpp accesses inter-working with 3gpp), session transfer policies, service aware roaming, and so forth. The policy plane can be generated through harmonization of existing components (e.g., discussed infra), and creation of new policy aspects where desired (e.g., policies for identity and charging management in personal area network, etc.). The policy plane works to close gaps between standards, operator requirements, and user requirements. | 08-12-2010 |
20100205294 | METHOD FOR MEASURING THE PERFORMANCE OF A TARGET SERVER HOUSING A DYNAMIC MONITORING TOOL - A method for measuring the performance of at least one target server housing a dynamic monitoring tool which can be controlled by scripts, the dynamic monitoring tool having predefined probes for acquiring the data relating to the behavior of an operating system and applications of the target server, the method including, from a remote management server, the following steps: a dynamic monitoring tool within the target server is accessed via a communication network, at least one script to be executed by the dynamic monitoring tool is remotely transmitted, and at predetermined times, the target server is automatically accessed so as to retrieve the performance data resulting from the execution of the script by the dynamic monitoring tool. | 08-12-2010 |
20100205295 | System Consisting Of A Plurality Of Cooking Devices With Respective Network-Based Monitoring Devices - A system for synchronous monitoring of a cooking process of a plurality of cooking devices via the internal web browser of one of the cooking devices comprises a plurality of cooking devices that can be interconnected via interfaces. Each cooking device is connected to at least one internal web server that is connected to a network and that provides services for the monitoring, control or analysis of at least one of the cooking devices. At least one internal web browser is provided that is connected to the network and that can use at least the services of one of the internal web servers. | 08-12-2010 |
20100205296 | FLOW CONTROL APPARATUS AND FLOW CONTROL METHOD - A flow control apparatus includes a status monitoring unit, a flow control deciding unit, a flow control strategy storing unit and a performing unit. The status monitoring unit is configured to report the current operating status of a service node to the flow control deciding unit. The flow control deciding unit is configured to provide the current operating status of the service node to the flow control strategy storing unit, generate a flow control command based on an evaluating result which is obtained by the flow control strategy storing unit based on one or more flow control algorithms and the current operating status of the service node, and distribute the flow control command. The flow control strategy storing unit is configured to store the one or more flow control algorithms, obtain the evaluating result based on the one or more flow control algorithms and the current operating status of the service node provided by the flow control deciding unit, and provide the evaluating result to the flow control deciding unit. The performing unit is configured to control new services arriving at a service processing system according to the flow control command distributed by the flow control deciding unit. A flow control method is also provided. | 08-12-2010 |
20100205297 | SYSTEMS AND METHODS FOR DYNAMIC DETECTION OF ANONYMIZING PROXIES - In embodiments of the present invention, improved capabilities are described for systems and methods that dynamically detect uncategorized web-based proxy sites and translator sites. The systems and methods may be directed at identifying a suspected proxy site, intercepting a form submission intended to be submitted to the suspected proxy site, submitting a probe in place of the intercepted form submission to the suspected proxy site wherein the probe is adapted to instruct a proxy site to direct communications to a known probe site adapted to return predetermined information as verification of interaction with the probe site, analyzing a response to the submission of the probe for the presence of the predetermined information, and upon detection of the presence of the predetermined information in the analysis, categorizing the suspected proxy site as a proxy site that is adapted to anonymize internet behavior. | 08-12-2010 |
20100205298 | Method, system and computer program to enable semantic mediation for SIP events through support of dynamically binding to and changing of application semantics of SIP events - An event notification system includes a data communications network ( | 08-12-2010 |
20100205299 | Intelligent Discovery Of Network Information From Multiple Information Gathering Agents - A system, method and computer program product for intelligent discovery of network information from multiple information gathering agents adapted to discover information concerning the network. The discovery agents each have an associated discovery capability. Based on consideration of the agent discovery capabilities, discovery assignments are computed and network discovery is performed according to the assignments so as to reduce discovery poll overhead. | 08-12-2010 |
20100205300 | ROUTING METHOD - A method executed by a router that establishes a connection between a network and an another network that includes an information processing device and an information storage device, the method includes: detecting an access status of the information processing device to the information storage device; and prohibiting transfer of the information from the information processing device to the another network depending on the access status managed in the detecting. | 08-12-2010 |
20100211668 | OPTIMIZED MIRROR FOR P2P IDENTIFICATION - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, by the network node, a packet belonging to an IP flow; when the IP flow is a flow for which content information is to be sent to the content identification device, performing the steps of: determining, using deep packet inspection, that the packet contains a value for at least one field of interest, determining whether all fields of interest needed by the content identification have been seen by the network node among a plurality of packets belonging to the IP flow, and communicating the value of the at least one field of interest to the content identification device. | 08-19-2010 |
20100211669 | DATA CENTER CONTROL - Systems and methods for data center control are provided that identify parameters of one or more data centers, where each data center includes a plurality of devices. The systems and methods receive a command to execute an application, and identify a selected data center from the one or more data centers as a location to run the application based at least in part on an evaluation of the parameters. | 08-19-2010 |
20100211670 | SYSTEM FOR MONITORING PRODUCTION OPERATIONS - A system for monitoring production operations includes an operator box located at a workstation and having a plurality of manual input devices configured for manual activation by an operator, a corresponding plurality of status indicators, each status indicator being configured to provide an indication of the operational status of the workstation, and a communications port configured to facilitate communication between the operator box and a network. The system also includes a computing device coupled to network to receive data from a machine controller coupled to the network and data from the operator box, and to store that data in a database of records reflecting historical performance of the system. | 08-19-2010 |
20100211671 | EFFICIENT MAINTENANCE OF A DISTRIBUTED SYSTEM MEMBERSHIP VIEW - A method, system and computer program product are disclosed for maintaining a membership view of a distributed computing system comprising a multitude of members, wherein each of said members sends out a message indicating that said each of the members is available in the system. In one embodiment, the method comprises maintaining a first list of at least some of the members in the distributed system; and over a period of time, when one of the members sends out the message indicating that said one of the members is available in the distributed system, adding said one of the members to a second list. At defined times, the first list is replaced with the second list. In an embodiment, the method further comprises at said defined times, starting a new, empty second list. | 08-19-2010 |
20100211672 | METHOD AND SYSTEM FOR SIMULATING LATENCY BETWEEN LAYERS OF MULTI-TIER APPLICATIONS - A method, system and article of manufacture for simulating latency between software applications. There is provided a middleware component, e.g., a delay driver, within a multi-tier software product, the middleware component driver enables simulation of both latency and bandwidth restrictions experienced by the components in the multi-tier software product. The middleware component determines whether I/O request packets should be delayed, selects the number and types of I/O requests packets to be delayed and the amount of time to delay processing of the packets. Through the use of such a middleware component, a user is able to simulate various conditions experienced by the multi-tier software product. | 08-19-2010 |
20100211673 | Methods and Apparatus for Determining and Displaying WAN Optimization Attributes for Individual Transactions - An apparatus for associating WAN optimization attributes with performance metrics of transactions between hosts on a network includes a network management device, a processor, and a display device. The network management device monitors data traffic between hosts communicating over the network and collects WAN optimization information relating to the data traffic. The data traffic includes individual flows between the hosts, and the individual flows include individual transactions involving exchanges of packets. The processor computes at least one performance metric for individual transactions between the hosts and determines what types, if any, of WAN optimization were applied to the individual transactions. The display device displays on an individual transaction basis the performance metric in combination with either the types of WAN optimization applied to the individual transaction or an indication that no WAN optimization was applied to the individual transaction. | 08-19-2010 |
20100211674 | COMMUNITY GENERATION SUPPORT SYSTEM, COMMUNITY GENERATION SUPPORT METHOD, AND COMMUNITY GENERATION SUPPORT PROGRAM - A community generation support system and a community generation support method. A community generation support device ( | 08-19-2010 |
20100211675 | REAL-TIME NETWORK DATA ANALYSING SYSTEM - An arrangement and method for analysing the data transferred in communications networks. The fact that though the amount of user plane traffic and data is increasing fast, the amount of signalling traffic is hardly increasing at all, is utilised. In the present system the analysis of the user plane and the control plane is done separately in user plane analysis appliance ( | 08-19-2010 |
20100211676 | COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - When communication is performed with the upstream and downstream sides being defined in the order of relay apparatuses, the relay apparatuses each transmit a keepalive message representing that they are effectively performing communication. When no keepalive message can be received from the relay apparatus and an abnormality is detected thereby, the relay apparatus transmits a keepalive message including abnormality information representing that the abnormality is detected. By receiving the keepalive message including the abnormality information, the relay apparatus detects the abnormality on the upstream side, changes a communication path, and transmits a master candidate notification to the relay apparatus on the downstream side in order that the relay apparatus itself becomes a master. | 08-19-2010 |
20100217858 | Handling User Identities In The IP Multimedia Subsystem - A method of handling SIP requests received by an IP Multimedia Subsystem network. The method comprises determining whether or not the SIP destination identity is within a range of identities owned by an operator of the network but is currently unallocated to a subscriber or service of the network and, if yes, routing the message to one or more SIP application servers within the network and implementing service logic at the application server(s) specific to a network owned but unallocated SIP identity. | 08-26-2010 |
20100217859 | SIMPLIFIED SUPPORT OF AN ISOLATED COMPUTER NETWORK - A method, a device and computer program products product for allowing performance related data to be obtained from an isolated computer network that includes a diagnostics collection function. Selections from a support user of nodes and plug-in modules associated with applications provided in the isolated computer network that are to be diagnosed are received by a autocollector file generating unit, which then provides at least one command file with instructions for the diagnostics collection function, including the user selected nodes and plug-in modules, and saves the provided data as an autocollector file that automatically makes the diagnostics collection function to apply the command file on the nodes and plug in modules when being activated. | 08-26-2010 |
20100217860 | SYSTEMS AND METHODS FOR SINGLE SESSION MANAGEMENT IN LOAD BALANCED APPLICATION SERVER CLUSTERS - Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session. | 08-26-2010 |
20100217861 | METHOD AND SYSTEM FOR MULTICAST STATISTIC COLLECTION | 08-26-2010 |
20100217862 | SUPPLYING NOTIFICATIONS RELATED TO SUPPLY AND CONSUMPTION OF USER CONTEXT DATA - Techniques are described for providing information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a module a request related to the modeling of the current state with the multiple state attributes. In such situations, the providing further includes, without further intervention related to the request by the module, determining that the request cannot currently be satisfied, and indicating to the module that the request cannot currently be satisfied, monitoring at later times after the indicating to determine whether the request can be satisfied, and indicating to the module that the request can be satisfied if it is determined at one of the later times that the request can currently be satisfied. | 08-26-2010 |
20100217863 | Securing An Access Provider - To secure an access provider, communications to/from the access provider are monitored for a partially-completed connection transaction. Detected partially-completed connection transactions are terminated when they remain in existence for a period of time that exceeds a threshold period of time. The monitoring may include detecting partially-completed connection transactions initiated by an access requestor, measuring the period of time that a partially-completed connection transaction remains in existence, comparing the period of time with the threshold period of time, and resetting a communication port located on the access provider. | 08-26-2010 |
20100223375 | SYSTEMS AND METHODS FOR SEARCHING A MANAGED NETWORK FOR SETTING AND CONFIGURATION DATA - A network management server can be configured to search the components of computing systems and devices in a managed network for specified settings and configurations in order to determine if the computing systems or devices contain the specified settings and configurations. The network management server can receive a request containing search parameters. The search parameters can identify specific settings and configurations to search for in the components of the systems and devices of the managed network. The network management server can initiate a search of the components of all the systems and devices in the managed network based on the search parameters. | 09-02-2010 |
20100223376 | METHODS AND APPARATUS FOR PROCESSING DISCOVERY SIGNALS AND/OR CONTROLLING ALERT GENERATION - Methods and apparatus for processing discovery signals and/or generating alerts based on received discovery signals are described. In at least some embodiments, alert signal generation is performed on a selective basis in response to received discovery signals. In at least some embodiments a user is given at least some control over alert generation with the user being able to indicate types of signals which should not trigger generation of an alert, the minimum permitted frequency of particular alerts or types of alerts and/or time or location constraints which are considered when a device determines whether or not to generate an alert in response to a received discovery signal. While user control of discovery signal processing and alert generation are provided, automatic control or adjustment of discovery signal processing and alert generation may also be implemented or the automatic control may be implemented as an alternative to the user control. | 09-02-2010 |
20100223377 | NETWORK MONITORING SYSTEM, SERVER APPARATUS, NETWORK MONITORING METHOD - A network monitoring system includes a server apparatus managing information of an optical transmission device in a network configured in a ring fashion and a client apparatus carrying out at least change of setting of the optical transmission device and check of apparatus condition thereof. A first protocol is used between the server apparatus and the client apparatus while a second protocol is uses between the server apparatus and the optical transmission apparatus. The first protocol and the second protocol are different from each other. The server apparatus includes a conversion portion carrying out mutual conversion between the first protocol and the second protocol. | 09-02-2010 |
20100223378 | SYSTEM AND METHOD FOR COMPUTER CLOUD MANAGEMENT - A method for auto-scaling the infrastructure capacity of an application in response to client demands includes providing an application configured to run on an application infrastructure comprising a plurality of server nodes and to be accessed by clients via a first network. Next, providing traffic management means directing traffic from the clients to the server nodes of the application infrastructure. Providing monitoring means gathering performance metrics of the application and metrics of the application infrastructure. Providing controlling means configured to change the application infrastructure. Next, monitoring the performance metrics of the application and the metrics of the application infrastructure via the monitoring means thereby obtaining metrics information and then changing the application infrastructure based on the metrics information via the controlling means. Finally directing network traffic targeted to access the application to server nodes of the changed application infrastructure via the traffic management means. | 09-02-2010 |
20100223379 | COORDINATING SERVICE PERFORMANCE AND APPLICATION PLACEMENT MANAGEMENT - Coordinating tasks of performance management and application placement management in a dynamic fashion by: estimating capacity needs for various service classes of service requests; computing desired capacities of at least one application for said service requests; deciding whether the desired capacities are satisfied by a current application placement; making no change to current application placement if the desired capacities are satisfied; determining a new application placement based on the desired capacities and a projected load if the desired capacities are not satisfied; computing corresponding capacity constraints for all pairs of service classes and servers; and computing an optimal allocation of capacities among the service classes so as to optimize a quality of service. | 09-02-2010 |
20100223380 | Session Monitoring Method, Apparatus, and System Based on Multicast Technologies - A session monitoring method based on multicast technologies is disclosed. The method includes: obtaining information about members of a multicast group that can be joined by a user in a session, wherein the session between a network and a member of the multicast group in the session is in an alive state; and checking whether the information about the members of the multicast group in the session includes user information corresponding to the user; if the member information includes the user information corresponding to the user, determining that the session between the network and the user as the member of the multicast group in the session is alive. A session monitoring apparatus, a session monitoring system, and an Access Node (AN) based on multicast technologies are also disclosed. | 09-02-2010 |
20100228849 | Deployment of Asynchronous Agentless Agent Functionality in Clustered Environments - A mechanism for the deployment of asynchronous agentless agent functionality in clustered environments. An agentless agent execution node in an agentless agent execution node cluster receives a context message comprising an asynchronous operation request and an execution context from a messaging service. The agent node determines if an entry for the execution context exists in an execution context state table of the agent node. If no entry exists, the agent node creates an execution context entry in the execution context state table of the agent node. The agent node retrieves an asynchronous code module associated with the asynchronous operation from a central repository. The asynchronous code module is then executed on a managed resource to detect asynchronous code events occurring on the managed resource. When asynchronous code events are detected at the managed resource, the agent node sends a message comprising the asynchronous code events to a management server. | 09-09-2010 |
20100228850 | Method and System for Estimating Unique Visitors for Internet Sites - This invention comprises a method and system for estimating unique visitors for Internet sites that is more accurate than the existing unique cookie/unique address counting methods. The invented method relies on the count of unique user identifiers (such as network addresses or preferably cookies)—I—that can be obtained from an existing cookie tracking/user access logging system. The number of unique visitors U is calculated substantially as a ratio of the count of unique cookies (or unique network addresses) to the number of visits N times the inflation factor X plus constant on that is approximately one (exactly one in the case of cookies). The number of visits is calculated by multiplying the sampling period t to the visitation frequency T | 09-09-2010 |
20100228851 | Aggregating and Reporting of Performance Data Across Multiple Applications and Networks - This description provides tools and techniques for aggregating and reporting of performance data across multiple applications and networks. These tools may provide apparatus for transforming visible characteristics of a graphical user interface. The graphical user interface may include representations of different physical networks, and may include representations of status indicators, with the representations of the physical networks being associated with one or more corresponding status indicators. These status indicators may represent respective performance levels computed for the different physical networks. More specifically, the performance levels relate to components of the physical networks or applications running on the physical networks. The graphical user interface may also respond to changes in the performance levels that are computed for the physical networks, to transform the status indicators that are associated with the physical networks | 09-09-2010 |
20100228852 | Detection of Advertising Arbitrage and Click Fraud - This description provides tools and techniques for detecting advertising arbitrage and click fraud. These tools may monitor packet traffic to or from subscribers to website hosting services. These tools may also analyze the packets to determine whether at least a part of the traffic is indicative of suspected click fraud affecting websites managed as part of the website hosting services. | 09-09-2010 |
20100228853 | CLUSTER-FREE TECHNIQUES FOR ENABLING A DIRECTORY PROTOCOL-BASED DOMAIN NAME SYSTEM (DNS) SERVICE FOR HIGH AVAILABILITY - Cluster-free techniques for enabling a directory protocol-based Domain Name System (DNS) service for high availability are presented. A DNS service monitors a node for wild-carded IP address that migrate to the node when a primary node fails to service DNS requests for a directory of the network. The DNS service forwards the wild-carded IP address to a distributed directory service for resolution and uses the distributed directory service to dynamically configure the DNS service for directly handling subsequent DNS requests made to the directory over the network while the primary node remains inoperable over the network. | 09-09-2010 |
20100228854 | NETWORK OPERATION MANAGEMENT - Systems and methods are provided to monitor and control peripheral devices at a remote operational site. A management platform configures a site controller deployed at the operational site, wherein configuration specifies collection of data from the peripheral devices connected to the site controller. Conditions that monitor device status and specify device alarms triggers also can be configured. Commands, which can be part of a script, remotely control peripheral devices functionally coupled to the site controller. Collected data is conveyed through a wired or wireless link to management component, which stores the data for analysis and report generation, and can supply the data to an authorized terminal. Data and reports can be conveyed to one or more systems and mass storage functionally connected to the management component. Analysis includes data trend generation. Reports include features of observed and predicted data, and alarm summaries. | 09-09-2010 |
20100228855 | NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network ( | 09-09-2010 |
20100228856 | Autonomous and Dependent Data Collection for Traffic Analysis - A central control system operates in conjunction with multiple mobile traffic probes to analyze and characterize traffic in a particular region or area. The traffic probes operate autonomously to collect traffic related data and report the collected data to the central control system. The traffic probes can analyze the collected data to identify traffic anomalies, and in response, change the amount and type of data collected, as well as the frequency of reporting the data to the central control system. In addition, the central control system can analyze the received data to identify traffic anomalies or points of interest and force one or more deployed traffic probes to change the amount and type of data collected, as well as the frequency of reporting. | 09-09-2010 |
20100228857 | MEDIA MONITORING, MANAGEMENT AND INFORMATION SYSTEM - Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed. | 09-09-2010 |
20100228858 | METHODS AND APPARATUS FOR DYNAMIC ALLOCATION OF SERVERS TO A PLURALITY OF CUSTOMERS TO MAXIMIZE THE REVENUE OF A SERVER FARM - A method and structure for dynamic allocation of servers to customers in a server farm which supports a flexible contract structure such that the total revenue of the farm is maximized. The invention creates a resource allocation plan based on a long term forecast for the server farm, taking into account traffic, number of servers, customers' contracts and revenue optimization algorithms. The plan is then modified as indicated by short term forecasting using currently monitored load metrics to reallocate to maximize revenue for particular time periods. | 09-09-2010 |
20100235489 | Systems and methods for determining electronic relationships - Systems and methods are provided for measuring the level of relative activity (relationship) between two entities (e.g., people, companies, organizations, etc.) in a group as compared with others in that group or in a subset of that group. A group or subset of a group can be defined manually or automatically by the program. Once the activity is measured, it is further analyzed to generate behavioral attributes (e.g., trust, respect, mutually enjoyable company or personal relationship, reciprocity and shared experience) of the relationship. These attributes may be employed to derive characteristics such as the strength of the relationship for each pair of entities. The relationships and characteristic and/or attributes may then be displayed in a simple to understand manner. | 09-16-2010 |
20100235490 | Method and Apparatus of Correlating Power Usage With Traffic Flow for a Network Device - A network device including: a power utilization monitor for monitoring and determining the power usage for the network device, the power usage being associated with a predetermined time value when the power usage was monitored; a data traffic monitor for determining the traffic flow of the network device, the traffic flow being associated with a predetermined time value when the traffic flow was measured; and a data correlator for correlating the power usage of the network device to the data traffic of the network device by associating the predetermined time value when the power usage was monitored with the predetermined time value when the data traffic flow measurement was made is described. | 09-16-2010 |
20100235491 | MEDIA DISTRIBUTION APPARATUS AND METHOD - A system that incorporates teachings of the present disclosure may include, for example, a recipient client device having a controller operable to receive and store a media object from an originating device, track locations where the media object has been since the media object has been stored in the recipient client device, track identifiers associated with a device or a user that has accessed the media object at the locations, and track and store annotations about the media object by the device or the user that accessed the media object. Other embodiments are disclosed. | 09-16-2010 |
20100235492 | SYSTEM AND METHOD FOR GENERIC APPLICATION OF LOCATION DETERMINATION FOR NETWORK ATTACHED DEVICES - A system and method for determining the location of a target device. A location request may be received for a target device, and a plurality of parameters determined that identify the target device. A most likely path may be selected from a plurality of paths to produce a location of the target device, each path having one or more of the plural determined parameters as an input and one or more measurement results as an output. Measurement information may be collected on the most likely path as a function of one or more of the determined parameters to provide the one or more measurement results. Location information may then be derived for the target device as a function of the one or more measurement results, the derivation utilizing a location determination function that evaluates ones of the plural paths. An estimated location of the target device may then be determined as a function of the respective location information for the selected path. | 09-16-2010 |
20100235493 | EXTENDABLE DISTRIBUTED NETWORK MANAGEMENT SYSTEM AND METHOD - An extendable network management system and method is provided to manage a network environment. The system can include a management server with a management application. In addition, the management application is configured to enable a user to manage the network environment. A extension application server can host a plurality of extension modules. The extension modules can supply management functions to the management application for defined network components. Further, a plurality of management engines can be located on the extension application server. The management engines can provide network probing and network event management, while integrating an extension modules' data object model with a management application's data object | 09-16-2010 |
20100235494 | FLEXIBLE LOGGING, SUCH AS FOR A WEB SERVER - A flexible logging system is described herein that operates with a web server to provide activity logging in a way that is customizable to include a variety of data fields, can capture both client and server log information to a single location, and can provide data to an analysis engine directly to provide near real-time reporting. The system captures events within the web server as they occur and can provide reporting before the final response occurs. During request processing in the web server, server extension modules raise log events whenever an event occurs. The system matches the received data to a log definition and writes the data to any log that matches. Thus, the flexible logging system provides a rich, flexible, and fast platform for content providers and administrators to get a real-time view of the state of requests to their web servers. | 09-16-2010 |
20100235495 | METHODS AND SYSTEMS FOR REDUCING A LOAD ON A MULTI-TENANT DATABASE - Mechanisms and methods for reducing a load on a multi-tenant database are provided. These mechanisms and methods for reducing a load on a multi-tenant database can enable a reduction in the computational effort expended to handle login requests with invalid usernames and the computational effort expended to handle valid login requests that occur at a high rate. The ability to provide a reduction in computational effort expended on login requests can enable a providing of a reliable level of resources to users and tenants of the multi-tenant database. | 09-16-2010 |
20100235496 | Method, System and Apparatus for Collecting Statistics of Characteristic Value with Threshold - A method for collecting statistics of a characteristic value with a threshold includes: determining, according to a total threshold for a characteristic value whose statistic is to be collected, at least one sub-threshold corresponding to at least one application processing apparatus participating in statistic-collection; issuing the at least one sub-threshold respectively to the at least one application processing apparatus, notifying the at least one application processing apparatus to enter into a distributed statistic-collecting state; after receiving from anyone of the at least one application processing apparatus a notification which indicates that a current statistic value of the characteristic value of the application processing apparatus reaches a sub-threshold corresponding to the application processing apparatus, notifying the at least one application processing apparatus to enter into a centralized statistic-collecting state to collect statistics of the characteristic value in a centralized mode. | 09-16-2010 |
20100235497 | INFORMATION PROCESSING APPARATUS AND COMMUNICATION PROCESSING METHOD THEREOF - An information processing apparatus including a first communication interface for individually communicating with a plurality of communication terminals without involvement of a public network and a second communication interface for communicating with involvement of a public network, wherein the apparatus provides services, via the first communication interface or via the first communication interface and the second communication interface, to a plurality of communication terminals that perform communication via the first communication interface, manages information regarding a communication interface used by each service and information regarding the service provided, and controls communication performed with the first and the second communication interfaces based on the managed information. When disconnection of communication performed with either one of the first and the second communication interfaces has been detected, the apparatus performs control relating to disconnection of communication performed with the communication interface in which disconnection was not detected based on the managed information. | 09-16-2010 |
20100235498 | INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING THE SAME - In order to enable more of the contents managed by a content server to be provided, an information processing apparatus connected to a communication network includes: a managing unit that manages a content and attribute information; a detecting unit that detects an external processing apparatus connected to the communication network; an acquiring unit that acquires capability information, which indicates a capability that can be provided by the external processing apparatus; a generating unit that generates content list information containing a first list containing a content that is managed by the managing unit and that can be directly provided by the information processing apparatus, and a second list containing a content that can be provided by giving a processing request to the external processing apparatus; and a providing unit that provides the content list information to a client terminal. | 09-16-2010 |
20100235499 | PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A processing apparatus capable of making it easy to set a selection condition under which desired packets are acquired. When a desired print job log is selected from a displayed print job history or when a desired transmission job log is selected from a displayed transmission job history, a file creation unit automatically creates, based on address information in the selected print job log or in the selected transmission job log, a filtering condition expression for acquiring desired packets and sets the created expression to a filtering unit. | 09-16-2010 |
20100235500 | INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE APPARATUS, METHOD OF CONTROLLING BOTH, AND STORAGE MEDIUM - An apparatus includes a storage unit configured to store information which is acquired by a negotiation with an external apparatus and is for communication via a network, a detection unit configured to detect that conditions are satisfied for switching to a power saving mode in which power consumption is smaller than in a normal power mode while the normal power mode is operating, and a notification unit configured to notify a network interface of the stored information when the conditions for switching to the power saving mode are satisfied. | 09-16-2010 |
20100235501 | Advanced Availability Detection - A method is provided for determining user availability on the basis of the manner in which a person uses (1) a communication terminal or (2) a computing device that is associated with the communication terminal or (3) any combination of (1) and (2). User availability is determined based on: (1) a characteristic of the use of a software application that is running on a computing device, or (2) a characteristic of the use of a feature of software that is running on a communication terminal, or (3) a characteristic of the use of a resource of a computing device, or (4) a characteristic of the use of a resource of a terminal, or (5) a sensor input, or (6) a characteristic of the incoming invitation, or (7) any combination of (1), (2), (3), (4), (5), and (6). | 09-16-2010 |
20100235502 | METHOD FOR MANAGING NETWORK COMPONENTS IN A NETWORK, AND A NETWORK COMPONENT - The invention relates to a method for managing network components in a network comprising a request subnet with request network components and a select subnet with select network components as well as to a network component, wherein the requesting network component out of the request network components of the request subnet transmits a registration request to a selected network component out of the select network components of the select subnet and, based on the registration request, the selected network component transmits information concerning the configuration of the select subnet at the time of registration request to the requesting network component, wherein, based on the registration request, the selected network component transmits further information concerning the configuration of the select subnet to the requesting network component at a later point in time which is chronologically following the registration request. | 09-16-2010 |
20100235503 | Method and apparatus for measuring stream availability, quality and performance - A streaming measurement agent designed to experience, measure, and report on a media stream as an actual end user would experience the stream. Preferably, agent resides transparently within a streaming media player itself so that it can monitor stream packet flows within the player as the measured streams are being played. In an illustrative embodiment, the agent comprises a performance monitoring module (PMM), which is software that resides in an interface between an existing core module and a renderer of a media player. The agent PMM intercepts each useful packet as it goes from the core to the renderer and, as a result, it is able to compute quality metrics about the playback. The agent functions “transparently” to the media player by presenting the core with an application programming interface (API) that emulates the API that the renderer normally presents to the core. Thus, when the core believes it is calling the renderer, it is actually calling the agent PMM, which can then receive all the packets from the core and process them. After computing relevant performance metrics using the packets it receives, the agent PMM calls the renderer. A set of performance agents can be managed by a service provider to enable a content provider to determine how a stream is perceived by end users. | 09-16-2010 |
20100235504 | METHOD AND APPARATUS FOR A POWER-EFFICIENT FRAMEWORK TO MAINTAIN DATA SYNCHRONIZATION OF A MOBILE PERSONAL COMPUTER TO SIMULATE A CONNECTED SCENARIO - An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed. | 09-16-2010 |
20100241742 | Collaborative speed determination in distributed systems - The described implementations relate to collaborative speed determination in distributed systems. One method estimates upload speeds of a plurality of hosts. The method sends a first bandwidth probe from a first host to a second host. The method receives, at the first host, a second bandwidth probe sent from the second host. The method determines which of the first and second bandwidth probes was relatively slower. The method designates either of the first or second hosts that sent the relatively slower bandwidth probe as a loser and takes a speed of the bandwidth probe of the loser as a first estimate of the loser's upload speed. | 09-23-2010 |
20100241743 | Achieving at least substantially constant processing request throughput within environment having varying resource availability - Resource loads are determined based on normalized factors that are themselves based on resource factors. The following is repeated until each resource's load is less than or equal to the resource's willingness capacity or until all the resources are each fully loaded or unavailable. Each resource's willingness capacity is determined based on the resource's willingness parameter. The willingness parameter indicates at least whether a resource is willing to receive a number of processing requests no greater than a maximum or a minimum request limit. A throughput overflow is determined for each resource having a load greater than its willingness capacity. The load for each resource having a throughput overflow greater than zero is reset. The load for each resource that is available and not fully loaded is updated based on new normalized factors and based on a potential throughput loss that is equal to a sum of the throughput overflows. | 09-23-2010 |
20100241744 | Network Monitoring Apparatus and Network Monitoring Method - According to one embodiment, a network monitoring apparatus includes an unauthorized node determination module, a spoofed address resolution protocol request transmission module, and a spoofed address resolution protocol reply transmission module. The unauthorized node determination module determines whether a sender node which transmits an address resolution protocol request packet is an unauthorized node. The spoofed address resolution protocol request transmission module transmits a spoofed address resolution protocol request packet to a target node corresponding to a target network address in the address resolution protocol request packet if the sender node is an unauthorized node. The spoofed address resolution protocol reply transmission module transmits to the unauthorized node a spoofed address resolution protocol reply packet which includes a predetermined physical address other than the physical address of the target node as a sender physical address and a network address of the target node as a sender network address. | 09-23-2010 |
20100241745 | CHARACTER DIFFERENTIATION BASED ON PATTERN RECOGNITION - A method and apparatus for character differentiation based on pattern recognition is provided. A sequence of events is received that have been generated from a given session or connection and determines if the sequence of events is likely to have come from an existing, known character, or if the events are from a previously unknown character. A character identifier (ID) is tagged onto (i.e. associated with) the event for further processing in another system that can, for example, provide different content based on the identified character and an associated preference profile. | 09-23-2010 |
20100241746 | Method, Program and System for Efficiently Hashing Packet Keys into a Firewall Connection Table - A method for increasing the capacity of a connection table in a firewall accelerator by means of mapping packets in one session with some common security actions into one table entry. For each of five Network Address Translation (NAT) configurations, a hash function is specified. The hash function takes into account which of four possible arrival types a packet at a firewall accelerator may have. When different arrival types of packets in the same session are processed, two or more arrival types may have the same hash value. | 09-23-2010 |
20100250726 | APPARATUS AND METHOD FOR ANALYZING TEXT IN A LARGE-SCALED FILE - The subject matter discloses a system for analyzing a large-scaled file downloaded to a user's computerized device in segments that comprises a detection module for reviewing at least a portion of the large-scaled file and detects new segments added to the large-scaled file since a previous review of the large-scaled file. The system also comprises a triggering module for triggering the detection module and an analyzing module for analyzing at least the text of the at least one new segment detected by the detection module. | 09-30-2010 |
20100250727 | SYSTEM AND METHOD FOR VERIFIED PRESENCE TRACKING - A system and method for verified presence tracking. A request for a location is received over a network. The request comprises a request type, a request source and at least one request target. Location data relating to the request targets is retrieved from a plurality of location data sources. The reliability of the retrieved location data is determined. A response is formulated using based on the request type, the retrieved location data, and the determined reliability of the retrieved location data. The response is then transmitted over the network to the request source. | 09-30-2010 |
20100250728 | METHOD FOR CONTROLLING WEB PAGE OPERATION IN BROWSER/SERVER ARCHITECTURE - A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page. | 09-30-2010 |
20100250729 | Method and System For Providing Access To Metadata Of A Network Accessible Resource - Methods, systems and computer program products are described for providing access to metadata of a network accessible resource, where the system includes a content handler component configured to receive request information identifying a matching condition and identifying a metadata-schema domain in a metadata-schema domain space. The metadata-schema domain includes a network domain of a schema provider node providing access to a metadata-schema defining metadata of a network accessible resource. A message formatter component is configured to generate a metadata access request identifying the metadata-schema domain and identifying the matching condition, and a content manager component is configured to send, based on the identified metadata-schema domain, the metadata access request to a metadata repository node representing a metadata-schema domain at least partially including the metadata-schema domain identified in the request. | 09-30-2010 |
20100250730 | AUTOMATED LICENSE RECONCILIATION FOR DEPLOYED APPLICATIONS - Systems, methods, and computer program products are described that perform automated license reconciliation for deployed applications. The applications may be deployed among a plurality of computers. Agents are deployed on respective computers to determine the deployed applications. The agents further determine licensable software product identifiers corresponding to the respective instances of the applications. A license data source module provides entitlements corresponding to respective license agreement(s). A reconciliation module matches the entitlements to the instances of the applications to determine whether the instances of the applications are in compliance with the license agreement(s). | 09-30-2010 |
20100250731 | SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION - An application identification system includes a network interface, a signature monitor, a rule generator and a packet access controller. The network interface is operable for receiving first and second packets transmitted by a network application. The signature monitor coupled to the network interface is operable for identifying the network application based on a first packet transmitted by the network application and for generating monitoring data indicative of a state of the first packet. The rule generator coupled to the signature monitor is operable for generating a rule according to the monitoring data and according to a state machine indicative of a state transition between the first and second packets transmitted by the network application. The packet access controller coupled to the rule generator is operable for identifying the network application if the second packet contains contents matched to the rule. | 09-30-2010 |
20100250732 | DETERMINING SERVER LOAD CAPACITY - A method, computer program product, and system for determining a number of users corresponding to a server load including simulating one or more virtual users on a test computer system on coupled to network. One or more client requests are sent from each of the one or more virtual users to a server application executed on a server computer system coupled to the network. A metric indicative of a load on the server computer system is measured. The metric is compared to a predetermined value; and the number of the one or more virtual users is changed based on the difference between the metric and the predetermined value until the metric is within a predetermined range of the predetermined value. | 09-30-2010 |
20100250733 | Method and Apparatus for Data Transfer in a Peer-to-Peer Network - A method is provided of managing traffic in a network. The method comprises applying (S | 09-30-2010 |
20100250734 | SERVER REASSIGNMENT SUPPORT SYSTEM AND SERVER REASSIGNMENT SUPPORT METHOD - A server reassignment support system has a storage device, a deallocated state estimation module and an allocation plan generation module. Stored in the storage device are an operation data indicating operation status of a plurality of physical servers and a plurality of virtual servers and a capacity data indicating resource capacity of each of the plurality of physical servers. The deallocated state estimation module refers to the operation data and the capacity data to extract an overloaded server from the plurality of physical servers, load of the overloaded server exceeding a threshold value depending on the resource capacity. Further, the deallocated state estimation module estimates a state in which at least part of virtual servers allocated to the overloaded server is deallocated as a deallocated server among the plurality of virtual servers. The allocation plan generation module generates an allocation plan for the deallocated server based on the estimated state. | 09-30-2010 |
20100250735 | MONITORING AN ENTERPRISE NETWORK FOR DETERMINING SPECIFIED COMPUTING DEVICE USAGE - Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. More specifically, embodiments relate to monitoring or otherwise “watching” the online and/or offline activity of specified computing devices in an enterprise wide electronic discovery system. By determining when a computing device is online/offline and notifying a requesting party of the online/offline status, the requesting party knows when the specified device is available for electronic discovery functions, such as collecting data from the computing device or the like. The monitoring application of the present invention eliminates the need for the requesting party to wait for prolonged periods of time for a computing device to come online or to randomly attempt to find a computing device on line. | 09-30-2010 |
20100250736 | Connection State Estimating Device, Connection State Estimating Method and Storage Medium - A connection state estimating method includes: acquiring a network distance between respective devices in a communication network; assuming branch point candidates at which three devices extracted from the network are connected together; calculating the network distance between each of the assumed branch point candidates and each of the three devices; classifying all the branch point candidates assumed to be connected with one of the devices into groups on the basis of the network distance between the one device and each branch point candidate; calculating representative values of the network distances between each device and branch point candidates assumed to be connected with the device; and selecting a device from the devices assumed to be connected with one of the branch point candidates and the representative value relating to the selected device. | 09-30-2010 |
20100250737 | DETECTING AND CONTROLLING PEER-TO-PEER TRAFFIC - A method for communication management includes detecting addresses of peer nodes ( | 09-30-2010 |
20100250738 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD,AND STORAGE MEDIUM - An apparatus configured to perform a search via communications excluding unicast and to use a registration function for searching for and registering a network device includes a re-search unit configured to re-search the registered network device when an actual operation is performed or when a status is acquired. The re-search unit performs the re-search via communication including unicast to re-search for the network device. | 09-30-2010 |
20100250739 | NETWORK MONITORING CONTROL DEVICE AND MONITORING CONTROL METHOD - A monitoring control device monitors a communication device connected through a network through a virtual LAN provided on the network. The monitoring control device includes: a bandwidth learning unit which learns a bandwidth between the communication device and the monitoring control device by a first file transfer; and a file transfer management unit which manages whether or not a second file transfer, which passes through at least one section, is able to be performed based on a section bandwidth of the at least one section of the network, the section bandwidth obtained from the bandwidth learned by the bandwidth learning unit. | 09-30-2010 |
20100250740 | METHOD AND APPARATUS FOR TRANSFERRING CONTEXT INFORMATION ON WEB SERVER - A method for transferring context information on a web server that contains a context pool. The method includes: in response to the web server receiving a message, obtaining context information from the message, generating a unique identifier according to a thread for processing the message, associating the context information with the generated unique identifier, and storing the context information and the associated unique identifier in context pool of web server correlatively. In response to a web server obtaining the context information, generating an identifier according to a thread that is executed currently in the web server, and extracting context information for which an associated unique identifier is matched with the generated identifier from the context pool. | 09-30-2010 |
20100250741 | INFORMATION PROCESSING APPARATUS AND ITS METHOD - An information processing apparatus which stores identification information (MAC address) for detection confirmation of a target network device in advance and executes detection of the target network device by comparing the stored identification information and identification information acquired from the network device on a network repeats executing a request by unicast to a part of addresses in a range of addresses to be detection target and then executing a request by broadcast or multicast until the target network device can be detected. | 09-30-2010 |
20100250742 | Global load balancing across mirrored data centers - An intelligent traffic redirection system that performs global load balancing can be used in any situation where an end-user requires access to a replicated resource. The method directs end-users to the appropriate replica so that the route to the replica is good from a network standpoint and the replica is not overloaded. The technique preferably uses a Domain Name Service (DNS) to provide IP addresses for the appropriate replica. The most common use is to direct traffic to a mirrored web site. | 09-30-2010 |
20100250743 | EFFECTIVE POLICIES AND POLICY ENFORCEMENT USING CHARACTERIZATION OF FLOW CONTENT AND CONTENT-INDEPENDENT FLOW INFORMATION - Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics. | 09-30-2010 |
20100262687 | DYNAMIC DATA PARTITIONING FOR HOT SPOT ACTIVE DATA AND OTHER DATA - A computer readable medium having executable instructions stored thereon to execute a database partitioning method during a current period of time is provided. The database partition method includes picking current hot spot data keys according to available data, creating hot spot partitions, respectively associated with the hot spot data keys, into which hot spot data is loaded before a start time of the current period of time and creating non-hot spot partitions into which non-hot spot data is loaded before the start time, routing hot spot data requests to the hot spot partitions and non-hot spot data requests to the non-hot spot partitions, and monitoring computing resources to determine if a number of the hot spot partitions is to be increased or decreased and, accordingly, increasing or decreasing the number of the hot spot partitions. | 10-14-2010 |
20100262688 | SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack; and (3) Spoofing Attack. A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint of the IP device or its configuration settings, a watermark inserted in the data-stream, and a private key burned into the IP devices' physical memory may be used to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks. | 10-14-2010 |
20100262689 | STAR NETWORK AND METHOD FOR PREVENTING A REPEATEDLY TRANSMISSION OF A CONTROL SYMBOL IN SUCH A STAR NETWORK - A star network ( | 10-14-2010 |
20100262690 | RECORDING COMMUNICATIONS - Determining an operation mode of a terminal, and recording communications data of the terminal, on the basis of the determined operation mode. | 10-14-2010 |
20100262691 | INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE DEVICE, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An apparatus stores address information of a server and transmits information of an apparatus to the server at a regular interval. The apparatus, when shifting from a normal state to a power-saving state, keeps continued regular transmission, by notifying a network interface device of the stored address information and the information of the apparatus. | 10-14-2010 |
20100262692 | Recommendation of network object information to user - Recommending network object information to a user includes, for each of a plurality of network objects, a respective plurality of behavior frequencies by the user is determined; a network object among the plurality of network objects that is of interest to the user is identified, the identification being based at least in part on the respective plurality of behavior frequencies that corresponds to each of the plurality of network objects; and additional information relating to the identified network object is provided to the user. | 10-14-2010 |
20100268812 | System and Method of Migrating Virtualized Environments - A system and method migrating virtualized environments is disclosed. According to an aspect of the disclosure, the information handling system can include a migration monitor configured to initiate migration of a remote virtualized environment operating on a first remote system. The information handling system can also include a trusted platform module including a local memory storing a plurality of access keys configured to enable use of a plurality of virtualized environments. According to an aspect, the plurality of access keys can include a first access key configured to be used with a first remote system. The information handling system can also include a secure communication channel configured to enable a mapping of the first access key to a second remote system upon the migration monitoring determining the second remote system is capable of satisfying an operating characteristic of the remote virtualized environment. | 10-21-2010 |
20100268813 | SYSTEM AND METHOD FOR HANDLING REMOTE DRAWING COMMANDS - Examples of systems and methods are provided for handling remote drawing commands. A system may comprise a buffer module configured to receive, at the system from a remote server system over a remote access connection between the system and the remote server system during a remote connection session, remote drawing commands, according to a drawing command rate, of a remote application running on the remote server system. The buffer module may be configured to store the remote drawing commands. The system may comprise a timer module configured to facilitate sending at least some of the remote drawing commands in the buffer module to a graphics module according to a refresh rate that is less than the drawing command rate. The timer module may be application agnostic. | 10-21-2010 |
20100268814 | Intercept Device for Providing Content - Described are computerized methods and apparatuses, including computer program products, for network virtualization. An intercept device receives a DNS response message from a DNS server. The DNS response includes a domain name, a network address associated with the domain name, and a destination address of a first network device. The intercept device determines whether the domain name satisfies a DNS intercept criterion. If the domain name satisfies the DNS intercept criterion, then a request intercept criterion is updated to include the network address associated with the domain name. The DNS response message is transmitted on to the first network device by the intercept server. | 10-21-2010 |
20100268815 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) COLLISION DETECTION MECHANISM AND METHOD - A LDAP collision detection mechanism and a method are described herein that allow a LDAP client to detect and avoid an update operation collision on an entry within a LDAP directory. The method includes the steps of: (a) reading data from the entry in the directory; (b) processing the retrieved data; (c) sending a request to modify the data in the entry in the directory, wherein the client is assured that the requested modification will not be performed by the directory if another client had previously performed a modification on the data within the entry that was originally read by the client. There are several different embodiments of the LDAP collision detection mechanism and the method described herein. | 10-21-2010 |
20100268816 | PERFORMANCE MONITORING SYSTEM, BOTTLENECK DETECTION METHOD AND MANAGEMENT SERVER FOR VIRTUAL MACHINE SYSTEM - A performance monitoring system, comprising: a server; a storage system; and a management server, the management server the management server is configured to: obtain the gathered time-sequential data from the server; judge whether at least one bottleneck has occurred in the logical resource of a specified one of the plurality of virtual machines at each time of the obtained time-sequential data, judge whether at least one bottleneck causing large influence on the specified one of the plurality of virtual machines has occurred; and notify that at least one large bottleneck has occurred in the specified one of the plurality of virtual machines. | 10-21-2010 |
20100268817 | HIERARCHICAL TREE-BASED PROTECTION SCHEME FOR MESH NETWORKS - In a hierarchical tree-based protection scheme, a node in a mesh network is designated as a root node of a spanning hierarchical protection tree and subsequently invites each adjacent node to become its child within the tree. If the inviting node provides a more capacious protection path to the root node than is currently enjoyed by the invitee, the invitee designates the inviting node as its primary parent and assumes a new tree position. Otherwise, the invitee designates the inviting node as a backup parent. A node assuming a new tree position invites all adjacent nodes except its parent to become its child. The invitations propagate throughout the network until a spanning hierarchical protection tree is formed. Upon a subsequent failure of a straddling link, the tree may be used to re-route data. Further, given a tree link failure, protection switching is quickly achieved at a disconnected node through use of a backup parent as the new primary parent. Dynamic tree reconfiguration in the event of network topology changes may be limited to the network area surrounding the change. | 10-21-2010 |
20100268818 | SYSTEMS AND METHODS FOR FORENSIC ANALYSIS OF NETWORK BEHAVIOR - Systems and methods monitor and manage computer network traffic and identify a status of normality or consistency of the traffic on a per user, per interne protocol address or MAC address basis. More specifically, the systems and methods determine, with degrees of significance, the abnormality or inconsistency of network traffic from a user, IP address or MAC address based on a comparison of said network traffic to previous network traffic from the same location. Moreover, the systems and methods monitor and manage the network traffic whereby, after an anomaly has occurred, network traffic is tagged as suspicious and thereafter is flagged for forensic study and placed in storage. In addition, the systems and methods report tagged traffic and alert administrators of a breach or violation in the computer network. | 10-21-2010 |
20100268819 | EVENT PROBLEM REPORT BUNDLES IN XML FORMAT - A network device may include logic configured to detect that an event has occurred in the network device, determine an XML document structure based on the detected event, and generate an XML document with the determined structure including information relating to the detected event. | 10-21-2010 |
20100268820 | USER DATA SERVER SYSTEM, METHOD AND APPARATUS - A user data server system includes: a data storage node, which stores user data, registers the user data in a Distributed Hash Table (DHT) network by using a key, and receives and processes user data operation requests; a DHT index node, which creates and maintains DHT routing information according to a DHT algorithm and stores information of data storage nodes where user data is stored according to the key and searches for information of a data storage node where target user data is stored according to the key; a DHT super maintenance node, which manages and optimizes the DHT network; and a front end node capable of protocol processing and service processing, which obtains a key associated with a target user and obtains information of a data storage node where the target user data is stored by querying the DHT index node via the DHT network according to the key, and performs operations on the user data stored in the data storage node where the target user data is stored. With the technical solution provided by the present invention, a user data server is not centralized and is highly scalable and highly reliable with a high cost-effectiveness. | 10-21-2010 |
20100274885 | PROACTIVE LOAD BALANCING - A load balancing system is described herein that proactively balances client requests among multiple destination servers using information about anticipated loads or events on each destination server to inform the load balancing decision. The system detects one or more upcoming events that will affect the performance and/or capacity for handling requests of a destination server. Upon detecting the event, the system informs the load balancer to drain connections around the time of the event. Next, the event occurs on the destination server, and the system detects when the event is complete. In response, the system informs the load balancer to restore connections to the destination server. In this way, the system is able to redirect clients to other available destination servers before the tasks occur. Thus, the load balancing system provides more efficient routing of client requests and improves responsiveness. | 10-28-2010 |
20100274886 | VIRTUALIZED DATA STORAGE IN A VIRTUALIZED SERVER ENVIRONMENT - Methods and systems for virtualizing a storage system within a virtualized server environment are presented herein. A computer network includes a first physical server configured as a first plurality of virtual servers. The computer network also includes a plurality of storage devices. The computer network also includes a first storage module operating on the first physical server. The first storage module is operable to configure the storage devices into a virtual storage device and monitor the storage devices to control storage operations between the virtual servers and the virtual storage device. The computer network also includes a second physical server configured as a second plurality of virtual servers. The second server includes a second storage module that is operable to maintain integrity of the virtual storage device in conjunction with the first storage module of the first physical server. | 10-28-2010 |
20100274887 | System and Method for Recommending Personalized Identifiers - Methods, systems and computer program products for providing one or more personalized identifiers to a user. In one method, the method obtains the user's personal information and user interest information from the user. The method generates a list of candidate identifiers taking into account the personal information or the user interest information. The method checks availability of the list of candidate identifiers using a database. The method provides a list of available identifiers to the user. | 10-28-2010 |
20100274888 | GENERATING A SUMMARY OF USERS THAT HAVE ACCESSED A RESOURCE - Information relating to monitored communications between user machines and a resource of a particular machine is received. Group information that identifies groups of the users is received. Based on the monitored communications and the group information, a summary of a subset of users that have accessed the resource is generated. | 10-28-2010 |
20100274889 | AUTOMATED FEED READER INDEXING - An incoming web feed received from a web feed document server is monitored for changes associated with a web feed document. A change associated with the web feed document is determined to have occurred. A priority is assigned to the change associated with the web feed document based upon a ranking criterion. The change associated with the web feed document is stored with the assigned priority to a memory. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract. | 10-28-2010 |
20100274890 | METHODS AND APPARATUS TO GET FEEDBACK INFORMATION IN VIRTUAL ENVIRONMENT FOR SERVER LOAD BALANCING - Methods and apparatus for providing availability information of a virtual machine to a load balancer are disclosed. The availability information of the virtual machine may be normalized information from performance metrics of the virtual machine and performance metrics of the physical machine on which the virtual machine operates. The normalized availability of a virtual machine is provided by a feedback agent executing on the virtual machine. Alternatively, the normalized availability of a virtual machine is provided by a feedback agent executing on a hypervisor executing multiple virtual machines on a common set of physical computing hardware. | 10-28-2010 |
20100274891 | NETWORK MONITORING SYSTEM AND METHOD - The present invention provides a network monitoring system and method, wherein the system includes a plurality of monitoring units, each containing a host computer and a camera. Each of the plurality of host computer stores the video images taken by the camera using a monitoring system program, and the monitoring units upload their network addresses to a portal server, so that remote clients can obtain the network addresses of these monitoring units by logging into the portal server. While enabling the remote clients to obtain the video images through connection with the monitoring units via these addresses, this will prevent them from gaining access to the video data by logging into the portal server at the same time, thus helping solve the problem of insufficient bandwidth and speeding up the connection with the server. Besides, once the telephone function of the monitoring units is started, the plurality of voice servers can notify the remote clients of unusual conditions via telephone immediately after that the conditions are found by the monitoring units. Therefore, the present invention will enable the remote clients to obtain the network addresses of the monitoring units by logging into the portal server, so that they can connect to the portal server and watch the video images immediately, achieving the purpose of responding to emergency situations in a real-time manner. | 10-28-2010 |
20100274892 | Method for Monitoring a message associated with an action generated by an element or the user of an IS, and corresponding computer software product, storage means and device - The invention relates to a method for monitoring at least one message, each message being associated with an action generated by at least one element or user of an information system ( | 10-28-2010 |
20100274893 | METHODS AND APPARATUS FOR DETECTING AND LIMITING FOCUSED SERVER OVERLOAD IN A NETWORK - Computer-based methods and apparatuses, including computer program products, are described for detecting and limiting focused server overload in a network. A feedback message is received from a downstream server, wherein the feedback message includes a communication protocol statistic. The methods and apparatuses determine which of one or more counters that store a number of feedback messages received that include the statistic, from an array of counters, are associated with the downstream server using one or more hash functions based on information included in the feedback message. The one or more counters are incremented in response to the feedback message including the statistic. Using the one or more hash functions, a value of the number stored in the one or more counters is determined. The value is determined to be indicative of an overload episode in the network for the downstream server based on whether the value satisfies a predetermined criteria. | 10-28-2010 |
20100274894 | Router Method And System - A method and system for operating a virtual router system. A system health index for each of a plurality of physical routers in a virtual router system is determined, and virtual router operation for the physical routers is suspended in response to the system health index. | 10-28-2010 |
20100274895 | OBJECT ORIENTED COMMUNICATION AMONG PLATFORM INDEPENDENT SYSTEMS OVER NETWORKS USING SOAP - A system for object oriented communication among platform independent systems over networks using SOAP, in which communications can be performed over a network utilizing a single communications protocol. A simple object access communications protocol (SOAP) is utilized for sending messages from one object to another across the network in a platform independent manner. This type of protocol can be utilized to control network elements provided at various locations. | 10-28-2010 |
20100274896 | SYSTEMS AND METHODS FOR FLOW SIGNATURE FORMATION AND USE - An embodiment of a method for use in performing interoperability testing between two network architectures includes forming multiple transaction signatures that each characterizes a communication transaction conducted over the two networks and analyzing each of the transaction signatures to determine if the transaction signature matches a previously classified pattern. The method may further include generating a report identifying each of the communication transactions and indicating that each of the communication transactions is classified with a classification associated with a previously classified pattern or are of unknown classification. Another method includes receiving a transaction signature composed of multiple transaction elements, and determining whether the received transaction signature corresponds to a previously identified transaction signature pattern. If the transaction signature does not correspond to a previously identified transaction signature pattern, a new transaction signature pattern is created, and classified as one of a plurality of classifications indicative of completion or failure of the communication transaction. | 10-28-2010 |
20100274897 | Random Early Detect and Differential Packet Aging Flow Control in Switch Queues - Flow control is provided for a packet switch. An incoming packet is classified according to its priority based on predefined rules to produce a weight value based on the priority of the packet. A lifetime value associated with the packet is produced based on the weight value and the queue occupancy in a queue to which the packet is assigned. The packet is discarded if its associated lifetime value is less than or equal to a threshold value. Otherwise the packet and associated lifetime value are sent to the queue. The lifetime value is periodically changed and compared to a threshold value. The packet is removed from the queue when its lifetime value reaches the threshold value. | 10-28-2010 |
20100281154 | Methods and Apparatus for Remote Monitoring - Provided are methods, apparatus and computer programs for remote monitoring of data. Log data output by an application program running on a storage-constrained apparatus is saved to local system memory—either as an in-memory data file or as output from one application piped to the input of another, or as a named pipe that passes data to a local publisher program—and then captured by the local publisher program. The local publisher program sends the data to a publish/subscribe broker, which can retain the most recent publications for analysis by one or more subscribers. This avoids the need to save large amounts of data to disk storage on the storage-constrained apparatus, and ensures that console output data and log data that is often discarded by headless, storage-constrained systems is available for analysis. The combination of the retain feature and publishing of output data in response to failure of a monitoring application ensures the availability of the data that was output just before the failure, which is generally the most useful data for problem diagnosis. | 11-04-2010 |
20100281155 | APPLICATION MONITORING - A method and apparatus for monitoring an application executing on a self-service terminal. The method comprises: registering with a services manager (such as an XFS or J/XFS manager) to receive event reports indicative of a change of state being sent to the application; accessing an operating system function to deduce a current status of the application; and communicating a status of the application to the remote management system, without communicating with the application, to enable the remote management system to manage the self-service terminal more effectively. | 11-04-2010 |
20100281156 | SYSTEM AND METHOD OF RECORDING AND SHARING MOBILE APPLICATION ACTIVITIES - A method of recording activity at a wireless device is provided. The method includes receiving a record command, determining a user activity at the wireless device, and determining available memory at the wireless device. The method further includes recording the user activity to create a device recording at least partially based on the user activity and the available memory. | 11-04-2010 |
20100281157 | DETECTING OVERLOADS IN NETWORK DEVICES - Systems and methods are provided to allow detection of the load conditions on network devices. The load detection can occur using a mobility management device to track establishment of sessions and attempts at session establishment to determine the loading conditions on various network devices. This information can then be used by a selection logic to determine which devices are selected to send session establishment messaging for new session establishment requests. This can provide quicker setup times as highly loaded network devices or network devices experiences other failures are selected less until conditions are back to normal. | 11-04-2010 |
20100281158 | ENVIRONMENTAL FOOTPRINT MONITOR FOR COMPUTER NETWORKS - A system and method for obtaining an environmental footprint of a website are presented. The system includes a website embedded with a unique identifying tag, a user terminal to view the website, an environmental footprint server which identifies the unique identifying tag of the website, and a processor to calculate the environmental footprint of the website based upon time data and the average emissions emitted by a user terminal, the server hosting the website and a network connecting the user terminal and the server. | 11-04-2010 |
20100281159 | MANIPULATION OF DHCP PACKETS TO ENFORCE NETWORK HEALTH POLICIES - A facility for causing a device connected to a network that is configured to act as a DHCP server to enforce network health policies against hosts connected to the network is described. The device intercepts network packets sent to a DHCP server from any host connected to the network. For each of at least a portion of these intercepted network packets that contain a statement of health, the facility ( | 11-04-2010 |
20100281160 | SYSTEM, APPARATUS AND METHODS TO IMPLEMENT HIGH-SPEED NETWORK ANALYZERS - Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit. | 11-04-2010 |
20100281161 | METHOD, SYSTEM AND APPARATUS FOR AUTOMATED INVENTORY REPORTING OF SECURITY, MONITORING AND AUTOMATION HARDWARE AND SOFTWARE AT CUSTOMER PREMISES - A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide for remote access to the configurable controller, thereby providing for remote monitoring of the state of a dwelling and for remote control of home automation. Embodiments of the present invention further provide for reporting to a provider those sensors and other hardware used by the configurable architecture, enabling the provider to track inventory of such items. | 11-04-2010 |
20100281162 | SYSTEMS AND METHODS OF PROVIDING SERVER INITIATED CONNECTIONS ON A VIRTUAL PRIVATE NETWORK - The present invention is related to a method for establishing via an appliance a transport layer protocol connection initiated by a server on a first network to a client connected from a second network to the first network via a secure socket layer virtual private network (SSL VPN) connection. The method includes the step of receiving, by an appliance, a transport layer connection request from a server on a first network to connect to a client connected to the first network via a SSL VPN connection from a second network. The transport layer connection request identifies a client destination internet protocol address and a client destination port on the first network. The method includes establishing, by the appliance, a first transport layer connection to the server on the first network, determining, by the appliance, the client on the second network associated with the client destination internet protocol address on the first network, and transmitting, by the appliance, connection information identifying the client destination port to an agent on the client. The agent establishes a second transport layer connection to the client destination port using a local internet protocol address of the client on the second network and establishes a third transport layer connection to the appliance, which it associates with the second transport layer connection. | 11-04-2010 |
20100281163 | METHOD AND APPARATUS FOR MAINTAINING ROUTING INFORMATION - A method and apparatus for maintaining routing information in a Peer-to-Peer (P2P) network are provided. The method includes that: a super maintenance node receives routing update information of an ordinary node in its home area; the super maintenance node sends routing update information to super maintenance nodes in other network areas; the super maintenance nodes in other network areas notify ordinary nodes in their home network areas to update routing information. With the present invention, a node of strong processing capabilities at the network area border is chosen to act as a super maintenance node and other nodes as ordinary nodes; when a node joins or fails, an ordinary node sends detected routing update information only to the super maintenance node in the local network area; the super maintenance node then forwards the update information to super maintenance nodes in other network areas. Each super maintenance node notifies ordinary nodes in its home network area of the received routing update information. | 11-04-2010 |
20100287273 | SYSTEM AND METHOD FOR DIRECTING COMMUNICATIONS WITHIN A HETEROGENEOUS NETWORK ENVIRONMENT - Disclosed is a communications device that monitors the status of its communications links. When more than one communications link is available, an “appropriate” link is selected for use by an application running on the device. The links are continually monitored, and, as circumstances change, the link selection can also change. In some embodiments, a link is “appropriate” when it is available to transfer data and when it satisfies certain “hard” rules set by the application or by a user of the communications device. Some embodiments monitor the behaviour of the communications device and of its user and capture that behaviour in “soft” rules that are applied when selecting an appropriate link and when the hard rules leave the choice open. When multiple links transmit on the same frequency, they may be supported “virtually simultaneously” by time-slicing the actual data transmissions. Unneeded links may be shut down to save battery power. | 11-11-2010 |
20100287274 | EFFICIENT NETWORK UTILIZATION USING MULTIPLE PHYSICAL INTERFACES - An architecture for streaming data from a sending endpoint to a receiving endpoint which are connected to each other by multiple networks is provided. Each of the sending endpoint and the receiving endpoint has multiple physical interfaces each for interfacing to a respective one of the multiple networks. The architecture is implemented on both of the endpoints. The architecture includes a traffic monitor for gathering performance characteristics of each of the multiple physical interfaces, and a software library for controlling sending and receiving of the data stream between the endpoints. The traffic monitor and the software library communicate information to each other. The software library instantiates a plurality of bondable virtual interfaces for splitting the data stream into multiple data sub-streams and for combining the multiple data sub-streams into the data stream, and a data organizer for designating one of the plurality of bondable virtual interfaces. | 11-11-2010 |
20100287275 | OPERATION SUPPORTING DEVICE AND METHOD FOR SUPPORTING OPERATION - Provided is an operation supporting device that can estimate an apparatus to be supported in operation and support the operation independent of a position relationship between a position of the apparatus to be supported and a position of the user, and of a density of apparatuses. The operation supporting device includes: an operation history collecting unit ( | 11-11-2010 |
20100287276 | NETWORK DEVICE AND NETWORK DATA ACCESS RECORDER - A network device includes flash memory to store a plurality of bits indicating login data on a user device. The network device sets the plurality of bits stored in the flash memory to a first value, sets a changing interval, and copies the plurality of bits from the flash memory to random access memory (RAM). The network device further searches for a first bit of the first value from the plurality of bits in the RAM, and records an index of the first bit of the first value in a variable. The network device further changes the first bit corresponding to the variable to a second value and increases the variable by 1 when the changing interval arrives. The network device further writes the bit changed to the second value from the RAM to the flash memory. | 11-11-2010 |
20100287277 | METHOD FOR MONITORING A PROCESS SYSTEM HAVING A FIELD BUS IN THE PROCESS AUTOMATION TECHNOLOGY - A method for monitoring a process plant having a fieldbus of process automation technology, via which a number of field devices exchange with a process control unit PLC telegrams in regular data traffic for process control. The following method steps are executed: telegrams transmitted via the fieldbus to the process control are tapped by a monitoring application, which performs a testing of the telegrams for data relevant for the monitoring application; data relevant for the monitoring application are processed as actual values in a process modeling application, which is part of the monitoring application; and when a significant deviation is determined between desired and actual values, an error signal is generated. | 11-11-2010 |
20100287278 | Automatic Proxy Detection and Traversal - The invention provides a method for detecting a proxy. The method comprises inspecting one or more network communications being sent from a client computer; and determining from information contained in the network communication whether the network communication is being sent via a proxy. | 11-11-2010 |
20100293266 | SYSTEM AND METHOD FOR DYNAMIC CONTROL OF NETWORK MANAGEMENT TRAFFIC LOADS - A system and method for dynamically controlling network management traffic load on network devices is provided. A network management module on a network management server has a request module for requesting management data from a network device. A storage device accessible by the network management module stores a list of the network devices and associated management request limits representing a number of management requests the network management module is allowed to send to a particular network device for processing at a time. A queue module on the network management module stores a management request from the network management module when a number of outstanding management requests exceeds the management request limit and places the management request in a queue. The queue module also forwards a management request from the queue to a network device when the network management module receives a response from the network device. | 11-18-2010 |
20100293267 | METHOD AND SYSTEM FOR MONITORING A WORKSTATION - A method and system for monitoring a workstation. The system includes a monitoring system for monitoring activity on a workstation and an analysis module for comparing a monitored activity to specified activities in a work profile. The system may include an alert generator for generating an alert if the monitored activity does not conform to the work profile. The work profile may be a user profile of specified activities allowed to be performed by a user, and/or a transaction profile of a sequence of specified activities to be performed in a transaction by a user. The monitoring system includes an inputs monitor for monitoring inputs by the user into the workstation, a screen monitor which extracts content from a screen display viewed by a user, and a physical presence monitor to determine if a user is at his workstation. | 11-18-2010 |
20100293268 | EFFICIENT MESSAGE CONSUMPTION IN A POINT-TO-POINT MESSAGING ENVIRONMENT - A method and system for assigning a message to an application instance are disclosed. Message processing times of a currently available application instance and a currently unavailable application instance are measured. An unavailable time of the currently unavailable application instance is approximated based on the estimated message processing time of the currently unavailable application instance. The unavailable time and estimated message processing time of the currently unavailable application instance are added to generate an updated processing time of the currently unavailable application instance. The estimated processing time of the currently available application instance and the updated processing time of the currently unavailable application instance are compared. If the updated processing time of the currently unavailable application instance is less than the estimated processing time of the currently available application instance, the currently unavailable application instance is selected to process the message. Otherwise, the currently available application instance is selected. | 11-18-2010 |
20100293269 | INVENTORY MANAGEMENT IN A COMPUTING-ON-DEMAND SYSTEM - A system may receive parameters for provisioning a resource object and may select network resources that correspond to the resource object based on the parameters, inventory information, and configuration information. In addition, the system may configure the selected network resources in accordance with the parameters and may monitor the selected network resources to obtain information on the selected network resources. Further, the system may update the inventory information and the configuration information based on the obtained information to reflect changes in state and configuration of the selected network resources. | 11-18-2010 |
20100293270 | Use Tag Clouds to Visualize Components Related to an Event - A method, system, and computer program product for displaying components assigned to events produced by resources, includes: registering a new resource by generating a label to which is associated a system specific device identifier used by the new resource within a computing environment; storing in a mapping table the generated label identifying the registered new resource together with an associated system specific device identifier; and updating the mapping table by associating to the label any other system specific device identifier used by the new resource within the computing environment; receiving events produced by resources when being executed within the computing environment, each event being associated with a list of labels for the resources relevant for the generation of the event; and maintaining a tag cloud including different tags, the different tags including labels for the resources associated with the received events to be displayed as components. | 11-18-2010 |
20100293271 | COMMUNICATION APPARATUS AND METHOD FOR CONTROLLING COMMUNICATION APPARATUS - A first communication apparatus for use in a network established by a plurality of communication apparatuses to implement a predetermined system function includes a sending unit configured to send, to the network, information on an apparatus function for implementing the predetermined system function to accommodate a communication apparatus having the apparatus function in the network, and an execution unit configured to execute processing for accommodating a second communication apparatus having the apparatus function sent by the sending unit in the network according to a request from the second communication apparatus. | 11-18-2010 |
20100293272 | TOLERANT DEVICE LICENSING IN A DISTRIBUTED ENVIRONMENT - Methods, apparatus and a computer program product provide for a Tolerant License Manager that defines a cluster of a plurality of network controllers, wherein each respective network controller contributes at least one license to a current total amount of licenses in a license pool. The Tolerant License Manager identifies at least one threatened access point upon detecting a first network controller has become unavailable. Each threatened access point comprises any access point connected to the first network controller when the first network controller becomes unavailable. The Tolerant License Manager establishes (and/or) approves a connection between a back-up controller and the threatened access point(s). While the first network controller is unavailable, the Tolerant License Manager allocates a license to each threatened access point via the back-up network controller. | 11-18-2010 |
20100293273 | System and Method for obtaining a classification of an identifier - A method for obtaining a classification of at least one identifier of at least one computer element is presented. The method involves the sending of identifiers between a sending client computing system and a plurality of receiving client computing systems, with the objective of obtaining a classification of said identifier, which corresponds to a computer element. Alternatively, if a predetermined condition of reception is not reached, a further sending of the identifier may be performed to a server computing system. This way, the classifications may be found spread over a plurality of receiving client computing systems or a server, and the data traffic may be distributed over several paths instead of, for example, a unique path to a unique server computing system. | 11-18-2010 |
20100293274 | DATA COMMUNICATION - A management device ( | 11-18-2010 |
20100299430 | AUTOMATED ACQUISITION OF VOLATILE FORENSIC EVIDENCE FROM NETWORK DEVICES - Examples disclosed herein are directed to techniques for automatically retrieving and processing forensic data from network devices connected to a communications network without requiring device-specific knowledge or training. A mobile forensic device includes and extensible forensic analysis tool that allows on-scene forensic investigators to quickly and automatically acquire data from network devices without device-specific knowledge. The extensible forensic analysis tool is designed for use on handheld mobile computers, enabling on-scene investigators to quickly and easily acquire forensic data from network devices in the field without losing volatile data or shutting down the network. | 11-25-2010 |
20100299431 | SYSTEM AND METHOD OF DETERMINING USER PROFILES - A method determines a user demographic profile of a user that visits one or more websites of a predetermined group of websites. The method includes generating a first record of visits by the user to the websites of the predetermined group of websites. The method further includes providing one or more website profiles comprising demographic characteristics of each website visited by the user of the predetermined group of websites. The method further includes calculating an estimated user demographic profile of the user by using the first record of visits by the user and the one or more website profiles. | 11-25-2010 |
20100299432 | SYSTEM AND METHOD FOR MANAGEMENT OF INFORMATION STREAMS DELIVERED FOR USE BY A USER - A method for management of information streams delivered for use by a user of a user device comprises discovering information streams relevant to the user using a plurality of uniquifiers, wherein each uniquifier of the plurality of uniquifier characterizes the user; adding the discovered information streams to a list of approved information streams; registering to at least one information stream in the list of approved information streams; filtering data provided by the at least one information stream using the plurality of uniquifiers; and providing a feedback based on the user usage of the filter data to enable improved future discovery and filtering. | 11-25-2010 |
20100299433 | NETWORK RESOURCE MANAGEMENT - The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth, delay, packet loss, and jitter, network element storage capacity, network element processing power. This information is made available by the RAS. In addition, the RAS generates and maintains predictive models and makes available predictive data from these models. Network elements and devices retrieve this information in the form of notifications from the RAS or by way of querying the RAS. The network elements and devices, based on these predictions, act to negotiate sessions to optimise QoS. In one embodiment the RAS is updated by only mobile devices subscribed to the operator which hosts the RAS. The update information is addressed to the RAS as a stand-alone entity. However, it is envisaged that the server may be hosted by multiple operators and may receive updates from devices subscribed to different operators. Also, it is envisaged that not only mobile devices but also network elements such as MMSCs may send update information. | 11-25-2010 |
20100299434 | SYSTEMS AND METHODS FOR TRACKING WEB ACTIVITY - Systems and methods of tracking activity over networks and, in particular, tracking web activity over the Internet are described. Exemplary systems and methods may include a receiver for receiving a request from a visitor for a data object, a processor for providing a cookie to track the visitor's web activity, and a transmitter for transmitting the cookie to the visitor in response to the request. The cookie may comprise tracking information for a plurality of web sites visited by the visitor. | 11-25-2010 |
20100306363 | DETERMINING COMPLETION OF A WEB SERVER DOWNLOAD SESSION AT A DATABASE SERVER - Techniques are described herein for determining completion of a Web server download session at a database server. A Web server initiates a download session for downloading a requested resource (e.g., a file or an output of an executable) to a client. The download session includes download operation(s), each corresponding to a respective portion of the requested resource. The Web server incorporates a session-specific identifier indicative of the download session and/or byte range indicator(s) corresponding to the respective download operation(s) into Web server log files. The database server uses the session-specific identifier and/or byte range indicator(s) to determine that the download operation(s) are included in the download session. The database server determines a download pattern corresponding to the download session based on download request(s) that correspond to the download operation(s). The database server determines whether the download session is complete using an algorithm that is indicative of the download pattern. | 12-02-2010 |
20100306364 | SORTING SYSTEMS IN A TREE - A method, computer program product, and computing system for monitoring, via a monitoring server, attributes of computer systems in communication with the monitoring server. A graphical user interface may display selectable attributes of the computer systems monitored by the monitoring server. The computer systems may be sorted in a tree based upon, at least in part, one or more selected attributes of the computer systems monitored by the monitoring server. | 12-02-2010 |
20100306365 | PUSH-BACK MECHANISM FOR PUB/SUB BROKERS - A method and system for controlling message throughput rates of clients connected to a broker device in a publish/subscribe network are disclosed. The broker device determines a maximum allowable message throughput for each client connected to the broker device. If a message-producing rate of a client exceeds the maximum allowable message throughput of the client, the broker device sends a negative acknowledgement (NACK) packet to the client and messages from the client are not accepted at the broker device. The NACK packet includes a maximum allowable message throughput of the client, so the client can adjust its message-producing rate based on the maximum allowable message throughput of the client. The present invention can be applied to a publish/subscribe network as well as a TCP/IP network. | 12-02-2010 |
20100306366 | SYSTEM FOR ENABLING RICH NETWORK APPLICATIONS - The present invention generally provides methods, systems and articles of manufacture that provide an autonomous system for enabling rich network applications. Embodiments of the invention may monitor an existing network application and generate a profile on the network application based on what responses and data updates are triggered by various requests from a user. Embodiments of the invention may refactor the existing network application into a rich network application based on the profile created for that network application. | 12-02-2010 |
20100306367 | IP SESSION-BASED REGULATION AND BILLING - Among other things, there are disclosed structures, systems and methods for monitoring and regulating access by consumers to computer network bandwidth, particularly with regard to peer-to-peer file sharing. A router (in certain embodiments, a core router) is programmed with a predetermined number of open or open and active internet protocol (IP) sessions a particular computer is allowed. Requests to open sessions that do not exceed that number are permitted. Requests to open sessions that exceed that number may be rejected, or an offer obtain additional session(s), perhaps with additional payment, may be made. | 12-02-2010 |
20100306368 | CONTENT DELIVERY NETWORK WITH CUSTOMIZED TRACKING OF DELIVERY DATA - A custom tracking system can provide functionality for operators of content sites to specify types of content delivery data to be tracked in a content delivery network. The custom tracking system can propagate operator tracking preferences to edge nodes in the content delivery network, such as delivery servers, which can track delivery data according to the preferences. The custom tracking system can use one or more tracking filters to reduce the storage burden of certain tracking requests while still providing relevant results. The custom tracking system can output results of the custom tracking for presentation to the content site operator. | 12-02-2010 |
20100306369 | VIDEO POLICY SERVER - A system for distributing digital content includes two or more digital content sources. Each source has a separate session manager that is distinct from other session managers associated with other digital content sources. The system further includes at least one set of network resources that receive digital content from the two or more digital content sources, modulate the digital content onto a carrier signal suitable for transmission over an access network, and transmit the carrier signal over the access network. The system also includes a receiving device for terminating the carrier signal. The receiving device generates a digital content stream corresponding to the digital content from the two or more digital content sources. The system further includes a policy server for allocating bandwidth of the network resources to the digital content sources, and for monitoring a utilization state of the network resources. | 12-02-2010 |
20100306370 | CALL PROCESSING TIME MEASUREMENT DEVICE, CALL PROCESSING TIME MEASUREMENT METHOD, AND PROGRAM FOR CALL PROCESSING TIME MEASUREMENT - To provide a call processing time measurement device which can measure the time required to process a measurement-object message to be measured. When a measurement-object message detection module detects a measurement-object message, a response request message transmission module transmits a response request message towards a node designated as a measurement object right after the measurement-object message. A response request message transmission time record module records the transmission time of the response request message transmitted by the response request message transmission module. A response message reception time record module records the reception time of the response message transmitted from the designated node. A processing time calculation module measures the message processing time of the designated node by calculating a difference between the reception time of the response message and the transmission time of the response request message. | 12-02-2010 |
20100306371 | METHOD FOR MAKING INTELLIGENT DATA PLACEMENT DECISIONS IN A COMPUTER NETWORK - A method for making data placement decisions in a computer network uses multiple factors comprising social rules (rules, factors and criteria common to all participating nodes and intended to benefit the community of nodes), as well as rules, factors and criteria driven by individual self-interest of the participating nodes. The method calls for each node to act in a semi-autonomous manner, without the need for a central coordinating node. By considering multiple factors fully, and not eliminating factors by a sequence of True/False decisions, the method may arrive at optimal decisions and may generate a ranked list of node candidates. | 12-02-2010 |
20100306372 | SYSTEM AND METHOD FOR ANALYZING THE STRUCTURE OF LOGICAL NETWORKS - Systems and methods for analyzing the structure of logical networks. Embodiments of the invention include ranking critical nodes according to regional hierarchies, distance hierarchies, global hierarchies, and relay hierarchies. Embodiments of the present invention are capable of testing the effectiveness of such hierarchies. In addition, critical nodes may be used to define critical regions. | 12-02-2010 |
20100306373 | DATA RETRIEVAL BASED ON BANDWIDTH COST AND DELAY - The invention provides for a download agent executing on a computing device. The download agent determines the status of each of the source servers, and downloads from source servers that are in the available state. Additionally the download agent tracks characteristics of the source servers. The download agent determines the required bandwidth of portions of the media content stored on the source servers. Based on the characteristics of the source servers and the required bandwidth of the portions of the media content, the download agent determines how much media content should be downloaded from which source servers and at what time. | 12-02-2010 |
20100306374 | Centralized network control - A method and system of network control is disclosed. The method and system includes collecting real-time operation information on one or more first network elements of a network, selecting a policy to be implemented by at least one second network element, different from the first network element, responsive to the collected real time information from the one or more first network elements, the at least one second element including an end-point element of the network and enforcing the selected policy on an agent hosted by the at least one second network element. | 12-02-2010 |
20100306375 | Method and System for Verifying Modem Status - A system for verifying modem status for a telecommunications service provider in a broadband network serviced by a central office. The system comprising an interne interface for receiving a modem status request from the telecommunications service provider via a telecommunications network and an integrator capable of retrieving subscriber information and a server connected to the internet interface for receiving the modem status request and transmitting the modem status request to the integrator. The integrator interprets the modem status request and retrieves corresponding subscriber information and transmits the corresponding subscriber information to the server, the server thereby converting the corresponding subscriber information to a central office request and sending the central office request to the central office. The central office responding to the request and transmitting a status signal to the server and the server transmitting the signal to the interne interface which converts the status signal to a readable format for the telecommunications service provider. | 12-02-2010 |
20100312872 | METHOD AND APPARATUS FOR MONITORING FUNCTIONS OF DISTRIBUTED DATA - This invention discloses continuous functional monitoring of distributed network activity using algorithms based on frequency moment calculations given by | 12-09-2010 |
20100312875 | AUTOMATED DISCOVERY OF MONITORING DEVICES ON A NETWORK - A system and method are disclosed for the automated discovery of devices on a network, such as a TCP/IP network using Dynamic Host Configuration Protocol (“DHCP”) and Domain Name System (“DNS”) servers. Devices on the network may be discovered, identified, and tracked by a monitoring server. Communications with the monitoring server may include identification information for each device. The identification information may be stored in DHCP option fields, transmitted with DHCP messages, and used to identify whether the device is new to the network. | 12-09-2010 |
20100312876 | METHOD FOR MONITORING ACTIVITIES OF A FIRST USER ON ANY OF A PLURALITY OF PLATFORMS - There is provided a method for monitoring activities of a first user on any of a plurality of platforms, with the first user having access to a first computing device for use by the first user. The method may include two modes which allows a master user to monitor activities of the first user even when the master user is not connected to the world wide web (offline). | 12-09-2010 |
20100312877 | HOST ACCOUNTABILITY USING UNRELIABLE IDENTIFIERS - An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change. Analysis of traffic (e.g., network activity or application request) logs may be performed and a host tracking graph may be generated that shows hosts and their bindings to IP addresses over time. A host tracking graph may be used to determine host accountability. To generate a host tracking graph, a host is represented. Host representations may be application-dependent. In an implementation, application-level identifiers (IDs) such as user email IDs, messenger login IDs, social network IDs, or cookies may be used. Each identifier may be associated with a human user. These unreliable IDs can be used to track the activity of the corresponding hosts. | 12-09-2010 |
20100312878 | Providing Ring Protection For Access Networks - According to one embodiment, an apparatus comprises one or more hub interfaces and one or more processors. A hub interface is coupled to an access network element of a ring network comprising a number of access network elements. The ring network comprises a pair of rings: a first ring traveling in a first direction and a second ring traveling in a second direction. The processors perform the following for each access network element: facilitate establishing a pair of point-to-point logical connections to couple a access network element to a hub interface at a corresponding dedicated bandwidth, a first connection traveling along the first ring, a second connection traveling along the second ring; facilitate establishing a pair of tunnels on the pair of point-to-point connections; and utilize the tunnels to protect the ring network. | 12-09-2010 |
20100312881 | SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - A site controller adapted to be used in an automated monitoring system for monitoring and controlling a plurality of remote devices via a host computer connected to a first communication network is provided. The site controller is configured for controlling communication with the host computer and a plurality of communication devices that define a second communication network associated with the plurality of remote devices. Briefly described, in one embodiment, the site controller comprises a transceiver configured to communicate with the plurality of communication devices via the second communication network; a network interface device configured to communicate with the host computer via the first communication network; and logic configured to: manage communication with each of the plurality of communication devices, via a first communication protocol, based on one or more communication paths for each of the plurality of communication devices, each communication path comprising one or more communication devices involved in the communication link between the transceiver and each of the plurality of communication devices; and manage communication with the host computer via a second communication protocol. Other aspects, features, and embodiments are also claimed and described. | 12-09-2010 |
20100312882 | CALL PROCESSING TIME MEASURING DEVICE, CALL PROCESSING TIME MEASURING METHOD, AND CALL PROCESSING TIME MEASURING PROGRAM - To enable the measurement of service time actually spent on the proceeding of a message out of the proceeding of messages. When a measurement-target message detecting device detects a measurement-target message, a latest transmission instruction device requests a response request message transmitting module to transmit a response request message immediately before the measurement-target message to a measurement-target node. Further, an immediate transmission instruction module requests the response request message transmitting module to transmit the response request message immediately after the measurement-target message to the measurement-target node. The response request message transmitting module transmits the response request which is a message to request a response according to each transmission request. A response message received time recording module records the received time of each of the response messages from to the measurement-target node. A processing time computing module computes the difference of the received time of each of the response messages. | 12-09-2010 |
20100312889 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, INFORMATION RECORDING MEDIUM, AND PROGRAM - In order to detect a fraudulent action, such as an attempt of invalidating a result of a match-up through a communication in a communication match-up game by changing the setting of a router device, in a communication system, a first terminal device ( | 12-09-2010 |
20100318647 | System and Method to Determine Network Usage - Systems and methods to measure network usage are provided. A particular method includes collecting first usage data from a first network device of a network at a network usage tracking system. The first network device determines the first usage data based on an inband measurement of data passing through the first network device. The method includes collecting second usage data from a second network device of the network at the network usage tracking system. The first network device and the second network device are different network devices. The method includes matching the first usage data and the second usage data to user accounts. The network usage data is determined based on the first usage data, the second usage data, and the user accounts. | 12-16-2010 |
20100318648 | Selective Instrumentation of Distributed Applications for Transaction Monitoring - Systems and methods provide a selective instrumentation strategy for monitoring the progress of transactions in a distributed computing system. The monitoring of the transactive processing of jobs is considered through a collection of computer operating stages in a distributed system, using limited information. The monitoring is performed by observing log records (or footprints) produced during each stage of processing in the system. The footprints lack unique transaction identifiers resulting in uncertainties in monitoring transaction instances. The processing stages are selective instrumented to reduce monitoring uncertainty under the given constraints such as limited budget for instrumentation cost. | 12-16-2010 |
20100318649 | CUSTOMER INTELLIGENCE IN A CLOUD OPERATING ENVIRONMENT - Computer-readable media, computer systems, and computing devices for providing customer intelligence data to a developer of an application that runs on a cloud operating environment associated with an online services provider. The online services provider collects customer information about customers, each of whom is identified by a customer ID. A developer uploads an application, having a corresponding application ID, and manages the application using resources associated with the cloud operating environment. An analysis module creates a three-way mapping between the application ID, customer IDs corresponding to customers that use the application, and customer intelligence data associated with the customer IDs. Using this mapping, the system presents the developer with customer intelligence information based on the customer intelligence data. | 12-16-2010 |
20100318650 | METHOD AND DEVICE FOR AGILE COMPUTING - A method for operating a group of nodes in a system for agile computing comprising a coordinator node and a first computation node communicating via a connection, and wherein the first computation node is adapted to perform a task for the coordinator node is provided. The method comprises the steps of: monitoring at least one operating parameter indicating the quality of the connection between the two nodes; determining a quality parameter based on the operating parameter, wherein the quality parameter indicates the quality of the connection between the two nodes; and transferring information from the first computation node to the coordinator node, when the value of the quality parameter falls within a transfer interval, wherein the information comprises information about a part of a task performed by the first computation node. | 12-16-2010 |
20100318651 | Network Communication System With Monitoring - The present invention is directed to a network communications system including a data communication path; a user communication device; a tapping device; and a rendering device. The user communications device (for example, a personal computer, a Blackberry type device) is structured, connected and/or programmed to receive web pages from the Internet over a data communication path. The tapping device is structured, located and/or connected to receive the communications and to send the network communication pages a rendering device. The tapping device and the rendering device are both separate from the user communications device. The rendering device converts the visual communications into corresponding bit maps. Preferably, the rendering device permanently stores the bit maps to a data storage device and/or displays the bit maps on a display device. In embodiments where the bit maps are permanently stored, the rendering device preferably compresses the bit maps. | 12-16-2010 |
20100318652 | APPARATUS AND METHODS FOR REAL-TIME MULTIMEDIA NETWORK TRAFFIC MANAGEMENT & CONTROL IN WIRELESS NETWORKS - The invention is directed to network management systems and methods that provide substantially real-time network management and control capabilities of multimedia streaming traffic in telecommunications networks. The invention provides pre-emptive and autonomous network management and control capabilities, and may include shared intelligence of embedded systems—Heterogeneous Sensor Entities (HSE) and the Sensor Service Management (SSM) system. HSEs are distributed real-time embedded systems provisioned in various network elements. HSEs performs fault, configuration, accounting, performance and security network management functions in real-time; and real-time network management control activations and removals. SSM facilitates automated decision making, rapid deployment of HSEs and real-time provisioning of network management and control services. The service communication framework amongst various HSEs and the SSM is provided by the Heterogeneous Service Creation system. The proposed network management procedure provides real-time network management and control capabilities of multimedia traffic in wireless networks and clusters of independent networks respectively. | 12-16-2010 |
20100318653 | INFORMATION OBTAINING ASSISTANCE APPARATUS AND METHOD - An information obtaining assistance apparatus including: a storage to store system environment information on an information processing system and obtaining method information on one or more methods of obtaining information; and a processor to create presentation information that is based on the system environment information and the obtaining method information and to present a method of obtaining target information of the information processing system. | 12-16-2010 |
20100325258 | CAPTURING A COMPUTING EXPERIENCE - The described implementations relate to capturing a computing experience. In one case, a user session capture tool can launch a remote user session where a user-interface and user inputs are gathered from a single computing device. Remote user session data produced by the remote user session can be analyzed to determine user activity. | 12-23-2010 |
20100325259 | Supervised Access Computer Network Router - A system for monitoring and regulating computer usage on a local network is disclosed. Computers on a network are configured with a client activity monitoring module that collects activity information including screen captures, keyboard activity, and/or information relating to network communications and sends the collected activity information to a network activity monitor for storage and later retrieval. Each computer on the local network periodically verifies that its client activity monitor module is operable. If a computer fails to send such verification, the system restricts network access by that computer, thus enforcing compliance with the activity monitoring system. The system further provides means for automatically displaying the collected activity information, including through screen savers, automatically changing desktop background images, and pop-up or sidebar windows. The system thus enables review of computer activities for appropriateness by both supervisors or parents as well as by peer users without requiring the reviewer to take affirmative steps to retrieve the activity information. | 12-23-2010 |
20100325260 | METHOD AND APPARATUS FOR MESSAGE ROUTING OPTIMIZATION - An approach is provided for optimizing message routing without repeatedly resolving a home location. A login request from a user equipment associated with a resource identifier is received. The user equipment is configured to operate within a network including a plurality of clusters. The resource identifier of the user equipment is modified to include home cluster information indicating a corresponding one of the clusters serving the user equipment. | 12-23-2010 |
20100325261 | System and Method to Manage Information Handling System Resources in Virtual Machine Infrastructure - A method can include monitoring a proportion of a particular type of information handling system resource used by a particular virtual machine of a plurality of virtual machines. The particular virtual machine can be accessible to a thin client information handling system via a communications broker. The method can include sending first data to the communications broker, the first data indicating the proportion of the particular type of information handling system resource used by the particular virtual machine, and receiving second data from the communications broker. The second data can indicate that a greater or lesser amount of the particular type of information handling system resource is to be allocated to the particular virtual machine. The method can include automatically allocating the greater or lesser amount of the particular type of information handling system resource to the particular virtual machine in response to the second data. | 12-23-2010 |
20100325262 | USING TRANSPORT-INDEPENDENT RESOURCE STATUS - The present invention extends to methods, systems, and computer program products for using transport-independent resource status. Embodiments of the invention provide a mechanism for implementing a new protocol for performing resource request status updates that maintains the benefits of existing protocol (e.g., HTTP) conventions while being usable with arbitrary transport protocols. Additionally, the new protocol works with a variety of different message exchange patterns. The use of the protocol can be hidden behind a programming model that normalizes transport-specific resource status protocols, such as, for example, HTTP, with transport-independent resource status protocols, such as, for example, with a SOAP binding of the described protocol. As such, embodiments of the invention provide resource status updates over an arbitrary network transport protocol whose format and message exchange pattern is decoupled from the definition of the application. | 12-23-2010 |
20100325263 | SYSTEMS AND METHODS FOR STATISTICS EXCHANGE BETWEEN CORES FOR LOAD BALANCING - Systems and methods for consolidating metrics and statistics used for load balancing by a plurality of cores of a multi-core intermediary are disclosed. A timer operating on each packet engine of each core in a multi-core system may expire. A consolidator may store, responsive to expiration of the timer, a set of counter values from each of the packet engines to a first storage location. The consolidator may send to each packet engine a message to update the set of counter values. The consolidator may, upon completion of updating the set of counter values by the packet engines, send a second message to the packet engines that includes a consolidated set of counter values determined based on the updated set of values from each packet engine. Each packet engine may establish settings and parameters for load balancing based on the consolidated set of counter values. | 12-23-2010 |
20100325264 | MEDIA RESOURCE STORAGE AND MANAGEMENT - Provided are computer-implemented methods and systems for performing media resource storage and management. The computer-implemented method and system implemented as a request manager is capable of monitoring requests for media resources in a content delivery network. For each monitored request, the request manager determines whether to generate a multifile for the requested media resource. For example, the request manager can first determine whether the media resource is eligible for multifile generation. If eligible, the request manager then determines whether the media resource has reached a popularity threshold. If the media resource has reached the popularity threshold, the request manager initiates generation of the multifile for the requested media resource. Generally, the generated multifile is stored in a storage system associated with the content delivery network. | 12-23-2010 |
20100325265 | METHOD AND SYSTEM OF MANAGING AND/OR MONITORING DISTRIBUTED COMPUTING BASED ON GEOMETRIC CONSTRAINTS - A method for managing distributed computing. The method comprises estimating, for each of a plurality of local computing nodes, a distribution of multidimensional values in a space. Each multidimensional value is calculated according to a plurality of locally monitored parameters. The method further includes calculating safe zones in the space where each safe zone is defined according to a respective estimated distribution under a global geometric constraint in the space and setting local geometric constraints for the local computing nodes according to the respective safe zones. Each local geometric constraint is defined such that a detection of at least one monitored multidimensional value violating it by a respective local computing node induces a communication event between the respective local computing node and one or more central computing nodes. | 12-23-2010 |
20100325266 | WEB SERVICE PROCESSING METHOD FOR A WEB SERVER PROVIDING DEVICE, AND A WEB SERVICE PROVIDING DEVICE - A web service processing method for a web server providing device, and a web service providing device enable eliminating the process delay that occurs the first time a web service is accessed. A web service provider | 12-23-2010 |
20100325267 | METHOD AND APPARATUS FOR NETWORK OPTIMIZATION USING SON SOLUTIONS - A method, an apparatus, and a computer program product for wireless communication are provided in which a communication event is detected, one or more aspects of the detected communication event are analyzed and at least one of the one or more aspects of the detected communication event is stored on an user equipment in a log. | 12-23-2010 |
20100325268 | SYSTEMS AND METHODS FOR SPILLOVER IN A MULTI-CORE SYSTEM - The present invention is directed towards systems and methods for spillover threshold management in a multi-core system. A pool manager divides the spillover threshold limit of connections for vServers into an exclusive quota pool and a shared quota pool. Each vServer operating on a core is allocated an exclusive number of connections from the exclusive quota pool. If a vServer wishes to create connections beyond its exclusive number, the vServer can borrow from the shared quota pool. When the vServers are using at least a first predetermined threshold of their exclusive number of connections and the number of available connections in the shared quota pool has reached a second predetermined threshold, the multi-core system establishes a backup vServer. | 12-23-2010 |
20100325269 | PERSONALIZED SERVICE SYSTEM BASED ON SMART CARD AND METHOD THEREOF, AND SMART CARD APPLIED TO THE SAME - Disclosed are a personalized service system based on a smart card, a method thereof, and a smart card applied to the same. Personalized information is extracted through the data mining by collecting user input information stored based on an SCWS (smart card web server) function, access history information for a site requested by a user, call history information of a user terminal stored based on a USIM (universal subscriber identity module), and base station information received from the user terminal. Since the personalized information is obtained based on the SCWS function and the USIM installed in the smart card, various regulations related to personalized information are circumvented, enabling provision of various personalized services. | 12-23-2010 |
20100325270 | AIR CONDITIONING MANAGEMENT APPARATUS AND AIR CONDITIONING MANAGEMENT SYSTEM - An air conditioning management apparatus is provided which can remotely monitor and control air conditioning equipment with ease of viewing a home page while securing security. | 12-23-2010 |
20100325271 | DYNAMIC SERVICE-AWARE FLOW CONTROL IN PACKET NETWORKS - The present invention, including system methods and computer program product, provide the ability to control the flow of traffic into an aggregated trunk port in a network. This is performed by monitoring the trunk port of an aggregation packet switch for congestion and limiting the traffic flowing into the aggregation packet switch through virtual connections with one or more user network interfaces. An access control system executing an access control algorithm monitors the trunk port and controls the user network interfaces to limit the traffic the passes through the trunk port in the event of traffic congestion. Traffic may be limited on the basis of the class of service, the virtual connection, or other parameters. | 12-23-2010 |
20100325272 | METHODS AND SYSTEMS FOR NETWORK TRAFFIC SECURITY - The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic. | 12-23-2010 |
20100325273 | METHOD AND APPARATUS FOR LOCATING CANDIDATE DATA CENTERS FOR APPLICATION MIGRATION - When an application running at a first data center needs to be migrated to a different data center, the first data center is able to automatically locate an appropriate target data center from among multiple other data centers for receiving the migration of the application. The first data center ensures that a specified level of performance of the application will be maintained following migration of the application by preparing a migration request document that specifies network requirements, server requirements and storage requirements for the application. A targeted data center that is a candidate for receiving migration of the application receives the specified requirements and uses a performance index and other analysis to determine whether its hardware, software and other configurations are capable of meeting the specified requirements. The results of the determination are sent back to the requesting data center, which then decides if migration will be carried out. | 12-23-2010 |
20100325274 | Method and System to Connect Multiple SCSI Initiators to a Fibre Channel Fabric Topology Using a Single N-Port - A method and system for connecting multiple initiators to a storage area network (SAN) via a Fibre channel fabric using a single N_port fibre channel switch. The multiple initiators are associated with a common domain identification (DID), each initiator having a unique source identification (SID). The method includes initiating a communication exchange between at least one of the initiators and the SAN, the exchange including transmission of a command frame. The method also includes monitoring the initiated exchange communication exchange, and replacing the unique SID of one of the initiators with an SID of the fibre channel switch. | 12-23-2010 |
20100332641 | PASSIVE DETECTION OF REBOOTING HOSTS IN A NETWORK - Host reboots may be detected passively by tracking and analyzing host initialization events and/or by tracking and analyzing temporal skews in periodic events. Detected host reboots may then be used to determine or help determine whether or not the host has a possible malware infection. | 12-30-2010 |
20100332642 | SYSTEM AND METHOD FOR ANALYZING DOMINO IMPACT OF NETWORK GROWTH - A system and method for analyzing domino impact of network growth including collecting, via a collector module, network information from one or more domains of a communication network. Also, the system and method may include processing, via an analytical module, the network information in order to determine a domino impact of growth of the communication network, wherein processing the network information comprises determining a number of lower network resources and a number of higher network resources within plurality types of networks in the one or more domains of the communication network and outputting, via a presentation module, the processed network information collected from the one or more domains of the communication network. | 12-30-2010 |
20100332643 | Pre-Scheduling the Timelines of Virtual Machines - A host controller pre-schedules the timelines of virtual machines that run on a host cluster. In one embodiment, the host controller uses a plurality of timers to determine the start times of the virtual machines. The host controller starts the virtual machines on the host cluster over a time span according to the configurable timelines recorded in the timers. The start times of the virtual machines can be spread over the time span to prevent a load spike at any particular time instance. The virtual machines are up and running on the hosts by a pre-determined time to provide virtual desktops to remote clients. The timers may be configured as a calendar. | 12-30-2010 |
20100332644 | OPTIMIZATION OF APPLICATION DELIVERY IN A VIRTUAL UNIVERSE - An approach is provided for optimizing delivery of virtual universe applications to users of said virtual universe applications. In one embodiment, there is an optimizing tool, including a ranking component configured to rank types of communication methods based on frequency of utilization of said communication methods by a user. The optimization tool further includes a determining component configured to determine a most desirable optimization technique for each available communication method used the most by said user. | 12-30-2010 |
20100332645 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT IN A COMPUTING ENVIRONMENT - A method and system for monitoring resources in a network of resources in a computing environment, is provided. One implementation involves discovering resources in the network; constructing a topology model including event information for each discovered resource; providing queries for polling the models for event information, such that the resources need not be polled; executing one or more queries against one or more models; evaluating the query results to ascertain whether or not an event has affected what is considered to be normal for the result of each query; and presenting the evaluation results to enable monitoring of the resources. | 12-30-2010 |
20100332646 | UNIFIED ENTERPRISE LEVEL METHOD AND SYSTEM FOR ENHANCING APPLICATION AND STORAGE PERFORMANCE - A unified enterprise level method and system for enhancing a performance of applications and storage subsystems in a storage network are disclosed. In one embodiment, a method for enhancing the performance of the storage network having applications and storage subsystems includes collecting performance data associated with the applications and the storage subsystems, and generating performance profiles for a set of combinations of the applications and the storage subsystems implemented in the storage network based on the performance data. The method also includes receiving desired performance criteria for an application of the storage network, and applying a performance profile to configure the application and a storage subsystem assigned to the application substantially similar to the desired performance criteria. | 12-30-2010 |
20100332647 | METHOD AND SYSTEM OF UPDATING PRESENCE INFORMATION IN A COMMUNICATION SYSTEM - In implementing a method of updating presence information for a plurality of presentities in a communication system, a presence server: defines a group of presentities that share the same value for a first presence attribute; receives an update of the value of the first presence attribute for one of the presentities in the group; and applies the update of the value to all of the presentities in the group. | 12-30-2010 |
20100332648 | COMPUTATIONAL MODELS FOR SUPPORTING SITUATED INTERACTIONS IN MULTI-USER SCENARIOS - Individuals may interact with automated services as one or more parties, where such individuals may have collective (as well as individual) intents. Moreover, parties may concurrently communicate with the interface, and the interface may have to manage several concurrent interactions with different parties. Single-individual interfaces may be unable to react robustly to such dynamic and complex real-world scenarios. Instead, multi-party interfaces to service components may be devised that identify individuals within a scene, associate the individuals with parties, track a set of interactions of the parties with the service component, and direct the service component in interacting with the parties. A multi-party interface may also detect and politely handle interruptions, and may identify information items about individuals and parties based on context and history, prioritize the intents of the individuals and parties, and triage interactions accordingly. | 12-30-2010 |
20100332649 | CONFIGURING APPLICATION MANAGEMENT REPORTING IN A COMMUNICATION NETWORK - The invention is directed to configuring an application management reporting service for managing a networked application carried over a WAN service without requiring knowledge of a network operator's infrastructure that is providing the WAN service. This capability aims at providing an abstraction from both the architecture of the operator's network and the technical details of its QoS management. | 12-30-2010 |
20100332650 | SYNCHRONIZED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 12-30-2010 |
20100332651 | MESSAGE-BASED COMMUNICATION SYSTEM MONITOR - Message-based communication system monitor, comprising an inspector ( | 12-30-2010 |
20100332652 | Distributed Methodology for Approximate Event Counting - In a method and system for aggregating event information, events are received at a first plurality of nodes in a distributed system. For the events received at each node aggregated attribute information is determined in accordance with two or more rules and stored in distinct first tables, each table storing aggregated attribute information for a respective rule of the two or more rules. At each node of the first plurality of nodes, the two or more distinct first tables are transmitted to a respective node of a second set of nodes in the distributed system. At each node of the second set of nodes, two or more distinct second tables are generated by merging the aggregated attribute information in the tables transmitted to the node. Each rule of the two or more rules is evaluating using the aggregated attribute information obtained from a corresponding table of the second tables. | 12-30-2010 |
20100332653 | IMAGE FORMING APPARATUS AND IMAGE FORMING METHOD - According to one embodiment, an image forming apparatus includes a unit configured to transmit input authentication information of a user or a department to a server apparatus, a unit configured to acquire setting information input, concerning a job allocated to the authenticated user or department, a unit configured to transmit the setting information to the server apparatus and request the sever apparatus to permit printing, a unit configured to receive a provisional limited number of printed sheets from the server apparatus and execute printing, a unit configured to request transmission of a new provisional limited number of printed sheets, a unit configured to receive the new provisional limited number of printed sheets from the server apparatus and execute the printing, and a unit configured to transmit the number of printed sheets to the server apparatus in a predetermined case. | 12-30-2010 |
20100332654 | METHOD AND APPARATUS FOR PROVIDING MOBILE DEVICE INTEROPERABILITY - An apparatus for providing mobile device interoperability with other devices may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured, with the processor, to cause the apparatus to perform at least receiving a frame buffer update request from a remote environment, determining a scan interval defining a first portion of the frame buffer over which scanning to determine data changes is to occur and a second portion over which scanning to determine data changes is not to occur, identifying whether a data change occurs in the first portion of the frame buffer by comparing relatively newer data to relatively older data, and updating a selected portion of the frame buffer to the remote environment based on the identifying. A corresponding method and computer program product are also provided. | 12-30-2010 |
20100332655 | CONTENT RECORDING CONTROL METHOD FOR PEERS, AND A DEVICE THEREFOR - A method and apparatus for controlling content recording for a buddy of a management server are provided. The method includes: receiving a recording request message for the buddy according to an external input; determining whether a local recording apparatus of the buddy is in a recording state; and selectively sending a recording start message to a recording apparatus on a network, different from the local recording apparatus of the buddy, according to a result of the determining. | 12-30-2010 |
20110004680 | SYSTEMS AND METHODS FOR UNIFIED MANAGEMENT OF DESKTOP SESSIONS - A method for using standards-based functionality to provide unified management for a plurality of remote desktop sessions includes executing an enhanced management access point on a first physical machine. The method includes monitoring a plurality of desktop sessions including a desktop session executing on one of a second physical machine and a virtual machine executing on the second physical machine. The desktop session provides access to at least one application or file. The method includes determining a first level of activity of the desktop session. A level of activity may be one of: active, inactive, hibernating and standby. The method includes receiving a notification of a migration of the desktop session to a third physical machine, the migrated desktop session maintaining the first level of activity. The method includes instructing a management component on the third physical machine to modify the migrated desktop session to a second level of activity. | 01-06-2011 |
20110004681 | Methods and Apparatus for Enhanced Overlay State Maintenance - Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates. | 01-06-2011 |
20110004682 | DETERMINING PROJECTION WEIGHTS BASED ON A CENSUS DATA - Projection weights may be configured to project usage of a first set of resources by users of a first group of clients systems to usage of the first set of resources by users in a larger group of users. Users of the first group of client systems may be a sample of a larger group of users that access resources on the network using client systems. The projection weights may be determined based on a first set of usage data and a second set of usage data. The first set of usage data may be determined based on information received from monitoring applications installed on a first group of client systems. The second set of usage data may be determined based on information received from a second group of client systems sent as a result of beacon instructions included with a second set of resources accessed by the second group of client systems. | 01-06-2011 |
20110004683 | Systems and Methods for Granular Resource Management in a Storage Network - In accordance with some aspects of the present invention, systems and methods are provided for dynamically and/or automatically selecting and/or modifying data path definitions that are used in performing storage operations on data. Alternate data paths may be specified or selected that use some or all resources that communicate with a particular destination to improve system reliability and performance. The system may also dynamically monitor and choose data path definitions to optimize system performance, conserve storage media and promote balanced load distribution. | 01-06-2011 |
20110004684 | Prediction Of Systems Location Inside A Data Center By Using Correlation Coefficients - The present invention enables location prediction of a system in a data center. Specifically, the invention monitors resources from the systems in the data center and measuring points in the data center. A system resource monitors the internal conditions of the system. A data center measuring point is any device which provide environment or data center resource information of the data center. The conditions obtained from the system resources and measuring points are correlated, and then utilized to predict the location of the system in the data center. For example, by correlating heat sensor values and bandwidth measurements, the prediction mechanism may be able to predict that a system that has a spike in network usage and is at fully capacity is near measuring points that detected an increased heat sensor value and detected increased bandwidth usage at the same time that the machine had its spike in network usage. | 01-06-2011 |
20110010445 | MONITORING APPLICATION SERVICE LEVEL OBJECTIVES - Embodiments of the invention provide a technique to model applications and storage used thereby, and to monitor application service level objectives. An aspect is directed to a method for managing a computer system which includes at least one host computer and at least one storage system which are connected via a network, the at least one host having an application running thereon. The method comprises modeling an application running on a host of a computer system as an application object, which includes associating storage utilized by the application with the application object; monitoring one or more application-based storage service level objectives for the storage utilized by the application, each service level objective being defined by a user to be threshold specific to the application; and alerting the user when any of the one or more service level objectives being monitored is violated. | 01-13-2011 |
20110010446 | Program and Method for Adaptively Maintaining a Local Peer Group in a Dynamic Environment - A method for maintaining a local peer group (LPG) for supporting communications among vehicles. The LPG is formed from a plurality of vehicles. Each vehicle is equipped with a wireless communications device. One of the vehicles is selected as a group header node (GH). The method comprises receiving periodically a heartbeat packet from the GH, the heartbeat packet including a maximum hop count, and a heartbeat cycle, forwarding the heartbeat packet until the maximum hop count is reached after waiting for a first random relay delay, which is less than a maximum allowable adjustable value, replying to the heartbeat packet with a membership report packet, forwarding a membership report packet towards the GH, and adding a vehicle that submitted the membership report packet to a LPG membership as a member node of the LPG if the membership report packet is new or updating information for a member node. | 01-13-2011 |
20110010447 | AUTO GENERATED AND INFERRED GROUP CHAT PRESENCE - A system can include multiple individual status identifiers that correspond to multiple users and a group status identifier that corresponds to a group with which the users are associated. A status identifier update module can update the group status identifier based on a change to at least one of the individual status identifiers. | 01-13-2011 |
20110010448 | LEVERAGING AND INFLUENCING COMPUTING NETWORK ACTIVITY - A system and method for associating benefit with the activities of a computing system, and for influencing the behaviour of users of the computing system, the system and method comprising a computing system having one or more subseribable actions, optionally associated with the functionality of the computing system; optionally, a means for associating additional information, activity or events with one or more of the one or more subseribable actions, the additional information, activity or events being associated with one or more third parties; a means for detecting and recording information relating to activity that is related to: the one or more subscribable actions, the one or more first users triggering the one or more subscribable actions, or a combination thereof; and optionally, a means for communicating or making available to one or more second users information relating to: the subseribable action, the one or more first users and, if necessary, the associated information, activities or events. | 01-13-2011 |
20110010449 | METHOD AND SYSTEM FOR SIMPLIFIED NETWORK WIDE TRAFFIC AND/OR FLOW MONITORING IN A DATA NETWORK - Method and system for providing dynamic network data traffic monitoring including monitoring a data network, detecting a change in the data network, initiating a span session based on the detected change in the data network, and dynamically modifying network configuration based on the detected change in the data network is disclosed. | 01-13-2011 |
20110010450 | APPARATUS AND METHOD FOR MONITORING AND AUDITING ACTIVITY OF A LEGACY ENVIRONMENT - An apparatus and a method for monitoring and auditing activity of a legacy environment. The apparatus includes an analyzer and a mirror manager. The analyzer is operative to analyze intercepted packets conveyed by entities in a network and to generate analyzed data based on information associated with at least some of the packets. The analyzed data is indicative of sessions. The mirror manager is responsive to the analyzed data for generating data representative of mirror sessions, each mirror session corresponding to a session. | 01-13-2011 |
20110010451 | Handheld Media Device For Displaying Computer Status Information - A system comprises a personal computer (PC) and a handheld media device (HMD) communicably coupled to the PC. The PC transfers status information to the HMD and the HMD displays the status information. The HMD is capable of displaying the status information using at least one of graphics or text. The status information includes information pertaining to the status the PC. | 01-13-2011 |
20110010452 | System and method for establishing a point-to-point connection - A communications system including a communications network, a multiplicity of communications terminals, a monitor operative to monitor whether or not a specific user is connected to the communications network, a point-to-point connection enabler operative to conditionally allow at least one seeking user to establish a point-to-point connection with at least one other user who is in a set of sought users and an authorization request manager operative to transmit an authorization request to the at least one other user, when the at least one other user is connected to the communications network, receive a response to the authorization request from the at least one other user and transmit the response to the point-to-point connection enabler prior to the point-to-point connection enabler allowing establishment of the point-to-point connection. | 01-13-2011 |
20110016204 | SYSTEMS, METHODS, AND MEDIA FOR IDENTIFYING AND ASSOCIATING USER DEVICES WITH MEDIA CUES - Systems, methods, and media for identifying and associating user devices with media cues are provided. In some embodiments, a plurality of data streams from a plurality of endpoints is received. At least one media segment is then received from a user device. It is determined whether the at least one media segment from the user device corresponds with one of the plurality of data streams from the plurality of endpoints. In response to being unable to match the at least one media segment, a media cue is inserted into one of the plurality of data streams. In response to detecting that the media cue in that data stream is received by the user device, identification information is transmitted to the user device that associates the user device with one or more services on a communications server. | 01-20-2011 |
20110016205 | MULTIPLE INSTANCE COMMERCIAL BROWSER WEBSITE TEST AGENT - A website test environment invokes multiple instances of a commercial browser, and captures invocations of browser operations for gathering performance data without interference from other instances or multiple occurrences of the operating system (OS). Commercial browsers often employ constraints that assume only a single instantiation is executing on a particular machine. Configurations allow each instance to present as a separate user, thus avoiding conflicts that may arise from temporary files and network connections, for example. Each browser instance operates as a performance agent and dynamically links with a set of entry points for accessing performance related browser operations. As each agent invokes native (OS specific) machine functions for network access via particular entry points, configurations disclosed herein redirect the entry points to a collection layer of instructions (code) for capturing performance data in addition to invoking the native OS function called for by the browser operation. | 01-20-2011 |
20110016206 | SYSTEMS AND METHODS FOR CREATING USER INTEREST PROFILES - Example methods include monitoring Internet traffic for a user, analyzing content of the Internet traffic, correlating the analyzed content with a simplified classifier set, ranking each correlated simplified classifier in the simplified classifier set, and storing the ranked simplified classifiers in a user interest profile for the user. Customer premise equipment may include a residential gateway, such as a wireless router, and user equipment such as a personal computer. Example systems may be configured from customer premise equipment or Internet service providers to generate user interest profiles in accordance with example methods. | 01-20-2011 |
20110016207 | Selective Reporting Of Upstream Transaction Trace Data - Technology for monitoring transactions in a computing environment is disclosed. Execution of a transaction by a first application is monitored by a first software entity executing on a first computing device. Performance data that relates to execution of the transaction by a first application is generated. Execution of the transaction by a second application is monitored by a second software entity. The transaction is executed by the second application based on a request from the first application. A determination is made, based on the monitoring, that the first software entity should report the performance data to a third software entity that executes on a second computing device. Based on determining that the first software entity should report the performance data, data is propagated that indicates that the first software entity should report the performance data. The first software entity reports the performance data to the third software entity. | 01-20-2011 |
20110016208 | APPARATUS AND METHOD FOR SAMPLING SECURITY EVENT BASED ON CONTENTS OF THE SECURITY EVENT - There are provided an apparatus and method for sampling a security event based on contents of the security event, the apparatus including: a security event accumulation module collecting security events occurring in a network system and storing the security events for each type according to contents of the security event; a security event analysis module calculating distribution of the security events for each type by analyzing the stored security events; and a security event extraction module sampling the stored security events according to the calculated distribution of the security events for each type. The apparatus and method may improve speed of visualization of a security event and a security event analysis apparatus and may increase accuracy thereof. | 01-20-2011 |
20110016209 | NETWORK CHARACTERISATION - Methods and systems for assigning information indicative of a network characteristic to one of a plurality of data units traversing a path across a network, said data units having associated therewith values indicative of said network characteristic, said path having at least one portion passing through a lower-capability region and at least one portion passing through a higher-capability region, said lower-capability region being a region in which information indicative of said network characteristic may be represented by values having a first resolution, and said higher-capability region being a region in which information indicative of said network characteristic may be represented by values having a second resolution, said second resolution being greater than said first resolution, said one data unit being a data unit entering said higher-capability region. | 01-20-2011 |
20110016210 | METHOD AND SYSTEM FOR PROVIDING AUTOMATIC DISABLING OF NETWORK DEBUGGING - An approach is provided for automatic disabling of network debugging. A debugging command is received for initiating debugging of a router that includes a processor configured to execute a debugging procedure. Utilization of the processor is monitored. A determination is made whether the utilization exceeds a utilization threshold. The debugging procedure is disabled based on the determination that the utilization threshold is exceeded. | 01-20-2011 |
20110016211 | MONITORING SYSTEM - A monitoring system includes a center device and terminal devices. The center device is configured to return a first response if receiving a first request from a terminal device. At this point, if the center device has a second request to at least one of the other terminal devices, the center device includes the second request and identification information of a corresponding terminal device in the first response. If receiving the first response, the terminal device transfers the second request to the corresponding terminal device. | 01-20-2011 |
20110016212 | REMOTE MONITORING SYSTEM - A first relay ( | 01-20-2011 |
20110016213 | MONITORING SYSTEM - A monitoring system includes a center device and terminal devices. The center device is configured to return a first response if receiving a first request from a terminal device. At this instance, if having a request to another terminal device, the center device includes designation information for designating said another terminal device in the first response. The terminal device receiving the first response, if the designation information is included in the first response, transfers the designation information to a corresponding terminal device. The corresponding terminal device transmits a second request to the center device if receiving the designation information. Thereby, the center device can promptly transmit the request with respect to said another terminal device to the terminal device. | 01-20-2011 |
20110022697 | DYNAMIC RESOURCE COLLABORATION BETWEEN NETWORK SERVICE PROVIDERS - Service providers capable of dynamic resource collaboration and corresponding dynamic resource collaboration techniques are provided. In one embodiment, a network service provider includes a service server that processes service requests, a resource monitoring unit that monitors available computing resources of the service server and generates a resource request for supplementary computing resources from one or more collaborating network service providers based on the result of the monitoring, and a resource collaboration unit acquires supplementary computing resources from at least one of the collaborating network service providers. | 01-27-2011 |
20110022698 | DYNAMIC MANAGEMENT OF MAINTENANCE ASSOCIATION MEMBERSHIP IN A COMPUTER NETWORK - In one embodiment, a new maintenance end-point (MEP) may join a particular network (and initiate its sending of continuity check messages, “CCMs”) by transmitting one or more join announcement messages (JAMs). When the JAMs are received by remote MEPs in the particular network, the new MEP may be added to a configured list of MEPs within the particular network at each remote MEP without an alarm. Also, a current MEP may leave the particular network (and cease its transmission of CCMs) by transmitting one or more leave announcement messages (LAMs), which request removal of the current MEP from the configured list at each of the remote MEPs without alarms. Otherwise, transmission of CCMs (that are not JAMs or LAMs) may result in alarms being generated by the MEPs in the particular network for unexpected MEPs or missing MEPs, accordingly. | 01-27-2011 |
20110022699 | Method And System For PHY Initiated Wake-Up In Energy Efficient Ethernet Networks - One or both link partners coupled via an Ethernet link may comprise a PHY device operable to initiate a wake-up interval. The PHY device may monitor parameters that may indicate Ethernet link status. Exemplary parameters may comprise a timer, communication performance metrics and/or configuration parameters. From a low power mode, the PHY device may generate a wake state idle symbol based on the monitoring and may communicate it to a local and/or a remote MAC. The local and/or remote MAC may establish a wake-up interval. The wake-up interval may comprise synchronization, circuit adaption and updating of communication parameters, which may enable control of noise cancellation functions and/or equalization functions. One or both of the link partners may transition to a low power mode after the wake-up interval and/or to an active state after the wake-up interval. | 01-27-2011 |
20110022700 | Real World Network Testing Combining Lower Layer Network Tests, Application Layer Tests and Interdependent Interactions - Combining lower layer network tests and upper layer network tests is disclosed. A method includes receiving a user selection to create an upper layer test and a lower layer test, receiving upper layer test information and lower layer test information, displaying a first timeline showing the activity of the upper layer test in a first pane and a second timeline showing the activity of the lower layer test in a second pane. Synchronization between the lower layer tests and upper layer tests may be defined. The method allows for observing and ascertaining the impact of the lower layer tests on the upper layer tests. The method may be implemented in software, stored on a storage medium and performed on a network testing system that includes one or more network cards and in one or more network testing systems. | 01-27-2011 |
20110022701 | METHOD AND APPARATUS OF FILTERING STATISTIC, FLOW AND TRANSACTION DATA ON CLIENT/SERVER - Network traffic filtering is provided to enable gathering of data and statistics related to client/server traffic corresponding to valid and desired client to server/server to client traffic. | 01-27-2011 |
20110022702 | MECHANISM FOR DETECTING AND REPORTING TRAFFIC/SERVICE TO A PCRF - A method implemented by a policy server operating on a network to which is connected a device that performs a data packet inspection function, the method involving: sending a first message over the network from the policy server to the device, the first message instructing the device to detect an occurrence of a particular network traffic or service taking place over a connection on the network and to send a notification to the policy server upon detecting the occurrence of that particular network traffic or service; at the policy server receiving a notification from the device that the device has detected the occurrence of that particular network traffic or service; and in response to receiving the notification, sending a second message over the network from the policy server to a network component, the second message containing information associated with the notification. | 01-27-2011 |
20110022703 | METHOD AND SYSTEM FOR ESTIMATING A NUMBER OF USERS OF A WEBSITE BASED ON LOSSY COMPRESSED DATA - The invention relates to a method and system for estimating a number of users of a website. According to the method, it is repeatedly determined that the website is accessed by an entity and data dependent on the entity is determined and stored. The stored data is repeatedly compressed using a lossy compressing algorithm and based on the compressed data a number of users of the website is estimated. | 01-27-2011 |
20110022704 | METHOD AND SYSTEM FOR COLLECTING INFORMATION ON A USER VISIT - The present invention provides a computer implemented method and system for collecting information on a user visit for web analytics. An information collection module is sent to a client in response to a page opening request from the client. The information collection module is for collecting additional information on user visit of the client. Additional information on user visit and basic information on user visit of the client is obtained from a web service request. A web beacon request is generated based on the obtained information. The invention adopts a non-intrusive information collection manner that does not require modifying code of a web application and thus, is much simpler, feasible, and cost-effective than prior art. Further, centralized collection and management for the information on user visit can be implemented. Thus, it is more flexible and convenient for maintenance and optimization. | 01-27-2011 |
20110022705 | METHOD AND APPARATUS FOR SUBSCRIPTION-BASED BANDWIDTH BALANCING FOR INTERACTIVE HETEROGENEOUS CLIENTS - A method or system for enabling client devices connected to a network to subscribe to a one or more multimedia signals available in a selection of bandwidths, based on an analysis of capabilities of the client, the quality of the connection, and the real-time changes in the ability of the client to process the signal. | 01-27-2011 |
20110022706 | Method and System for Job Scheduling in Distributed Data Processing System with Identification of Optimal Network Topology - The method of the present invention provides an automatic and optimised selection of the network topology for distributing scheduling of jobs on the computers of the modified network topology. The automatic and optimised selection of the network topology starts from the current topology and a desired number of additional connections. In this way the method of the present invention provides a higher convergence speed for the modified consensus algorithm in comparison, e.g., to a simple ring network. The method exploits the so called small-world networks. Small-world networks are more robust to perturbations than other network architectures. The preferred embodiment provides a workload scheduling system which is highly scalable to accommodate increasing workloads within a heterogeneous distributed computing environment. A modified average consensus algorithm is used to distribute network traffic and jobs amongst a plurality of computers. | 01-27-2011 |
20110022707 | HIERARCHY FOR CHARACTERIZING INTERACTIONS WITH AN APPLICATION - Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components). | 01-27-2011 |
20110022708 | METHOD AND DEVICE FOR MEASURING THE TEMPORAL DRIFT OF AN ITEM OF ELECTRONIC EQUIPMENT CONNECTED TO A NETWORK - A method of measuring temporal drift of an electronic apparatus linked to a network and capable of providing a time-stamp including capturing at least two messages including a gauge reference time circulating around the network, and determining precision of the time-stamping function of the apparatus as a function of the gauge reference time and of a time-stamp provided by the apparatus. The apparatus can be a network analyser and each message captured includes at least one Ethernet frame including a gauge reference time in accordance with NTP (Network Time Protocol). | 01-27-2011 |
20110022709 | Method, System and Game Server for Recommending Game Room - A method, system and game server for recommending a game room are disclosed. The method includes: a speed measuring server measuring a network speed from a network user logging on an IDC in which the speed measuring server is located to the IDC, counting an average of network speeds from all network users in a same subnet to the IDC; the speed measuring server sending the average of network speeds to a QoS center, the QoS center allocating, according to the average of network speeds and a predetermined principle, a QoS level to a communication link from each subnet to each IDC, sending the QoS level to a game server in each IDC; and the game server sending information of a recommended game room to a game client according to the QoS level of the communication link from the subnet to which the game client belongs to each IDC. | 01-27-2011 |
20110022710 | LOCATION INFORMATION SERVICE METHOD - A location service method in a terminal includes: receiving a message including a first parameter with respect to an inner area determined based on a particular geographic area and a second parameter with respect to an outer area from a server; and checking whether or not the terminal leaves the particular geographic area through the parameters of the inner area and the outer area. | 01-27-2011 |
20110029657 | TRACKING HIGH-LEVEL NETWORK TRANSACTIONS - A system and method of tracking high-level network transactions. At least one switching node on a network may collect low-level data packets, the low-level data packets forming collectively a corresponding stream of high-level messages as parts of high-level transactions involving network resources of the network. Identifiers of the network resources in the network serving the high-level transactions may be identified from the low-level data packets. The data content of the high-level messages may be determined. The high-level messages may be grouped into groups of high-level messages having similar data content. Commonalities in the occurrences of high-level messages having different data content may then be identified. | 02-03-2011 |
20110029658 | SYSTEM AND METHODS FOR PROVIDING A MULTI-DEVICE, MULTI-SERVICE PLATFORM VIA A CLIENT AGENT - The solution of the present application provides many types and forms of resources, such as products or services, to an environment of heterogeneous devices. An agent and centralized service may communicate to deliver an optimum package of resources to a device. Each device may include an agent that collects information important to determining the appropriate resources for the device and understanding the environment the devices are contributing to. The information may be stored and analyzed in a cross device knowledge base, and the knowledge base may be consulted to determine resources appropriate for devices. The agent and centralized service may engage in pro-active alerting and provisioning of services, based on any collected information, to minimize the burden of resource procurement on the customer. After delivery of resources, the agent and centralized service may also perform updating, repairing, and healing functions for the resources. Resources may be aggregated into a cohesive platform to be combined and delivered in an optimum manner, and resources may also be maintained and monitored to ensure their quality via escalation or remedial action. Devices may be connected to the resources through intelligent routing. | 02-03-2011 |
20110029659 | Method and System for Network Proxy Services for Energy Efficient Networking - A network device may provide power-aware network proxy services to one or more resources internal to the network device and/or one or more other network devices that may transition to corresponding power saving states. The power saving states may comprise disabling, shutting down, and/or reducing power consumption. The power-aware network proxy service may comprise handling at least some of network communication on behalf of serviced internal resources and/or other network devices, and monitoring for conditions to transition the serviced internal resources and/or other network devices from the corresponding power saving states. The power-aware network proxy services may be provided via a network interface controller (NIC) in the network device. Determining when to transition serviced resources and/or other network devices from corresponding power saving states may be based on monitoring and/or processing of traffic handled on behalf of the serviced resources and/or other network devices during power-aware network proxy servicing. | 02-03-2011 |
20110029660 | METHOD FOR MONITORING AND PROVIDING INFORMATION OVER A PEER TO PEER NETWORK - A pseudonode for deployment on a peer to peer network. The pseudonode is programmed for monitoring the peer to peer network to receive search requests therefrom, optionally comparing each said received search with said list of data objects, and to respond to such requests. The response may include advertising; the advertising may be selected in response to the request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method further includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode, and responding to substantially each node representing an acquired ID. | 02-03-2011 |
20110029661 | Enforcement of Network Service Level Agreements - A service level agreement may be imposed by a service provider, such as an Internet service provider, that may include, e.g., a volume limitation and a bandwidth limitation. One or more limitations of the service level agreement may be enforced or modified in response to a triggering event. For example, a bandwidth limitation on a network subscriber may be enforced or modified based on how much data is consumed by the subscriber. | 02-03-2011 |
20110029662 | Isolating Local Performance Variation in Website Monitoring - Systems and methods are provided for isolating performance variation in website monitoring. A set of geographically diverse monitoring agents are identified and a subset of baseline agents is selected from these monitoring agents. The baseline agents are those agents that are geographically close to the target website or otherwise enjoy reliable communications with the target website and are therefore less affected by network latencies. The frequency at which a target website is monitored is weighted in favor of the baseline agents in order to get an accurate baseline metric for the target website while also obtaining information regarding global accessibility of the website from the geographically disperse monitoring agents. The variations in sample frequency can be optimized for each particular set of baseline agents. The set of baseline agents can be pre-assigned or dynamically identified based on an analysis of the performance variation from each of the monitoring agents. | 02-03-2011 |
20110029663 | METHOD OF GATHERING INFORMATION RELATED TO ACTIVITY OF A USER AND A DATA PROCESSING SYSTEM PROGRAM PRODUCT - Information related to activity of a user may be provided using a method or a data processing system program product to perform the method. In one embodiment, the method includes sending a first view request to a first electronic site, receiving a first view from the first electronic site, and first information related to the first view request to a second entity that is different from the first entity. In another embodiment, a data processing system program product may perform a method of sending information related to a view request from the user for an electronic site. The information is to be sent to an entity that is different from an entity that substantially controls or owns the electronic site and different from an Internet service provider of the user, if the user is to use the Internet service provider in accessing the electronic site. | 02-03-2011 |
20110029664 | SYSTEM AND METHOD FOR PEAK FLOW DETECTION IN A COMMUNICATION NETWORK - An adaptive file delivery system and method transmits a data file, such as an audio-video file, over a network or collection of networks in segments, each segment transmitted during a different time period. Each time period has a transmission portion to transmit its associated file segment and a wait portion in which no further interaction with the network occurs regarding the transmitted segment. In some implementations, the duration of the transmission portion of each time period is sufficient to reach a steady-state throughput condition, which allows the traffic load status of the network or networks to be determined from rate measurements of file segment transmissions. A peak flow determination is made to assure that the delivery of file segments does not cause network congestion. The system has spurious peak rejection to avoid the false detection of network congestion. | 02-03-2011 |
20110029665 | DYNAMICALLY CONFIGURABLE SESSION AGENT - A monitoring system captures the behavior of distributed applications and also provides a framework for augmenting functionality of the application in response to user interactions and different states of the application and network. Network events exchanged between an application and an application server are captured and the local client events on the client device are also selectively captured. The different disparate network events and client events are then combined together during a replay operation to simulate the user experience during the previous application session. | 02-03-2011 |
20110029666 | Method and Apparatus for Passively Monitoring Online Video Viewing and Viewer Behavior - Various user behaviors are passively monitored and recorded when a user/viewer interacts with a network video player, e.g. a web video player, while watching an online video clip. For one embodiment, a data collection agent (DCA) is loaded to the player and/or to a web page that displays the video clip. The DCA passively collects detailed viewing and behavior information without requiring any specific input or actions on the part of the user. Indications of user preferences are inferred by user actions leading up to viewing the video, while viewing the video, and just after and still related to viewing the video. The DCA periodically sends this information to a central server where it is stored in a central database and where it is used to determine preference similarities among different users. Recorded user preference information may also be used to rate a video itself. | 02-03-2011 |
20110029667 | Data Retention and Lawful Intercept for IP Services - The method provides a Law Enforcement Agency LEA with retention or interception data related to a target user. At a data retention source node or at an interception control element of a telecommunications network, traffic packets involving the target user are inspected and a plurality of usage data records based on the inspected traffic packets are generated. Each record comprises information relating to a certain service class and to a respective communications stack layer. For each communications session involving a plurality of different communications stack layers, at the data retention source node or, respectively, the interception control element, the plurality of usage data records are provided with a same correlation identity number for correlating the data at the different communications stack layers. Then, the usage data records comprising the correlation identity number to the LEA are sent, for instance to the LI system or the data Retention System, respectively. | 02-03-2011 |
20110029668 | MANAGEMENT OF THE DISTRIBUTION OF CONTENTS - A method of transmitting management information for entities linked to a contents distribution network comprises a registration of entities linked to the distribution network with a notification entity; a detection of at least one event by at least one entity linked to the distribution network; a transmission of information regarding detection of events by said entity linked to the distribution network to the notification entity; and a transmission of management information corresponding to said event by said notification entity to the registered entities linked to the distribution network, wherein said detection comprises the observation and the analysis of signalling messages circulating over the contents distribution network. | 02-03-2011 |
20110029669 | Adjustable Server-Transmission Rates Over Fixed-Speed Backplane Connections Within A Multi-Server Enclosure - Embodiments of the present invention are directed to providing configurable transmission rates for devices within a multi-device enclosure, despite common communication media within the multi-device enclosure that would otherwise constrain or fix the transmission rates of the devices. In one embodiment of the present invention, implemented within a virtual-connect manager or other module or device contained in, or associated with, a multi-server enclosure, the virtual-connect manager provides an administrative or management interface through which each server can be assigned a maximum transmission rate. The virtual-connect manager then continuously monitors the transmission rates of servers and/or ports within servers in order to apply back pressure, or flow control, so that the servers and/or ports within servers do not exceed the configured maximum transmission rates. | 02-03-2011 |
20110035485 | System And Method For Goal Driven Threshold Setting In Distributed System Management - The present invention includes, but is not limited to, a method, system and computer-usable medium for providing automated management of threshold crossing alarms. Transaction processing resources are selected for monitoring, followed by selecting a monitoring time interval, an initial threshold alarm level. Selections are then made regarding transaction codes to monitor, acceptable average transaction processing times, and acceptable ratio of successful transactions to unsuccessful transactions. The transaction processing resources are then monitored to count the number of transactions processed, measure the processing time for individual transactions, and capture their corresponding transaction result code. An average transaction processing time value and a successful transaction ratio processing value are generated. Comparison operations are performed. If the results of the comparison operations are acceptable, then threshold crossing alarms are then suppressed and the threshold alarm level is increased. If not, then a threshold crossing alarm is generated and the threshold alarm level is decreased. | 02-10-2011 |
20110035486 | MONITORING THE HEALTH OF WEB PAGE ANALYTICS CODE - A system for monitoring the “analytics health” or “tracking health” of a web page can include one or more modules that render analytics code on the web page. In one implementation, a monitoring service downloads one or more web pages from a web server. The monitoring service can attempt to render any analytics code on the web pages to see if the analytics code renders or executes as expected. The monitoring service can also perform basic text searches to identify analytics code, even if it cannot be rendered, and to determine if such code is present and correctly written in the web page. For web pages that require form input, the monitoring service can prompt the user for corresponding input, or retrieve pre-recorded user input from a store. The monitoring service can determine analytics health for web pages of interest in real-time. | 02-10-2011 |
20110035487 | COMMUNICATION NETWORK SYSTEM AND SERVICE PROCESSING METHOD IN COMMUNICATION NETWORK - A communication network system includes a resource network element and further includes a resource server adapted to retrieve availability information of the resource network element and to allocate the resource network element according to the retrieved availability information. A service processing method in a communication network at the resource server side includes: receiving a resource query request; and searching for an available resource network element and responding with it being a response result. A service processing method in a communication network at the resource network element side includes: receiving a request for a service; determining whether the service can be processed immediately, and if not, transmitting a resource query request to a resource server; and transmitting the service request to an available resource network element in a response result. A resource server and a resource network element are further disclosed. With a resource server, the invention can monitor dynamically availability information of a resource network element and allocate appropriately an idle resource network element to thereby improve both a utilization ratio of network resource and a service processing capability of network element. | 02-10-2011 |
20110035488 | Method for Monitoring and Providing Information Over A Peer to Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 02-10-2011 |
20110035489 | SYSTEM AND METHOD FOR INTERFACING WITH A MANAGEMENT SYSTEM - Systems and methods that interface with a management system are provided. In one embodiment, a system and a method may provide a command protocol and format for communication between a network interface card (NIC) and a management device such as, for example, an intelligent management device (IMD). An interface may be adapted to allow the management device to merge its traffic with that of the NIC to provide a fully integrated management solution. The fully integrated management solution may be implemented, for example, without additional network connections. | 02-10-2011 |
20110035490 | METHOD, SYSTEM AND CONNECTIVITY SERVICE NETWORK (CSN) FOR REALIZING LOCATION SERVICE - A method, a system, and a connectivity service network (CSN) for realizing a location service are provided. When a user terminal roams to the visited domain network from the home domain network, the H-CSN interacts with the V-CSN after receiving the location request, and obtains the location result through location control exercised by the V-CSN over the V-ASN, which realizes the location of the user terminal from the home domain network, and expands the application of the location service in the home domain network. | 02-10-2011 |
20110035491 | Method for Internetworked Hybrid Wireless Integrated Network Sensors (WINS) - The Wireless Integrated Network Sensor Next Generation (WINS NG) nodes provide distributed network and Internet access to sensors, controls, and processors that are deeply embedded in equipment, facilities, and the environment. The WINS NG network is a new monitoring and control capability for applications in transportation, manufacturing, health care, environmental monitoring, and safety and security. The WINS NG nodes combine microsensor technology, low power distributed signal processing, low power computation, and low power, low cost wireless and/or wired networking capability in a compact system. The WINS NG networks provide sensing, local control, remote reconfigurability, and embedded intelligent systems in structures, materials, and environments. | 02-10-2011 |
20110035492 | DATA USE STATUS TRACKING SYSTEM, MANAGER DEVICE, AGENT DEVICE, DATA USE STATUS TRACKING METHOD, AND STORAGE MEDIUM - A data use status tracking system | 02-10-2011 |
20110035493 | APPARATUS AND METHOD FOR TRACKING REQUESTS IN A MULTI THREADED MULTI TIER COMPUTERIZED ENVIORONMENT - The subject matter discloses a method and apparatus for associating requests and responses in a multi-tier computerized environment, comprising for each tier, detecting incoming and outgoing data flow; sending the detected data to a processing module; for each two neighboring tiers, comparing incoming data of one tier and outgoing data of the other tier; associating incoming requests of one tier to outgoing requests of the other tier. The association may use an ad-hoc ID. The subject matter also discloses a computerized apparatus detecting data and sending the data to a central storage outside the multi-tier environment when the data is used to match requests and responses. Another object of the subject matter is a method for associating an incoming request and outgoing response or outgoing requests in a multi-threaded computerized environment. | 02-10-2011 |
20110035494 | NETWORK VIRTUALIZATION FOR A VIRTUALIZED SERVER DATA CENTER ENVIRONMENT - A data center includes a physical host machine operating a virtualized entity and a network switch having a physical port connected to the physical host machine. To configure the network switch, the network switch has a management module that acquires information about the virtualized entity operating on the physical host machine. The network switch associates the acquired information about the virtualized entity with the physical port, assigns the virtualized entity to a group associated with a traffic-handling policy, and processes packet traffic from the virtualized entity in accordance with the traffic-handling policy. The virtualized entity can be, for example, a virtual machine or a multi-queue network input/output adapter operating on the physical host machine. | 02-10-2011 |
20110040867 | MECHANISM TO DETECT RESTRICTED ACCESS VIA INTERNET HOTSPOT - The disclosed wireless device automatically detects the redirection of its internet access via a wireless hotspot network. The exemplary device algorithm provides the flexibility to detect either or both of DNS redirection and HTTP redirection, as well as to automatically accommodate such internet redirection. The proposed algorithm allows a wireless device user to be alerted and account for internet redirection when such internet redirection is automatically detected upon entering service via a hotspot. Alternatively, the wireless device may attempt to automatically meet the hotspot requirements and complete the internet access through the hotspot. | 02-17-2011 |
20110040868 | SERVER INFORMATION SENDING SYSTEM - A server information sending system includes a server and an optical receiving device. The server has a microprocessor and a single LED element connected the microprocessor. The microprocessor transmits some server information in series outwardly by the single LED element. Flashes having information transmitted by the single LED element includes a machine-received message for the optical receiving device and a naked-eye-received message for a user. | 02-17-2011 |
20110040869 | ELECTRONIC DEVICE WITH WEBSITE INFORMATION - An electronic device is capable of communicating with at least one website via a network. The electronic device includes a storage module, an executing module, an integrating module, and a display module. The executing module is capable of retrieving information from the at least one website via the at least one webpage address. The integrating module is capable of determining positions where the information would be displayed in the electronic device. The display module is capable of displaying the information in the determined positions. | 02-17-2011 |
20110040870 | Systems and Methods for Determining Location Over a Network - Systems and methods for determining location over a network are disclosed. In some embodiments, a method comprises scanning, by a digital device, an area for one or more wireless networks, receiving one or more BSSIDs associated with the one or more wireless networks, generating a location request in a DNS protocol formatted message, the location request comprising the one or more BSSIDs, providing the location request, receiving a location response based on the location request, and retrieving at least one location identifier from the location response. | 02-17-2011 |
20110040871 | MONITORING WEBSITE VISITS FROM ON-LINE ENQUIRY AND VIEWS OF ELECTRONIC DOCUMENTS TO OFF-LINE (DELAYED) PURCHASE - A system for monitoring website visits is implemented by an implementing server ( | 02-17-2011 |
20110040872 | SYSTEM AND METHOD FOR MANAGING NETWORK TRAFFIC - A system and method for managing network traffic is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a data switch having a controller element to transmit telemetry data representative of bandwidth usage by one or more users of the data switch. At least one higher bandwidth user can have an increased polling frequency based at least in part on a differential in upstream and downstream data transfer rates for the one or more users. Additional embodiments are disclosed. | 02-17-2011 |
20110040873 | HOME NETWORK USING WIRELESS MODULE - Methods and apparatus for implementing a home network including a wireless module. In one implementation, a home network includes: two or more host devices, where at least one host device includes a wireless module port, and where the host devices are connected in a local network; and a wireless module connected to the wireless module port of a host device, where the wireless module provides a wireless connection to an external network; where at least one host device is a consumer appliance. | 02-17-2011 |
20110040874 | Automated Characterization of Network Traffic - Automated characterization of network traffic is described herein. A method may include compiling network traffic data based on received network traffic, preparing a network traffic characterization based on the network traffic data, and generating outgoing network traffic scripts based on the network traffic characterization. A method may also include capturing network traffic and generating test network traffic based on the scripts. A network testing system on which the method may be executed may include one or more chassis and/or computing devices, each having one or more network cards. The chassis and/or computing devices may be connected to one or more networks and to one another. The networks may include a production network and a test network. A system may include a data collector, a characterization engine, a script generator, and a traffic generator. | 02-17-2011 |
20110047261 | INFORMATION COMMUNICATION APPARATUS, INFORMATION COMMUNICATION METHOD, AND PROGRAM - An information communication apparatus is provided which can maintain a communication by an information processing unit (for example, application program etc.) even when a change may occur in a communication with employment of an actual address. | 02-24-2011 |
20110047262 | System And Method For Circuit And Path Based Event Correlation - A method, system and computer-usable medium are disclosed for the correlation of network events. A port of a network device is monitored at the physical layer interface for the occurrence of a network event. If detected, a repository of circuit path, network device, and device interface data is queried for information related to the network event and each network device at each hop of the circuit path associated with the event. A user selects time intervals for other network events or alarms occurring before or after the target event. A repository of network event and alarm data is then queried to retrieve all network events or alarms occurring during the selected time interval. Information related to the network events or alarms are then compared to interfaces related to devices that are likewise associated with the circuit path associated with the event. If the event information does not match the interface, then it is associated as a child event of a network circuit event. Otherwise it is associated as a parent event of a network path query event. | 02-24-2011 |
20110047263 | Method and System for Automatic Location Tracking of Information Technology Components in a Data Center - Methods and systems provide the automatic tracking of the physical location of information technology components in a data center. These systems automatically identify where a given IT component, such as a server, router, switch or other device, is located. They automatically identify which slot the IT component is located in a given rack in the data center. When a server is added or removed from a particular slot, the tracking database is automatically notified and updated, and users of the database have instantaneously accurate information about the location of each IT component in a data center. If the server is changed to a different slot or rack, the system immediately identifies that the given server or device is located in a different location. Users can rely on the information in the database when remotely managing the data center's IT assets. | 02-24-2011 |
20110047264 | ANALYZING A COMMUNICATION PERFORMANCE OF AN IED - A communication stack performance of an Intelligent Electronic Device (IED) is analyzed in a communication network of a Substation Automation (SA) system. The IED processes network messages that are transferred with, or belonging to, a specific configurable SA communication service. A plurality of application level scenarios corresponding to a high communication load is executed. Among all network messages captured or intercepted during the scenario, the network messages destined to the IED and sent by the IED in response are identified. A number of the identified messages, a number of specific communication protocol elements or data items related to a service-specific property, and a number of changed protocol elements, which are indicative of an SA event, for which the value of the data item has changed compared to the value of the same data item in a previous message, are determined. An IED-intrinsic processing time of the identified messages is likewise determined, based on which parameter values of a service specific processing time model are calculated. | 02-24-2011 |
20110047265 | Computer Implemented Method for Identifying Risk Levels for Minors - A computer system is configured to monitor and analyze the use of a client device by a minor and compute a risk for that minor. Examples of client devices include personal computers, laptops, cellular phones, “smart phones”, and other personal electronic devices. The analysis includes receiving text blocks from the client, processing the text block to discover “hit strings”, compute risk scores for the hit strings, and then to compute an overall risk score for the minor. A hit string is a string of characters such as a word or phrase that is indicative of a risk to the minor such as depression, “cyber bullying”, or an “adult predator”. | 02-24-2011 |
20110047266 | METHOD AND APPARATUS FOR SHARING FUNCTION OF EXTERNAL DEVICE THROUGH COMPLEX NETWORK - A method of sharing a function of a device, the method including detecting at least one device from among a plurality of devices through a first device connected to the plurality of devices through a plurality of networks, wherein the detecting is performed by a second device in the plurality of devices; interworking the second device with a third device in the detected at least one device, through the first device; and using, by the second device, a function of the third device through the first device. | 02-24-2011 |
20110047267 | Method and Apparatus for Managing Communication Between Participants in a Virtual Environment - A method and apparatus for managing communication between participants in a virtual environment enables the participants to elect to automatically connect with each other via a preferred communication mechanism, manually connect with each other, or choose not to connect with each other. The connection may be point-to-point between two participants or may include multiple participants. Establishment of a connection, or the ability to establish a connection, may be based on the proximity of the participants, or the Avatars representing the participants, in the virtual environment. Once the connection is established, the connection may be managed so that the connection is maintained while the Avatars remain proximate each other and is automatically severed once the Avatars move away from each other. Environmental noise and other audio aspects may be included in the connection to simulate a real-world conversation. | 02-24-2011 |
20110047268 | Switching system - An Ethernet access connection connects a user access point to an access node in the network. The access connection comprises a passive coupler, by means of which a further access connection can be provided between the user access point and a second access node, such that data can be exchanged over each access connection between the user access point and the network. This duplication ensures that communication is not severed if the access connection is breached. To avoid interference at the destination terminal between the two resulting identical data streams, the access nodes giving access to the destination terminal are controlled such that only one of them forwards data to the destination access point, with the capability to switch to the other one in the event of a loss of connection between the access node and user access point. | 02-24-2011 |
20110047269 | DEVICE, METHOD AND SYSTEM FOR DETECTING UNWANTED CONVERSATIONAL MEDIA SESSION - Some embodiments of the invention relate to a method and a system for detecting unwanted conversational media session data. In accordance with one aspect of the invention, a method of detecting unwanted conversation media session data according to some embodiments of the invention may include calculating two or more progressive similarity scores each with respect to a different instant during a progress of a real-time conversational media session, wherein each of said scores is associated with a similarity between the conversational media session's media data that was available at the associated instant and a reference data item corresponding to media data of a previous conversational media session, and evaluating progressive similarity between the real-time conversational media session and the reference data item based upon the two or more progressive similarity scores. | 02-24-2011 |
20110055369 | SYSTEM AND METHOD FOR PRESENCE NOTIFICATION BASED ON PRESENCE ATTRIBUTE - Provided is a system and method for optimizing the presence notifications. The system includes a presence server which stores the presence subscription and presence information; and a presence XDMS for storing the authorization related information, wherein the presence server store the filtering rule pertaining to presence based notification delivery. The method includes: storing the presence subscription and presence information by a presence server; and storing the authorization related information by a presence XDMS, wherein a filtering rule pertaining to presence based notification delivery is used with the presence server. | 03-03-2011 |
20110055370 | Dynamically Balancing Resources In A Server Farm - Methods, apparatus, and products are disclosed for dynamically balancing resources in a server farm, the server farm comprising a plurality of servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, the methods, apparatus, and products including: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 03-03-2011 |
20110055371 | Using a Content Delivery Network for Security Monitoring - A content delivery network includes a plurality of cache servers. Each cache server is configured to receive a request for content from a client system and receive content and security data from a content server. Each cache server is further configured to provide the content to the client system and provide the security data to a monitoring system. | 03-03-2011 |
20110055372 | Auto Suspense Of Virtual Machine On Client Disconnection - A host controller or a host detects that a client has disconnected from a virtual machine running on the host. The host controller or host initiates a timer upon detecting that the client has disconnected. When the timer times out, the host controller or host saves the state of the virtual machine. The host controller or host causes the virtual machine to be shut down upon saving the state. | 03-03-2011 |
20110055373 | SERVICE IDENTIFICATION FOR RESOURCES IN A COMPUTING ENVIRONMENT - A method for identifying computational services performed by one or more computing resources is provided. The method comprises analyzing digital data associated with the computing resources to identify similarities between the digital data; grouping sets of digital data into one or more clusters according to similarities identified between the digital data; and generating a description for the one or more clusters to describe at least one computational service associated with a set of digital data grouped in the one or more clusters. | 03-03-2011 |
20110055374 | COMPUTER IMPLEMENTED DNS SERVER IP ADDRESS LOOKUP MECHANISM - Systems, methods and articles of manufacture are disclosed for resolving hostnames on a private network with a public Internet server. One embodiment of the invention provides for a public Internet server configured to generate a private network ID when a new private network is identified, wherein the private network ID is a unique reference to all nodes within a private network and wherein the private network is comprised of one or more private DNS servers. The public internet server stores the private network ID and an IP address for at least one or more private DNS servers on the private network and sends, upon request, the private network ID to at least one of the private DNS servers. | 03-03-2011 |
20110055375 | METHODS FOR MONITORING OPERATING STATUS OF REMOTE HOSTS - Methods for monitoring operating statuses of hosts are described herein. Operating statuses for one or more hosts are monitored by a management server over a network using a network management protocol. In response to a failure to obtain an operating status of a first host over the network using the network management protocol, the management server instructs a second host to access a predetermined storage location to obtain the operating status of the first host. The predetermined storage location is specifically allocated for the first host from a storage space shared by all the hosts. Thereafter, the management server is configured to determine an operating condition of the first host based on the operating status obtained via the second host. | 03-03-2011 |
20110055376 | HEURISTIC TRANSACTION TIMEOUT CONTROL - A processing device receives a request to initiate a new transaction. The processing device identifies one or more components of that will be used by the new transaction. The components may include hardware components and software components that operate on the hardware components. A timeout period is determined to apply to the new transaction based on properties of the one or more components and a current resource utilization of the one or more components. The new transaction is then initiated, wherein the determined timeout period is assigned to the new transaction. | 03-03-2011 |
20110055377 | METHODS AND SYSTEMS FOR AUTOMATED MIGRATION OF CLOUD PROCESSES TO EXTERNAL CLOUDS - A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud management system can migrate the virtual machines to an external cloud. | 03-03-2011 |
20110055378 | METHODS AND SYSTEMS FOR METERING SOFTWARE INFRASTRUCTURE IN A CLOUD COMPUTING ENVIRONMENT - A metering tool can monitor the software resources of the cloud to meter the software utilization of the cloud. The metering tool can cooperate and communicate with a cloud management system to determine the software resources utilized by processes instantiated in the cloud and to track the duration of the utilization. The metering tool can store the tracked utilization in a record. | 03-03-2011 |
20110055379 | CONTENT-BASED AND TIME-EVOLVING SOCIAL NETWORK ANALYSIS - System and method for modeling a content-based network. The method includes finding single mode clusters from among network (sender and recipient) and content dimensions represented as a tensor data structure. The method allows for derivation of useful cross-mode clusters (interpretable patterns) that reveal key relationships among user communities and keyword concepts for presentation to users in a meaningful and intuitive way. Additionally, the derivation of useful cross-mode clusters is facilitated by constructing a reduced low-dimensional representation of the content-based network. Moreover, the invention may be enhanced for modeling and analyzing the time evolution of social communication networks and the content related to such networks. To this end, a set of non-overlapping or possibly overlapping time-based windows is constructed and the analysis performed at each successive time interval. | 03-03-2011 |
20110055380 | NETWORK PROVIDING AUTOMATIC CONNECTIONS BETWEEN DEVICES BASED ON USER TASK - A system including a network; and a plurality of devices configured to be communicatively coupled to the network, each device configured to be automatically discoverable when connected to the network; wherein at least one of the devices is configured to: discover devices connected to the network; and establish a network communication link between at least two devices based on a user task. | 03-03-2011 |
20110055381 | HOST INFORMATION COLLECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for collecting information of host devices. In one aspect, a method includes transmitting a plurality of information probes to the host device, including an agent probe that queries an agent installed on the host device for a unique agent identifier, monitoring for replies to the information probes from the host device during the host detection phase, ending the host detection phase in response to receiving a reply to the agent probe and that includes the unique agent identifier, resending the plurality of information probes and incrementing a repeat counter in response to not receiving a reply to the agent probe after the expiration of a time period and ending the host detection phase in response to a value of the repeat counter exceeding a maximum repeat value. | 03-03-2011 |
20110055382 | HOST ENTRY SYNCHRONIZATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, synchronizing records in peer devices. In one aspect, a method includes comparing, in a first peer device, a peer record received from a second peer device based on an IP address of the peer record from the second peer device and an IP address of a record stored in a host table of the first peer device. Unique agent identifiers, MAC addresses and time stamps are also compared to determine whether the peer record indicates a new host device, a new IP assignment to a known host device, or a new user logged into a known host device. | 03-03-2011 |
20110055383 | PROBE ELECTION IN FAILOVER CONFIGURATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type. | 03-03-2011 |
20110055384 | METHOD FOR CREATING CONTENT, METHOD FOR TRACKING CONTENT USE ACTIONS, AND CORRESPONDING TERMINAL AND SIGNALS - A method is provided for tracking at least one use of at least one piece of multimedia content on a terminal connected to a communication network. The piece of content is transmitted to the terminal in the form of at least one description file generated according to a predetermined description format. The method includes using the piece of content by a user of the terminal, including activation of at least one interaction element; implementing at least one instruction followed by the use associated with the activated interaction element; executing the use tracking instruction controlling storage of at least one piece of information concerning the activation of the interaction element, or use tracking information; and transmitting by the terminal the piece of use tracking information to a tracking terminal in charge of processing the use tracking information. | 03-03-2011 |
20110055385 | ENTERPRISE-LEVEL MANAGEMENT, CONTROL AND INFORMATION ASPECTS OF CLOUD CONSOLE - A method, computer-readable medium, and system for monitoring usage of computing resources provisioned across multiple cloud providers and/or data centers are disclosed. Events associated with usage of a plurality of computing resources may be accessed, where the plurality of computing resources may implement a virtual machine, a plurality of virtual machines of a cloud computing environment, etc. The events may be associated with a start, a stop, a status change, etc., of the plurality of computing resources. The events may be used to generate usage data for the plurality of computing resources. The usage data may include historical data associated with previous usage of the plurality of computing resources. Additionally, the usage data may be displayed using a graphical user interface, thereby enabling monitoring and/or tracking of usage of computing resources provisioned across at least one cloud provider and/or at least one data center. | 03-03-2011 |
20110055386 | NETWORK ANALYTICS MANAGEMENT - Embodiments generally disclosed herein include a methods and systems configured for providing network analytics for a content delivery network. The methods and systems include providing a content delivery network comprising at least one content server. The methods and systems further include detecting a request for network analytics from the content delivery network and extracting network analytics at the at least one content server. The methods and systems may further include disseminating the network analytics from the content delivery network. | 03-03-2011 |
20110055387 | Method and Apparatus for Performing Buffer Status Reporting - The present invention provides a method for performing Buffer Status Reporting (BSR) in a user equipment (UE) of a wireless communication system. The method includes steps of determining whether any BSR has been triggered since last cancellation of a triggered BSR to a current Transmission Time Interval (TTI); and performing a BSR procedure when determining that at least one BSR has been triggered. | 03-03-2011 |
20110055388 | Methods and computer program products for monitoring and reporting network application performance - Provided are methods and computer program products for monitoring and reporting network application performance in a networked device. Methods may include collecting performance data corresponding to at least one application running on the networked device in substantially real time using at least one kernel space driver interface; generating multiple kernel level metrics and multiple user level metrics based on the collected performance data; aggregating the kernel level metrics and the user level metrics that were generated during a predefined time interval; and generating, responsive to aggregating the kernel level metrics and the user level metrics, an event incorporating the aggregated metrics. | 03-03-2011 |
20110055389 | Methods and Computer Program Products for Generating a Model of Network Application Health - Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that corresponds to activities of multiple applications that are operable to execute on at least one networked device, and combining the received activity data to remove redundant portions thereof and/or to reconcile inconsistencies therein. Based on the received activity data, ones of the multiple applications are identified, and relationships between the identified applications are determined. A model is generated including the identified applications and the relationships therebetween, and a representation of the model is displayed. Related computer program products are also provided. | 03-03-2011 |
20110055390 | NETWORK CAPACITY PLANNING - Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations is used or until a substantially steady state of network performance is achieved. | 03-03-2011 |
20110060821 | SYSTEM AND METHOD FOR DETERMINING AFFINITY GROUPS AND CO-LOCATING THE AFFINITY GROUPS IN A DISTRIBUTING NETWORK - In at least one embodiment, an apparatus for determining one or more affinity groups in a distributed network is provided. A first distributed computing device is operably coupled to a plurality of clients for enabling electronic interactive activities therebetween. The first distributed computing device is configured to detect at least one network interaction among the plurality of clients. The first distributed computing device is further configured to generate at least one weighted value based on the number of detected network interactions. The first distributed computing device is further configured to establish an affinity group comprising at least one client from the plurality of clients based on the at least one weighted value. | 03-10-2011 |
20110060822 | APPARATUS AND METHOD FOR MANAGING COMMUNICATIONS - A system that incorporates teachings of the present disclosure may include, for example, a gateway having a controller to transport media data between a service provider network and one or more end user devices associated with the gateway, and transmit connection signals to a second gateway for establishing a management channel between the gateway and the service provider network when an undesired condition is detected, where the management channel transports management data associated with the gateway to the second gateway for transport to the service provider network using a separate transport queue of the second gateway. Other embodiments are disclosed. | 03-10-2011 |
20110060823 | NETWORK-ASSISTED HEALTH REPORTING ACTIVATION - A system and method for generating and tracking health diagnoses of devices connected to a computer network via a statement of health provided by each device. The system monitors the health of devices on the network and attempts to engage the operator of undiagnosed devices in order to provide a diagnosis. Undiagnosed devices are quarantined to restrict their access to network resources. For example, access requests from quarantined devices to certain Web services may be intercepted and the device redirected to a page informing the operator of the need to provide a health diagnosis by installing or activating a compatible system health agent. | 03-10-2011 |
20110060824 | Signalling Proxy System for a Switching Center Server - A signalling proxy system for a switching center server is provided, as well as a method of operating a signalling proxy system for a switching center server. The signalling proxy system comprises two signalling proxies for routing signalling traffic between a network node and a plurality of switching center server units. Each signalling proxy is addressable by an address code and is operable in one of an active state and a passive state towards the network node. | 03-10-2011 |
20110060825 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM RECORDING CONTROL PROGRAM FOR INFORMATION PROCESSING APPARATUS, CAPABLE OF EXECUTING EFFICIENT DATA COMMUNICATION DISPENSING WITH COMMUNICATION WITH ONCE COMMUNICATED PARTNER - An exchange data communication determining unit determines, based on a received reception wireless frame, whether or not a communication partner is an exchange partner with which the exchange data can be exchanged. Receiving a notice that exchange of the exchange data is possible, a data communication control unit executes a process for giving/receiving the exchange data. A machine identification information registration unit stores an MAC address of a portable game machine in an MAC address list saving area. Again, the wireless frame transmitting/receiving unit sets a transmission wireless frame and executes an exchange partner searching process. An exchange data communication determining unit determines whether or not an MAC address included in the received reception wireless frame is registered with the MAC address list saving area, and if it is registered, the data communication is terminated. | 03-10-2011 |
20110060826 | DETECTING AND DETERMINING AVAILABILITY OF A NETWORK STRUCTURE WITH ACTIVE CONNECTION NODES - This is achieved in an arrangement of a network forming a network topology with network components connected via data lines of a computer with an operating system and holding software for detecting the network components and the network topology is stored. An analysis tool is connected at a connection to the network to be examined and includes a computer and software developed for this combination and stored on this computer. This analysis tool has a processing unit, an integrated or external display, a network card for exchange of data via the connection with the network components in the network to be examined, and programming for automatically detecting all of the network components connected to one another in the network using the network card for automatically detecting all of the active switching nodes in the network via the connection with the network. | 03-10-2011 |
20110060827 | MANAGING APPLICATION SYSTEM LOAD - An improvement in a networked digital computing system comprises an Information Resource Manager (IRM) operable to communicate with elements of the digital computing system to obtain performance information regarding operation of and resources available in the computing system, and to utilize this information to enable the IRM to adjust the application parameters relating to application execution, thereby to optimize execution of the at least one application program. | 03-10-2011 |
20110060828 | AUTOMATIC SEQUENCING BASED ON WIRELESS CONNECTIVITY - A method of determining the sequence of traversing nodes in a communication network is provided. The method comprises with each node, determining other nodes in the network it can reach in a single hop. Creating a local sequence connection order based on the determined other nodes the node can reach in a single communication hop. Storing historical data of local sequence connection order information and determining a new local sequence connection order based in part on the historical data and communication information. | 03-10-2011 |
20110060829 | METHOD AND APPARATUS PROVIDING DEVICE-INITIATED NETWORK MANAGEMENT - A method is disclosed for managing a network entity that is initiated by the network entity, the method comprising the computer-implemented steps performed at the network entity of monitoring the network entity; periodically evaluating one or more specified conditions at the managed network entity; when one or more of the specified conditions are satisfied, then gathering specified information from the managed network entity, preparing a message that includes the specified information and the specified conditions that were satisfied, and sending the message to a management point. | 03-10-2011 |
20110060830 | METHOD, SYSTEM AND DEVICE FOR DEVICE CAPABILITIES EXCHANGE - A method, system and device for device capabilities exchange are provided. The method for device capabilities exchange includes: receiving a device capability exchange request sent from an initiating Diameter node; and returning a device capability exchange answer to the initiating Diameter node according to a state of a state machine of a receiving Diameter node or a request type in the device capability exchange request. The method can optimize the existing method for updating and negotiating device capability information when a Diameter device is upgraded, reduce the amount of data exchanged over the network, reduce the repetition of database update performed by the Diameter nodes, and improve the robustness of network connection and system processing. | 03-10-2011 |
20110060831 | NETWORK MONITORING DEVICE, BUS SYSTEM MONITORING DEVICE, METHOD AND PROGRAM - A network monitoring device which monitors a network in which data is transmitted through relays, includes a monitoring frequency recording unit ( | 03-10-2011 |
20110066717 | METHOD AND APPARATUS FOR TIME ADAPTATION OF ONLINE SERVICES TO USER BEHAVIOR - An approach is provided for time adaption of online services. Timing information relating to usage by a user of one or more online services is retrieved. A pattern of consistent usage is determined from the timing information. Scheduling information is generated for transmission of a message based on the determined pattern. | 03-17-2011 |
20110066718 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENTLY POOLING CONNECTIONS BETWEEN CLIENTS AND SERVERS - An apparatus, method and computer program product for efficiently pooling network client-server connections. The apparatus is implemented within an interface unit connecting a plurality of servers to the Internet, which is in turn connected to a plurality of clients. The method includes the steps of opening a connection between a first client and the interface unit; determining whether a connection between the interface unit and a server is finished being utilized by the first client; opening a connection between a second client and the interface unit; if no free connection is open between the interface unit and the server, then allowing the second client to access information on the server via the same connection utilized by the first client without waiting for the first client to initiate closing the connection; and delinking the connections between the first and second clients and the interface unit while keeping open the connection between the interface unit and the server. | 03-17-2011 |
20110066719 | Automated Applicatin Dependency Mapping - A computer-executed method for network management automatically maps applications to network infrastructure. The method comprises monitoring network activity on one or more managed computers and collecting network activity data on the managed computers. The association of executable files to applications is identified and network activity data and the association of executable files to applications are analyzed. Connections from applications on the managed computers are established according to the analysis. | 03-17-2011 |
20110066720 | NETWORK CONNECTION STATUS DETECTING SYSTEM AND METHOD THEREOF - A network connection status detecting system is provided for detecting a network connection status of a server, and the detecting system includes a plurality of monitoring servers and a central processing server. Each monitoring server is communicably coupled to the server and continues detecting the network connection status of the server. If the detected network connection status of the server is offline, offline information including an offline starting time will be produced. The central processing server contains a selected time interval and receives the offline information to compute a time difference between the offline starting times. If all time differences are smaller than the selected time interval, then the central processing server determines that the network connection status of the server is an offline status and records the earliest offline starting time as an offline time. | 03-17-2011 |
20110066721 | IMAGE PROCESSING APPARATUS, REMOTE MANAGEMENT SYSTEM, LICENSE UPDATE METHOD, AND COMPUTER PROGRAM PRODUCT - An image processing apparatus includes an HDD t |