10th week of 2015 patent applcation highlights part 81 |
Patent application number | Title | Published |
20150067057 | SYSTEM AND METHOD FOR STREAMLINING MICROBLOGS ACROSS A PLURALITY OF MEDIA CHANNELS - A system and method for streamlining microblogging across a plurality of media channels are provided. The method includes receiving content to be published and a plurality of target media channels; obtaining requirements data comprising at least one requirement respective of each of the plurality of target media channels; for each of the plurality of target media channels determining if the content successfully meets the at least one requirement of the target media channel; generating a set of characterization attributes to optimize the content reach through the target media channel compiling a microblog and metadata respective of the set of characterization attributes for the target media channel; and sending the metadata and the microblog to the target media channel. | 2015-03-05 |
20150067058 | SYSTEMS AND METHODS FOR PROVIDING A COLLECTIVE POST - Methods, systems, and computer program code for producing a collective post are disclosed. A system for producing a collective post may include a processing device and a non-transitory, processor-readable storage medium in communication with the processing device. The non-transitory, processor-readable storage medium may include one or more programming instructions that, when executed, cause the processing device to receive at least one input from each of a plurality of users, direct a storage device to store data corresponding to the at least one input, receive an instruction from at least one of the plurality of users, and publish the collective post to the collaborative networking platform as a collective post entry. The at least one input may correspond to one or more interactions between each user and a collective desktop. The instruction may include a command to compile the data into the collective post. | 2015-03-05 |
20150067059 | Scalable Content Distribution for Sparse Publish-Subscribe Systems Using the Object Management Group Real-Time Publish-Subscribe Protocol - Publisher-side content based filtering methods and systems are provided to select which subscribers shall receive each data-message sent by a publisher using an Object Management Group (OMG) Real-Time Publish-Subscribe (RTPS) protocol. Methods and systems are provided for writer-side content based filtering and data distribution from a publisher to a plurality of subscribers using an Object Management Group (OMG) Real-Time Publish-Subscribe (RTPS) protocol. Methods and systems are provided for performing scalable content-based filtering and distribution from a publisher to a plurality of subscribers using the Object Management Group (OMG) Real-Time Publish-Subscribe (RTPS) protocol. | 2015-03-05 |
20150067060 | METHOD AND SYSTEM FOR CO-BROWSING IN A B2C ARCHITECTURE THROUGH CO-BROWSING FUNCTIONALITY EMBEDDED IN CONTENT OF A CONTENT PROVIDER AS INITIATED BY A GUEST TO A CO-BROWSE SESSION - A method includes establishing a first communication session between a first web browser associated with a user and a content provider over a network to deliver content including embedded co-browsing functionality. A second communication session is established between a second device and a co-browse communication server to initiate a co-browse session having a session identifier, wherein the second device is a guest. A user identifier and the session identifier is delivered from the second device to the content provider. The co-browsing functionality is exposed with an icon, such that when the icon is activated at the first device, the first web browser is joined into the co-browse session. The co-browse session is established between the first web browser as a host and a second web browser, such that content at the first web browser is delivered to the second web browser via the co-browse communication server through the co-browse session. | 2015-03-05 |
20150067061 | SYSTEMS AND METHODS FOR PREDICTING AND CHARACTERIZING SOCIAL MEDIA EFFECTIVENESS - Embodiments of the invention are directed to methods and systems for providing engagements to allow users to interact with reconfigured media inputs being provided through a social media presentation system. User responses, actions, and other related information to the engagements may be collected, analyzed, and actions may be taken based on the analysis. One embodiment may be directed to a method of providing an event scorecard by receiving a user interaction from a user computer, determining an engagement associated with the user interaction, and identifying a type of user interaction and a user identifier. The method continues by storing information associated with the user interaction including the user identifier, the type of user interaction, and a product identifier. The method further includes determining social engagement levels based on stored user interactions, generating event scorecard ratings based on the social engagement levels, and displaying an event scorecard including the scorecard ratings. | 2015-03-05 |
20150067062 | MESSAGE PUSH NOTIFICATION CLIENT IMPROVEMENTS FOR MULTI-USER DEVICES - Methods and apparatuses that generate a subtopic identifier identifying a client application within a client device that can support multiple users are described. The client application may be associated with a server application hosted in one or more application servers. Notification services may be registered with the application servers from the client application to forward identifiers associated with the client application for one of the multiple users to the server application to enable the server application to push notification messages to the client device selectively for the client application for that user. When receiving a notification message from the application server, the notification message may be examined to forward the notification message directly to the client application for that user without invoking other applications in the client device if the notification message carries a subtopic identifier of the client application. | 2015-03-05 |
20150067063 | System and Method for Comparison of Physical Entity Attribute Effects on Physical Environments Through In Part Social Networking Service Input - A method includes, but is not limited to: obtaining status information about one or more physical attributes associated with one or more first physical entities and one or more second physical entities, the one or more physical attributes each being perceived by one or more humans as being capable of having one or more effects upon one or more physical environments, obtaining input information from at least one of the one or more humans through at least in part one or more social networking services, the input information associated with at least one of the one or more physical attributes, and determining assessment information comparing the one or more first physical entities with the one or more second physical entities based at least in part upon the status information and based at least in part upon the input information. In addition to the foregoing, other related method/system aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2015-03-05 |
20150067064 | Social Network for Travelers with Event Codes - A method of correlating events between multiple people is disclosed including generating a statistically unique event code. The statistically unique event code uniquely identifies the event and is associated with the event. The statistically unique event code is unique for at least a period of time up until the event happens. The statistically unique event code is provided when a person joins the event (e.g. printed on a ticket, transmitted in a data record, etc.). In a social network in which the person is a member, the statistically unique event code is associated with the person. A buddy list of the person is searched for other members of the social network for an overlap in which the person and one of the buddies of the person will be co-located (e.g., matching statistically unique event codes or at a location near the event, etc.). | 2015-03-05 |
20150067065 | TRANSMISSION OF MESSAGES AND NOTIFICATIONS IN VIRTUALIZED WIRELESS MOBILE COMPUTING DEVICES - A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message. | 2015-03-05 |
20150067066 | Provisioning Communication Services using Proxy Server in a Cloud - A method and system for provisioning a communication service using a proxy server in a cloud. The method includes engaging a service provider network and a cloud in a zero-rated service level agreement (SLA). Further, the method includes receiving a message and compressing content of the received message into plain text. The method further includes detecting one or more attachments associated with the message and removing the one more attachments from the message. Furthermore, the method includes inserting one or more links to the one or more removed attachments into the message and routing the message to one or more receivers in accordance to the zero-rated SLA. | 2015-03-05 |
20150067067 | Data Communications In A Distributed Computing Environment - Data communications may be carried out in a distributed computing environment that includes a plurality of computers coupled for data communications through communications adapters and an active messaging interface (‘AMI’). In such an environment, data communications may include: issuing, by a sender to a receiver, an eager SEND data communications instruction to transfer SEND data, the instruction including information describing a location and size of a send buffer in which the SEND data is stored; transmitting, by the sender to the receiver, the SEND data as eager data packets; issuing, by the receiver to the sender in dependence upon data flow conditions, a STOP instruction, the STOP instruction including an order to stop transmitting the eager data packets; and transferring the SEND data by the receiver from the sender's data location to a receive buffer by remote direct memory access (“RDMA”). | 2015-03-05 |
20150067068 | Data Communications In A Distributed Computing Environment - Data communications may be carried out in a distributed computing environment that includes a plurality of computers coupled for data communications through communications adapters and an active messaging interface (‘AMI’). In distributed computing environment, data communications may include: receiving in the AMI from an application an eager SEND instruction that describes the location and size of send data in an application SEND buffer; copying by the AMI the send data from the application SEND buffer to a temporary AMI buffer; advising the application of completion of the SEND instruction before sending the SEND data to the receiver; and after advising the application of completion of the SEND instruction, sending the SEND data by the sender to the receiver. | 2015-03-05 |
20150067069 | ENFORCING RESOURCE QUOTA IN MAIL TRANSFER AGENT WITHIN MULTI-TENANT ENVIRONMENT - An application such as a mail transfer agent (MTA) enforces a resource quota within a multi-tenant environment. An email associated with a tenant is managed based on decisions evaluating the email against a queue quota and an association between the email and an email storm. The email is also managed based on another decision evaluating the email against a processing quota. In addition, the email is managed based on a cross MTA aggregate of usage information associated with the first, second, and third decisions. | 2015-03-05 |
20150067070 | SYSTEM AND METHOD FOR PERFORMING GENDER BALANCING OF AN EVENT USING NOTIFICATIONS IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes determining a first number of users who have indicated an intention to attend an event; determining what fraction of the first number of users is a particular gender; and using the determined fraction and an ideal fraction of the particular gender for the event to determine an additional number of males or an additional number of females to be invited to attend the event. | 2015-03-05 |
20150067071 | MANAGING MESSAGE DISTRIBUTION IN A NETWORKED ENVIRONMENT - A method for managing message distribution in a networked computing environment. The method includes determining, for a particular topic, at least a first subscriber messaging engine and a second subscriber messaging engine to receive a topic message. The method includes determining that the first subscriber messaging engine is to act as a cache for the second subscriber messaging engine. The method includes sending the topic message to the first subscriber messaging engine. The method then includes sending a reference message to the second subscriber messaging engine, the reference message being able to be used to retrieve the topic message from the first subscriber messaging engine. | 2015-03-05 |
20150067072 | MAINTAINING AND UPDATING NOTIFICATION REGISTRATION INFORMATION - A first server may receive, from a user device, a first instruction including a token and a request to register the user device to receive a message associated with a particular application; update registration information to indicate that the user device is to receive the message based on receiving the first instruction; and provide a second instruction to a second server to cause the second server to provide the message to the user device on behalf of the first server. The second instruction may include information regarding the message, the token, and an instruction to provide the message to the user device associated with the token. The first server may receive, from the second server, a report indicating that the message was not delivered to the user device; and update the registration information to indicate that the user device is no longer to receive the message based on receiving the report. | 2015-03-05 |
20150067073 | RESTART CAPABILITY IN MESSAGE CAMPAIGN - In an embodiment, a message campaign is defined based on a received plurality of inputs and received target group to be assigned to the message campaign. In response to receiving an execute instruction from a user interface, a mass data run object instance is created corresponding to the message campaign. Schedule parameters such as date and time are specified to schedule execution of the created mass data run object instance. The mass data run object instance groups the recipients of the target group into packages. Execute the grouped packages in parallel in batches to send personalized communication to the recipients grouped in the packages by creating a corresponding instance for the recipients. In case one or more packages fails to execute, restart execution of the one more packages to send personalized communication to the recipients in the one or more packages. The recipients receive personalized communication only once. | 2015-03-05 |
20150067074 | PERSONALIZED BOOKMARKING OF TEXTSITE APPLICATIONS VIA A TEXT MESSAGE - A method for using a bookmark to access content from a global textsite platform (GTP). The method includes obtaining a bookmark creating text message, wherein the bookmark creating text message is based on a text messaging service (TMS) and sent by a user to create the bookmark, extracting, by a computer processor from the bookmark creating text message and based on a pre-determined syntax, a user ID representing the user, a first bookmark ID representing the bookmark, and a first registered unique keyword used to access a first textsite from the GTP based on the TMS, and storing, as a bookmark entry in a bookmark list of the GTP, the user ID, the first bookmark ID, and the first registered unique keyword, wherein the first bookmark ID is used by the user to access the first textsite from the GTP. | 2015-03-05 |
20150067075 | METHODS AND APPARATUS TO ESTIMATE DEMOGRAPHICS OF USERS EMPLOYING SOCIAL MEDIA - Methods, apparatus, systems and articles of manufacture are disclosed to estimate demographics of users employing social media. An example method disclosed herein includes (1) identifying a social media message regarding an asset, the social media message associated with a user identifier associated with the user, (2) determining demographics associated with a group of people exposed to the asset, (3) associating the user identifier with the asset, and (4) repeating (1) to (3). The example method also includes (5) combining demographics associated with two or more different groups of people with which the user identifier is associated to estimate a demographic profile for the user. | 2015-03-05 |
20150067076 | SYSTEM AND METHOD FOR DISTRIBUTING AND OPTIMIZING QUALITY AND QUANTITY OF SOCIAL MEDIA POSTS - Approaches for distributing and optimizing quality and quantity of social media posts or other posts are disclosed. In certain implementations, a post may be received from a user for submission to a channel directed to a topic. A stream flow value may be determined for the channel. The stream flow value may be based on a volume of posts associated with the channel. A rating value associated with the user submitting the post may be determined. A scope of distribution of the post to one or more users accessing the channel may be determined based on the stream flow value and the rating value. In some implementations, channel instances corresponding to the channel may be provided on different device components. At least one channel instance of the channel instances on which to make the post available may be determined based on the stream flow value and the rating value. | 2015-03-05 |
20150067077 | PRIVATE MESSAGING AND PRIVATE SOCIAL NETWORK METHOD FOR CREATING PERSONAL AND PRIVATE ONLINE COMMUNITIES THROUGH CONNECTING USER(S) UTILIZING PHYSICAL OBJECTS AND/OR PRODUCTS AND ASSOCIATED UNIQUE CODE(S) LINKED TO USERS, MESSAGES, ACTIVITIES, AND/OR INFORMATION - A method for creating personal and private online communities through connecting users utilizing physical objects and/or products associated with or having Unique Code(s) linked to member(s), message(s), activity(ies), and information. The invention connects individuals virtually or online in a private online community. The method implements at least one (1) computer, on-line, and/or virtual network, which hosts at least one (1) home page and/or webpage of at least one (1) private online and/or virtual community and uses at least one (1) database, in part or in whole, which stores Unique Code(s) printed on and/or associated with corresponding physical objects and/or products. At least one (1) physical object and/or product is exchanged between at least two (2) individuals. A private messaging and private social network method. | 2015-03-05 |
20150067078 | METHOD, COMPUTER PROGRAM AND COMPUTER FOR DETECTING TRENDS IN SOCIAL MEDIA - The present invention provides a method for selecting an identified message group from among the plurality of messages sent by a plurality of users of social media. For the messages sent by users other than the original user that quote the message sent by the original message user, the method provides: performing a primary evaluation of the potential for being further resent; identifying a single user who has sent a message for which the primary evaluation result was higher than a predetermined first threshold; identifying a message group similar to a resent messages group, based on a resent messages group that quotes the message send by the single user; performing a secondary evaluation for the potential that the similar message group will be further resent; and selecting a message group for which the secondary evaluation result was higher than a predetermined second threshold. | 2015-03-05 |
20150067079 | DEVICE MANAGEMENT SYSTEM, DEVICE MANAGEMENT APPARATUS, COMMUNICATION DEVICE, AND CONTROL METHODS THEREFOR, AND STORAGE MEDIUM - A device management system including the device management apparatus and a plurality of communication devices capable of communicating with the device management apparatus via the network stores destination information received from a first communication device and first identification information corresponding to the first communication device in association with address information, transmits the address information according to the destination information, transmits screen information to a second communication device in response to access from the second communication device using the address information, stores, when it receives service-related information input according to the screen information from the second communication device, the service-related information in association with second identification information for uniquely specifying the service-related information and the first identification information corresponding to the address information, and notifies the first communication device of the second identification information stored in association with the first identification information. | 2015-03-05 |
20150067080 | METHOD AND APPARATUS FOR REMOTELY CONTROLLING HOME DEVICE IN HOME NETWORK SYSTEM - A method for remotely controlling a home device in a mobile terminal is provided. The method includes receiving a chat message input to the mobile terminal for controlling at least one home device through an instant messenger application installed in the mobile terminal, and sending the chat message to a messenger server. The sent chat message is converted into a control command, which is sent to the home device. | 2015-03-05 |
20150067081 | MECHANISM FOR ESTABLISHING REPUTATION IN A NETWORK ENVIRONMENT - Traffic is obtained from a plurality of internet protocol version six addresses within a plurality of internet protocol version six blocks; and a first indication of inappropriate traffic is obtained from a first one of the addresses. Responsive to the first indication of inappropriate traffic, a reputation score for a first given one of the blocks, containing the first one of addresses, is incremented by a first predetermined amount; and a reputation score for a second given one of the blocks, adjacent the first given one of the blocks, is incremented by a second predetermined amount which is less than the first predetermined amount. Traffic from the plurality of addresses within the plurality of blocks is passed or blocked in accordance with a policy based on the incremented reputation scores for the first and second given ones of the blocks. | 2015-03-05 |
20150067082 | Systems, Methods, and Computer Program Products for Automatic Mapping Between Parlay-X Short Messaging Service Message Element XML Encoding and Native SMPP Protocol Data Coding Scheme - Systems, methods, and computer program products are for mapping an extensible markup language (XML) encoding declarations to a short message peer-to-peer (SMPP) data coding scheme (DCS) for a mobile-terminated (MT) short messaging service (SMS). An exemplary method includes receiving a message from a short message entity (SME) for delivery to a mobile device. The message includes a payload with at least one character encoded in accordance with a first character encoding scheme. The exemplary method further includes receiving from the SME a second encoding scheme for the message, implementing a mapping table to map the first character encoding scheme to the second character encoding scheme, and performing an encoding transformation of the message from the first character encoding to the second character encoding scheme yielding a modified message comprising the payload of the message encoded in the second character encoding scheme as specified by the SME. | 2015-03-05 |
20150067083 | METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL, AND INFORMATION COLLECTION BASED UPON A CONNECTION OR CONNECTIONLESS COMMUNICATION METHOD FOR SENDING MESSAGES TO THE RESOURCE MANAGER - A method, system, and program product for communicating with machines connected to a network. Information sent to or from the machines is transmitted using electronic mail or via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device that is being monitored or controlled and include information regarding the status, usage, or capabilities of the attached device. The device may send status messages and usage information of the device to either a resource administrator or to a service center on the Internet through a firewall. | 2015-03-05 |
20150067084 | SERVER SYSTEM AND REDUNDANT MANAGEMENT METHOD THEREOF - A server system and a redundant management method are provided. The server system includes a first central management board (CMB), a second CMB, a server and a redundant circuit board (RCB). The RCB includes a communication bus, a shared storage device, a storage switch circuit, and a redundant switch module. The communication bus communicates the first CMB with the second CMB. The storage switch circuit connects the shared storage device to the first CMB or the second CMB. The first CMB or second CMB acquires the system mastery of the server via the redundant switch module. | 2015-03-05 |
20150067085 | AUTOMATIC PINNING AND UNPINNING OF VIRTUAL PAGES FOR REMOTE DIRECT MEMORY ACCESS - In one exemplary embodiment, a computer-implemented method includes receiving, at a remote direct memory access (RDMA) device, a plurality of RDMA requests referencing a plurality of virtual pages. Data transfers are scheduled for the plurality of virtual pages, wherein the scheduling occurs at the RDMA device. The number of the virtual pages that are currently pinned is limited for the RDMA requests based on a predetermined pinned page limit. | 2015-03-05 |
20150067086 | Isolating Clients of Distributed Storage Systems - A distributed storage system that includes memory hosts. Each memory host includes non-transitory memory and a network interface controller in communication with the memory and servicing remote direct memory access requests from clients. The memory receives a data transfer rate from each client in communication with the memory host through remote direct memory access. Each memory host also includes a data processor in communication with the memory and the network interface controller. The data processor executes a host process that reads each received client data transfer rate, determines a throttle data transfer rate for each client, and writes each throttle data transfer rate to non-transitory memory accessible by the clients through remote direct memory access. | 2015-03-05 |
20150067087 | AUTOMATIC PINNING AND UNPINNING OF VIRTUAL PAGES FOR REMOTE DIRECT MEMORY ACCESS - In one exemplary embodiment, a computer-implemented method includes receiving, at a remote direct memory access (RDMA) device, a plurality of RDMA requests referencing a plurality of virtual pages. Data transfers are scheduled for the plurality of virtual pages, wherein the scheduling occurs at the RDMA device. The number of the virtual pages that are currently pinned is limited for the RDMA requests based on a predetermined pinned page limit. | 2015-03-05 |
20150067088 | SCHEDULING AND EXECUTION OF DAG-STRUCTURED COMPUTATION ON RDMA-CONNECTED CLUSTERS - A server and/or a client stores a metadata hash map that includes one or more entries associated with keys for data records stored in a cache on a server, wherein the data records comprise a directed acyclic graph (DAG), and the directed acyclic graph is comprised of a collection of one or more nodes connected by one or more edges, each of the nodes representing one or more tasks ordered into a sequence, and each of the edges representing one or more constraints on the nodes connected by the edges. Each of the entries stores metadata for a corresponding data record, wherein the metadata comprises a server-side remote pointer that references the corresponding data record stored in the cache. A selected data record is accessed using a provided key by: (1) identifying potentially matching entries in the metadata hash map using the provided key; (2) accessing data records stored in the cache using the server-side remote pointers from the potentially matching entries; and (3) determining whether the accessed data records match the selected data record using the provided key. | 2015-03-05 |
20150067089 | METADATA DRIVEN DECLARATIVE CLIENT-SIDE SESSION MANAGEMENT AND DIFFERENTIAL SERVER SIDE DATA SUBMISSION - A method and system for managing declarative client-side session. The method includes caching data loaded by user interface (UI) associated with a client device operated by a user, and identifying one or more units of data and meta-information describing data to be accessed through the UI. Further, the method includes associating the one or more units of data with the identified meta-information, and constructing a declarative session in accordance to the association. Further, the method includes recording changes performed by the user on the one or more units of data, and submitting the recorded changes to a server in accordance to the declarative session. | 2015-03-05 |
20150067090 | STORING LOW RETENTION PRIORITY DATA IN A DISPERSED STORAGE NETWORK - A method begins by a processing module of a dispersed storage network (DSN) sending a set of low retention priority write requests to storage units of the DSN, where each low retention priority write request includes a low retention priority query. For each storage unit of the storage units that receives a low retention priority write request of the set of low retention priority write requests, the method continues with the processing module determining a low retention priority response regarding availability for storing low retention priority data based on current storage of low priority data objects and available memory for storing the low retention priority data. The method continues with the processing module sending the low retention priority response. When a threshold number of favorable low retention priority responses have been received, the method continues at the processing module facilitating storage of a low retention priority data object. | 2015-03-05 |
20150067091 | INTERCONNECT DELIVERY PROCESS - A method for enforcing data integrity in an RDMA data storage system includes flushing data write requests to a data storage device before sending an acknowledgment that the data write requests have been executed. An RDMA data storage system includes a node configured to flush data write requests to a data storage device before sending an acknowledgment that a data write request has been executed. | 2015-03-05 |
20150067092 | CONTENT DELIVERY NETWORK WITH DEEP CACHING INFRASTRUCTURE - Embodiments herein include methods and systems for use in delivering resources to a client device over a local network. An exemplary system comprises a plurality of caching devices operable to cache resources on behalf of a plurality of content providers, and a local caching device communicatively situated between an access network and the client device, wherein the access network is communicably situated between the plurality of caching devices and the local caching device. The local caching device is operable to retrieve a requested resource from at least one of the plurality of caching devices, deliver the requested resource to the client device over the local network, and store the requested resource for future requests by other client devices. | 2015-03-05 |
20150067093 | Network Distributed File System - A storage pool component is operable on a computing device including a storage medium having an otherwise free storage capacity for forming a portion of a storage capacity of a storage pool and being operably connected across a network to at least one other such component. The component comprises configuration data identifying at least one other computing device to which the computing device may connect across the network; and a directory for identifying file information for files of the storage pool stored on the storage medium, the file information being stored with a degree of redundancy across the computing devices of the storage pool. On instantiation, the component for communicates with at least one other component operating on one of the other computing devices to verify the contents of the directory. The component reconciles file information stored on the storage medium with file information from the remainder of the storage pool. The component then acts as a driver, responsive to an access request for a file stored in the storage pool received across the network from another component of the storage pool, for determining a location of the file on the storage medium from the directory and for accessing the file accordingly. | 2015-03-05 |
20150067094 | MESSAGE MATCHING - Processing a message is disclosed. For each field group applicable to a message from one or more unique field groups of one or more fields identified using one or more content matchers, a compiled message corresponding to the field group applicable to the message is generated. It is determined whether one or more of the compiled messages matches one or more of the one or more content matchers. | 2015-03-05 |
20150067095 | Generating an Idempotent Workflow - Various methods and systems for generating an idempotent workflow are described herein. In one example, a method includes detecting distributed code and identifying a boundary function in the distributed code. The method can also include separating the boundary function into a transition function, a non-idempotent function, and a reversion function. Additionally, the method can include transforming the non-idempotent function into an idempotent function by generating a flag corresponding to the non-idempotent function, wherein the flag indicates if the non-idempotent function has been executed. Furthermore, the method can include combining the transition function, the idempotent function, and the reversion function to form the idempotent workflow. | 2015-03-05 |
20150067096 | REDIRECTING LOCAL STORAGE TO CLOUD STORAGE - One embodiment is directed to a method of providing access to cloud storage performed by a mobile computing device. The method includes (a) receiving a file-level access command to perform a file-level operation on a file of filesystem storage of the mobile computing device, the filesystem storage including remote storage provided by a remote storage platform and locally-cached storage provided by local storage, (b) evaluating whether the file-level access command is directed to a pre-determined portion of the filesystem provided by the remote storage platform, (c) in response to evaluating, if the file-level access command is directed to the pre-determined portion, then performing a synchronization operation to ensure that the file is stored on local storage in synchronization with the remote storage platform, and (d) fulfilling the file-level access command by accessing the local storage once the file is stored on local storage in synchronization with the remote storage platform. | 2015-03-05 |
20150067097 | MANAGING DATA DISTRIBUTION TO NETWORKED CLIENT COMPUTING DEVICES - A method for managing data distribution within a networked computing environment, the method including receiving one or more tasks and associated task priorities. The method includes determining a current resource allocation for a plurality of computing devices within the networked computing environment. The method includes determining, based, at least in part, on the received task priorities and the current resource allocation, at least one of the plurality of computing devices to assign as a source computing device, and sending at least one of the one or more tasks to the at least one source computing device. | 2015-03-05 |
20150067098 | ELECTRONIC DEVICE AND METHOD FOR UPDATING ACCESSORY INFORMATION - An operating method of an electronic device and the electronic device are provided. The method includes detecting that a first accessory is located within a predetermined distance from the electronic device; determining whether address information stored in the first accessory corresponds to address information stored in the electronic device; and transmitting, to the first accessory, in response to a determination that the address information stored in the first accessory does not correspond to the address information stored in the electronic device, the address information stored in the electronic device. | 2015-03-05 |
20150067099 | TRANSFERRING USER SETTINGS FROM ONE DEVICE TO ANOTHER - A cloud-based computer system changes the modern paradigm from being device-centric to being person-centric. The system makes all user data, settings, and licensed content for a user available in the cloud. This allows transferring user settings from a first device to a second device that is of the same type. A conversion mechanism also allows converting user settings for a first device to corresponding user settings for a second device that is of a different type. In addition to transferring user settings from the cloud, the user settings for the first device can be transferred to an external memory device, which may then be removed and connected to a second device, which can then use the user settings on the external memory device to program the second device. | 2015-03-05 |
20150067100 | DISPERSED STORAGE BASED ON RANGE AVAILABILITY AND METHODS FOR USE THEREWITH - A dispersed storage and task (DST) processing unit receives a data access request corresponding to a data segment. Range availability information is obtained for a plurality of DST execution units of the DST network. A subset of the plurality of DST execution units is selected based on the range availability information and a threshold number corresponding to the data access request. Execution unit access requests are generated and sent to the subset of the plurality of DST execution units corresponding to a plurality of slices of the data segment, wherein the execution unit access requests include address information that is based on the range availability information. | 2015-03-05 |
20150067101 | DISPERSED STORAGE BASED ON ESTIMATED LIFE AND METHODS FOR USE THEREWITH - A dispersed storage and task (DST) processing unit receives a data access request. An estimated end of life is determined for a plurality of DST execution units. A subset of the plurality of DST execution units is selected, based on a threshold number associated with the data access request and further based on the estimated end of life for the subset of the plurality of DST execution units. The data access request is executed via the subset of the plurality of DST execution units. | 2015-03-05 |
20150067102 | SYSTEM FOR PROVIDING EVENT-RELATED CONTENTS TO USERS ATTENDING AN EVENT AND HAVING RESPECTIVE USER TERMINALS - The present invention provides a system for providing event-related contents to users attending an event, comprising: a set of cameras ( | 2015-03-05 |
20150067103 | Media processing system automatically offering access to newly available media in a media exchange network - A method and system for communication of information in a distributed media network includes receiving an indication of the availability of new media in the media network. A first device of a first user in the media network attempts to predict whether the new media will likely be selected at a future time by the first user, and if so, selectively retrieves the new media for a possible future playback of the new media by the first user. | 2015-03-05 |
20150067104 | SECURE ONE-WAY INTERFACE FOR ARCHESTRA DATA TRANSFER - A system for transmitting ArchestrA information from a first network in a first security domain to a second network in a second security domain. A first stand-alone server within the first security domain retrieves information via the first network from a first ArchestrA Galaxy and/or from a first historian in the first security domain and forwards the retrieved information to a send server coupled to the first network. The send server forwards the received information received to a receive server via a one-way data link. The receive server receives the information from the send server and forwards the received information to a second stand-alone server via the second network. The second stand-alone server receives the information from the receive server and forwards the information to a second ArchestrA Galaxy and/or to a second historian in the second security domain. | 2015-03-05 |
20150067105 | HTTP STREAMING CLIENT ADAPTATION ALGORITHM BASED ON PROPORTIONAL-INTEGRAL CONTROL - In one embodiment, an HTTP streaming session may be initiated at a client device in a network. The client device may have a buffer and may be configured to request and receive one or more data segments over HTTP from an HTTP server. A first data segment at a first data source rate may be requested and subsequently received. The first data segment may be stored in the buffer. A second data source rate may then be calculated based on a storage level in the buffer, and a second data segment at the second data source rate may be requested. | 2015-03-05 |
20150067106 | Graphical Indicator Of Presence, Identity, And Action For Media Sharing On A Display - A method for graphically indicating presence, identity, and action with respect to a media post transmitted by a client device and displayed on a shared display. Metadata indicating the identity of a user is logically associated with visual media to form a media stream, which is transmitted to the shared display. The transmitted media stream is then decoded to recover the transmitted metadata. The media post is displayed on the shared display and the presence of a client device media stream, the identity of the current user of the device generating the stream, and an action associated with the user interaction with the client device, is then graphically indicated on the display, using the recovered metadata. | 2015-03-05 |
20150067107 | Selectively Providing Local and Remote Services to Wireless Communication Devices - An occurrence of a particular event related to a local radio access network may be detected. The local radio access network may be configured to provide wireless service to WCDs. Possibly in response to the occurrence of the particular event, a local content server device or a remote content server device may be selected. At least some transactions involving a particular WCD served by the local radio access network may be routed between the particular WCD and the selected content server device. The local content server device may contain at least some content that is also contained by the remote content server device. | 2015-03-05 |
20150067108 | DATA RATE CONTROL OF INDIVIDUAL DATA STREAMS IN A NETWORK DEVICE - A method includes receiving data stream packets on respective ones of data channels. The data stream packets of each respective data channel contain an input data stream. The method includes storing the data stream packets for each of the data channels in one or more packet buffers associated with the respective data channel. For each of the data channels, the method includes determining if a timing maturity event of a corresponding input data stream has occurred. The method includes outputting one or more of the stored data stream packets from the packet buffers associated with the respective data channel to generate a transmission packet if the timing maturity event of the corresponding input data stream has occurred. The stored data stream packets for generating consecutive transmissions packets may be output at a data rate based on a distance between timing maturity event occurrences of the corresponding input data stream. | 2015-03-05 |
20150067109 | METHOD FOR PROCESSING SHARED FILE AND CLOUD STORAGE SERVER - The present invention provides a method for processing a shared file and a cloud storage server. The method comprises: receiving, by a cloud storage server, an update request message from a second client; determining that a first file is located within a storage region of a first client according to an identifier of the first file and acquiring current version information of the first file from the storage region of the first client; and if it is determined that the version of the first file on the second client is older than the version of the first file within the storage region of the first client, generating a first download address and transmitting the first download address to the second client, so that the second client downloads the first file in the current version. According to an embodiment of the present invention, it is able to synchronously update the shared file. | 2015-03-05 |
20150067110 | Media Playing Method, Apparatus, and System - A media playing method is provided. The method includes separately sending a connection preparation message to a media server and at least one media renderer that supports multicast, so as to instruct the media server and each media renderer to configure a multicast protocol address according to the connection preparation message; and sending a media transport identifier and a play message to the media server, so as to instruct the media server to transmit, on the multicast protocol address according to the play message, a media stream of a to-be-played media file identified by the media transport identifier, so that each media renderer receives the media stream on the multicast protocol address and plays the to-be-played media file locally. | 2015-03-05 |
20150067111 | PROVIDING ENHANCED DATA RETRIEVAL FROM REMOTE LOCATIONS - Techniques are described for providing client computing nodes with enhanced access to data from remote locations, such as by providing and using local capabilities specific to the remote locations. In at least some situations, the access of a client computing node to data from a remote location may be enhanced by automatically performing activities local to the client computing node that improve the efficiency of communications sent between the client computing node and the remote location. As one example, access to data from a remote service may be enhanced by locally performing activities specific to the remote service, such as by using information about the remote service's internal mechanisms to cause the desired data to be provided from internal storage devices of the remote service without passing through front-end or other intermediate devices of the remote service while traveling to the client computing node. | 2015-03-05 |
20150067112 | SYSTEM AND METHOD FOR NETWORK ADDRESS ADMINISTRATION AND MANAGEMENT IN FEDERATED CLOUD COMPUTING NETWORKS - Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (NICs) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks. The local cloud network and the remote cloud network are then configured to send packets with unclaimed network address to the associated registered NICs. A layer-2 (L2) network tunnel including a data channel and a control channel is then formed between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network. Network address allocation, administration and management in the federated cloud computing networks are then performed using the formed L2 network tunnel. | 2015-03-05 |
20150067113 | ADAPTIVE NETWORK CONTROL SYSTEM AND METHOD THEREOF - A centralized configuration controlling system for configuring network devices is provided. The centralized configuration controlling system includes a retrieval component for retrieving configuration data, and operating parameters related to performance of a plurality of network devices in a network. The centralized configuration controlling system includes a processing component for processing retrieved operating parameters of the plurality of network devices based upon predefined rules to generate revised configuration data for the plurality of network devices. The centralized configuration controlling system includes a configuration component for configuring the plurality of network devices based upon the revised configuration data. | 2015-03-05 |
20150067114 | SYSTEMS AND METHODS FOR RESOLVING DATA INCONSISTENCIES BETWEEN DOMAIN NAME SYSTEMS - In one aspect, a computer-implemented method for managing Domain Name System (DNS) information is provided. The method uses a computing device having a processor and a memory. The method includes receiving, in the memory, source DNS data from a plurality of DNS systems including at least first source data from a first source system and second source data from a second source system. The method also includes identifying, by the processor, an inconsistency between the first source data and the second source data. The inconsistency includes an inconsistency type. The method further includes determining a solution to the inconsistency by applying one or more rules from a plurality of inconsistency rules based at least in part on the inconsistency type associated with the inconsistency. The method also includes resolving the inconsistency using the determined solution including generating resultant DNS data. | 2015-03-05 |
20150067115 | METHOD OF PROVIDING A MOBILITY SERVICE - A method comprising running an application on user equipment; providing a mobility service; using a packet switched connection when said mobility service is unavailable; and using said mobility service when said mobility service becomes available. | 2015-03-05 |
20150067116 | SYSTEMS AND METHODS FOR LOCATION-BASED WEB COOKIES - A communication device may have a set of web cookies designated for a specific location. When the communication device enters the specific location, the set of web cookies, which are designated for the specific location, may be used to customize a web page displayed at the communication device. When the communication device exits the specific location, the set of web cookies, which are designated for the specific location, may be inactivated. Different sets of web cookies may be designated for different locations. For example, a set of web cookies may be designated for home and another set of web cookies may be designated for work. The communication device may activate an appropriate set of web cookies based on the location of the communication device. | 2015-03-05 |
20150067117 | SYSTEM AND METHOD FOR ADVERTISEMENT OF SLA ATTRIBUTES OF A SERVICE AND THE TEST CAPABILITY OF THE ENDPOINT DEVICE - A system comprises a first endpoint device; and a second endpoint device coupled to the first endpoint device over a service provider network. The first endpoint device is configured to insert a Service Level Agreement (SLA) Type Length Value (TLV) element into a Protocol Data unit (PDU) to form an enhanced PDU, the first endpoint device further configured to transmit the enhanced PDU to the second endpoint device. The SLA TLV element includes fields for at least one of service configuration information and test capability information of the first endpoint device. | 2015-03-05 |
20150067118 | ANONYMOUS CROSS-DEVICE LINKING USING TEMPORAL IDENTIFIERS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, including a method for providing content. Login credentials provided by a user are received when communicating through a first user device, and a temporal identifier is created for the user and provided to the first user device. Prior to expiration of the temporary key, login credentials provided by the user on a second different user device are received. The temporal identifier is re-created for the user and provided to the second different user device. A first request is received from the first or second different user device. The temporal identifier is stored and an identifier associated with the device. A second request is received from the other device. A device identifier for the first and second different user device are linked in association with the temporal identifier. The linking is used to respond to the second request. | 2015-03-05 |
20150067119 | Dynamic Programming and Control of Networked Sensors and Microcontrollers - A network of sensor and controller nodes having the ability to be dynamically programmed and receive updated software from one another, and from a host system. Each network node includes multiple state machines, at least some of which are operable relative to physical pins at the network node; the physical pins correspond to inputs from sensor functions or outputs to control functions. The network nodes include microcontrollers that are operable in an operating mode to execute a state machine and respond to commands from other nodes or the host, and in a read mode to receive and store program instructions transmitted from other nodes or the host. A learn mode is also provided, by way of which a network node can store program code corresponding to instructions and actions at the node when under user control. | 2015-03-05 |
20150067120 | METHOD FOR DOUBLE IP ADDRESS RECOVERY - A computer-implemented method, computer program product, and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a network, and the double IP address recovery resolves the double IP address. In the invention, the hosts exchanges rules and system state information. Each of the hosts determines its own action of the double IP address recovery based on the same rules and the system state information of the different hosts. Each of the hosts executes its own action, either to continue or to alter an IP address. | 2015-03-05 |
20150067121 | Policy driven auto-transitioning framework for governed objects in service registries - A method for automated policy-driven transitioning of governed objects in a service registry is provided. The method includes receiving a request in a service registry executing in memory of a host server computing system to persist a governed object of a service registry. The method also includes identifying a policy to be applied to the governed object in response to the receipt of the request. The method yet further includes applying the policy to the governed object and determining whether or not the application of the policy has been successful. Finally, the method includes triggering a transition of the governed object from a contemporaneous state to a new state in the service registry if the application of the policy has been successful. In this way, governed objects of the service registry can be transitioned from one state to the other driven by policies in an automated way. | 2015-03-05 |
20150067122 | METHOD FOR DOUBLE IP ADDRESS RECOVERY - A computer program product and computer system for double IP address recovery. Double IP address is a situation of a same IP address for different hosts in a network, and the double IP address recovery resolves the double IP address. In the invention, the hosts exchanges rules and system state information. Each of the hosts determines its own action of the double IP address recovery based on the same rules and the system state information of the different hosts. Each of the hosts executes its own action, either to continue or to alter an IP address. | 2015-03-05 |
20150067123 | Engine Architecture for Processing Finite Automata - An engine architecture for processing finite automata includes a hyper non-deterministic automata (HNA) processor specialized for non-deterministic finite automata (NFA) processing. The HNA processor includes a plurality of super-clusters and an HNA scheduler. Each super-cluster includes a plurality of clusters. Each cluster of the plurality of clusters includes a plurality of HNA processing units (HPUs). A corresponding plurality of HPUs of a corresponding plurality of clusters of at least one selected super-cluster is available as a resource pool of HPUs to the HNA scheduler for assignment of at least one HNA instruction to enable acceleration of a match of at least one regular expression pattern in an input stream received from a network. | 2015-03-05 |
20150067124 | APPLICATION SERVICE MANAGEMENT DEVICE AND APPLICATION SERVICE MANAGEMENT METHOD - An application service management method includes: receiving a creation request from one user group, the creation request comprises an identity of the user group. Creating an application cluster associating with the identity of the user group and assign a group account associating with the application cluster and the identity of the user group for the user group. Generating an administrator account according to the group account. Providing at least one application service item list each comprises a plurality of selectable application service items. In addition, producing a register request in response to an operation of selecting the application service item to an application service provider to register in the application service provider, and adding the selected application service item to the application cluster if registered in the application service provider successfully. | 2015-03-05 |
20150067125 | METHOD AND APPARATUS FOR INTEGRATING NETWORKING, COMPUTE, AND STORAGE SERVICES THROUGH CATALOG MANAGEMENT FOR A SOFTWARE DEFINED CLOUD - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067126 | METHOD AND APPARATUS FOR MULTI-TENANT SERVICE CATALOG FOR A SOFTWARE DEFINED CLOUD - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067127 | METHOD AND APPARATUS FOR MULTI-CLIENT SERVICE CATALOG FOR A SOFTWARE DEFINED CLOUD - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067128 | METHOD AND APPARRATUS FOR DYNAMIC DETERMINATION OF QUOTAS FOR SOFTWARE DEFINED CLOUD CATALOG SERVICES - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067129 | APPARATUS, SYSTEM, AND METHOD OF MANAGING DEVICE, AND RECORDING MEDIUM STORING DEVICE MANAGEMENT PROGRAM - In response to a request for reproducing one or more devices in a first area, one or more devices in a second area are caused to reproduce connections and roles of the one or more devices in the first area, as determined based on usage information indicating use of the one or more devices in the first area and device information for the one or more devices in the second area. | 2015-03-05 |
20150067130 | METHOD AND APPARATUS FOR CREATING SOFTWARE DEFINED CLOUD COLLISION DOMAIN NETWORKS USING A tELASTIC CONTROLLER - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private.. | 2015-03-05 |
20150067131 | METHOD AND APPARATUS FOR DISPLAYING LOGICAL VIEWS OF COLLISION DOMAIN NETWORKS - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067132 | METHOD AND APPARATUS FOR DYNAMIC SELF-ADAPTING LAYER-2 STRETCH - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |
20150067133 | MANAGING MULTIPLE IP ADDRESS MANAGEMENT SYSTEMS - Managing multiple IP address management systems is provided. In some embodiments, managing multiple IP address management systems includes providing an IP address management (IPAM) manager system for receiving a configuration command to manage a first IP address management system; receiving a configuration command to manage a second IP address management system; receiving a join request from the first IP address management system; and receiving a join request from the second IP address management system, in which the IP address management manager system is in communication with the first IP address management system and the second IP address management system for managing each of the first IP address management system and the second IP address management system. | 2015-03-05 |
20150067134 | GAIN TO GAIN NETWORK FOR AIRCRAFT GALLEY SYSTEM - An aircraft galley system is configured with a GAIN to GAIN network that allows for data exchange and communication between each GAIN on the system. By omitting reliance on a galley network controller for acquisition of GAIN data, the present system is simpler, lighter, and more cost-effective. Each GAIN may be polled for data by any other GAIN, such as via a data port, dedicated bus, or wireless connection. The data acquisition between the GAIN and a data collection and display device may be wired in network, wired out of network, or through a wireless link such as a Wi-Fi network. | 2015-03-05 |
20150067135 | MEMBER-ORIENTED HYBRID CLOUD OPERATING SYSTEM ARCHITECTURE AND COMMUNICATION METHOD THEREOF - A member-oriented hybrid cloud operating system architecture and a communication method thereof are provided. A hybrid architecture is established based on layer, object and message models, and a member-oriented idea is applied to manage constituent members and a processing environment thereof. On this basis, high-efficient routing, read-write separation and load balancing are performed on a member processing cluster, satisfying the requirements of being open and compatible, loosely coupled and extensible of a cloud operating system, and solving the self-management problem, the horizontal scaling problem of members and the high-availability problem of stateful members of the existing cloud operating system. | 2015-03-05 |
20150067136 | Rapid and Precise Methodology for Massive Small Cell Deployment - Small cell deployment may be provided. First, access point data may be captured by a technician device from an access point. Next, the access point data may be transmitted from the technician device to a backend server. The technician device may then receive post-check results corresponding to the access point from the backend server. The post-check results may be based on the transmitted access point data. | 2015-03-05 |
20150067137 | REDUCING BUFFER BLOAT WHILE PROBING FOR ADDITIONAL BANDWIDTH IN AN ADAPTIVE BITRATE NETWORK - In one embodiment, a device receives data from a network at a TCP buffer at a selected data rate, and copies the data from the TCP buffer to a decoder buffer at a reading rate. Once decreasing the reading rate to decrease a level of the decoder buffer, the device may increase the reading rate to an upshift probe rate, and monitors a TCP buffer level during reading at the upshift probe rate to determine whether the network can support the upshift probe rate. If the TCP buffer level decreases to a lower threshold during the upshift probe rate, the device returns to read data from the TCP buffer by the decoder buffer at the reading rate. If the TCP buffer level stays above the lower threshold during the upshift probe rate, the device may trigger a corresponding upshift in a send rate from a sender of the data. | 2015-03-05 |
20150067138 | OPTIMIZE DATA EXCHANGE FOR MVC-BASED WEB APPLICATIONS - Embodiments of the present invention disclose a method, computer program product, and system for reducing network traffic. In one embodiment, a computer determines that a webpage has changed and that an amount of data to be transmitted to update the portion of the webpage that has changed is smaller than an amount of data to be transmitted to update the entire webpage. | 2015-03-05 |
20150067139 | AGENTLESS MONITORING OF COMPUTER SYSTEMS - An agentless monitor may monitor a remote server through a communication session. The monitor may transmit commands for execution on the remote server by a simulated user. Results from the executed commands may be returned to the agentless monitor for parsing and execution of logical rules. The agentless monitor may be used, for example, to identify and terminate looping processes executing on the remote server before failure or performance degradation of the remote server. | 2015-03-05 |
20150067140 | PREDICTING SERVICE DELIVERY METRICS USING SYSTEM PERFORMANCE DATA - A method for predicting a computerized service delivery organization workload including collecting data of a computer implementing service delivery routine including overlapping samples of load values, overlapping samples of performance values, overlapping samples of event outputs, ticket values and ticket volumes, building a first correlation of said load values with said performance values for predicting new performance values based on new data, building a second correlation of said performance values with said event outputs, said ticket values and said ticket volumes, combining said first and second correlations into a third correlation for correlating said load values with a ticket volume and an event volume, and determining at least one projected event volume or projected ticket volume value using said third correlation and at least one projected load value of said computer. | 2015-03-05 |
20150067141 | ANALYTICAL DEVICE CONTROL SYSTEM - Analytical device control servers transmit analytical parameter information and analysis data concerning the analysis being controlled to a system control server at a predetermined time interval. When the system control server detects a fault in an analytical device control server, the system control server determines a new assignment destination from among other normally functioning analytical device control servers, transmits analytical parameter information and analysis data saved in an analysis information storage unit to the assignment destination analytical device control server, and transmits a command to continue execution of control of analysis of the analytical device to that analytical device control server. | 2015-03-05 |
20150067142 | AGGREGATION OF METRICS FOR TRACKING ELECTRONIC COMPUTING RESOURCES BASED ON USER CLASS HIERARCHY - An improved technique involves collecting data from a hosting environment that provides access to electronic computing resources and computing aggregated metrics from the data for a particular level of a user class hierarchy by aggregating metric values collected for subordinate levels of the user class hierarchy. Along these lines, a tracking server, upon receiving resource usage data, arranges the data in entries having values of metrics that describe some attribute related to resource usage and pertaining to a user class hierarchy. For a given level of the user class hierarchy, the tracking server performs an aggregation operation (e.g., a summation) of metric values over entries pertaining to subordinate levels of the user class hierarchy. The tracking server stores the result of the aggregation operation in an aggregation table for future report generation. | 2015-03-05 |
20150067143 | SYSTEM FOR VIRTUAL MACHINE RISK MONITORING - A virtual machine may allow execution of applications decoupled from physical hardware. The virtual machine may be executed by the physical hardware in a data center. A system can monitor and assess performance and reliability of the virtual machine based on device records of network components of the data center that are supporting operation of the virtual machine. | 2015-03-05 |
20150067144 | Method and System for Detecting Network Printers without Prior Knowledge of Network Topology - In one example, we describe a method and system for detecting network printers without any knowledge of the network topology. Discovery (our solution) uses three different utilities: Discover Computers runs on a domain attached computer, with a domain user account. It queries AD (Directory Services) and gets lists of users, groups, and computers. The computer list is then used by Discover Ranges. Discover Ranges uses Computers.txt and queries the DNS for the IP addresses. It builds a list of IP addresses used by Discover Printers. Discover Printers uses IPRanges.csv, and with 40 threads, opens port 9100 on each IP address. When successful, it then requests web page(s) to determine manufacturer and model for each device. The end result is UnivDriverlmport.csv, which is directly importable into the Universal PS Driver Wizard in the output management module. Other details and variations are also presented here. | 2015-03-05 |
20150067145 | DATA RATE MONITORING TO DETERMINE CHANNEL FAILURE - Data channels of a computer system may be remotely monitored to detect data channel degradation. A monitoring agent on a client may execute script commands on the remote computer system to monitor input/output (I/O) rates of a set of channels. The monitoring agent may compute an average data rate of the data channels and compare the I/O rate of each channel to the average. When the rate of a channel falls below the average by at least a threshold amount, an alert may be generated to indicate to an administrator a possible failure with the data channel. | 2015-03-05 |
20150067146 | CUSTOM CORRELATION OF A DISTRIBUTED BUSINESS TRANSACTION - A mechanism is provided for customizing communication of correlation data between servers using a custom or proprietary communication protocol. The system may modify a payload transmitted between servers to include monitoring parameters. The payload may be modified by expanding a portion of the payload or otherwise inserting data into the payload. The portion may include a header, footer, an additional property, a field, or other portion of the header. A mechanism may detect both outgoing calls and incoming requests to either modify the request with the payload or retrieve the payload from the request. The configuration preferences received from a user may be used to process the detected calls and modify a payload at a designed portion suitable to be expanded. Once sent, the configuration parameters may be used by a recipient server to detect the request with the modified payload and retrieve the monitoring parameter. The monitoring parameter may be used to correlate distributed transactions that occur over a set of servers which communicate with non-standard protocols. | 2015-03-05 |
20150067147 | GROUP SERVER PERFORMANCE CORRECTION VIA ACTIONS TO SERVER SUBSET - Business transactions and the nodes processing the transactions are monitored and actions are applied to one or more nodes when a performance issue is detected. A performance issue may relate to a metric associated with a transaction or node that processes the transaction. If a performance metric determined from data captured by monitoring does not satisfy a health rule, the policy determines which action should be performed to correct the performance of the node. When a problem is detected for multiple nodes, the present technology may address a subset of the multiple nodes rather than apply an action to each node experiencing the problem. When a solution is found to correct the problem with the subset of nodes, the solution may be applied to the other nodes experiencing the same problem. | 2015-03-05 |
20150067148 | AUTOMOTIVE OPEN SYSTEM ARCHITECTURE (AUTOSAR)-BASED COMMUNICATION METHOD AND COMMUNICATION APPARATUS THEREOF - An Automotive Open System Architecture (AUTOSAR)-based communication method and communication apparatus. According to an exemplary embodiment, the AUTOSAR-based communication method may filter input data, using a data range filter, a first valid data filter, or a second valid data filter, in order to decrease the length of an interrupt operation, and improve processing speed of an overall application system. | 2015-03-05 |
20150067149 | RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules. | 2015-03-05 |
20150067150 | SYSTEMS AND METHODS FOR PROACTIVE MEDIA DATA SHARING - In some embodiments, a computer implemented method, a system, and/or a non-transitory computer readable medium can receive an actionable rule that represents user intent to share media data. The actionable rule can be analyzed to determine a set of conditions and a set of actions included in the actionable rule. The actionable rule, including the set of conditions and the set of actions, can be stored in a rule database. Context data can be acquired from a context database. Whether or not the set of conditions is satisfied based on the acquired context data can be determined. The set of actions can be executed when the set of conditions is satisfied based on the acquired context data. In some cases, executing the set of actions can include, at least in part, initiating a sharing of the media data with at least one target system. | 2015-03-05 |
20150067151 | SYSTEM AND METHOD FOR GATHERING AND DISPLAYING DATA IN AN ITEM COUNTING PROCESS - Methods and systems for providing information about production lines in a process environments are provided. In one embodiment, a method for providing a notification of a production line status includes receiving a status indication of a production line from a tracker associated with the production line. The method further includes transmitting the status indication from the tracker to a server. Finally, the method includes transmitting the notification from the server to a client device, wherein the notification comprises the status indication. | 2015-03-05 |
20150067152 | MONITORING SYSTEM, SYSTEM, AND MONITORING METHOD - A monitoring system includes an access unit, an access result analyzer, a creator, and an output unit. Based on access data that defines an order of one or more access processes necessary for receiving a service and access information used in the respective access processes, the access unit accesses a service providing system that provides the service and acquires access results of the respective access processes. The access result analyzer analyzes the access results and generates access result information on the respective access processes. Based on the pieces of access result information, the creator creates a report on whether the service is capable of being provided. The output unit outputs the report. | 2015-03-05 |
20150067153 | REMOTE MONITORING OF DATA FACILITY IN REAL-TIME USING WIRELESS SENSOR NETWORK - A method of monitoring a status of one or more computing devices in a computing system environment includes deploying a sensor network including a plurality of sensors to monitor multiple operating parameters of one or more computing devices of said computing system environment, each sensor being associated with one of said one or more computing devices. A base station computing device collects operating parameter data for the computing devices and analyzes the operating parameter data to (a) predict a failure of said one or more computing devices and/or (b) identify a fault condition of said one or more computing devices. Computing device operating parameters monitored include one or more of an operating temperature, a vibration, a cooling air flow rate, and a battery charge level. Monitoring systems for use in the method are disclosed. | 2015-03-05 |
20150067154 | Internet of Things Event Management Systems and Methods - Internet of Things (IoT) event objects can be tailored to specific device types and capabilities. An IoT event object can use a flexible definition of an event that can be reconfigured. An IoT event object allows for the ability to set different triggering conditions and priorities. Individual event definitions can be extended to create more complex events. A Notification Handler supports sending a request or command in response to an event that requires action. | 2015-03-05 |
20150067155 | SYSTEMS AND METHODS FOR MEASURING APPROXIMATE ENGAGEMENT OF USERS IN A SOFTWARE APPLICATION - Methods and systems are provided for measuring user engagement with an application. Heartbeat messages are sent from the application being monitored on a mobile computing device to a tracking server. Heartbeat messages may be stored on the mobile computing device for later transmission to the tracking server in situations where network connectivity is unavailable. A user session record is stored by the tracking server, and is closed upon a failure to receive a heartbeat message before a timeout interval elapses. A closed user session record may be reopened upon receiving a subsequent heartbeat message associated with the formerly closed user session. | 2015-03-05 |
20150067156 | METHOD AND APPARATUS FOR CREATING INTER DATACENTER COLLISION DOMAIN NETWORK STRETCH - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 2015-03-05 |