12th week of 2015 patent applcation highlights part 70 |
Patent application number | Title | Published |
20150081776 | METHOD AND SYSTEM FOR ESTABLISHING INTEGRATED GROUP ISC SESSION BASED ON CONTENT INTEREST - A method and system for establishing an integrated group Immersive Social Centre (ISC) session for a content viewing and a communication by an ISC server to deliver contents associated with a content interest is disclosed. The group ISC session is established for a pre-defined group created with members indicating interest in the group ISC session initiated by an initiator ISC client. The method allows the ISC server to receive the content interest from an initiator ISC client. Further, the members of the pre-defined group can schedule time for the integrated group ISC session. The content interest received from the initiator ISC client is selected by the ISC user of the initiator ISC client from a personalized contents list, based on static preference or on demand preference of the ISC user, sent by the ISC server or an ISC XML Document Server (XDMS). | 2015-03-19 |
20150081777 | DYNAMIC CONTENT AGGREGATION - Methods, systems, and devices for dynamically aggregating content, especially digital content, are described. These include tools and techniques for automatically creating a unique package that tells a user-specific story about memorable life events. Electronic media files such as photographs, videos, and the like, of a user may be captured and linked to a unique identifier. The electronic media files may be transmitted to a central server where they may be aggregated and utilized to generate a multimedia file for user. The multimedia file may include electronic media files captured at disparate locations and times, and it may include stock content, user-generated content, third-party content, and the like. Users may access archived stories (e.g., multimedia files) in a virtual bookshelf Third-parties may be compensated for their content that is provided to a user. | 2015-03-19 |
20150081778 | WEB ACCESS USING CROSS-DOMAIN COOKIES - Disclosed is a method and a system for web access using cross-domain cookie. The method uses a cookie server to generate a public cookie which uniquely identifies a client and is adapted for the client to access multiple operator servers that are recognized by the public cookie. When an operator server receives an access request from the client without a valid public cookie recognizing the operator server, it redirects the access request to the cookie server, which generates a public cookie, redirects the access request back to the operator server and passes along the public cookie. The operator server then writes the public cookie into the client and binds itself with the public cookie. A public cookie may include a group of related cookies identifying the common client that are generated this way to allow the same client's activities to be tracked by different operator servers having different domain names over the Internet. | 2015-03-19 |
20150081779 | Predictive, Multi-Layer Caching Architectures - Predictive, multi-layer caching architectures may be used to predict which elements a user is most likely to navigate to within a collection of elements associated with a predefined layout and, in response, to increase the accessibility of these elements to a client device of the user. For instance, the techniques may utilize a predictive, multi-layer caching architecture for storing these predicted elements to decrease the latency to render these images if the user navigates within the collection of elements in the predicted manner. The collection of elements may comprise images (e.g., a 3D model, a map, etc.), video files, audio files, text files, or any other type of file that is consumable on a client device. | 2015-03-19 |
20150081780 | METHODS AND SYSTEMS FOR APPLICATION CONTROLLED PRE-FETCH - Systems and methods for application controlled pre-fetch are described. One method is for receiving pre-fetch information, over a network, at a first load balancer. The pre-fetch information is received from a first server. The pre-fetch information includes a first element identifier. The method is further for retrieving a first element by communicating a message to a second server, the message including the first element identifier. | 2015-03-19 |
20150081781 | METHOD AND SYSTEM FOR INTERFACE CONFIGURATION VIA DEVICE-SIDE SCRIPTING - A technique is provided for configuring an interface device. The interface device includes a plurality of device elements, such as objects configured in accordance with object-oriented programming concepts. A query from a general purpose viewer is received by the interface device, such as originating from a configuration station where the general purpose viewer is operative. The query is interpreted by server-side scripting executed in the interface device to identify the device elements and to display visual representations of the device elements in a design-time environment. The design-time environment and the visual representations are then transmitted to a configuration station. The device elements, their properties and functionalities may be altered by means of the design-time environment and the server-side scripting to create interface screens, alter device elements and their properties and functions, and so forth. | 2015-03-19 |
20150081782 | METHOD OF AUTONOMIC REPRESENTATIVE SELECTION IN LOCAL AREA NETWORKS - A method and apparatus for selecting a client computer as a relay server to rebroadcast common application information that is broadcast from a server system over a network. The client computer is selected randomly to rebroadcast the User Datagram Protocol (UDP) information received from the server system and client computers receiving the UDP information from another client computer relay server on the network do not rebroadcast the information. If the client computer selected to rebroadcast the common information fails to rebroadcast, another client computer is randomly selected as a relay server and takes over rebroadcasting the common information. | 2015-03-19 |
20150081783 | MEDIA SHARING TECHNIQUES - Improved techniques for media item sharing are described. In one embodiment, for example, an apparatus may comprise a classification module to assign a media item to a content category, a correlation module to determine context information for the media item, and an estimation module to determine a set of relevance values for a set of contacts based at least in part on a sharing history and to generate a set of suggested recipients for the media item based at least in part on the set of relevance values and the set of contacts. Other embodiments are described and claimed. | 2015-03-19 |
20150081784 | INTEROPERABLE SOCIAL SERVICES - In a method for utilizing multiple social computing services of a user, a processor accesses a first networking service of a user and a second networking service of the user, wherein the first networking service includes a first group of contacts connected with the user and the second networking service includes a second group of contacts connected with the user. A processor retrieves the first group from the first networking service and the second group from the second networking service. A processor creates a set of contacts, wherein the set of contacts includes each contact of the first group of contacts with a corresponding link to information about that contact, and each contact of the second group of contacts with a corresponding link to information about that contact, and wherein a contact of the set of contacts has an associated relationship, established externally from either networking service, with the user. | 2015-03-19 |
20150081785 | DISTRIBUTED EVENTS IN AN ACCESS CONTROL SYSTEM - A method disclosed may include storing event data in a physical access control system originating from a first device of a plurality of security devices in a first data area of a memory. The method may include storing event data originating from devices other than the first device in a second data area. The method may include removing the event data from the first data area to prevent the first data area from occupying more than a first memory space and removing the event data from the second data area to prevent the second data area from occupying more than a second memory space. The method may include distributing the event data from the first data area to the other devices through a network interface. | 2015-03-19 |
20150081786 | EVENT NOTIFICATION - A technique for user notification involves receiving an event notification related to an event associated with user notification by a user; providing the event notification from a stored array to a process executed by a processor; using the event notification as a first title used for the process; providing a second title from the stored array to the process; and using the second title to identify the process to the user. | 2015-03-19 |
20150081787 | SYSTEM AND METHOD FOR TAGGING IMAGES IN A SOCIAL NETWORK - A method for tagging images in a social network is provided. The method may include enabling a capture of an image associated with an online group discussion. The method may further include allowing an automatic tagging of the image associated with the online group discussion, the image including a visual representation of a first participant of the online group discussion. The method may also include providing the first participant with an option to indicate whether to approve distribution of the tagged image. The method may also include receiving an indication from the first participant whether to approve the distribution of the tagged image. When the indication from the first participant whether to approve the distribution of the tagged image indicates approval of the distribution, the method may further include distributing the tagged image, based at least in part on the indication of approval of distribution of the tagged image. | 2015-03-19 |
20150081788 | SERVER APPARATUS, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM HAVING INFORMATION PROCESSING PROGRAM STORED THEREIN, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - In an example system, information about a browse action which is a predetermined operation performed, for a content posted by a user, by another user browsing the content, is stored. Next, the display manner for the content is determined based on the browse action information about the content. At this time, the display manner is determined so that the display manner becomes different from a display manner for a content in a normal state. Then, browse source data for displaying the content in the determined display manner is generated. | 2015-03-19 |
20150081789 | APPARATUS, SYSTEM, AND METHOD OF MANAGING DATA, AND RECORDING MEDIUM - A transmission terminal includes: a memory to store, for each one of a plurality of candidate counterpart terminals that the transmission terminal is capable of communicating, address information indicating at least a location of the candidate counterpart terminal on a network; a user interface to receive a user input of address information of a counterpart terminal, and a communication start request that requests to start communication with the counterpart terminal; a processing circuitry to store the address information of the counterpart terminal received at the user interface in the memory, to register the counterpart terminal as a candidate counterpart terminal for the terminal; and a transmitter to send a request to start communication with the counterpart terminal using the address information of the counterpart terminal that is received at the user interface. | 2015-03-19 |
20150081790 | System and Method for Analyzing and Transmitting Social Communication Data - There is provided a system and method for transmitting social communication data across at least one social communication channel. The method is performed by a computing device for communicating social data, comprising: receiving a composed social data object; integrating at least one tracker object within the social data object; transmitting the social data object comprising said tracker object to at least one destination target; obtaining a response from said tracker object indicating target feedback, wherein the target feedback indicates at least one of: subsequent transmission of the social data object to additional destination targets and feedback parameters from at least one of: said at least one destination target and said additional destination targets. | 2015-03-19 |
20150081791 | PRIVATE PHOTO SHARING SYSTEM, METHOD AND NETWORK - The present invention is a photograph sharing process and/or system that allows professional photographers, who photograph weddings or other events where large numbers of photographs containing varying subject, to send photographs in which a subject or individual appears directly to that particular individual. Thus, the photographs are shared only with intended recipients and may be viewed essentially simultaneously or in close proximity to the photographed event | 2015-03-19 |
20150081792 | METHOD AND SYSTEM FOR MAINTAINING CONTACT INFORMATION - The present disclosure relates to communication technologies, and particularly, to a method, apparatus and system for maintaining contact information. The embodiment of the present invention provides a method for maintaining contact information, including: acquiring address book information of a user and authorization settings of the address book information of the user and saving the acquired in an address book server, receiving a subscription request from a subscriber device, and establishing, according to confirmation information from the subscribed-for user regarding the subscription request from the subscriber device, a subscription relation list for a subscribed-for user and subscriber device and updating, by the address book server, address book information of the subscriber device according to a subscription relation and authorization in the subscription relation list when the subscribed-for user modifies the address book information of the subscribed-for user in the address book server. | 2015-03-19 |
20150081793 | IDENTIFY EXPERTS AND INFLUENCERS IN A SOCIAL NETWORK - On embodiment accesses a set of information comprising one or more elements of information relating to a subject matter, wherein the one or more elements of information have been shared among one or more users of a social-networking system; for each element of information, determines a rate of sharing of the element of information among the one or more users and identifies one or more first users who cause the rate of sharing of the element of information to increase; and identifies one or more influencers associated with the subject matter from the one or more first users identified for each element of information. | 2015-03-19 |
20150081794 | Publish/Subscribe Mashups For Social Networks - Described herein is a mashing technology that facilitates mashup creation over a plurality of publish/subscribe social network data stream. These mashing techniques that are tailored to managing content from disparate social networks. As described herein, these techniques include creating and using a set of operations that facilitate the creation of “mashups” over multiple publish/subscribe social network data streams. | 2015-03-19 |
20150081795 | MANAGEMENT APPARATUS, CONTROL METHOD THEREFOR, COMPUTER-READABLE RECORDING MEDIUM, APPLICATION SYSTEM, AND IDENTIFICATION-INFORMATION ASSOCIATING METHOD - A management server issues a game link identifier associated with friend network identification information corresponding to an inviting game and sends the game link identifier to a terminal apparatus corresponding to the friend network identification information. In the terminal apparatus, the game link identifier is passed from the inviting game to an invited game, and the program of the invited game sends the passed game link identifier and identification information of an inviting user, corresponding to the invited game, to the management server. The management server searches already issued game link identifiers, and, when a game link identifier that matches the received game link identifier is found, associates friend network identification information corresponding to the invited game associated with the received game link identifier, with the friend network identification information corresponding to the inviting game associated with the issued game link identifier. | 2015-03-19 |
20150081796 | METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING MEDIA STREAM - Embodiments of the present invention relate to a method, an apparatus and a system for transmitting a media stream. The method is executed by an access terminal, includes: establishing a real-time collaboration channel between the access terminal and a network computer; sending through a first VDI channel to the network computer an operation instruction input by a user; receiving a real-time collaboration message that is sent through the real-time collaboration channel by the network computer; performing, through the network computer, media negotiation with a communication device, so as to determine a media attribute parameter that is used to transmit a media stream between the access terminal and the communication device; and transmitting, by the access terminal, a media stream mutually with the communication device according to the media attribute parameter determined through the media negotiation. | 2015-03-19 |
20150081797 | System and Method for Continuous Social Communication - A system and method are provided for analysing and communicating social data. A method performed by a computing device or server system includes obtaining social data and deriving at least two concepts from the social data. A relationship between the at least two concepts is determined. The method also includes composing a new social data object using the relationship and transmitting the new social data object. User feedback associated with new social data object is obtained, and the computing device or server system computes an adjustment command using the user feedback. Executing the adjustment command adjusts a parameter used in the method. After the adjustment command is executed, the method is repeated. | 2015-03-19 |
20150081798 | PROCESS-BASED INTER-THING COLLABORATION APPARATUS AND METHOD IN WEB OF THINGS ENVIRONMENT - Disclosed herein is a process-based inter-thing collaboration apparatus and method in a Web of Things (WoT) environment, which can perform dynamic collaboration between things in a WoT environment. The presented apparatus includes an inter-thing collaboration design tool unit for designing an Inter-Thing Collaboration Process (ITCP) based on information of things including a device, a service, and a process, and an inter-thing collaboration management unit for dynamically configuring an inter-thing collaboration community based on context information of the things, and executing the ITCP designed by the inter-thing collaboration design tool unit. | 2015-03-19 |
20150081799 | SYSTEM FOR MANAGING ADMINISTRATIVE ELECTRONIC NOTIFICATIONS - The invention relates to a system for managing administrative electronic notifications of a service voluntarily or obligatorily provided to the end users and the authorized intermediaries thereof through web pages created for that purpose, consisting of a served connected via Internet to said web pages and to user terminals, provided with a data base administrator and a web application that make it possible to periodically recover, according to various search criteria, new notifications in the mailbox associated with each user by means of the corresponding digital certificate, processing and generating a report of said notifications and sending it electronically to the user terminal, along with the corresponding documents. The system solves the problem experienced by authorized users, such as handling centers, of having to make daily checks of the electronic mailboxes of the people they represent, and also useful to end users as an advisory service. | 2015-03-19 |
20150081800 | MANAGING MEMBERSHIP IN SOCIAL GROUPINGS OF CONTACTS FOR A PARTICIPANT OF AN E-MAIL CONVERSATION THREAD - Configurations of the subject technology integrate with an online social networking service in order to manage membership of contacts within one or more social circles provided by the online social networking service. In one example, a button or other similar graphical element is provided to provide this functionality in a widget displayed in a user's e-mail application. The widget in one example is displayed in a conversation thread view of a conversation including one or more different e-mails from one or more participants. For a selected participant of the conversation thread, the aforementioned button is initially rendered to provide an indication of the participant's inclusion in one or more of the user's social circles. Selecting or hovering over the aforementioned button further allows the user to add the conversation participant to the user's social circles. | 2015-03-19 |
20150081801 | METHOD AND APPARATUS FOR GENERATING WEB PAGES FOR MEMBERS - The present invention comprises a method and apparatus for generating web pages for members. | 2015-03-19 |
20150081802 | FACILITATING USER COMMUNICATION ABOUT A COMMON TOPIC - Among other things, we describe identifying, in first data available to a first user and not available to a second user, and in second data available to the second user not available to the first user, data pertaining to a common topic, and enabling the first user and the second user to communicate about the common topic based on the identification. | 2015-03-19 |
20150081803 | Recipient Control System for Ensuring Non-Conflicting and Comprehensive Distribution of Digital Information and Method Thereof - A system and method for ensuring an electronic communication sent by a user to one or more recipients is not sent to one or more inappropriate recipients. The system and method controls, monitors, detects and prevents sending of electronic communications to an unintended recipient or recipients. The system and method also controls, monitors, detects and ensures electronic communications are sent to all intended recipients. Based on parameters that identify conditions for an inappropriate recipient, the system and method compares each recipient of an electronic communication with the parameters and stops the sending if an inappropriate recipient exists. A notification is then provided identifying each inappropriate recipient and the parameters that were triggered. Mechanism to override the stopping of the electronic communication may be provided. | 2015-03-19 |
20150081804 | ELECTRONIC NOTIFICATION SYSTEMS AND METHODS - Described are a system and method for electronic notification. A metadata generator adds metadata including data related to a computer-related action to an electronic notification. The electronic notification configured to be received by a plurality of disparate systems. A state processing machine changes a state of the electronic notification according to the metadata. A notification modification module marks the electronic notification having the changed state, wherein the marked electronic notification is received by each of the disparate systems and is processed according to its changed state. | 2015-03-19 |
20150081805 | CONSENSUS LOSS IN DISTRIBUTED CONTROL SYSTEMS - A device may correspond to a physical access controller in a distributed physical access control system. A method, performed by the device in a distributed system, may include detecting that another device in the distributed system has become unavailable; determining that a loss of consensus has occurred in the distributed system based on detecting that the other device has become unavailable; generating a list of available devices in the distributed system; and sending an alarm message to an administrative device, wherein the alarm message indicates the loss of consensus and wherein the alarm message includes the list of available devices. | 2015-03-19 |
20150081806 | Techniques for Requesting Web Conference Recordings Automatically via a Conference Invitation Response - Techniques are presented for recording and delivering content associated with a teleconference meeting. At a server device, a message is sent to a first endpoint device. The message comprises an invitation to join a teleconference meeting. The message also comprises an option for a user at the first endpoint device to respond to the message with a request to record the teleconference meeting. A response message is received from the first endpoint device. The response message contains an indication of whether or not the user will join the teleconference meeting and a request to record the teleconference meeting. A host at a second endpoint device is presented with the request from the user to record the teleconference meeting. | 2015-03-19 |
20150081807 | INITIATING SOCIAL INTERACTION BASED ON E-MAIL CONTENT - Arrangements described herein relate to initiating social interaction based on e-mail content. Information associated with an e-mail being composed by a user can be analyzed to determine whether content of the e-mail is appropriate for incorporation into at least one social system. Responsive to determining that the content of the e-mail is appropriate for incorporation into at least one social system, a first option to enter the content of the e-mail in a first social system and a second option to enter the content of the e-mail in a second social system can be presented to the user. Responsive to the user selecting to enter the content of the e-mail in the first social system, a first entry in the first social system can be automatically created. The first entry can include the content of the e-mail composed by the user. | 2015-03-19 |
20150081808 | EMAIL WEBCLIENT AUTOMATIC FAILOVER - An attachment received from a webclient for a message in composition can be saved by an HTTP server in a storage system. Location information for the attachment can be stored in a database in a record associated with the webclient. If the HTTP server is unexpectedly unavailable, a backup HTTP server can locate the attachment using the record in the database and provide the attachment to a messaging server when the user is ready to send the message. | 2015-03-19 |
20150081809 | CONTROLLING DELIVERY AND ACCESS OF ELECTRONIC COMMUNICATIONS - A method, system and a computer program product of a computer controlling delivery and access of electronic communications is provided which includes providing an electronic communication sender to include a security measure with respect to an electronic communication to be sent to at least one electronic communication account of at least one intended recipient, receiving and applying the electronic communication security measure to the electronic communication to be sent, sending the electronic communication with the security measure to at least one intended recipient, determining existence of one or more delegates of the electronic communication account of the at least one intended recipient and in response to the determination step, preventing the sent electronic communication with the security measure from view by the one or more delegate of the electronic communication account of the at least one intended recipient. | 2015-03-19 |
20150081810 | EMAIL WEBCLIENT NOTIFICATION QUEUING - Notifications received from an email server can be stored and provided to a webclient upon subsequent communications from the webclient received at an HTTP server. Notifications stored in a database or a storage are retrieved and transmitted to the webclient by backup or alternate HTTP servers when the webclient requests service. An attachment received from a webclient for a message in composition can be saved by an HTTP server in a storage system so that a backup HTTP server can locate the attachment and provide the attachment to a messaging server when the user is ready to send the message. | 2015-03-19 |
20150081811 | METHOD FOR PROVIDING MESSAGE TO MOBILE COMMUNICATION DEVICE - The present invention discloses a method for providing a message to a mobile communication device. The method includes the following steps: a dispatched message is received from a service-providing server through a message-dispatching server. The dispatched message includes identification information of at least one message receiver. Rule-operating and message-processing are performed to the dispatched message through the message-dispatching server after a fixed time period from a time at which the dispatched message is received. The rule-operated and message-processed dispatched message is displayed on a display unit of a mobile communication device through the message-dispatching server. The mobile communication device logs in with the identification information of the message receiver. | 2015-03-19 |
20150081812 | Content-Based Notification and User-Transparent Pull Operation for Simulated Push Transmission of Wireless Email - Exemplary system, method, software and apparatus embodiments provide for creating a content-based notification for a mobile device, as a simulated push operation, for devices which do not have push capability. The system comprises a database, a server, and may also include a second web server for user account configuration. The database is adapted to store user account configuration and preference information. The server is adapted to receive a first message having a first protocol, such as SMTP, and to determine whether the content-based notification for the first message should be provided. When the content-based notification is to be provided, the server is adapted to extract a subset of information from the first message, and using the subset of information, to create a second message having a second, different protocol, such as SMS. The second message is transferred to a wireless network for transmission to the mobile device, with the second message providing the content-based notification of the first message. The information extracted from the first message enables a user to determine whether they want to download the complete message, as a user-transparent pull operation, and typically includes the from, to, size, date, subject fields, and a portion of the body of the first message, up to the remaining capacity of the second message. | 2015-03-19 |
20150081813 | Logo Message - A method for augmenting any communication, text, instant message, social media and other similar user interfaces and applications now known or shall be known in the future that provides the ability to insert and/or place logo, icon, symbol and other such material into individual message interfaces or character bubbles; provides further capability for an end user to “click” such material and subsequently be directed to any desired destination (i.e., content, web, video, audio, mobile, or satellite); user may be re-directed back to their original location prior to clicking on said material once desired. | 2015-03-19 |
20150081814 | WEB REPLY PATH VIA SMS - Methods and systems of providing a web reply path via an SMS-based communication are disclosed. A request to send an SMS message to a second user may be received from a first user. A first SMS message may be sent to the second user via SMS-based communication in response to the request from the first user. The first SMS message may comprise a URL. In response to the second user causing the URL to be loaded on a web browser, a web-based chat session between the first user and the second user may be initiated using the URL. The first user and the second user may be enabled to send chat messages to each other via the web-based chat session, which may be hosted by an online service provider at the URL. | 2015-03-19 |
20150081815 | METHOD OF TRANSMITTING ANONYMOUS MESSAGE AND MESSAGE TRANSMISSION SYSTEM USING THE SAME - An anonymous message transmission method and a message transmission system using the same. In an anonymous message transmission method of a message transmission system, a terminal device transmits a message created by a user to a server when the terminal device is set to an anonymous transmission mode and receives a message transmission command from the user, and the server generates an anonymous message by eliminating user information included in the message, and transmits the anonymous message to an external terminal device. | 2015-03-19 |
20150081816 | ELECTRONIC MESSAGE MANAGEMENT SYSTEM - An electronic message management system is disclosed that comprises an electronic message server arranged to receive electronic messages addressed to a recipient user associated with the electronic message server, and to cause electronic messages to be sent from the electronic message server to an electronic message client associated with the user and arranged to display messages indicative of the electronic messages, and a storage device arranged to store delivery rules. The system is arranged to store electronic messages until the electronic messages are sent to an electronic message client. Each recipient user associated with the system has at least one associated delivery rule defining when electronic messages received by the message server are made available for sending by the message server to the message client associated with the recipient user. The system is arranged to apply the delivery rules to electronic messages received by the message server so as to control when the received electronic messages are made available for sending by the message server to the message client associated with the recipient user. A corresponding method is also disclosed. | 2015-03-19 |
20150081817 | METHOD FOR DELIVERING PUSH NOTIFICATION AND PUSH NOTIFICATION SERVER FOR PERFORMING THE SAME - The present invention relates to a method for delivering a push notification and a push notification server for performing the method. In the push notification delivery method, by a push notification server, a push notification message is received from a push notification server application. By the push notification server, the push notification message is sent to a push notification client registered in association with the push notification server application. If the push notification message is not sent, the push notification message is stored in a transmission queue within the push notification server and is resent to the push notification client, or an update, expiration or cancellation of the push notification message is processed. A push delivery state of a push notification message, sending of which has finally failed, is changed to a delivery failed state, and failure results are transferred to the push notification server application. | 2015-03-19 |
20150081818 | Combining Communication Contents - When a communication message notification initiated by a current communication window is received, a correlation relationship between a party participating in a communication and K communication subjects that belong to a same user system which acts as another party participating in the communication is obtained respectively. The K communication subjects that belong to the same user system have a common principal account and each communication subject has a corresponding child account. Alternatively, the K communication subjects use a same account and logs in different communication tools in the same system. K≧1. According to the correlation relationship, historical communication contents between the party participating in the communication and the K communication subjects are obtained respectively. The historical communication contents are combined. The combined communication contents are saved and displayed. The present techniques avoid the tedious and overdue problem of manually combining the communication contents. | 2015-03-19 |
20150081819 | Messaging Policy Controlled Email De-Duplication - Example methods and apparatus associated with a messaging policy controlled email deduplication are provided. In one example a messaging policy is accessed. It is determined whether a received message complies with the policy based on rules of the messaging policy. If a message complies with the messaging policy, the message is displayed. If the message does not comply with the messaging policy, it is determined whether the message is duplicative. If the message is deemed duplicative it is not displayed. Conversely, if the message is not deemed duplicative it is displayed. | 2015-03-19 |
20150081820 | MESSAGE PUBLISHING WITH PROHIBITED OR RESTRICTED CONTENT REMOVAL - Publishing of a message that is free of prohibited or restricted content by a message publishing system that is provided with criteria concerning acceptable content. A message is received at the message publishing system, is processed by a processor to detect any prohibited or restricted items in the message which are outside of the criteria of the acceptable content, and the prohibited or restricted content is removed in response to the detection of the prohibited or restricted items in the message. Either the message or only a remainder of the message which is free of the prohibited or restricted content is published in accordance with the criteria provided to the message publishing system. | 2015-03-19 |
20150081821 | Time-Managed Electronic Mail Messages - Systems, method sand computer program products for facilitating the automatic deletion of received emails after a user-selectable time period has elapsed are disclosed. In various embodiments, email messages contain a header field referred to as an “Expiration Time” header field that dictates the length of time the email will reside in a designated Inbox prior to its automatic deletion by an email server. The server is able to automatically delete the received email as long as the email is residing in a folder that is synched to the server. A user receiving the email has access to the Expiration Time Header field and can modify its value if desired and allowed by the sender. The user can move the retrieved email to a folder that is not synched to the server, thus preventing the email from being automatically deleted by the server. | 2015-03-19 |
20150081822 | METHOD AND SYSTEM FOR IMPROVING ESTABLISHING OF A MULTIMEDIA SESSION - Multimedia communication systems and methods are disclosed. An exemplary system comprises a server adapted to communicate with two or more multimedia endpoints; and a MCU adapted to communicate with the at least one server and the multimedia endpoints, wherein the server contains a module for instructing the multimedia endpoints to call a dial number for the MCU to establish a multimedia conference in response to a requested list of multimedia endpoints received from one of the multimedia endpoints. An exemplary method for establishing a multimedia conference comprises receiving at a server from a first endpoint a requested list of second endpoints desired to participate in the multimedia session; reviewing at the server the status of the second endpoints; and if the status of a particular second endpoint is an available status, instructing at least some of the available second endpoints to call a dial number for a MCU to participate in the multimedia conference. A further exemplary method allows for a determination to be made whether a multipoint or point-to-point conference is required, and allows a user to leave a message for users who unavailable to participate in the conference. | 2015-03-19 |
20150081823 | Terminal Search Method and Apparatus - A terminal search method and apparatus are disclosed that relate to the field of wireless communications technologies and resolve a problem in the prior art that a terminal cannot find, without relying on support from a Location Based Service (LBS) server, another terminal that runs a same application in a local scope or an adjacent area. The method includes acquiring an application identifier; broadcasting a broadcast frame that carries the application identifier to a receiving end; receiving a message that is sent by a candidate receiving end and carries a target application identifier, where the target application identifier is selected by the candidate receiving end from the application identifier; and determining a target receiving end from the candidate receiving end, so as to establish a connection of a target application with the target receiving end. Embodiments of the present invention are mainly applied to a short-distance wireless communication process. | 2015-03-19 |
20150081824 | Forgotten Attachment Detection - A user is writing an email or other message. The message is inspected for a predetermined word and for at least one of: a predetermined phrase or a template match. A score is generated if the predetermined phrase or the template match is detected. A suggestion is provided to a user that the message may need an attachment if the predetermined word is detected or if the score is greater than a predetermined score. The inspection may begin when the user begins creating the message, indicates that the message should be sent, or at some point in between. The user may provide feedback that the suggestion is accepted or that the suggestion is rejected. | 2015-03-19 |
20150081825 | Method for Automatically Unsubscribing an Address from a Subscription - An improved method for detecting and unsubscribing one or more addresses from a series of subscriptions by examining the emails in the mailbox of the address and determining if they are from a subscription/automated/list server by examining the header contents, the sender's address, the subject, and comparing each message to other messages to identify patterns, then, examining each message to identify methods of unsubscribing from the Subscription. Finally, unsubscribing from the subscriptions either automatically, or in a semi-manual method and optionally deleting all messages associated with the subscription. | 2015-03-19 |
20150081826 | METHOD AND APPARATUS FOR COMMUNICATION AND COLLABORATIVE INFORMATION MANAGEMENT - A communication system includes a communication server configured to receive a request to generate a communication and receive a request to associate the communication with one or more classifications from a plurality of classifications. The system further includes a store coupled to the communication server and configured to store the communications and/or store the classification received in the association request. The classifications are associated with a request for information from a recipient of the communication. The classifications are associated with a request for information from a recipient of the communication, a request for sharing information with the recipient of the communication, and a request for action from the recipient of the communication. | 2015-03-19 |
20150081827 | INTEGRATED TWO-WAY COMMUNICATIONS BETWEEN DATABASE CLIENT USERS AND ADMINISTRATORS - A method and system for communicating between database client users and administrators. A message request is received from a database administrator (DBA) responsible for managing aspects of a particular database. The message request includes a database name of the particular database, at least two message recipients, and message content. The message request is a request to send the message content only to the at least two message recipients consisting of at least two but not all database client users currently connected to the particular database. An Internet Protocol (IP) address associated with each message recipient is determined, without using an instant messaging address for any of the message recipients. A first message including the message content is simultaneously transmitted to each of the determined IP addresses. A second message, which includes a reply message to the first message, is received from one of the determined IP addresses. | 2015-03-19 |
20150081828 | DEGREES OF SEPARATION FOR HANDLING COMMUNICATIONS - A sender's degrees of separation from a recipient may be used to aid in spam filtering or to otherwise handle a communication. The “degrees of separation” represent a metric used to quantify whether/how the recipient is linked to the sender through intermediary people or other entities. For example, a recipient may know a first user (first degree of separation) and the first user may know a second user (second degree of separation) who knows the sender of an e-mail. In this case, the sender is separated from the recipient by two degrees of separation (by two other contacts). A level of “trust” or “legitimacy” about a sender's communication can be inferred by looking at whether the sender is linked to an intended recipient. Typically, user contact lists (e.g., address book, buddy list, and/or white list) are evaluated to determine the number of degrees (or hops) are required to link or relate two users. | 2015-03-19 |
20150081829 | OUT-OF-BAND REPLICATING BIOS SETTING DATA ACROSS COMPUTERS - Certain aspects of the present disclosure relate to a system for replicating BIOS setting data (BIOSSD) across computers. The system includes a plurality of computers, and each computer is connected to a service processor (SP). Each computer includes a BIOS chip, which stores a first BIOSSD collection. The SP stores a second BIOSSD collection. When the first BIOSSD collection is newer, the SP receives a copy of the first BIOSSD collection from the computer to replace the second BIOSSD collection. When the second BIOSSD collection is newer, the SP transmits a copy of the second BIOSSD collection to the computer to replace the first BIOSSD collection in the BIOS chip. A remote management may request and obtain from the SP the updated second BIOSSD collection such that the remote management computer may send the copy the updated second BIOSSD collection to other SP's for update. | 2015-03-19 |
20150081830 | METHODS, CIRCUITS, DEVICES, SYSTEMS AND ASSOCIATED COMPUTER EXECUTABLE CODE FOR DISTRIBUTED CONTENT CACHING AND DELIVERY - Disclosed are methods, circuits, devices, systems and associated computer executable code for distributed content caching and delivery. An access or gateway network may include two or more gateway nodes integral or otherwise functionally associated with a caching unit. Each of the caching units may include: (a) a caching repository, (b) caching/delivery logic and (c) an inter-cache communication module. Caching logic of a given caching unit may include content characterization functionality for generating one or more characterization parameters associated with and/or derived from content entering a gateway node with which the given caching unit is integral or otherwise functionally associated. Content characterization parameters generated by a characterization module of a given caching unit may be compared with content characterization parameters of content already cached in: one or more cache repositories of the given caching unit, and one or more cache repositories of other caching units. | 2015-03-19 |
20150081831 | JOINING A DISTRIBUTED DATABASE - A method may include a device joining a distributed database in a distributed physical access control system. The method may include storing first data in a first memory area of a memory. The first memory area may be designated to store data for a consensus-based distributed database (DB). The first data is to be added to the consensus-based distributed DB that is distributed among other devices in a network. The method may include copying the first data to a second memory area of the memory of the device and adding the device to the network, receiving data from the other devices in the network and adding the received data to the consensus-based distributed DB by storing the received data in the first memory area, and adding the first data to the consensus-based distributed DB by copying the first data from the second memory area to the first memory area. | 2015-03-19 |
20150081832 | MANAGING SEED DATA - Embodiments of the invention provide systems and methods for managing seed data in a computing system (e.g., middleware computing system). A disclosed server computer may include a processor and a memory coupled with and readable by the processor and storing therein a set of instructions which, when executed by the processor, cause the processor to perform a method. The method may include obtaining first input data via a graphical interface. The first input data indicates a first memory storage location of seed data. The seed data comprises data to initialize an application for operation. The method further includes accessing the seed data from the first memory storage location based on the first input data. The method includes storing data based on the seed data to a second memory storage location. | 2015-03-19 |
20150081833 | Dynamically Generating Flows with Wildcard Fields - Some embodiments of the invention provide a switching element that receives a packet and processes the packet by dynamically generating a flow entry with a set of wildcard fields. The switching element then caches the flow entry and processes any subsequent packets that have header values that match the flow entry's non-wildcard match fields. In generating the flow, the switching element initially wildcards some of all of match fields and generates a new flow entry by un-wildcarding each match field that was consulted or examined to generate the flow entry. | 2015-03-19 |
20150081834 | INFORMATION PROCESSING SYSTEM AND METHOD - An information processing system includes a reception part and a process control part. The reception part receives a processing request including process identification information identifying a process and user identification information from an apparatus. The process control part, when the received user identification information is stored in correlation with the received process identification information, executes the process according to the process identification information based on the result of applying change information stored in correlation with the received user identification information to setting information stored in correlation with apparatus identification information identifying the apparatus and with the received process identification information. | 2015-03-19 |
20150081835 | METHOD AND APPARATUS FOR SPEEDING UP WEB PAGE ACCESS - Embodiments of the present invention disclose a method and apparatus for speeding up Web page access, pertaining to the network field. The method includes: acquiring a URL address initiated by a user; judging whether the URL address is stored in a preset cache database, where the cache database stores a plurality of mapping relationships between URL addresses and cache data; and when it is judged that the URL address is stored in the preset cache database, acquiring cache data corresponding to the URL address from the cache database, processing the cache data, and rendering the Web page. According to the embodiments of present invention, logic for implementing the cache database is added at the browser end. In this way, no matter a Web server or a proxy server complies with the HTTP. | 2015-03-19 |
20150081836 | PROFILE-BASED LIFECYCLE MANAGEMENT FOR DATA STORAGE SERVERS - Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition. | 2015-03-19 |
20150081837 | PROVISIONING A PLURALITY OF COMPUTING DEVICES - Example techniques and systems may facilitate self-provisioning of respective computing devices. In one example, a technique may include transmitting, by a first computing device and to a second computing device via NFC, a network identifier that identifies a wireless device-to-device communication connection (e.g., Bluetooth connection) broadcast from the first computing device and a service identifier identifying a connection service of the Bluetooth connection and receiving, from the second computing device via the Bluetooth connection, a request to access a configuration service at a web address. Responsive to receiving the request, the technique may include transmitting the request to the web address via an Internet connection of the first computing device, receiving, by the first computing device and via the Internet connection, provisioning information from the configuration service, and transmitting, by the first computing device and via the Bluetooth connection, the provisioning information to the second computing device. | 2015-03-19 |
20150081838 | Delivering Services Using Different Delivery Methods - Systems, methods, and devices of the various embodiments enable objects associated with a service available in a MBMS network to be delivered through more than one delivery method or context. In various embodiments, an application service document may map objects of a service to their respective delivery methods or contexts. In an embodiment, an application service document may also identify service area restrictions applicable to an object. In an embodiment, an application service document may further identify group restrictions applicable to an object. In a further embodiment, the application service document may identify identical and alternative objects that are available. | 2015-03-19 |
20150081839 | FAST SEQUENTIAL MESSAGE STORE - A broker may be used as an intermediary to exchange messages between producers and consumers. The broker may store and dispatch messages from a physical queue stored in a persistent memory. More specifically, the broker may enqueue messages to the physical queue that are received from producers and may dispatch messages from the physical queue to interested consumers. The broker may further utilize one or more logical queues stored in transient memory to track the status of the messages stored in persistent memory. As messages are dispatched to and acknowledged by interested consumers, the broker deletes acknowledged messages from the physical queue. The messages deleted are those preceding a physical ACKlevel pointer that specifies the first non-acknowledged message in the physical queue. The physical ACKlevel pointer is advanced in the physical queue based on the relative position of corresponding logical ACKlevel pointers maintained by the logical queues. | 2015-03-19 |
20150081840 | SYSTEM AND METHOD FOR MULTIHOP SERVICE DISCOVERY WITH MEMBER STATION PROXY SERVICE ADVERTISEMENTS - Systems and methods for multi-hop service discovery within a mobile device cluster are disclosed. A seeker station may be seeking or may have found a desired service available from a provider station. The seeker station may receive the service announcement from the provider station, and become a proxy station, expanding the service area of the provider station. The proxy station may selectively transmit services and advertisements for services on behalf of the provider station based on restrictions placed on selection as a proxy station. Restrictions or conditions may be placed on the proxy station limiting the number of stations that may become proxy stations, limiting traffic within the cluster. Some restrictions may require a proxy station to be a member of the cluster or a member of a group within the cluster. Selection as a proxy station and frequency of transmission of service announcements by proxy stations may also be conditioned on various specific parameters or combinations of parameters as specified by the provider station. | 2015-03-19 |
20150081841 | SYSTEMS AND METHODS FOR DATA SYNCHRONIZATION MANAGEMENT - Systems and methods for synchronizing data between a communications management system and data management system. In some implementations, contact data may be requested from a data management system external to and/or operated by a distinct entity with respect to a communications management system. The requested contact data may be received at the communications management system and the communications management system may be used to establish a communication using at least one contact from the requested contact data. The requested contact data may be updated using data generated during the communication and then updated contact data may be transmitted to the data management system to synchronize the two systems. | 2015-03-19 |
20150081842 | NETWORK RESOURCE IDENTIFICATION - A system, method and computer-readable medium for client-side processing of resource identifiers. A client request for content is returned that includes information for generating a request for translation information and a number of embedded resource identifiers. Based on the information for generating a request for translation information, the client generates and obtains translation information and processes the embedded resource identifiers to obtain resources from a service provider. | 2015-03-19 |
20150081843 | CONTENT CAPABILITY CLEARING HOUSE SYSTEMS AND METHODS - A content capability clearing house that can act as a trusted and neutral mediator among network providers to manage rich content capabilities among multiple networks is provided. Content capabilities that can be brokered include, but are not limited to, quality of service and content screening. In an embodiment, a content capability clearing house includes a receiver that receives content capability request messages and other messages from network providers. A content capability request message includes a quality of service request and/or a subscriber profile request for use with content screening and subscriber specific advertisements. The present invention includes a series of methods for determining content capabilities for data transmission over a transaction between a content provider and a subscriber in which a content capability clearing house is used to efficiently broker and manage the capability among multiple network providers. | 2015-03-19 |
20150081844 | Systems and Methods for Retrieving Customer Premise Equipment Data - A method includes detecting, at a customer premise equipment management system, a trigger event associated with customer premise equipment data, the customer premise equipment data associated with a customer premise equipment device. The method also includes initiating a connection to the customer premise equipment device via an application program interface in response to the trigger event, where the application program interface is selected based on the customer premise equipment data. The method further includes sending, from the customer premise equipment management system, a customer premise equipment data request to the customer premise equipment device via the application program interface. | 2015-03-19 |
20150081845 | COMMUNICATION TERMINAL, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - A communication terminal includes a receiving unit to receive an input of an execution instruction for outputting electronic data stored in an information processing apparatus by using an output apparatus; an obtaining unit to obtain connection status of each of the communication terminal, information processing apparatus, and output apparatus; a determination unit to determine a transmission destination of an request depending on the connection status; a generating unit to generate the request, wherein when the transmission destination is the information processing apparatus, a first request, when the transmission destination is the output apparatus, a second request, when the transmission destination is the information processing apparatus and the output apparatus, a third request and a fourth request; and a transmission unit to transmit one of the first, the second, the third, and the fourth requests, to the transmission destination. | 2015-03-19 |
20150081846 | SYSTEM AND METHOD FOR BRIDGING DIVERGENT INFORMATION NETWORKS - A computer system is provided that enables secure, on demand communications across IT infrastructures that may be divergent, and that may be associated with legacy components, different communication protocols, and frequent system changes. The system includes one or more bridge utilities, each bridge utility comprising two or more anchor components, each anchor component being connected to one or more associated devices or computer systems, the anchor components automatically locating and communicating with one or more span utilities, wherein the anchor components and the span utilities execute functionality for automatically creating and configuring connections between them so as to establish the bridge utility, and wherein the anchor components and span utilities are operable to send and receive signalling communications between them for configuring anchor to anchor connections, including hierarchical connections for implementing hierarchical relationships between the associated devices or computer systems, thereby establishing peer-to-peer anchor associations and parent-to-child anchor associations; and once data connections are established between anchor components in a peer-to-peer anchor association (“peer anchor components”), data communications between peer anchor components carry communications automatically between their associated devices or computer systems on a secure and on demand basis; and wherein the one or more bridge utilities enable secure, on demand communications across the IT infrastructures, even if these are divergent, thereby giving effect to information processes across such IT infrastructures. | 2015-03-19 |
20150081847 | BROADCAST/MULTICAST OFFLOADING AND RECOMMENDING OF INFRASTRUCTURAL CHANGES BASED ON USAGE TRACKING - A method, a device, and a storage medium having instructions stored thereon to obtain usage data that indicates a usage of a downloading service and a streaming service of programs, in which the programs are provided to user devices via unicast delivery. The usage data is analyzed to determine whether a multicast offloading or a broadcast offloading is to be invoked on behalf of a program designated for unicast delivery. Additionally, a method, a device, and a storage medium obtain usage data, analyze the usage data, and generate a recommendation for an infrastructural change of a content delivery network based on the analysis. | 2015-03-19 |
20150081848 | DYNAMIC REQUEST REROUTING - A point of presence includes edge servers having IP addresses and storing content, a switch/router that receives and forwards requests for content to the edge servers, a health monitoring server that gathers health information from the edge servers, and a dynamic request rerouting (DRR) server. The DRR server is connected with each of the edge servers. If the DRR server obtains a determination that one of the edge servers is down, it advertises a route including the IP address of the down edge server to the switch/router. The switch/router forwards a request for content, originally addressed to the down server, to the DRR server. The DRR server forwards the request to a working server that stores the content. The working server sends the content to the DRR server, the DRR server forwards the content back to the switch/router, and the switch/router responds to the original request with the content. | 2015-03-19 |
20150081849 | METHOD AND APPARATUS FOR PROVIDING ENHANCED STREAMING CONTENT DELIVERY WITH MULTI-ARCHIVE SUPPORT USING SECURE DOWNLOAD MANAGER AND CONTENT-INDIFFERENT DECODING - A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives. | 2015-03-19 |
20150081850 | SYSTEMS AND METHODS FOR ESTABLISHING NON DATA DELIVERY CHANNEL TO CHECK DEVICE CAPABILITIES - This technology relates to systems and methods for establishing a non-data delivery channel for checking device capabilities to send one or more media contents. This technology involves receiving request to deliver media contents to telecommunication devices. Then, a non data delivery channel is established with the telecommunication devices by sending a message to the devices. In response to the message, one or more device capabilities and user preferences are sent by the devices and received by the server. The server analyzes the device capabilities and user preferences and selects the most appropriate channel to deliver the requested media contents. Finally, the server delivers the media contents through the selected delivery channel. If the device capabilities do not meet the predefined benchmark, then an error message is sent to the device and if the user preferences cannot be fulfilled then an appropriate message is sent to the device. | 2015-03-19 |
20150081851 | DELIVERY OF TARGETED MEDIA CONTENT - Technology for receiving targeted media content is disclosed. A user equipment (UE) can receive a first metadata including group information for files corresponding to targeted media content and media presentation description (MPD) information associated with the files, wherein each file the group information is associated with a group identification (ID) element. A second metadata can be received in a user service description (USD) that includes MPD information for streaming media content. A user profile can be identified that includes group ID elements associated with a user. Targeted MPD information for selected targeted media content having the group ID element that is included in the user profile can be inserted into the MPD information for the streaming media content to generate a merged MPD. The selected targeted media content and the streaming media content can be received according to the merged MPD for playback at the UE. | 2015-03-19 |
20150081852 | PROXY RELATIONSHIP PROCESSING METHOD AND SYSTEM, PROXY SERVER, AND TERMINAL - This disclosure provides a proxy relationship processing method and system, a proxy server, and a terminal, where the method includes: the proxy server receiving a service content request sent including an account of a first terminal and a service item by another terminal; searching, according to the account of the first terminal, a preset proxy relationship table corresponding to the account of the first terminal to obtain a proxy-enabled service item from the proxy relationship table; and if it is learned, according to the proxy relationship table, that the service item is the proxy-enabled service item, sending the service content request to a second terminal corresponding to the proxy-enabled service item, so that the second terminal sends a service content request response to the other terminal according to the service content request. This resolves problems of limited application and low proxy efficiency of an existing proxy relationship processing method. | 2015-03-19 |
20150081853 | NETWORK ADDRESS ASSIGNMENT WITH DUPLICATION DETECTION - Network storage system configuration via a network is disclosed. A network address assignment component is configured to listen for network discovery requests over the network. Responsive to receiving a network discovery request from a network storage system, one or more candidate network addresses are (e.g., randomly) generated until an available candidate network address is generated. For example, if a first candidate network address is determined as available (e.g., not used by another device within the network), then the first candidate network address is offered and/or assigned to the network storage system as an initial configuration network address that may be used to provide configuration access to the network storage system, otherwise a second candidate network address is generated and/or evaluated for availability. As such, configuration access may be provided over the network to the network storage system regardless of whether the network comprises an IP address assigning (e.g., DHCP) server. | 2015-03-19 |
20150081854 | DYNAMIC AGENT REPLACEMENT WITHIN A CLOUD NETWORK - A computing device receives information from one or more agents, wherein the one or more agents monitor one or more resources in a cloud network. The computing device determines that the configuration of the one or more agents monitoring the one or more resources needs to be changed based on at least the information received from the one or more agents. The computing device changes the configuration of the one or more agents monitoring the one or more resources based on at least the information received from the one or more agents. | 2015-03-19 |
20150081855 | SYSTEM AND METHOD FOR ASSIGNING MULTI-INSTANCE SERVICES IN A PROVIDER NETWORK - A system and method for placing inline services having multiple instances in a service provider network. In one implementation, a topology of the service provider network and services to be placed therein are defined, wherein a network node may include a data forwarding functionality and a control plane functionality. Using service chaining policy requirements, the number of service instances, etc. as input, services and their multiple instances are placed within the network such that an overall network metric is optimized for all subscriber data flows. | 2015-03-19 |
20150081856 | CLUSTER CONFIGURATION - Computer implemented methods, system and apparatus for configuring a cluster using a plurality of hosts include identifying a plurality of features for forming the cluster. The plurality of features define requirements needed in a host for forming the cluster. A plurality of hosts are identified to be part of the cluster. A compatibility analysis is executed for each of the identified hosts. A plurality of suggested adjustments to particular hosts are presented to enable the particular hosts to be compatible with the features requirements. A configuration template is constructed for the hosts in the cluster that are compatible with the requirements. The hosts are configured for the cluster using the configuration settings in the configuration template. The configured hosts enable the features in the cluster. | 2015-03-19 |
20150081857 | DYNAMIC AGENT REPLACEMENT WITHIN A CLOUD NETWORK - A computing device receives information from one or more agents, wherein the one or more agents monitor one or more resources in a cloud network. The computing device determines that the configuration of the one or more agents monitoring the one or more resources needs to be changed based on at least the information received from the one or more agents. The computing device changes the configuration of the one or more agents monitoring the one or more resources based on at least the information received from the one or more agents. | 2015-03-19 |
20150081858 | SYSTEM FOR PROVIDING TELEMATIC SERVICES AND CORRESPONDING METHOD - Method of providing services for a vehicle, the method comprising: storing for at least one model of vehicle of said group of vehicles, the configuration files for at least one service to be provided; storing a set of data pairs comprising an identifier of the control unit and an identification number of the corresponding vehicle; receiving the identification number of the vehicle from said vehicle by the services provision server; extracting the identifier of the control unit as a function of the identification number of the vehicle; an extraction of one or more configuration files as a function of a vehicle identification datum; and a downloading by the control unit of said vehicle from the services provision server of the configuration file or files extracted for the setting up of the service or services to be provided for the model of the vehicle. | 2015-03-19 |
20150081859 | METHOD, APPARATUS AND SYSTEM FOR CONNECTING DEVICES TO A NETWORK - The present invention discloses a method, apparatus and system of configuring devices to join a network. The method of the present invention comprises the following steps of: a second device broadcasting in a hot spot of the network; a first device scanning for a broadcasted signal from the second device for connecting the first device to the second device; the first device sending a network configuration information to the second device; and the second device to connect to the network according to the network configuration information. According to the method of the present invention, the devices can be received the network configuration information and configured automatically for joining a network group efficiently. | 2015-03-19 |
20150081860 | IDENTIFYING AND TARGETING DEVICES BASED ON NETWORK SERVICE SUBSCRIPTIONS - Examples of the disclosure describe automatically associating devices of a user with a network service subscription of the user. The user has a subscription to services offered by an entity. Connection statistics for the devices to networks are generated and compared to criteria to determine whether any of the devices should be associated with the subscription of the user. After association, the devices are able to access networks and/or services associated with the subscription. | 2015-03-19 |
20150081861 | CONNECTION IDENTIFIER ASSIGNMENT AND SOURCE NETWORK ADDRESS TRANSLATION - A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a distributed manner in several hosts. The controller assigns a first set of identifiers to a first middlebox instance that associates an identifier in the first set with a first packet. The controller assigns a second set of identifiers to a second middlebox instance that associates an identifier in the second set with a second packet. | 2015-03-19 |
20150081862 | ADMINISTERING GROUP IDENTIFIERS OF PROCESSES IN A PARALLEL COMPUTER - Administering group identifiers of processes in a parallel computer includes each process in a set of processes, receiving from a compute node of the plurality of compute nodes, a request to establish the set of processes as an operational group including receiving a list of process identifiers for each process of the set of processes. Embodiments also include each process generating without communication amongst the processes, a unique group identifier in dependence upon the list of process identifiers. | 2015-03-19 |
20150081863 | Enhanced Network Virtualization using Metadata in Encapsulation Header - In a network virtualization system, metadata is passed in an encapsulation header from one network virtualization edge to another network virtualization edge or to a service connected to a network virtualization edge. The metadata may carry packet processing instructions, diagnostic information, hop-specific information, or a packet identifier. Using the metadata information in the packet header, the datacenter network may provide services such as remote segmentation offload, small packet coalescing, transparent packet compression, and end-to-end packet tracing. | 2015-03-19 |
20150081864 | REVERSIBLE MAPPING OF NETWORK ADDRESSES IN MULTIPLE NETWORK ENVIRONMENTS - A method for translating network addresses includes receiving a first network packet, the first network packet comprising an internal source address. The method also includes generating, by performing a mapping operation, a mapping value. The generating of the mapping value uses, at least in part, at least a portion of the internal source address, and at least a portion of an external source address. The external source address is associated with the internal source address. The method also includes forwarding, using a second network packet, at least a portion of the first network packet. The second network packet comprises the external source address and at least a portion of the mapping value. | 2015-03-19 |
20150081865 | LOSSLESS SWITCHING OF TRAFFIC IN A NETWORK DEVICE - A system for lossless switching of traffic in a network device may be implemented when a network switch is integrated into a gateway device, or with any other data source. A processor of the gateway device may receive queue depth information for queues of the network switch. The processor may prevent data from being transmitted to congested queues of the network switch, while allowing data to be transmitted to uncongested queues. In this manner, data loss can be avoided through the network switch for data sourced from the gateway device, such as audio-video data retrieved from a hard drive, audio-video data received from a tuner, etc. Furthermore, re-transmission at higher layers can be reduced. Since the subject system observes congestion for each individual queue, only traffic destined to that particular, congested, queue is affected, e.g. paused. Traffic to non-congested queues is not affected, regardless of traffic class or egress port. | 2015-03-19 |
20150081866 | SYSTEM AND METHOD FOR SHARING SPECIAL-PURPOSE PROCESSING RESOURCES - A special-purpose processing system, a method of carrying out sharing special-purpose processing resources and a graphics processing system. In one embodiment, the special-purpose processing system includes: (1) a special-purpose processing resource and (2) a Representational State Transfer (ReST) application programming interface operable to process data using the special-purpose processing resource in response to stateless commands based on a standard protocol selected from the group consisting of: (2a) a standard network protocol and (2b) a standard database query protocol. | 2015-03-19 |
20150081867 | OBTAINING A MAC ADDRESS FROM AN EXTERNAL SOURCE - A non-transitory computer readable medium storing instructions which, when executed on one or more processors, cause performance of operations. The operations include: receiving a first message from a device; determining, in response to the first message, a media access control (MAC) address of the device; and transmitting, in response to the first message, a second message comprising the MAC address to the device. | 2015-03-19 |
20150081868 | METHOD AND SYSTEM FOR DETERMINING COMPATIBILITY OF COMPUTER SYSTEMS - Compatibility and consolidation analyses can be performed on a collection of systems to evaluate the 1-to-1 compatibility of every source-target pair, evaluate the multi-dimensional compatibility of specific transfer sets, and to determine the best consolidation solution based on various constraints including the compatibility scores of the transfer sets. The analyses can be done together or be performed independently. These analyses are based on collected system data related to their technical configuration, business factors and workloads. Differential rule sets and workload compatibility algorithms are used to evaluate the compatibility of systems. The technical configuration, business and workload related compatibility results are combined to create an overall compatibility assessment. These results are visually represented using color coded scorecard maps | 2015-03-19 |
20150081869 | MESSAGE FORWARDING BETWEEN GEOGRAPHICALLY DISPERSED NETWORK SITES - The present disclosure describes message forwarding in a network where Virtual Local Area Networks (VLANs) are deployed over geographically dispersed sites. The network comprises a first aggregation layer device at a first site and second first aggregation layer device at a second site. The first aggregation layer device learns Media Access Control (MAC) address information received from the second aggregation layer device. The MAC address information includes: a VLAN identifier (ID), an aggregated MAC address and an aggregated MAC address mask configured at the second site. When receiving a message addressed to the VLAN ID and a destination MAC address, the first aggregation layer device searches for the MAC address information based on the VLAN ID and destination MAC address and forwards the message to the second aggregation layer device according to the MAC address information. The destination MAC address belongs to the same MAC address segment as the aggregated MAC address and searching for the MAC address information comprises mask matching based on the aggregated MAC address mask. | 2015-03-19 |
20150081870 | APPARATUS, SYSTEM, AND METHOD OF MANAGING DATA, AND RECORDING MEDIUM - In view of the above, in one aspect of the present invention, in response to a request for registering a specific management terminal to be under management of a specific administrator, a transmission management system not only registers terminal identification information of the specific management terminal, to terminal identification information of management terminals being managed by the specific administrator, but also registers the terminal identification information of the specific management terminal from candidate counterpart terminal identification information for the other management terminals being managed by the specific administrator. | 2015-03-19 |
20150081871 | ACTIVELY RESPONDING TO DATA STORAGE TRAFFIC - Technology is described for actively responding to data storage traffic. The technology can provide an application program interface; receive, via the application program interface, from an application, a command to query a data storage attribute associated with a virtual data storage component; query the associated virtual data storage component; and return to the application a value for the data storage attribute. | 2015-03-19 |
20150081872 | SOFTWARE DOWNLOAD METHOD AND APPARATUS - Embodiments of the present invention disclose a software download method and apparatus. The method includes: acquiring a fanout command and a replacement instruction delivered by a device management server, and replacing, according to the replacement instruction, a software identifier in the fanout command with a software local download address generated for software; delivering the converted fanout command to each terminal corresponding to the fanout command, so that each terminal downloads the software according to the software local download address. The present invention further provides another software download method and software download apparatus. In the embodiments, multiple terminals can be effectively prevented from retrieving data externally, and a local storage function provided by a device management gateway is used to directly acquire download data of the software from a local network of the device management gateway, thereby significantly improving the efficiency. | 2015-03-19 |
20150081873 | DYNAMIC STATE BASED CASE MANAGEMENT AND TASK TRANSITIONING - A dynamic state-based case management and task transitioning system, comprising a dynamic case management system that maintains a state model and associates states with tasks pertaining to cases, and a method for maintaining and transitioning states for tasks and cases. | 2015-03-19 |
20150081874 | OPERATION PROCESS CREATION PROGRAM, OPERATION PROCESS CREATION METHOD, AND INFORMATION PROCESSING DEVICE - A non-transitory computer-readable recording medium stores an operation process creation program that causes a computer to execute a process, the process including extracting a candidate operation manipulation component to be combined with an operation process following an operation manipulation component that has been determined to be arranged, when creating the operation process by arranging a plurality of the operation manipulation components on a screen, the candidate being extracted based on previously set relevance information indicating relevance between operation manipulation components and usage frequency information indicating usage frequencies of operation manipulation components in past instances of creating the operation processes; and displaying the extracted candidate operation manipulation component on the screen, by combining the extracted candidate operation manipulation component with the operation manipulation component that has been determined to be arranged. | 2015-03-19 |
20150081875 | METHOD AND SYSTEM FOR OPERATING SYSTEM (OS) VERIFICATION - A method for operating system application performance verification of a mainframe server system is provided. The method comprises comparing system snapshots of the operating system application. The method further comprises determining results of operational changes to the operating system application based on the compared system snapshots. The method further comprises comparing system log verification of the operating system application with previous system logs of the operating system application. The method further comprises determining results of operational changes to the operating system application based on the compared system log verification with the previous system logs. The method further comprises determining results of operational changes to the operating system application based on the compared system log verification with the previous system logs. The method further comprises performing system checkouts of vendor tools installed on the operating system application. | 2015-03-19 |