18th week of 2016 patent applcation highlights part 74 |
Patent application number | Title | Published |
20160127403 | SENSOR MESH AND SIGNAL TRANSMISSION ARCHITECTURES FOR ELECTROMAGNETIC SIGNATURE ANALYSIS - Systems and methods can support a sensor mesh and signal transmission architecture for electromagnetic signature analysis and threat detection. Sensor antennas may be deployed within an electromagnetic environment. A configurable antenna feed network can couple radio frequency signals from the antennas to both software-defined radio receivers and hardware-defined radio receivers. A raw signal analysis engine associated with the software-defined radio receiver can receive digital samples of the radio frequency signals, identify signal features within the digital samples, and generate signal feature vectors from the identified signal features. A signal feature network can receive the signal feature. A signal aggregation and analysis engine can receive the signal feature vectors from the signal feature network, aggregate the signal feature vectors, process the signal feature vectors, and identify wireless attacks according to the signal features within the signal feature vectors. One or more updatable analysis databases can support the signal processing operations. | 2016-05-05 |
20160127404 | COMPUTATIONAL SIGNAL PROCESSING ARCHITECTURES FOR ELECTROMAGNETIC SIGNATURE ANALYSIS - Systems and methods can support a computational signal processing architecture for electromagnetic signature analysis and threat detection. A plurality of sensor antennas can couple a radio frequency signal into a radio receiver. The radio receiver can generate digital samples of the signal. A raw signal analysis engine can identify signal features within the digital samples, generate signal feature vectors from the identified signal features, decode signal content from the signal feature vectors, and transmit the signal feature vectors into a signal feature network. The signal feature vectors may be aggregated from the signal feature network into a signal aggregation and analysis engine. The signal aggregation and analysis engine can refine feature vectors through processing such as identifying wireless attacks according to the signal features within the signal feature vectors. One or more operator interfaces and one or more analysis databases may support these operations. | 2016-05-05 |
20160127405 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - An information processing system, having one or more information processing apparatuses, includes a data input unit configured to take as input first data being multidimensional; a dimension reduction unit configured to generate, based on the first data, second data representing a characteristic of the first data, the second data having a prescribed number of dimensions fewer than a number of dimensions of the first data; and a distinguishing unit configured to distinguish whether the first data is normal data or abnormal data by a semi-supervised anomaly detection, based on the first data and the second data. | 2016-05-05 |
20160127406 | IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS - Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network resource (e.g., an entire website or a particular element of the website) can be tracked. In one embodiment, a statistical analysis of how often a particular source address (or other primary identifier) normally makes a request can be used to identify source addresses that make substantially more requests. A normal amount can correspond to an average number of request that a source address makes. According to some embodiments, a system can use statistical analysis methods on various request data in web server logs to identify potential attacks and send data concerned potential attacks to an HBA system for further analysis. | 2016-05-05 |
20160127407 | CERTIFICATION OF CORRECT BEHAVIOR OF CLOUD SERVICES USING SHADOW RANK - Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a resource of the enterprise directed to the network endpoint external to the enterprise, and calculating a plurality of individual scores related to a risk associated with the network-based communication, wherein each individual score corresponds to a different category of risk. The determination also includes receiving data specifying a policy related to rules defined by the enterprise regarding usage of cloud services; calculating a composite risk score related to the network-based communication, wherein the composite risk score is based on the individual scores and the policy; and notifying an entity of the enterprise about the composite risk score. | 2016-05-05 |
20160127408 | DETERMINING VULNERABILITY OF A WEBSITE TO SECURITY THREATS - Provided are methods and systems for determining a vulnerability of a website to at least one security threat. An example method can comprise providing a user interface; receiving, via the user interface, website data associated with the website; based on the website data, probing the website with at least one request, with the at least one request including at least one security threat signature; receiving at least one response from the website; comparing the least one response to at least one expected response for the at least one request; based on the comparison, determining the at least one security threat; and reporting results of the determination for review. | 2016-05-05 |
20160127409 | WEB SERVICE TESTING - Disclosed is a computer-implemented method and system of inferring a web service infrastructure from a web service hosted on a web server. The method includes: downloading a web service description language (WSDL) file describing the web service from a location on the web server identified by a uniform resource locator (URL); identifying at least one of a web service design technology and a web service design technology provider from character strings indicative of the technology and implementation, respectively, in at least one of the URL and WSDL file; and inferring the web service infrastructure from the identified web service design technology and web service design technology provider. A computer program product having aspects of the method as program code is also disclosed. | 2016-05-05 |
20160127410 | SYSTEM AND METHODS FOR SCALABLY IDENTIFYING AND CHARACTERIZING STRUCTURAL DIFFERENCES BETWEEN DOCUMENT OBJECT MODELS - A security auditing computer system efficiently evaluates and reports security exposures in a target Web site hosted on a remote Web server system. The auditing system includes a crawler subsystem that constructs a first list of Web page identifiers representing the target Web site. An auditing subsystem selectively retrieves and audits Web pages based on a second list, based on the first. Retrieval is sub-selected dependent on a determined uniqueness of Web page identifiers relative to the second list. Auditing is further sub-selected dependent on a determined uniqueness of structural identifiers computed for each retrieved Web page, including structural identifiers of Web page components contained within a Web page. The computed structural identifiers are stored in correspondence with Web page identifiers and Web page component identifiers in the second list. A reporting system produces reports of security exposures identified through the auditing of Web pages and Web page components. | 2016-05-05 |
20160127411 | METHOD FOR ADDRESSING, AUTHENTICATION, AND SECURE DATA STORAGE IN COMPUTER SYSTEMS - A system and method is provided for addressing, authentication and secure data storage in computer systems with a first, second and/or third computer system with at least one network interface and at least one telephony interface. The connection information for the network interface of at least one first computer system is transmitted via the telephony interface to at least the second and/or third computer system. A call number associated with each computer system is checked and appropriate network interfaces are activated if the result(s) of the check is/are positive. Connections with the connection information of the first computer system are only allowed by the network interface of the second computer system, and vice versa. Network interfaces only allow connection attempts with respective connection information, once connection is established, or not established for a predetermined time, the network interfaces are not recognizable or reachable by other computer systems. | 2016-05-05 |
20160127412 | METHOD AND SYSTEM FOR DETECTING EXECUTION OF A MALICIOUS CODE IN A WEB BASED OPERATING SYSTEM - A method for detecting a malicious code injected into the command stream of a widget running by a web-based OS at a device. The method is multi-stepped. Introducing by an App-Store hooks to within the command stream of the widget. Running at the App-Store the widget on an App-Store device, measuring respective time durations between various hooks, and recording said time durations within a metadata file. Associating said metadata file with said widget, and supplying said widget, and associated metadata file to within a user device. Upon running said widget by a web based OS at said user device, activating a monitoring module, determining durations between said introduced hooks, and comparing respectively said determined time durations with said measured time durations. And issuing an alert upon detection of a variation above a predefined value between any of said determined durations and said measured durations respectively. | 2016-05-05 |
20160127413 | NETWORK PROTECTION SYSTEM AND METHOD - Systems and methods for protecting at least one client from becoming part of at least one botnet by monitoring and analyzing botnet communications to and from criminal servers and identifying at least one botnet attack on at least one client. The system may comprise virtual machines deliberately infected with malicious content and operable to record botnet communications to and from criminal servers. The virtual machines are in communication with a processing unit configured to index data collected. Data related to the prevalence of cyber threats may be presented to users in response to queries. | 2016-05-05 |
20160127414 | TLS connection abandoning - A network-based appliance includes a mechanism to enable the appliance to extract itself from man-in-the-middle (MITM) processing during a client-server handshake and without interrupting that connection. The mechanism enables the appliance to decide (e.g., based on a rule match against a received server certificate) to stop performing MITM during the handshake and thus to de-insert itself transparently, i.e., without interfering or signaling to either end of the session that this operation is occurring. Once the connection is abandoned in the manner, the appliance ignores additional traffic flow and thus can free up processing resources (CPU, memory, and the like) that would otherwise be required to decrypt the connection (even if no further inspection or rewrite processing would be expected to occur). | 2016-05-05 |
20160127415 | SYSTEM AND METHOD FOR PROVIDING ERROR HANDLING IN AN UNTRUSTED NETWORK ENVIRONMENT - An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user equipment (UE) attempting to connect to the first ePDG; determining an Internet Key Exchange version two (IKEv2) error type corresponding to the DIAMETER-based error; and communicating the IKEv2 error type to the UE over an SWu interface. In some cases, the IKEv2 error type can be included in a notify payload or in a vendor ID payload for an IKE authentication response (IKE_AUTH_RESP) message. By distinguishing the IKEv2 error type, the UE can determine whether the error is a temporary or a permanent type and can determine whether to attempt to connect again to the first ePDG after a period of time or attempt to connect to another ePDG, which can help to reduce unnecessary signaling and provide better connectivity and user experience. | 2016-05-05 |
20160127416 | APPARATUS AND METHOD FOR CONTROLLING ACCESS TO SECURITY CONTENT USING NEAR FIELD NETWORK COMMUNICATION OF MOBILE DEVICES - Disclosed is an apparatus for controlling access to a security content using near field network communication of mobile devices. A policy issuance provider registration unit requests a content security policy for a first content, a security content, to a service server, receives the content security policy for the first content, requests to the service server for a first mobile device to be registered as a content security policy issuance provider, and receives a result of registration and a provider policy from the service server. A policy issuance provider converting unit converts the first mobile device to the content security policy issuance provider when receiving a request for access for browsing the first content through near-field network communication from another mobile device in which a DRM client application is being executed. A temporary content security policy issuance unit issues a temporary content security policy for the first content through near-field network communication to the second mobile device so that the second mobile device can browse the first content. | 2016-05-05 |
20160127417 | SYSTEMS, METHODS, AND DEVICES FOR IMPROVED CYBERSECURITY - Embodiments relate to systems, devices, and computing-implemented methods for initiating a secure network communication system using a response to a risk assessment template and one or more computer knowledge bases to determine a network security policy, network security controls, hardware and software devices, and commands for the hardware and software devices. Embodiments also relate to systems, devices, and computing-implemented methods for monitoring the secure network communication system by monitoring communications from user devices, determining to hold communications based on the network security policy, notifying users of held communications, and allowing the users, via their user devices, to adjust the network security policy for overridable controls to authorize held communications. | 2016-05-05 |
20160127418 | POLICY-GUIDED FULFILLMENT OF A CLOUD SERVICE - A model represents a cloud service to be provisioned over a cloud. A policy guides provisioning and subsequent management of the cloud service. The model is modified by introducing code corresponding to the policy into the model, the introduced code to perform at least one action with respect to a rule of the policy, the at least one action selected from among validating the rule and performing remediation with respect to the rule. Responsive to the modifying of the model, a set of instructions is generated including code for deploying an instance of the cloud service according to the model, and the introduced code to perform the at least one action with respect to the rule. | 2016-05-05 |
20160127419 | COMPUTERIZED SYSTEM AND METHOD FOR ADVANCED NETWORK CONTENT PROCESSING - A computerized system and method for processing network content in accordance with at least one content processing rule is provided. According to one embodiment, the network content is received at a first interface. A transmission protocol according to which the received network content is formatted is identified and used to intercept at least a portion of the received network content. The intercepted portion of the network content is redirected to a proxy, which buffers the redirected portion of network content. The buffered network content is scanned in accordance with a scanning criterion and processed in accordance with the at least one content processing rule based on the result of the scanning. The processed portion of network content may be forwarded using a second interface. | 2016-05-05 |
20160127420 | Lawful Interception for Proximity Service - Apparatuses and methods are described, which perform control in relation to a connection for proximity service between at least two devices, perform lawful interception in relation to the proximity service with respect to at least one device to be intercepted of the at least two devices, and configure at least one radio access network control element to perform the lawful interception in relation to the proximity service. | 2016-05-05 |
20160127421 | SIP EXTENSION FOR DMR NETWORKS MATCHING PMR FEATURES - A system comprising:
| 2016-05-05 |
20160127422 | APPARATUS, SYSTEM AND METHOD OF DIFFERENTIATING BETWEEN AN IMS CONNECTION AND A NON-IMS CONNECTION - Some demonstrative embodiments include devices, systems and methods of differentiating between an Internet Protocol (IP) Multimedia Subsystem (IMS) connection and a non-IMS connection. For example, a UE may include a communication module configured to receive from an application a request to establish a Packet Data Network (PDN) connection, and to assign an IMS tag to a traffic flow identifier of the PDN connection, wherein the IMS tag indicates that the PDN connection is an IMS connection or a non-IMS connection. The communication module may be configured to receive from the application a request to handle data packets having the traffic flow identifier, and to process the request to handle the data packets based on the IMS tag assigned to the traffic flow identifier. | 2016-05-05 |
20160127423 | DIRECT CONNECTION WITH SIDE CHANNEL CONTROL - A wireless computer that pairs with a remote audio-video presentation device, such as a television. As a result of the pairing, a communication channel is established for the computer to transmit audio-video content for presentation through that device. Additionally, as part of the pairing, the computer and remote device select a side channel for communication of user commands. The wireless computer may display a user interface through which a user may input commands that control the manner in which the remote audio-video device presents the content. As a result, a user may use the wireless computer as a remote control for the audio-video device, controlling both the content presented and the manner in which it is presented. The side channel may use different frequencies than the channel used to communicate audio-video content, and may use very low power at frequencies in the digital TV spectrum. | 2016-05-05 |
20160127424 | METHOD FOR SEARCHING FOR DEVICE IN DIRECT COMMUNICATION SYSTEM AND APPARATUS THEREFOR - The present invention relates to a wireless communication system. Disclosed are a method for searching for a device and an apparatus therefor. To this end, the method for searching for a device of a first wireless device comprises: transmitting a probe request frame; and receiving a probe response frame from a second wireless device in response to the probe request frame, wherein the probe response frame may contain information on an access point (AP) to which the second wireless device is currently connected. | 2016-05-05 |
20160127425 | REGISTRATION METHOD FOR MANAGING NAT SHUTDOWN - The present invention provides a registration method for managing NAT shutdown. In Internet communication field, a user must perform registrations intermittently to a server through NAT, and increase the time interval of registration step by step. But NAT itself will shutdown if no packet is passed through for a long period. The registration method of the present invention is to adjust the time interval of registration step by step so that the time interval of registration is slightly less than the shutdown time of NAT, and then fix the time interval of registration to assure that all of the Invite packet can pass through without blocking up by the shutdown of NAT. | 2016-05-05 |
20160127426 | SPI HANDLING BETWEEN UE AND P-CSCF IN AN IMS NETWORK - Managing Security Parameter Information (SPIs) to prevent race condition failures begins where a system negotiates SPIs along with associated expiration times, and re-negotiates new SPIs as necessary. The system prevents race conditions that would otherwise occur when both an old SPI and a new SPI are active at the same time. The system accomplishes this by managing the storage and deletion of old SPIs such that only active SPIs are stored on the system for use by a User Equipment (UE) or Proxy Call Session Control Function (P-CSCF). | 2016-05-05 |
20160127427 | FOCUS COORDINATION IN GEOGRAPHICALLY DISPERSED SYSTEMS - A method, system, and computer program product for focus coordination in geographically dispersed systems are provided in the illustrative embodiments. A shifting of focus to a first object present in a first view is detected at a first data processing system in a first location in the geographically dispersed plurality of data processing systems. Metadata of the first view is identified, the metadata being usable to identify a second object in a second view at a second data processing system in a second location in the geographically dispersed plurality of data processing systems, the second object corresponding to the object in the view. A focus information package is constructed, wherein the focus information package includes an attribute of the first object and the metadata of the first view. The focus information package is sent to the second data processing system. | 2016-05-05 |
20160127428 | Data Collaboration in an Enterprise Environment - Example embodiments involve a system, computer-readable storage medium storing at least one program, and computer-implemented method for data collaboration in an enterprise environment. The method may include establishing a collaboration session to facilitate editing of a data record accessed by at least two client devices. The method further includes providing instructions to the at least two client devices that cause display of an editable representation of the data record, and modifying the editable representation of the data record in accordance with received user edits. The method further includes preventing further modification to the editable representation in response to receiving a freeze request. The method may further include writing data representative of the editable representation to a persistent storage repository in response to receiving a commit request. | 2016-05-05 |
20160127429 | APPLICANT ANALYTICS FOR A MULTIUSER SOCIAL NETWORKING SYSTEM - A method and system for conducting applicant analytics for a multiuser social networking system is disclosed. A social networking system stores member qualification data for a plurality of members of a social networking system. The social networking system receives an education institution interest indication. The social networking system receives an analytics data request from the client system, wherein the analytics request indicates a first education institution. The social networking system determines a list of other members of the social networking system that have indicated interest in the first education institution. The social networking system generates comparison data for the first member and the determined list of other members, wherein comparison data compares member qualification data of the first member and the determined list of other members. The social networking system transmits the generated comparison data to the client system. | 2016-05-05 |
20160127430 | BROADCASTING AND MANAGING BROADCASTS USING A TELEPHONY CONFERENCE PLATFORM - A system for broadcasting via a telephony conference platform includes a gateway device having a processor and a telephony conference platform. The gateway device broadcasts a broadcast media stream to a plurality of user devices. A user signal is received from one of the user devices via a user telephony connection between the user device and the telephony conference platform. The gateway device next suspends the broadcast media stream for the user device associated with the user signal, and mixes the user signal into the broadcast media stream in real time using the telephony conference platform. The gateway device then broadcasts the broadcast media stream comprising the user signal to the plurality of user devices in real time, except for the user device associated with the user signal. | 2016-05-05 |
20160127431 | SMOOTHING PEAK SYSTEM LOAD VIA BEHAVIOR PREDICTION IN COLLABORATIVE SYSTEMS WITH TEMPORAL DATA ACCESS PATTERNS - Techniques are described above for smoothing peak load in collaborative systems. One embodiment includes, prior to a predicted peak load period, pre-staging user-data associated with one or more users of the collaborative system. During the predicted peak load period, a request from a first one of the users for access to the pre-staged user-data associated with the first user is received. And in response to the request, the pre-staged user-data is provided to the first user. | 2016-05-05 |
20160127432 | METHODS AND SYSTEMS FOR ESTABLISHING, HOSTING AND MANAGING A SCREEN SHARING SESSION INVOLVING A VIRTUAL ENVIRONMENT - Techniques for establishing a screen sharing session are described. Consistent with some embodiments, a web conferencing application executing at a mobile computing device enables a user to specify the identity of a remote computer. The identity of the remote computer is communicated to a web conferencing service, directing the server operating the web conferencing service to establish a remote desktop connection with the remote computer. Once established, the web conferencing service receives from the remote computer a stream of information representing a user interface of the remote computer, and then broadcasts the user interface to all computing devices participating in the web conferencing session, while enabling the mobile computing device to manipulate the user interface of the remote computer. | 2016-05-05 |
20160127433 | BROADCASTING AND MANAGING BROADCASTS USING A TELEPHONY CONFERENCE PLATFORM - A system for managing a broadcasting platform includes a gateway device that broadcasts a broadcast media stream to a plurality of user devices. Each user device is connected to a primary conference room of a telephony conference platform of the gateway device via a first user telephony connection. The gateway device receives a user signal from a first user device through the telephony conference platform via a second user telephony connection associated with the first user device, between the first user device and a secondary conference room of the telephony conference platform. The gateway device mixes the user signal into the broadcast media stream in real time using the telephony conference platform and broadcasts the broadcast media stream comprising the user signal to the plurality of user devices connected to the primary conference room in real time, excluding the first user device. | 2016-05-05 |
20160127434 | SYSTEMS AND METHODS FOR TRANSMITTING AND RECEIVING BROADCAST DATA - Systems and methods for transmitting and receiving broadcast data are disclosed. In one embodiment, a system includes a modulator configured to receive a stream of Ethernet packets and modulate the stream of Ethernet packets to produce a baseband signal, where each Ethernet data packet includes broadcast data that is encapsulated in a IP/UDP packet. The system can also include an upconverter configured to upconvert the baseband signal to a transmission frequency, and a transmitter configured to transmit the upconverted signal. | 2016-05-05 |
20160127435 | Method for Delivering Advertising Content and/or Advertising Media and Communication System for Performing the Method - The invention relates to a method for delivering advertising content and/or advertising media from an advertising media server to a client device, wherein the client device transmits a request for advertising content and/or advertising media to a Flash socket server via an initiated Flash socket connection, the Flash socket server communicates with the advertising media server addressed in the request to initiate a transmission of the advertising content and/or advertising media requested by the client device, and wherein the transmission of the requested advertising content and/or advertising media from the advertising media server to the client device takes place via the Flash socket server and the Flash socket connection set up between the Flash socket server and the client device and/or the transmission of the advertising content and/or advertising media takes place to at least one third server from which the advertising media and/or advertising content can be retrieved by the client device. | 2016-05-05 |
20160127436 | MECHANISM FOR FACILITATING USER-CONTROLLED FEATURES RELATING TO MEDIA CONTENT IN MULTIPLE ONLINE MEDIA COMMUNITIES AND NETWORKS - In accordance with embodiments, there are provided mechanisms and methods for facilitating playlist assistance and sharing of media content over multiple media communities according to one embodiment. In one embodiment and by way of example, a method includes receiving, at a first computing device, a request relating to media content. The request may be placed by a user at a second computing device. The method may further include researching a plurality of media playlists at a plurality of media communities for the media content, selecting one or more of the plurality of media playlists at one or more of the media communities having the media content, and transmitting, from the first computing to the second computing device, the one or more media playlists having the media content. | 2016-05-05 |
20160127437 | Method and Apparatus For Segmenting Media Content - To create information in media content a standardized segment tag associated with macro segments is created To extract segments from media content, macro segments of the contiguous stream are identified based on the presence of a standardized segment tag associated with each identified segment and data is extracted from each identified segment based on the associated tag. In a device for creating information in media content, a processor identifies macro segments of the contiguous stream and creates a standardized segment tag associated with each segment. A memory stores the macro segments and the standardized tag associated with each segment. A device for extracting segments includes a processor configured to identify macro segments of the contiguous stream based on the presence of a standardized segment tag associated with each segment. The processor extracts data from each identified macro segment based on the associated standardized tag. A memory stores the extracted data. | 2016-05-05 |
20160127438 | MAINTAINING VIRTUAL MACHINES FOR CLOUD-BASED OPERATORS IN A STREAMING APPLICATION IN A READY STATE - A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager automatically requests virtual machines from a cloud manager. The cloud manager provisions one or more virtual machines in a cloud with the specified streams infrastructure and streams application components. The streams manager then modifies the flow graph so one or more portions of the streaming application are hosted by the virtual machines in the cloud. When performance of the streaming application indicates a virtual machine is no longer needed, the virtual machine is maintained and placed in a ready state so it can be quickly used as needed in the future without the overhead of deploying a new virtual machine. | 2016-05-05 |
20160127439 | INTERFACING MULTIMEDIA PUBLIC WARNING SYSTEM ALERTS - Interfacing of multimedia public warning system alerts is discussed in which a user equipment (UE) receives a system information broadcast message with a multimedia alert contained therein. The multimedia alert triggers the UE to automatically initiate a multimedia broadcast application to process the alert. The multimedia alert includes broadcast system information that enables the multimedia broadcast application to automatically tune the UE to the streaming multimedia content associated with the alert. The UE may then process the streaming multimedia content on the UE. | 2016-05-05 |
20160127440 | CONFIGURING MANIFEST FILES REFERENCING INFRASTRUCTURE SERVICE PROVIDERS FOR ADAPTIVE STREAMING VIDEO - Techniques for serving a manifest file of an adaptive streaming video include receiving a request for the manifest file from a user device. The video is encoded at different reference bitrates and each encoded reference bitrate is divided into segments to generate video segment files. The manifest file includes an ordered list of universal resource locators (URLs) that reference a set of video segment files encoded at a particular reference bitrate. A source manifest file that indicates the set of video segment files is identified based on the request. An issued manifest file that includes a first URL and a second URL is generated based on the source manifest file. The first URL references a first domain and the second URL references a second domain that is different from the first domain. The issued manifest file is transmitted to the user device as a response to the request. | 2016-05-05 |
20160127441 | APPLICATION LEVEL AUDIO CONNECTION AND STREAMING - Systems and methods disclosed herein may include receiving from an audio application running on the computing device, a selection of a multimedia endpoint device. The multimedia endpoint device may be connected with the audio application in response to a request from the audio application. An audio stream of the audio application may be separated from a system audio stream. The system audio stream may include a plurality of audio signals generated by system components of the computing device or applications running on the computing device. The plurality of audio signals may be played on a default audio endpoint of the computing device. The separated audio stream of the audio application may be communicated to the selected multimedia endpoint device for playback. Separating the audio stream of the audio application from the system audio stream may be based on an API request from the application. | 2016-05-05 |
20160127442 | METHODS AND SYSTEMS FOR INSERTING CONTENT IN A MOBILE APPLICATION - Systems and methods for automatically providing third-party content for display in a mobile application based on an interaction with the mobile application are described. One or more processors identify a mobile application within which to insert content. The processors receive one or more actions performed on a mobile application executing on a computing device. The processors determine that the one or more actions performed on a mobile application correspond to a content insertion policy for inserting content to the mobile application. The processor then transmits, to the mobile application, content for display within the mobile application executing on the computing device responsive to determining that the one or more actions performed on the mobile application correspond to the content insertion policy. | 2016-05-05 |
20160127443 | COMPRESSION OF GRAPHICAL COMMANDS FOR REMOTE DISPLAY - In one example, a method for transmitting video data includes capturing a plurality of sets of graphical command tokens respectively renderable into a plurality of frames of video data; and responsive to determining that a length of a current set of graphical command tokens of the plurality of sets of graphical command tokens is the same as a length of a previous set of the plurality of sets of graphical command tokens, outputting, by a source device and to a sink device, a compressed version of the current set of graphical command tokens. | 2016-05-05 |
20160127444 | WEB COMPONENT DISPLAY BY CROSS DEVICE PORTAL - In an approach to distributing web components for display, a computer receives a request for a plurality of web components from a user on a first computing device. The computer fetches the web components. The computer determines whether the first computing device and one or more additional computing devices are registered in association with the user. Responsive to determining the first computing device and one or more additional computing devices are registered in association with the user, the computer identifies preferred device capabilities for at least one of the web components. The computer identifies a best match of the preferred device capabilities for the at least one of the web components to one or more device capabilities of a target computing device. The computer distributes the at least one of the web components to the first computing device or the one or more additional computing devices. | 2016-05-05 |
20160127445 | METHODS AND DEVICES FOR IDENTIFYING TERMINAL - Methods and devices are provided for identifying a terminal. In the method, the device receives a request for accessing a target webpage sent by the terminal. The device sends preset drawing information to the terminal, where the preset drawing information may instruct the terminal to draw a corresponding object according to the preset drawing information. The device acquires object information for characterizing the object drawn by the terminal and generates identification information for identifying the terminal according to the object information. | 2016-05-05 |
20160127446 | INFORMATION PROCESSING APPARATUS AND METHOD - An information processing apparatus having a cooperation function for causing a first application and a second application to cooperate, the first application operating on a network, the second application operating in the information processing apparatus, includes a holding unit configured to, in a case where the cooperation function gives an instruction to call the second application, hold data from the first application in association with predetermined specifying information, and an issuance unit configured to cause the cooperation function to issue to the second application a request to acquire data from the first application, wherein according to the request, the second application performs data acquisition using the specifying information, without using communication via Hypertext Transfer Protocol (HTTP). | 2016-05-05 |
20160127447 | FILE SHARING USING REMOTE APPLICATIONS - Techniques are disclosed herein for file sharing using remote applications. One embodiment provides a computer-implemented method that includes receiving, at a computing device, a selection of a reference for accessing the file, where the reference includes a first identifier specifying the file stored on a host server remotely located with respect to the computing device and a second identifier specifying an application that is running on the host server and that is configured to open files of a same type as the file. The method further includes establishing a remote connection to the application specified by the second identifier, by connecting to the host server and causing the application to be launched on the host server. In addition, the method includes causing the application to open the file specified by the first identifier and the user interface of the application to be remoted to the computing device. | 2016-05-05 |
20160127448 | WEARABLE DEVICE INCLUDING MODULAR FUNCTIONAL BLOCK AND METHOD FOR EXTENDING FUNCTION OF WEARABLE DEVICE USING MODULAR FUNCTIONAL BLOCK - Disclosed are a wearable device including a modular functional block and a method for extending a function of a wearable device using a modular functional block. The wearable device including the modular functional block according to an embodiment of the present invention includes a plurality of functional blocks that are removably fastened to a strap connected to a main block of the wearable device. Here, a processing block of at least one of the main block and the plurality of functional blocks recognizes a mounting state of each of the other functional blocks, and generates application information provided in a combination of the functional blocks fastened to the strap. | 2016-05-05 |
20160127449 | Recipe exchange and management system - A recipe exchange and management system is provided for a group of related restaurants. The system may be implemented as a network service that provides a series of interfaces or web pages to implement recipe creation, recipe sharing, and recipe and menu management. Users of the system may login with a username and password to access recipe data and menu data of any of two or more restaurants supported by the network service. A recipe may be created by a first user and reviewed by one or more second users of the service. A user associated with a first restaurant of the group of restaurants may access a recipe associated with a second restaurant of the group of restaurants. | 2016-05-05 |
20160127450 | METHOD AND APPARATUS FOR ACCELERATING DATA TRANSMISSION IN A NETWORK COMMUNICATION SYSTEM - A second network node receives a first download request from a first network node. After determining that the first data object requested by the first node is not locally stored at the second network node, the second node sends a second download request for the first data object to a third network node and records a mapping relationship for the three network nodes. After receiving N1 data packets from the third network node and determining that a total amount of data in the N1 data packets corresponding to the first data object exceeds a predefined data amount threshold, the second node starts transmitting the data in the N1 data packets corresponding to the first data object to the first network node according to the recorded mapping relationship. | 2016-05-05 |
20160127451 | TRIGGERING OF NOTIFICATIONS IN A COMMUNICATIONS NETWORK - A method of triggering a notification in a communications network method comprises specifying at least one computer device as a recipient device for the notification. The method further comprises triggering a rendering of the notification on the specified recipient device, wherein the notification has associated therewith a notification duration that is based on a current operational context of the notification. Furthermore, a network server and a computer system for triggering a notification in a communications network are defined. | 2016-05-05 |
20160127452 | OPENING LOCAL APPLICATIONS FROM BROWSERS - Systems and methods are disclosed herein for opening local applications from browsers. A request to open a document associated with a cloud computing system is received from a user. A determination is made that the local device has a copy of the document, and a local application is selected to open the local copy. A message is transmitted to open the local copy with the selected local application. | 2016-05-05 |
20160127453 | WORKLOAD DEPLOYMENT DENSITY MANAGEMENT FOR A MULTI-STAGE COMPUTING ARCHITECTURE IMPLEMENTED WITHIN A MULTI-TENANT COMPUTING ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for workload deployment density management for a multi-stage architecture implemented within a multi-tenant computing environment. The method includes receiving different requests from different tenants of a multi-tenant computing environment to deploy respectively different application instances of respectively different computer programs into different nodes of the host computing system. The method also includes determining from each request an associated stage of a software lifecycle for a corresponding one of the application instances. Finally, the method includes deploying each of the application instances into a particular one of the nodes depending upon an associated stage of each of the application instances so that each of the nodes hosts different application instances for different tenants of a common stage of the software lifecycle. | 2016-05-05 |
20160127454 | INTERCONNECTION PLATFORM FOR REAL-TIME CONFIGURATION AND MANAGEMENT OF A CLOUD-BASED SERVICES EXCHANGE - In one example, a cloud-based services exchange comprises a plurality of interconnection assets configured to connect a customer of the cloud-based services exchange to one or more cloud service providers, the plurality of interconnection assets including a virtual circuit by which the customer accesses a cloud service from the one or more cloud service providers; and an orchestration engine configured to modify the plurality of interconnection assets. | 2016-05-05 |
20160127455 | SHARING AN APPLICATION CONFIGURATION AMONG SOCIAL NETWORKS - A machine may generate and store a correlation among multiple identifiers of the user that enable access to an application through multiple systems. For example, the user may have a first identifier for using a first social network system, and a second identifier for using a second social network system, and the machine may generate and store a correlation between the first identifier and the second identifier. The machine may identify the user based on the first identifier and access a database that stores the correlation. The machine may then access a configuration of the application based on the correlation and configure the application in accordance with the configuration. The machine may generate a visual representation of the configured application, provide the visual representation to a device of a further user, receive an indication of an opinion of the further user on the visual representation, and present the indication. | 2016-05-05 |
20160127456 | MUSICAL COMPOSITION AND PRODUCTION INFRASTRUCTURE - Disclosed is a system infrastructure that allows for the online and social creation of music and musical thoughts in real-time or near real-time by amateurs and professionals. Individual musical contributions are combined into a single, cohesive musical thought that is presented for approval to the collaborating creators. This solution is extensible from the world of music to other creative endeavors including the written word, video, and digital images. The foregoing system infrastructure powers and supports the online and social creation of music and musical thoughts in real-time or near real-time by amateurs and professionals alike. | 2016-05-05 |
20160127457 | Machine-To-Machine (M2M) Autonomous Media Delivery - Systems, methods, and apparatuses may use machine-to-machine communication to provide customized media in response to an autonomous detection of an event, such as a celebration, emergency, or security event. A method may include receiving a request in response to an autonomous detection of an event, whereby the request includes information about the event. Media appropriate for the event may be determined based on the information about the event. The media appropriate for the event may be further adapted according to information on a destination device and users of the destination device. Instructions are then provided to deliver the media appropriate for the event to the destination device. | 2016-05-05 |
20160127458 | P2P APPARATUS AND METHOD FOR P2P CONNECTION - A point-to-point (P2P) apparatus has a device resource, a processor, a storage device and a network interface. The processor processes the device resource. The storage device stores a unique identification code. The network interface connects to a first network via a first gateway and transmits the unique identification code to a server via a second network by a first gateway. An external device accesses the device resource via the first gateway. The second network is a TCP/IP network and the first network is not a TCP/IP network. | 2016-05-05 |
20160127459 | APPARATUS, SYSTEM AND METHOD OF COMMUNICATING TRAFFIC TO A PLURALITY OF PEER TO PEER DEVICES - Some demonstrative embodiments include apparatuses, systems and/or methods of Peer to Peer communication. For example, a device may include a controller to generate a Peer to Peer discovery frame including at least one Multicast attribute, the Multicast Attribute including an address field and one or more attribute fields, the address field to indicate a plurality of devices; and a radio to transmit the Peer to Peer discovery frame, and to transmit multicast traffic to the plurality of devices according to the one or more attribute fields. | 2016-05-05 |
20160127460 | MULTI-HOP WIRELESS PEER-TO-PEER DISCOVERY PROTOCOL - A method is disclosed for discovering communication devices. The method includes broadcasting, with a first communication device, a message that can be detected by one-hop neighbors. The first communication device listens for data indicating that it has at least one two-hop neighbor, and constructs and stores a list of its one-hop and two-hop neighbors. In addition, the method may also include selecting a subset of the set of one-hop neighbors such that all of the two-hop neighbors of the first communication device can be reached by the first communication device through the subset of one-hop neighbors. Then the selected subset is stored on a list on the first communication device. Next, the first communication device broadcasts to one-hop neighbors in the selected subset, the data indicating that a one-hop neighbor is part of the selected subset. The method also allows the discovery of multi-hop neighbors by utilizing the selected subset. | 2016-05-05 |
20160127461 | METHOD AND APPARATUS FOR REAL TIME INTERACTIVE MODERATION OF NETWORK TRAFFIC - A new approach is proposed that contemplates systems and methods to support interactive moderation of network traffic, where authorization to access certain web media content is approved or denied on a per-content item basis in real time. When a content requester initiates a request for a piece of web media content from a content provider over the Internet, the request is intercepted and either allowed, denied, or marked as requiring further approval based on content access policies and restrictions specific to the content requester. If the content request is marked as requiring further approval, it will be forwarded to a traffic moderator, which will make a decision on the request based on policies related to the content requester and the requested web media content in real time. The requester is then either allowed or denied access to the web media content based on the decision by the traffic moderator. | 2016-05-05 |
20160127462 | TECHNIQUES FOR CONTROLLING CLIENT TRAFFIC ON A CLUSTERED SYSTEM - Various embodiments are generally directed an apparatus and method to receive client traffic comprising information at a primary cluster of a clustered system over a communications link, perform, a replication operation on the clustered system to replicate the information on a secondary cluster of the clustered system, and determine a client traffic throughput for the client traffic and a replication throughput for the replication operation. In some embodiments, the apparatus and method may include buffering one or more write operations to control the client traffic such that the client traffic throughput is less than or equal to the replication throughput for the replication operation. | 2016-05-05 |
20160127463 | SYSTEMS AND METHODS FOR PERFORMING UPDATES IN A DISTRIBUTED ENVIRONMENT - The present disclosure is directed towards systems and methods for performing updates in a distributed environment, which comprises receiving a platform product and a plurality of supporting products at a server, the server being accessible by one or more access devices and receiving a plurality of modified supporting products at the server, a given modified supporting product corresponding to a given supporting product. A determination is made as to whether a given one of the plurality of supporting products is in use by the one or more access devices. If the given one of the plurality of supporting products is not in use, the given one of the plurality of supporting products is overwritten with the corresponding modified supporting platform product. If the given one of the plurality of supporting products is in use, the given one of the plurality of supporting products is locked until its use terminates. | 2016-05-05 |
20160127464 | OUTPUT DATA PROVIDING SERVER, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, OUTPUT DATA PROVIDING METHOD, INFORMATION PROCESSING METHOD, AND DATA STRUCTURE OF CONTENT DATA - When a user executes an operation of requesting a client terminal for starting processing, a server starts information processing of specified contents, transmitting initial output data such as an initial screen and a sound to the client terminal. The client terminal outputs the initial data and, every time the user executes an indication input such as a command input, transmits the input information concerned to the server. The server executes information processing corresponding to the input information and generates output data common to destination client terminals as basic output data and output data for each client terminal as individual output data. The client terminal decodes an image and sound data that are basic output data and synthesizes figures and sounds based on individual output data, thereby outputting the synthesized figures and sounds. | 2016-05-05 |
20160127465 | CROSS-PLATFORM DATA SYNCHRONIZATION - Systems, apparatus, and methods are disclosed for using a deduplication index, a centralized cache repository, and a data mapping mechanism to detect and synchronize changes to deduplicated data objects stored in two or more third party databases. The disclosed systems, apparatus, and methods can maintain, in a deduplication index, a two-way mapping between one or more data object references and a datagram which uniquely identifies the real-world entity represented by said data object; maintain, in the centralized cache repository, two temporal states, one including current information, the other including previously-synchronized information. The disclosed systems, apparatus, and methods can also implement the data mapping mechanism to determine corresponding data objects in other systems when one or more data objects have apparent changes when compared with the centralized cache repository, and apply a given configuration in order to synchronize the current temporal states of all such data objects. | 2016-05-05 |
20160127466 | METHODS AND SYSTEMS FOR PROVIDING CONTENT DATA TO CONTENT CONSUMERS - An automated content extraction, transformation, and load (ETL) system extracts content from a source content system, transforms the content, loads the transformed content into a specific target system, and then allows a content consumer to search, request, and receive content data without communicating with the source content system. The system may retrieve content data of any type from one or more content delivery management (CMS) repositories using CMS connectors. The system then may extract content from the retrieved content items and may provide the extracted content items to a search platform for indexing. The system may extract the one or more content assets and store the extracted assets into a content delivery network (CDN), for example without communicating or accessing any of the CMS repositories. | 2016-05-05 |
20160127467 | TECHNIQUES FOR STORING AND DISTRIBUTING METADATA AMONG NODES IN A STORAGE CLUSTER SYSTEM - Various embodiments are generally directed to techniques for reducing the time required for a node to take over for a failed node or to boot. An apparatus includes an access component to retrieve a metadata from a storage device coupled to a first D-module of a first node during boot, the metadata generated from a first mutable metadata portion and an immutable metadata portion, and the first metadata specifying a first address of a second D-module of a second node; a replication component to contact the second data storage module at the first address; and a generation component to, in response to failure of the contact, request a second mutable metadata portion from a N-module of the first node and generate a second metadata from the second mutable metadata portion and the immutable metadata portion, the second mutable metadata portion specifying a second address of the second D-module. | 2016-05-05 |
20160127468 | VIRTUAL NON-VOLATILE MEMORY EXPRESS DRIVE - A processing device receives an input/output (I/O) command generated by a process, the I/O command directed to a virtual storage provided to a host executing the process, wherein the virtual storage comprises a virtual non-volatile memory express (NVMe) drive. The processing device generates a new I/O command based on the received I/O command and encapsulates the new I/O command into a message. The processing device sends the message to at least one of a remote NVMe storage device or a storage server comprising one or more remote NVMe storage devices. | 2016-05-05 |
20160127469 | CLOUD STORAGE MANAGING SYSTEM, CLOUD STORAGE MANAGING METHOD, AND APPARATUS FOR SAME - Disclosed are a cloud storage managing system, a cloud storage managing method, and an apparatus for same. To achieve the objective according to the present invention, the cloud storage managing apparatus according to the present invention comprises: a content alignment unit for aligning and shifting content recorded on a cloud storage, by transmitting a shift signal to the cloud storage; and a broker application programming interface (API) providing unit for abstracting, into a broker API, a storage API which corresponds to the type of the cloud storage by using an API mapping table, and providing the content to a terminal device by using the broker API. | 2016-05-05 |
20160127470 | SYSTEM AND METHOD FOR SHARING SAN STORAGE - According to various embodiments, systems and methods are provided that relate to shared access to Storage Area Networks (SAN) devices. In one embodiment, a Storage Area Network (SAN) host is provided, comprising: a server component: a first host bus adapter configured to be connected to a SAN client over a first SAN; a second host bus adapter configured to be connected to a SAN storage device over a second SAN; and wherein the server component is configured to manage a data block on the SAN storage device, receive a storage operation request from the SAN client through the first host bus adapter, and in response to the storage operation request, perform a storage operation on the data block, the storage operation being performed over the second SAN through the second host bus adapter. | 2016-05-05 |
20160127471 | METHOD AND APPARATUS OF REDUNDANT PATH VALIDATION BEFORE PROVISIONING - Exemplary embodiments of the invention provide a technique to validate physical cabling and logical path before provisioning volume. In accordance with an aspect, a computer comprises a memory storing software and a processor executing the software. The software is operable to: identify first server port and second server port forming redundant ports of a server and first storage port and second storage port forming redundant ports of a storage system; and check whether a redundant relationship is formed by at least one of (i) a physical connection between the first server port and the first storage port and a physical connection between the second server port and the second storage port, or (ii) a logical connection between the first server port and the first storage port and a logical connection between the second server port and the second storage port. | 2016-05-05 |
20160127472 | METHOD AND APPARATUS OF REDUNDANT PATH VALIDATION BEFORE PROVISIONING - Exemplary embodiments of the invention provide a technique to validate physical cabling and logical path before provisioning volume. In accordance with an aspect, a computer comprises a memory storing software and a processor executing the software. The software is operable to: identify first server port and second server port forming redundant ports of a server and first storage port and second storage port forming redundant ports of a storage system; and check whether a redundant relationship is formed by at least one of (i) a physical connection between the first server port and the first storage port and a physical connection between the second server port and the second storage port, or (ii) a logical connection between the first server port and the first storage port and a logical connection between the second server port and the second storage port. | 2016-05-05 |
20160127473 | Vehicle Communication System - A communication system for facilitating control over a function of a vehicle ( | 2016-05-05 |
20160127474 | EXCHANGING FLOOR ARBITRATION HISTORY INFORMATION DURING A COMMUNICATION SESSION - In an embodiment, a communication device (e.g., a current floor arbitrator of the session, a proxy device, etc.) records a floor arbitration history that tracks one or more floor grants and one or more floor denials that occur while a first device is performing a floor arbitration function for the communication session with the communication group, and transmits some or all of the floor arbitration history to a second device during the communication session. The second device (e.g., a new floor arbitrator for the session, a late or re-joining participant to the communication session, etc.) participates in the communication session based at least in part upon the received floor arbitration history (e.g., by factoring the received floor arbitration history into future floor-related decisions, by selectively requesting particular missed portions of the communication session, etc.). | 2016-05-05 |
20160127475 | Leak-Proof Classification for an Application Session - The present disclosure discloses a system and method for classifying an application session for forwarding or refrain from forwarding to a client. Generally, classifying an application session includes: receiving a first request from a client device at a first network device; transmitting, by the first network device, a second request to obtain classification information corresponding to the first request; forwarding, by the first network device, the first request from the client device prior to receiving the classification information corresponding to the first request; receiving, by the first network device, the classification information corresponding to the first request; receiving, by the first network device, a first response corresponding to the forwarded first request; and based on the classification information, forwarding or refraining from forwarding the first response to the client device. | 2016-05-05 |
20160127476 | METHODS AND SYSTEMS FOR FACILITATING A REMOTE DESKTOP SESSION UTILIZING A REMOTE DESKTOP CLIENT COMMON INTERFACE - Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling. | 2016-05-05 |
20160127477 | ZERO CLIENT DEVICE WITH CACHED CONNECTIONS - Systems and methods for maintaining zero client sessions between different servers and a zero client device are presented herein. | 2016-05-05 |
20160127478 | Creating Services Using Service Modules - Concepts and technologies are disclosed herein for creating services using service modules. A control system can detect a service creation request. The control system can identify service modules to be included in a service requested by the service creation request. A service control function can be created to manage the service requested by the service creation request. The service modules can be coupled together, and the service requested by the service creation request can be output. | 2016-05-05 |
20160127479 | EFFICIENT GROUP COMMUNICATIONS LEVERAGING LTE-D DISCOVERY FOR APPLICATION LAYER CONTEXTUAL COMMUNICATION - The disclosure relates to leveraging peer-to-peer (P2P) discovery messages for application layer contextual communication. A P2P middleware layer of a user device receives a P2P discovery message, the P2P discovery message comprising metadata including an identifier of a first application and content to be rendered by the first application, determines whether or not there is an application installed on the user device that can render the content, and sends the content to be rendered by the first application to the installed application based on there being an application installed on the user device that can render the content. | 2016-05-05 |
20160127480 | Systems And Methods For Data Routing Management - Methods and systems for data routing management are disclosed. A method can comprise a communication processing system receiving a request directed to an address. The communication processing system can determine performance capabilities of a first logical grouping of computing devices, wherein the first logical grouping of computing devices share the address. The communication processing system can determine whether at least one computing device of the first logical grouping of computing devices can receive the request. If at least one computing device of the first logical grouping of computing devices can receive the request, the request can be transmitted to the at least one computing device of the first logical grouping of computing devices. If at least one computing device of the first logical grouping of computing devices cannot receive the request, the request can be transmitted to a second logical grouping of computing devices that share the address. | 2016-05-05 |
20160127481 | DIFFERENTIATED SERVICE IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past. This approach further allows for a validation assessment that is based on actual metrics of service usage verses an estimated usage at the time of service implementation. | 2016-05-05 |
20160127482 | External Device Interface Abstraction - Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for executing a user interface on a computing device, generating one or more event handlers executed on the computing device, each event handler corresponding to a local device service file, receiving first data at a first event handler of a first local device service associated with a first device that is in electronic communication with the computing device, generating, using the first event handler, a first event that includes the first data, receiving, at an external device service, the first event, generating, using the external device service, a first external device event based on the first event, and performing a first action based on the external device event. | 2016-05-05 |
20160127483 | METHOD AND DEVICE FOR DISPLAYING ITEM CONTENT - A method and a device for displaying reminder item content on a lock screen interface of a terminal are described. The device may implement the method described. The device may acquire a current geographical position of the terminal when displaying the lock screen interface. The device may detect whether the current geographical position is within a display range of the reminder item. If the current geographical position is within the display range, the device may display the reminder item content on the lock screen interface. Further, when the reminder item content is displayed on the lock screen interface, and if the current geographical position of the terminal is outside the display range but within a reminding range, then the user may be prompted about the reminder item content displayed on the lock screen interface. | 2016-05-05 |
20160127484 | PERSONAL MONITORING USING A REMOTE TIMER - Method and apparatus for monitoring the status and location of personnel using a remote timer. In some embodiments, a method includes logging in, through a network accessible device, a geo position of a subject to initiate a monitored session associated with the subject. A countdown timer of a remote server is initiated to denote a monitored time interval, the remote server in communication with the network accessible device over a network. A notification is generated and transmitted across the network to a monitoring device responsive to a conclusion of the monitored time interval. | 2016-05-05 |
20160127485 | RECOMMENDATIONS BASED ON GEOLOCATION - In one embodiment, a method includes accessing geolocation data indicating a current geolocation of a client device of a user; identifying one or more categories of interest to the user based at least in part on social information of the user; identifying one or more objects based at least in part on the current geolocation; and determining one or more recommendations for the user based at least in part on a calculated interest value of each identified object. The calculated interest value is based at least in part on the identified categories of interest to the user. The method also includes providing the recommendations for transmission to the client device. The recommendations include one or more of the identified objects. | 2016-05-05 |
20160127486 | METHOD AND SYSTEM FOR LOCATION SHARING - Method and server system for location sharing are disclosed. The method includes: determining a motion state of a first user in accordance with respective information items related to a current location and a previous location of a first device associated with the first user; in accordance with a determination that the motion state of the first user is a stationary state, determining a user direction of the first user based an orientation of the first device associated with the current location; in accordance with a determination that the motion state of the first user is a moving state, determining the user direction of the first user based on a motion direction from the previous location to the current location of the first device; and sending the determined user direction of the first user to one or more second devices associated with one or more second users for location sharing. | 2016-05-05 |
20160127487 | SYSTEMS AND METHODS FOR GENERATING A UNIQUE FINGERPRINT AGGREGATING SET OF UNIQUE TRACKING IDENTIFIERS THROUGHOUT REQUEST/RESPONSE PROCESSING - Systems and methods for generating a fingerprint including multiple tracking identifiers. Control circuitry receives a first tracking identifier from a first component of a network. The first tracking identifier is associated with a data request sent to the first component. The control circuitry identifies parameters based on a configuration of the first component. The control circuitry transmits an application programming interface (API) request for information related to the parameters from the first component. The control circuitry receives information related to the parameters for the first component in response to the API request. The control circuitry determines a second tracking identifier based on the first tracking identifier and the information related to the parameters for the first component. The control circuitry transmits the second tracking identifier to the first component. The first tracking identifier and the second tracking identifier are combined to generate a fingerprint in connection with the data request. | 2016-05-05 |
20160127488 | METHODS AND APPARATUS TO IMPROVE USAGE CREDITING IN MOBILE DEVICES - Methods, apparatus, systems and articles of manufacture are disclosed to identify a first request having a first source port number, from a device. Examples disclosed herein determine whether a second request, having a second source port number, is within a threshold number of ports from the first source port number. Examples disclosed herein group the first and the second requests as a first session when the second source port number is within the threshold number of ports from the first source port number, and identify an application associated with the first session. | 2016-05-05 |
20160127489 | MULTI-TENANT NETWORKING - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media are disclosed for binding a process to a wildcard address and a port on a plurality of nodes of a cluster. A process receives a first request for a first address of a first volume that is sent to the port and a first address associated with a first virtual local area network that is not the wildcard address. The process determines the first address, a name of the first VLAN, and a first node that contains information regarding the first volume. The process determines an address of the first node that is part of the first VLAN. The address of the first node is returned. The process receives another request for a second address of a second volume that is sent to the port and a second address associated with another VLAN that is not the wildcard address. | 2016-05-05 |
20160127490 | DYNAMIC DATA COMPRESSION - A method for dynamic data compression includes receiving, at a first computer system, a request for data from a second computer system. A distance factor is determined, based, at least in part, on distance separating the first computer system and the second computer system. A processor loading factor is determined, based, at least in part, on one or more processor utilization percentages of the first computer system, and a network bandwidth factor is determined, based, at least in part, on bandwidth utilization of data transport fabric interconnecting the first computer system and the second computer system. A data compression selection index is calculated, based, at least in part, on the distance factor, the processor loading factor, and the network bandwidth factor. The requested data is compressed, when indicated by the calculated data compression selection index, and transmitted from the first computer system to the second computer system. | 2016-05-05 |
20160127491 | CLOUD SERVICE SYSTEM, CLOUD SEVICE DEVICE, AND METHOD USING SAME - Disclosed are a cloud service system, a cloud service device, and a method using same. When a download of a shared original content is requested, a conversion factor is determined by considering device information and network information of a terminal device requesting the download, and converted content is provided, wherein the content of the converted content has been converted based on the determined conversion factor. The conversion factor is calculated by applying an application ratio to a base conversion factor. As a result, downloading time can be reduced, network traffic can be reduced, and saving space on a terminal can be efficiently managed. | 2016-05-05 |
20160127492 | NON-VOLATILE MEMORY EXPRESS OVER ETHERNET - A processing device receives a message encapsulating an input/output (I/O) command from a remote computing device. The processing device identifies one or more physical storage devices to be accessed to satisfy the I/O command. The processing device then sends, to each physical storage device of the one or more physical storage devices, one or more non-volatile memory express (NVMe) commands directed to that physical storage device. | 2016-05-05 |
20160127493 | CACHING METHODS AND SYSTEMS USING A NETWORK INTERFACE CARD - A computing device having a host memory and a host processor for executing instructions out of the host memory; and a network interface card interfacing with the computing device are provided. When there is a cache hit for a read request, the network interface card processes the read request by obtaining data stored from one or both of the host memory and a storage device that the network interface card accesses without involving the host processor and when there are is a cache miss, then the read request is processed by the host processor. | 2016-05-05 |
20160127494 | REMOTE DIRECT NON-VOLATILE CACHE ACCESS - A system and method of providing direct data access between a non-volatile cache and a NIC in a computing system. A system is disclosed that includes a processing core embedded in a controller that controls a non-volatile cache; and a direct access manager for directing the processing core, wherein the direct access manager includes: a switch configuration system that includes logic to control a switch for either a remote direct access mode or a host access mode, wherein the switch couples each of the NIC, a local bus, and the non-volatile cache; a command processing system that includes logic to process data transfer commands; and a data transfer system that includes logic to manage the flow of data directly between the non-volatile cache and the NIC. | 2016-05-05 |
20160127495 | SYSTEM AND METHOD FOR PROVIDING A DYNAMIC CLOUD WITH SUBNET ADMINISTRATION (SA) QUERY CACHING - A system and method support can subnet management in a cloud environment. During a virtual machine migration in a cloud environment, a subnet manager can become a bottleneck point that delays efficient service. A system and method can alleviate this bottleneck point by ensuring a virtual machine retains a plurality of addresses after migration. The system and method can further allow for each host node within the cloud environment to be associated with a local cache that virtual machines can utilize when re-establishing communication with a migrated virtual machine. | 2016-05-05 |
20160127496 | METHOD AND SYSTEM OF CONTENT CACHING AND TRANSMISSION - A content caching and transmission method and a system thereof are disclosed. In the method, a client side returns only identifiers that are cached by the client to a server when a new page is to be displayed, and the server directly obtains content of a content queue based on the identifiers to cause the client to display the content corresponding to the identifiers without the need of performing ordering and computations repeatedly, thus saving traffic and caching resources, reducing data transmitted between the client and the server, improving user experience with respect to a browsing speed, and facilitating expansion in face of an increase in the number of users. | 2016-05-05 |
20160127497 | SMART SITE PRELOADING - A method, medium, and system for receiving a request to load a hierarchical content container, the request being invoked in reply to an event and the hierarchical content container referencing at least one page and other content item; retrieving a site structure of the requested hierarchical content container exclusive of a structure of the at least one page and the other content item referenced by the hierarchical content container; and presenting a representation of the site structure of the requested hierarchical content container in a user interface, as well as receiving a request to load an application, the request being invoked in reply to an event and the application referencing a plurality of application resources; and loading the application, in reply to the request and based on a usage ranking assigned to each of the plurality of application resources, a sub-set of the plurality of application resources. | 2016-05-05 |
20160127498 | METHOD AND APPARATUS FOR PROVIDING INFORMATION TO AN APPLICATION IN A MOBILE DEVICE - A method, computer readable medium, and an apparatus for providing information to an application of a mobile endpoint device are disclosed. For example, the method receives a request for the information from the application of the mobile endpoint device, and provides the information to the application from a cache when the application is deemed to be a non-critical application. | 2016-05-05 |
20160127499 | DETERMINING A VISITATION PROFILE FOR A USER - A method, non-transitory computer-readable storage device, and apparatus for determining a visitation profile for a user are disclosed. For example, the method gathers uniform resource locator visitation data from each user endpoint device of a plurality of user endpoint devices associated with the user, aggregates the uniform resource locator visitation data that is gathered from the plurality of user endpoint devices associated with the user, and determines the visitation profile for the user, wherein the visitation profile indicates a trend of the uniform resource locator visitation data over a time period. | 2016-05-05 |
20160127500 | System And Method For Modifying A Preference - A method for profile matching includes receiving, from a first user, a first preference regarding a second user. The method includes receiving, from the second user, a second preference regarding the first user. The method also includes determining, based on the first preference and the second preference, to allow the first user to modify the first preference. The method also includes receiving, from the first user, a request to modify the first preference. The method also includes modifying the first preference. | 2016-05-05 |
20160127501 | HINT-BASED IDENTIFICATION SCHEME FOR A NETWORK - An interest vector directed from a source profile to a target profile, and hints associated with the interest vector, are received. A profile filter is generated based on the hints. Profiles of a network are filtered, creating a set of profiles, each having attributes matching the hints. A first number of profiles in the set of profiles is calculated. Second hints are received, based on the first number, the second hints associated with the interest vector. A second profile filter is generated based on the second hints, and used to filter the profiles of the network, creating a second set of profiles. A second number of profiles in the second set of profiles is calculated. An interest alert is generated based on the second number, the interest alert including data sufficient to directly or indirectly identify the source profile and configured to notify the target profile about the interest vector. | 2016-05-05 |
20160127502 | METHOD FOR OPERATING MACHINES AND SYSTEM USING THE SAME - Disclosed herein are a method for operating machines and a system using the method, which can manage relations required in order to execute commands. The method includes generating a capability set required to execute the command by analyzing the command, and determining whether to participate in a machine group to execute the commands based on the generated capability set and capability parameters and status parameters of the machine. | 2016-05-05 |