33rd week of 2013 patent applcation highlights part 68 |
Patent application number | Title | Published |
20130212178 | SYSTEM AND METHOD FOR RECOMMENDING ONLINE MULTIMEDIA CONTENT - A method of recommending and prioritizing multimedia content targeted to a user is provided. The method includes (i) obtaining a first set that includes one or more multimedia content based on a first set of parameters, (ii) obtaining a second set that includes one or more multimedia content based on a second set of parameters, (iii) computing (a) one or more priority indicators of the one or more multimedia content of the first set, and (b) one or more priority indicators of the one or more multimedia content of the second set, and (iv) prioritizing a subset of multimedia content targeted to the user based on at least one of (a) the one or more priority indicators of the one or more multimedia content of the first set, and (b) the one or more priority indicators of the one or more multimedia content of the second set. | 2013-08-15 |
20130212179 | WEB-TELCO CONVERGENCE COMPRISING DOWNLOADING SCRIPT COMMANDS TO USER TERMINALS - The present invention relates to methods, apparatus and systems for enabling an improved Web-Telco Convergence, in particular for telecommunication session oriented service. A Web-Telco Convergence Function may identify user interface relevant information in telecommunication protocol messages relating to a telecommunication session oriented service for a user and transmits the identified user interface relevant information to a Virtual Terminal Function. The Virtual Terminal Function may obtain web assets based on the user interface relevant information and generate a user interface description. An address of the location of the user interface description may be transmitted to the Web-Telco Convergence Function which may transmit the address to a user device. | 2013-08-15 |
20130212180 | VALIDATING ACHIEVEMENTS OF USERS OF A SOCIAL NETWORK - A method and system for evaluating the reputation of a member of a social networking system is disclosed. Consistent with an embodiment of the invention, one or more attributes associated with a social networking profile of a member of a social network are analyzed. Based on the analysis, a ranking, rating or score is assigned to a particular category of reputation. When requested, the ranking, rating or score is displayed to a user of the social network. | 2013-08-15 |
20130212181 | INFORMATION-PROCESSING DEVICE, COMMENT-PROMPTING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - An information-processing device ( | 2013-08-15 |
20130212182 | METHOD AND SYSTEM FOR COLLABORATIVELY OPERATING SHARED CONTENT IN A VIDEO CONFERENCE - The disclosure provides a method for collaboratively operating shared content in a video conference, wherein the shared content is shared by a sharing terminal to a shared terminal. In the method, an operation event is transmitted by the shared terminal to the sharing terminal. The operation event is then transmitted to a virtual device of the sharing terminal, and the operation event is performed on the shared content by the virtual device. | 2013-08-15 |
20130212183 | APPLICATION BROKER - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, provide a broker for client applications. In one aspect, a method includes providing an electronic document that has a document format compatible with a document reader application. The electronic document includes a broker application and a client application. The broker application can be loaded into a virtual machine running in the document reader application on a client device. The loaded broker application loads the client application into the virtual machine, and the loaded client application provides a graphical user interface for display. In some instances, the loaded broker application receives data from the loaded client application and stores the received data as a data set in the electronic document. In some instances, the loaded broker application retrieves a data set from the electronic document and provides the retrieved data set to the loaded client application. | 2013-08-15 |
20130212184 | Method and Apparatus Pertaining to the Use of Identifying Images for Social Content Sources - A control circuit monitors treatment of incoming social content and then uses this treatment information to determine an identifying image to present for given social content sources. The monitored treatment can comprise, for example, whether the recipient opens incoming social content from various social content sources over some relevant period of time. By one approach, when the recipient user is tending to ignore social content from a given social content source, these teachings can provide for automatically selecting and displaying an image of a non-face portion of that social content source (such as an image of the backside of a person's head) to thereby convey a sense that the recipient's relationship with this particular person has been neglected. | 2013-08-15 |
20130212185 | ELECTRONIC MESSAGE METERING AND TRAFFIC MANAGEMENT IN A NETWORKED ENVIRONMENT - A system, method, electronic device and server are provided for metering electronic messages and for managing message traffic within an organization. An electronic message resistance value is stored for recipients within an organization. When a message is composed and addressed at a sending terminal, the electronic message resistance value may be retrieved and displayed at the sending terminal. The message server receiving the composed message for transmission to the recipient sends the message to the recipient in accordance with a priority determined based on the recipient's electronic message resistance; for example, the message may be sent with a low priority attribute, or the transmission of the message to the recipient may be delayed for a set period of time. | 2013-08-15 |
20130212186 | METHODS FOR COLLABORATIVELY ASSISTING A CONTROL ROOM OPERATOR - Methods for collaboratively assisting a control room operator are disclosed. An example method disclosed includes receiving a notification associated with a person via a portable wireless device. The notification includes information regarding a process control variable in a process control environment. The example method further includes altering the notification by the person via the portable wireless device and transmitting the altered notification via the portable wireless device. The control room operator and other persons associated with the notification are to receive the altered notification. | 2013-08-15 |
20130212187 | Mail Management - The instant application discloses, among other things, techniques to allow a user to inform direct mail senders of their preferences with respect to communications. | 2013-08-15 |
20130212188 | METHODS AND APPARATUS TO IDENTIFY SESSION USERS WITH COOKIE INFORMATION - Methods and apparatus are disclosed to identify session users with cookie information. An example method includes identifying activity associated with a first cookie having a first type, in response to identifying the first, parsing the first cookie to identify a first panelist, when the first cookie includes an identifier associated with a first panelist, associating current usage activity of the computing device with the first panelist, and when the first cookie includes an identifier unassociated with the first panelist, associating current usage activity of the computing device with a guest. | 2013-08-15 |
20130212189 | SYSTEMS AND METHODS FOR SHARING ONLINE CONTENT - Systems and methods are disclosed for sharing online content and, in particular, for allowing users of an online community to manage the delivery and sharing of messages received from other users of the community or those external to the community. In one or more implementations, the system may include clients, servers, and a network. Clients may communicate with the servers using the network in order to exchange data, messages, and other content with users of the online community. The online community includes configurable settings, allowing users to control the manner in which messages are delivered to them, as well as the extent to which their sent messages are automatically shared with users not identified by the sender. Using the online community, users may also communicate with, and receive communications from, individuals that have accounts on social media websites. | 2013-08-15 |
20130212190 | INTELLIGENT AUTOMATED MESSAGING FOR COMPUTER-IMPLEMENTED DEVICES - Various computer-implemented systems and methods are provided here for purposes of intelligent predictive messaging. An exemplary system can be operated to obtain message context data associated with a messaging session, process the message context data to obtain suggested message content for the messaging session, and automatically populate a message field of a user device with at least some of the suggested message content. The system may proceed by sending a message from the user device, where the message includes content of the message field. | 2013-08-15 |
20130212191 | DEVICE-AGNOSTIC NETWORK AND SOCIAL NETWORK SHARING OF... WEB-APPLICATIONS - A Software as a Service framework that supports the creation and adoption of web-application availability to users' contacts without needing technical knowledge of computer code, network architectures, devices, or protocols. Forwarding is controlled by sending a link through said framework over SMS, MMS, email, social networks, etc. Depending upon permissions set by the application's owner, a recipient may also forward the web-application link to his/her own contacts, promoting viral propagation of the web-application's availability. Recipients may also be granted permission by the web-application's owner to contribute towards its functionality and/or its source data, enabling crowd-sourced enhancement of the web-application. Web-applications developed within said framework may be utilized and distributed via any web-enabled device able to access the link to the web-application. Restrictions may be imposed by the web-application owner regarding the duration and/or number of accesses permitted to it. | 2013-08-15 |
20130212192 | COMPUTER-IMPLEMENTED METHOD FOR POSTING MESSAGES ABOUT FUTURE EVENTS TO USERS OF A SOCIAL NETWORK, COMPUTER SYSTEM AND COMPUTER-READABLE MEDIUM THEREOF - The present disclosure relates in general to social networks run in a computer environment and in particular to methods and systems for posting messages about future events to users of a social network who are registered users of the social network, preferably in accordance with selectable, pre-selectable or adjustable settings for individual users. The method and system allows a user to post a message about a future plan or event that is taking place at a specified time rather than the time that the message is sent. The approach according to the present disclosure is directed to a unique way of social networking via an ordered list of events, such as a timeline or calendar, that shows when future plans will take place, and to a ‘matchmaking’ service between people organizing or taking part in such an event and other users who may also be interested in that event. | 2013-08-15 |
20130212193 | SYSTEM FOR SHARING IMAGES - An embodiment of the present invention provides a method for sharing studies and medical images via a one click mechanism whereby only an email address is required to share a medical image or a study with a third party without assistance from information technology administrators or copying patient image and information somewhere else. | 2013-08-15 |
20130212194 | COMMUNICATION SYSTEM AND METHOD - The present invention relates to a communication system ( | 2013-08-15 |
20130212195 | System and Method for Servers to Send Alerts to Connectionless Devices - A method of sending alerts from servers to client devices is provided. The alert can be generated with a server application and may include customer information. The alert may then be sent to a message router. The message router retrieves a station ID of the client device based on the customer information. A communication type of the client device can be determined based on the station ID and one or more of a plurality of protocol gateways can be selected based on the communication type. The alert can be forwarded to the selected one or more of the plurality of protocol gateways where is may be formatted for the selected client device. The formatted alert may then be forwarded via the network to the selected client device. | 2013-08-15 |
20130212196 | Systems and Methods for Messaging to Multiple Gateways - Systems and methods for providing message communication among multiple communication gateways. In particular, systems and methods for providing non-voice message delivery to intended recipients with increased speed and reliability to multiple users on multiple platforms. The systems and methods relate to non-voice messaging to multiple messaging gateways. In at least one embodiment, the systems and methods include Internet based electronic messaging using a messaging subsystem configured to optimize text message delivery to communication gateways. | 2013-08-15 |
20130212197 | REMINDER SYSTEM - A reminder system is provided. The system provides a user-friendly interface to a user's existing email, and in some embodiments to the user's document management, calendar and other systems, in order to ensure that an appropriate user is notified when action should be taken, and also provides notation to the user indicating the appropriate course of action to be taken. The system provides a calendaring feature where a supervisor or manager can determine the workload of a group of workers for an upcoming time period. The system provides an easily accessible and traceable database of information pertaining to a project checklist, document, a client name, a client matter number, a document type, or other customizable fields in order for a user to search and sort the information for their own use. | 2013-08-15 |
20130212198 | METHODS AND SYSTEMS OF DYNAMIC MAIL SYNCHRONIZATION FOR MOBILE DEVICES - Systems and methods of dynamic mail synchronization for mobile devices are provided. At least one state of a mail box corresponding to a mail application on the electronic device is monitored, wherein the mail application has a predefined mail synchronization mechanism for checking and receiving mails from a server. It is determined whether the monitored state reaches a corresponding threshold value. When the monitored state reaches the corresponding threshold value, the predefined mail synchronization mechanism of the mail application is adjusted, such that the mail application periodically checks and receives mails from the server based on the adjusted mail synchronization mechanism. | 2013-08-15 |
20130212199 | EVENT BASED SOCIAL NETWORKING - A method, apparatus, and computer program product are disclosed for facilitating networked communication. An event creation module is configured to create an event profile within a social networking service. A check in module is configured to associate a plurality of user profiles of the social networking service with the event profile. A message interface module is configured to provide a message interface in response to determining that a user profile of a first user of the social networking service and a user profile of a second user of the social networking service are associated with the event profile. The message interface is operable by the first user to send a private message to the second user. | 2013-08-15 |
20130212200 | MIGRATION PROJECT AUTOMATION, E.G., AUTOMATED SELLING, PLANNING, MIGRATION AND CONFIGURATION OF EMAIL SYSTEMS - Technology is generally described for automating the project management and execution of data migration from a source email system to a destination email system. In some examples, the technology can include receiving a domain name of a second computing system; obtaining domain name system (DNS) records for the received domain name; determining an email hosting provider for the second computing system; determining, by the processor, based on the obtained DNS records, an email system service type of the source email system on the second computing system; discovering mailboxes and message delivery rules of the source email system; displaying customization options for migrating discovered source email system mailboxes; migrating data items from the source email system to the destination email system; and managing migration of data from source email system client computing devices to the destination email system. | 2013-08-15 |
20130212201 | ON-DEMAND MARKETING LITERATURE DISTRIBUTION SYSTEM - A literature on demand (LOD) distribution system comprises a secure server hosting a LOD database and a vendor's electronic data processing device on which a LOD application is loaded. The vendor's electronic data processing device is configured to execute the LOD application to perform operations including: storing a local LOD database containing a portion or all of the LOD items stored in the LOD database at the secure server; selecting an LOD item stored in the local LOD database; displaying the selected LOD item or causing the selected LOD item to be displayed by a viewer application executing on the electronic data processing device; constructing an email including a hyperlink for downloading or streaming the selected LOD item from the LOD database of the secure server; and sending the constructed email to a recipient or causing the constructed email to be sent to the recipient by an email application executing on the electronic data processing device. | 2013-08-15 |
20130212202 | CONVERSATIONAL MESSAGE SERVICE OPERATING METHOD FOR PROVIDING ACKNOWLEDGEMENT - A method of operating a conversational messaging service may include assigning an identification number to messages transmitted by users participating in a group chat, sequentially, selecting an identification number of any one of messages associated with each of the users as a watermark of each of the users, and determining a number of users failing to read each of the each of the messages, based on the watermark of each of the users. | 2013-08-15 |
20130212203 | APPARATUS AND METHOD FOR RECEIVING MOBILE MESSAGE - A method and apparatus for receiving a mobile message are provided. The apparatus includes a Short Messaging Service (SMS) client for receiving a short message by using a short message service; a Mobile Message (MM) client for receiving a mobile message; and a push client for, when an arrival notification informing that the mobile message has arrived from a push server is received, informing the MM client that the mobile message has arrived and, when the MM client is turned off, waking the MM client, wherein, when the push client is turned off, the SMS client receives the arrival notification from the push server through a short message. | 2013-08-15 |
20130212204 | METHOD AND SYSTEM FOR MONITORING AND LIMITING WIRELESS NETWORK ACCESS BASED UPON LOCATION PARAMETERS - A method of limiting access to a wireless network is disclosed. The method includes broadcasting boundary coordinates associated with the wireless network. The broadcast coordinates are detected by a remote wireless device seeking access to the network. The remote wireless device determines whether it is within the broadcast boundary coordinates of the network. | 2013-08-15 |
20130212205 | TRUE GEO-REDUNDANT HOT-STANDBY SERVER ARCHITECTURE - A server configuration provides a geo-redundant server that is ready as a hot-standby to the primary server in another location. This architecture can be easily implemented in a distributed contact center environment or any other server deployment where services provided by the primary server are mission-critical. One exemplary configuration provides a single active master server. This single active master server is responsible for making all service-based decisions, receiving and processing client requests, etc., as long as it is operational. A second server is provided at the same geographic site or location as the single active master and a high bandwidth active LAN connection is established between the two. The second server maintains synchronization with the single active master. The second server is also connected with a third server via a WAN. The second server provides the third server with the state information for synchronization with the single active master. | 2013-08-15 |
20130212206 | METHOD OF DISCOVERING IP ADDRESSES OF SERVERS - A method of discovering IP addresses of servers includes: (i1) beginning discovery processes of management modules and initialization processes of servers; (i2) the management modules sending network packages to one of the servers; (i3) the server responding with its IP address to the management modules, if the server receives the network packages of the management modules; (i4) ending the initialization processes of the server; (i5) each such management module storing the IP address in a database, if any of the management modules receive the IP addresses of the server; (i6) the management modules sending network packages to a next one of the servers with a next MAC address, if a next one of the servers with a next MAC address exists; (i7) repeating (i2) through (i5) if and as necessary in respect of the next one of the servers; and (i8) ending the discovery processes of the management modules. | 2013-08-15 |
20130212207 | ARCHITECTURE AND METHOD FOR REMOTE MEMORY SYSTEM DIAGNOSTIC AND OPTIMIZATION - A smart memory system preferably includes a memory including one or more memory chips and a smart memory controller. The smart memory controller includes a transmitter communicatively coupled to the cloud. The transmitter securely transmits a product identification (ID) associated with the memory to the cloud. A cloud-based data center receives and stores the product ID and related information associated with the memory. A smart memory tester receives a product specific test program from the cloud-based data center. The smart memory tester may remotely test the memory via the cloud in accordance with the product specific test program. The information stored in the cloud-based data center can be accessed anywhere in the world by authorized personnel. Repair solutions can be remotely determined based on the test results and the diagnostic information. The repair solutions are transmitted to the smart memory controller, which repairs the memory. | 2013-08-15 |
20130212208 | PARTIAL OBJECT CACHING - A method of providing media at multiple bit rates using partial object caching may include receiving, from a first user device, a first request for a media object encoded at a first bit rate; providing the first portion of the media object to the first user device; and caching, in a partial object cache, the first portion of the media object. The method may additionally include receiving, from a second user device, a subsequent request for the media object encoded at the first bit rate; providing the first portion of the media object as retrieved from the partial object cache; and receiving a request for the media object encoded at a second bit rate. The method may further include modifying the request for the media object encoded at the second bit rate to instead request a second portion of the media object at the second bit rate. | 2013-08-15 |
20130212209 | INFORMATION PROCESSING APPARATUS, SWITCH, STORAGE SYSTEM, AND STORAGE SYSTEM CONTROL METHOD - In an information processing apparatus, a data controller performs transmission and reception of data with a storage apparatus having a storage region allocated to the information processing apparatus by a physical port or a virtual port set at the physical port. The physical port transmits and receives data by communicating with the storage apparatus. A management controller calculates a use rate based on a storage capacity of the allocated storage region of the storage apparatus and an amount of use of the storage region and determines whether to perform allocation based on the calculated use rate. When determining to perform the allocation, the management controller allocates an unallocated storage region allocated to none of information processing apparatuses to the information processing apparatus, and also sets a virtual port and connects the information processing apparatus to the allocated storage region by the virtual port. | 2013-08-15 |
20130212210 | RULE ENGINE MANAGER IN MEMORY DATA TRANSFERS - A rule engine manager in-memory data transfer system includes a rule engine manager cluster, a first memory cache coupled to the rule engine manager cluster, a data server cluster coupled to the rule engine manager cluster and a second memory cache coupled to the data server cluster. | 2013-08-15 |
20130212211 | Managing Online Composite Image Content - A method includes receiving an upload request to retrieve a master image. The method further includes retrieving the master image in response to the upload request. The method also includes storing the retrieved master image. The method further includes generating a composite image file using the retrieved master image. The composite image file can be used to create a plurality of images derived from the master image. | 2013-08-15 |
20130212212 | APPLICATION CONTEXT TRANSFER FOR DISTRIBUTED COMPUTING RESOURCES - In one embodiment, a universal programming module on a first device collects context and state information from a local application executing on the first device, and provides the context and state information to a context mobility agent on the first device. The context mobility agent establishes a peer-to-peer connection with a second device, and transfers the context and state information to the second device, such that a remote application may be configured to execute according to the transferred context and state information from the first device. In another embodiment, the context mobility agent receives remote context and remote state information from the second device, wherein the remote application had been executing according to the remote context and remote state information, and provides the remote context and remote state information to the universal programming module to configure the local application to execute according to the remote context and remote state information. | 2013-08-15 |
20130212213 | DATA TRANSMISSION IN CLOUD-BASED SYSTEM - Technologies are generally described for a data transmission scheme for a cloud-based system. In some examples, a data transmission system may include a communication speed determination unit configured to determine communication speed between a server and multiple client devices connected to the server; a client classification unit configured to classify each of the multiple client devices based at least in part on the communication speed determined by the communication speed determination unit; and a data transmission unit configured to transmit a predetermined portion of data to one or more of the client devices connected to the server. | 2013-08-15 |
20130212214 | CLOUD GATEWAY FOR INDUSTRIAL AUTOMATION INFORMATION AND CONTROL SYSTEMS - A cloud gateway for coupling an industrial system to a cloud platform is provided. The cloud gateway collects data from one or more industrial controllers, meters, sensors, or other devices comprising an industrial automation system. The cloud gateway optionally performs additional transformations on the data to add context, summarize, filter, reformat, and/or encrypt the data. The cloud gateway then sends data to a cloud platform for use by one or more cloud-based applications or services. The cloud gateway can facilitate cloud-based data collection from both fixed-location and mobile industrial systems. The cloud gateway can also support store-and-forward logic, allowing industrial data to be temporarily stored in local storage in the event that communication between the cloud gateway and the cloud platform is disrupted. | 2013-08-15 |
20130212215 | METHOD, APPARATUS AND SYSTEM FOR ADDRESSING RESOURCES - An apparatus for addressing resources including a first interface to communicate with end-points, the end-points having resources; a second interface for communicating with web applications; a component for creating an universal resource locator (URL) for a resource, the URL including the IP address, port and path of the resource; a component for creating an abstract universal resource identifier (URI) for the resource, a component configured to receive over the second interface and resolve a look-up URI for the resource, the look-up URI having the address of the apparatus, domain and end-point parameters and metadata related to the resource; and a component configured to link the URL and the abstract URI together and the look-up URI with one or more URLs or abstract URIs. | 2013-08-15 |
20130212216 | Transmission Method and Electronic Device - The present disclosure provides a transmission method and an electronic device. The transmission method includes the steps of detecting whether a predetermined condition is satisfied; dividing the data to be transmitted into a first data and a second data when determining that the predetermined condition has been satisfied; converting the first data to a third data with a first algorithm and the second data to a fourth data with a second algorithm, so that the sum of the amounts of the third data and the fourth data is less than the sum of the amounts of the first data and the second data, wherein the first algorithm is different from the second algorithm; and transmitting the third data and the fourth data to the receiving device. | 2013-08-15 |
20130212217 | METHOD AND DEVICES FOR TARGETED DISTRIBUTION OF DATA - A network server ( | 2013-08-15 |
20130212218 | METHOD AND SYSTEM FOR DISTRIBUTED INFRASTRUCTURE FOR STREAMING DATA VIA MULTIPLE ACCESS POINTS - Methods and systems for distributed infrastructure for streaming data via multiple access points. Aspects of one method may include apportioning multimedia information among a plurality of transmitting devices based on feedback channel information received from a destination receiving device by, for example, a transmission controller device. The transmitting devices may transmit the multimedia information to the destination receiving device. A transmitting device that may not be apportioned multimedia information may transmit a probing signal. The destination receiving device may generate feedback channel information for a transmitting device, for example, based on the multimedia information or the probing signal received from the respective transmitting device. The apportioning of the multimedia information may be dynamically adjusted based on updated feedback channel information received from the destination receiving device. | 2013-08-15 |
20130212219 | METHOD AND APPARATUS FOR FACILITATING MACHINE GATEWAY OPERATION - An apparatus ( | 2013-08-15 |
20130212220 | TERMINAL DEVICE, DATA RECEIVING METHOD, DATA RECEIVING PROGRAM, AND RECORDING MEDIUM - A terminal device can connect to a first network whose communication speed is high or whose communication fee charged according to an amount of communication is low and a second network whose communication speed is lower than that of the first network or whose communication fee charged according to an amount of communication is higher than that of the first network. The terminal device receives first data with a large amount of data through the first network and stores the first data. Also, the terminal device receives second data with an amount of data smaller than that of the first data through the second network and stores the second data. The terminal device determines a connection state of the network and a storage state of data and controls reception of data used to output contents on the basis of the determination result. | 2013-08-15 |
20130212221 | VEHICLE WIRELESS COMMUNICATION APPARATUS - A vehicle wireless communication apparatus, including: a first portable device; a second portable device; a first receiver; a second receiver; a control apparatus; an in-vehicle communication network; and a relay unit, wherein, on receiving first directive data transmitted from the first portable device, the first receiver transmits first identification data of the first portable device to the relay unit; on receiving second directive data transmitted from the second portable device, the second receiver transmits second identification data of the second portable device to the relay unit; and on receiving the first identification data transmitted from the first portable device or the second identification data transmitted from the second portable device, the relay unit transmits more-recently received data to the control apparatus as identification data continuously at predetermined regular intervals. | 2013-08-15 |
20130212222 | STREAM DURATION MANAGEMENT - In general, in one aspect, streaming content is received from a server, the streaming content being stored and queued for client-side playback from the server. Information about the streaming content is received. A virtual current duration of the streaming content is determined at a client-side application based on the information about the streaming content. A timeline control is generated based on the determined virtual duration, the timeline control presenting a representation of the virtual duration and allowing navigation forward and backward in the streaming content. The timeline control is displayed at the client-side display device. | 2013-08-15 |
20130212223 | DYNAMIC MODIFICATION OF MEDIA STREAMS' QUALITY - A method, apparatus and computer program product useful for communicating media content, over a computerized network, in accordance with download duration time. One exemplary method may comprise receiving, by a client, a first portion of a media content having a first quality. In response to an indication from a user, a change of quality to a second quality is determined. The client receives a second portion of the media content having the second quality. Whereby received media content by the clients comprises portions having different qualities. | 2013-08-15 |
20130212224 | METHOD AND SYSTEM OF TRANSFERRING CONTENT TO COMPLETE A TASK FROM ONE USER EQUIPMENT TO THE OTHER IN A NETWORK - The present invention relates to a method and system of preserving an active session with a site at a first user equipment and downloading or uploading contents or data on at least one second user equipment in a communication network. In one embodiment, this can be accomplished by registering the first user equipment, at least one second user equipment and a server with at least one lookup server, the first user equipment, the second user equipment and the lookup server are tagged with a unique identifier, browsing to select the content in the site at the first user equipment via a first communication link and redirecting automatically the selected temporarily content from the first UE to the identified second available UE for downloading or uploading, wherein the redirection is based on the unique ID of the content. | 2013-08-15 |
20130212225 | METHOD AND SYSTEM OF REDIRECTING STREAMING CONTENT OVER A COMMUNICATION NETWORK - The present invention relates to a method and system of redirecting streaming content from one user equipment to the other available precise user equipment over a communication network. In one embodiment this is accomplished by registering a plurality of user equipments and a server with at least one lookup server, checking periodically integrity of the connection between the first user equipment and the lookup server, triggering, upon failure of connection, to identify the transfer of some or all incoming contents at the first UE to at least one second UE from the group of UEs registered with the lookup server and redirecting the transfer of the content of the lookup server from the first UE to the identified second available UE, wherein the redirection is based on the unique ID of the content. | 2013-08-15 |
20130212226 | ORIGIN REQUEST WITH PEER FULFILLMENT - A method for transferring content across a content delivery network (CDN) may include receiving a notification of a request. The request may include a client identifier and a content identifier. The method may also include accessing one or more global policies applicable to the request. The method may additionally include determining, using the one or more global policies, that a client is eligible to receive content associated with the content identifier from another client; identifying, using the one or more global policies and the content identifier, one or more authorized transfers of at least a portion of the content; identifying one or more eligible clients that are associated with the one or more authorized transfers; and sending a set of client identifiers that are associated with the one or more eligible clients. | 2013-08-15 |
20130212227 | SYSTEM AND METHOD FOR STREAMING DATA VIA HTTP - A system and method for providing bi-directional streaming communication over the HTTP or HTTPS protocol between a client and a server is disclosed. The method provides a long-lived, bi-directional communication mechanism from a web client that is performed entirely over HTTP or HTTPS, using existing HTTP verbs such as GET and POST, and is operable with existing browser and RIA technology. The graphical and networking features of RIA frameworks in conjunction with the disclosed method provide low-latency, real-time data applications in a web browser. | 2013-08-15 |
20130212228 | ROUTING VIRTUAL AREA BASED COMMUNICATIONS - In association with a virtual area, a first network connection is established with a first network node present in the virtual area and a second network connection is established with a second network node present in the virtual area. Based on stream routing instructions, a stream router is created between the first network node and the second network node. The stream router includes a directed graph of processing elements operable to receive network data, process the received network data, and output the processed network data. On the first network connection, an input data stream derived from output data generated by the first network node is received in association with the virtual area. The input data stream is processed through the stream router to produce an output data stream. On the second network connection, the output data stream is sent to the second network node. | 2013-08-15 |
20130212229 | SOCIAL NETWORKING INFORMATION SYSTEM AND METHOD - The present invention is embodied in methods and system for obtaining information about a category of interest from a computer network, the computer network including a plurality of user networks with each user network including a plurality of users. The method includes receiving an information request from a user, the information request specifying a category, identifying a first set of users within a user network of the user, each user in the first set associated with the category and established as a trusted information resource contact of the user for the category, and identifying a second set of users within a user network of one or more users of the first set, each user in the second set associated with the category and established as a trusted information resource contact of the one or more trusted information resource contacts of the first set for the category. | 2013-08-15 |
20130212230 | MOBILE TERMINAL, DATA DISTRIBUTION SERVER, DATA DISTRIBUTION SYSTEM, AND DATA DISTRIBUTION METHOD - A data distribution server, a mobile terminal, and a data distribution method perform distribution of data in consideration of memory capacity. In a mobile terminal, an amount-of-space arithmetic unit carries out an arithmetic operation for an amount of space and a possible amount of space of an object storage unit. Then, in an object distribution server, object data is selected based on the amount of space or the like, and a distribution list is generated and transmitted to the mobile terminal. In the mobile terminal, deletion of object data determined as deletable is performed in order to acquire object data in the distribution list. Acquisition of the object data is then performed. | 2013-08-15 |
20130212231 | METHOD, APPARATUS AND SYSTEM FOR DYNAMIC MEDIA CONTENT INSERTION BASED ON HTTP STREAMING - Embodiments of the present invention disclose a method, an apparatus, and a system for dynamic media content insertion based on HTTP streaming, relating to the field of video technologies, and capable of implementing dynamic insertion of a customized media content. The dynamic media content is transmitted through HTTP streaming. The method includes: receiving, by a server, a request message that is sent by a client terminal and carries user information; screening out a target media content from locally stored media contents according to the user information; and sending the target media content to the client terminal so that the client terminal can play the target media content. Embodiments of the present invention are mainly applied to the process of dynamic media content insertion. When the client terminal watches a program through HTTP streaming, the customized insertion of the media content can be implemented. | 2013-08-15 |
20130212232 | CONTENT SHARING VIA SOCIAL NETWORKING - Example systems and methods of content sharing via social networking are presented. In one example, availability of a first user device to provide media content over a communication network is detected. A second user device is identified via an association of the first user device with the second user device that is specified in a social network. An acceptance by the second user device to receive the media content from the first user device is determined. In response to the acceptance, transmission of the media content provided by the first user device over the communication network to the second user device is initiated. | 2013-08-15 |
20130212233 | METHOD FOR CONFIGURING A WIRELESS DEVICE - A method for configuring a first electronic device that includes first and second wireless communication systems. A first wireless connection is established between the first electronic device and a second electronic device using the first wireless communication system. Configuration information pertaining to the second wireless communication system is transmitted from the first electronic device to the second electronic device using the first wireless connection. Configuration instructions are transmitted from the second electronic device to the first electronic device over the first wireless connection. The configuration instructions are used to configure the first electronic device to communicate using the second wireless communication system, and the first wireless connection can then be terminated. | 2013-08-15 |
20130212234 | PROVIDING CONFIGURABLE WORKFLOW CAPABILITIES - Techniques are described for providing clients with access to functionality for creating, configuring and executing defined workflows that manipulate source data in defined manners, such as under the control of a configurable workflow service that is available to multiple remote clients over one or more public networks. A defined workflow for a client may, for example, include multiple interconnected workflow components that are specified by the client and that each are configured to perform one or more types of data manipulation operations on a specified type of input data. The configurable workflow service may further execute the defined workflow at one or more times and in one or more manners, such as in some situations by provisioning multiple computing nodes provided by the configurable workflow service to each implement at least one of the workflow components for the defined workflow. | 2013-08-15 |
20130212235 | MAINTAINING QUALITY OF SERVICE IN SHARED FORWARDING ELEMENTS MANAGED BY A NETWORK CONTROL SYSTEM - A non-transitory machine readable medium storing a program that manages a plurality managed forwarding elements that forward data through a network is described. The program receives user inputs that define forwarding performance constraints of a set of managed forwarding elements. Based on the inputs, the program generates a set of universal flow entries for configuring the set of managed forwarding elements to apply the forwarding performance constraints to data traffic that the managed forwarding elements forward. The set of universal flow entries is for subsequent conversion into a set of customized flow entries for the managed forwarding elements. | 2013-08-15 |
20130212236 | M2M SERVICE ENABLEMENT OVER ACCESS NETWORKS - Upon attachment of a machine-to-machine (M2M) device to a network, the access network determines which service provider to connect the device to. During an initial attachment process, the device can be configured so that it only will connect to a defined M2M service provider. | 2013-08-15 |
20130212237 | PROXY INFRASTRUCTURE TO ACCESS FIRMWARE-BASED FEATURES - A customizable configuration data structure contains information regarding proxies to provide. A proxy infrastructure has a controller to read the customizable configuration data structure and to create the proxies. A management processor has firmware-based features, where the proxies are to access the firmware-based features through an interface between the proxy infrastructure and the management processor. | 2013-08-15 |
20130212238 | Method and Configuration Component for Assigning a Station Name to Components of an Industrial Automation Arrangement - A method and a configuration component for assigning a respective station name to a plurality of components of an industrial automation arrangement, wherein projected components are each allocated a station name and a number of projected properties in a project. During a startup phase or an operating time of the automation arrangement, the configuration component ascertains the components in the data network are ascertained, retrieves information about respective actual properties of the ascertained components, determines a respective similarity value for each ascertained component in relation to the projected components using the degree of match between the actual properties and projected properties, and assigns to each ascertained components the projected station name of that projected component having the best similarity value to allow partial or complete automation of the process of assigning station names, even if some of the properties of the projected and ascertained components differ from one another. | 2013-08-15 |
20130212239 | METHODS AND APPARATUS TO PROVISION NAME-SERVERS - Methods and apparatus are disclosed to provision name-servers. An example system disclosed herein includes a name-server evaluator to determine capacities of the plurality of name-servers, a provisioner to compute profile assignment values based on a plurality of subscriber identifiers, and an assignor to assign the subscriber identifiers to one of the plurality of name-servers based on the profile assignment values and the capacities. | 2013-08-15 |
20130212240 | METHODS FOR DYNAMIC DNS IMPLEMENTATION AND SYSTEMS THEREOF - A method, computer readable medium, and device for dynamic DNS implementation, comprises receiving, at a network traffic management device, a first DNS response from a DNS server, wherein the first DNS response is compliant with Internet Protocol version 4 (IPv4). The first DNS response corresponds to a first DNS request from a client device being compliant with Internet Protocol version 6 (IPv6). The first DNS response is converted into a DNS second response that is compliant with IPv6, by attaching a prefix that identifies a network gateway device which is to handle receive subsequent non-DNS requests from the client device. The second DNS response is routed to the client device. Subsequent non-DNS requests from the client device that contain at least a part of the prefix allow the network traffic management device to route the non-DNS request through the designated network gateway device. | 2013-08-15 |
20130212241 | SYSTEM AND METHOD FOR OPERATING NETWORK BASED ON NETWORK VIRTUALIZATION - A virtual network operating apparatus and method are provided. The virtual network operating method includes configuring, by a virtual network operating apparatus, a plurality of virtual networks identified by domain names, setting, by the virtual network operating apparatus, representative virtual routers representing each of the virtual networks for each virtual network, setting, by the virtual network operating apparatus, representative routing information including an IP address of each of the representative virtual routers in each virtual router included in the virtual networks, and transmitting, by each virtual router, a packet using the set representative routing information. | 2013-08-15 |
20130212242 | GLOBAL SESSION IDENTIFIER - Systems and methods are described for creating and managing Global Session Identifiers (GSIDs) for communication sessions. GSIDs provide a way to globally identify communication sessions including those communication sessions that have experienced one or more topology changes. The GSID may be considered a header itself or a value within a header and information contained within a GSID can be used to trace backwards through time to find the session segments that led up to (or exist concurrently to) a currently signaled session. | 2013-08-15 |
20130212243 | SCHEDULING DISTRIBUTION OF LOGICAL FORWARDING PLANE DATA - A controller for managing several managed switching elements that forward data in a network is described. The controller includes an interface for receiving input logical control plane data in terms of input events data. The controller includes a converter for converting the input logical control plane data to output logical forwarding plane data by processing the input events data. The logical forwarding plane data is for subsequent translation into physical control plane data. The controller includes an input scheduler for (1) categorizing the input events data into different groups based on certain criteria and (2) supplying the input events data into the converter in a manner that each different group of input events data is processed separately by the converter. | 2013-08-15 |
20130212244 | COMMUNICATION CHANNEL FOR DISTRIBUTED NETWORK CONTROL SYSTEM - For a particular controller for managing managed forwarding elements that forward data in a network, a method for computing forwarding state using a set of inputs from a first controller and a second controller that is a back up controller for the first controller is described. The method receives a first subset of the set of inputs from the first controller. After failure of the first controller, the method receives a second subset of the set of inputs from the second controller. At least one input of the second subset of the set of inputs is duplicative of an input in the first subset. The method computes forwarding state using the first and second subsets of the inputs but without using the duplicative input. | 2013-08-15 |
20130212245 | NESTING TRANSACTION UPDATES TO MINIMIZE COMMUNICATION - For a controller for managing a network including managed forwarding elements that forward data in the network, a method for configuring a set of managed forwarding elements is described. The method generates a first set of flow entries for configuring the set of managed forwarding elements to forward packets as non-first-hop forwarding elements for a logical datapath set. The method generates a second set of flow entries for configuring the set of managed forwarding elements to forward packets as first-hop forwarding elements for the logical datapath set. The method sends the first set of flow entries to the set of managed forwarding elements prior to sending the second set of flow entries to the set of managed forwarding elements. | 2013-08-15 |
20130212246 | PULL-BASED STATE DISSEMINATION BETWEEN MANAGED FORWARDING ELEMENTS - For a controller that manages managed forwarding elements that forward data in a network, a method for configuring the managed forwarding elements is described. The method computes forwarding state and pushes the computed forwarding state to the managed switching elements. The forwarding state defines forwarding behaviors of the managed switching elements. The method configures the managed switching elements to exchange forwarding state with each other. The method configures the managed switching elements by configuring a first managed forwarding element to send a forwarding state information request to a second managed forwarding element and by configuring the second managed forwarding element to (1) respond to the forwarding state information request by looking up a forwarding state information repository and (2) update the forwarding state information repository with forwarding states information received from a third managed forwarding element. | 2013-08-15 |
20130212247 | Method of Handling Triggered Trap Management Object - A method of handling triggered trap management object of a client in a service system supporting open mobile alliance (OMA) device management is disclosed. The method comprises creating a node in a trap management object for storing a predefined value of time interval; and transmitting a notification associated to a triggered trap to a server of the service system or invoking a management object of the client associated to the triggered trap, only when a time interval between a triggered trap and a preceding triggered trap is greater or equal to the predefined value of stored in the node. | 2013-08-15 |
20130212248 | CREDENTIAL MANAGEMENT SYSTEM - A server may communicate with a mobile device and/or a reader device via an Internet connection. The server may be configured to generate a credential and transmit the credential to the mobile device. The mobile device may use the credential in an access control system, a payment system, a transit system, a vending system, or the like. | 2013-08-15 |
20130212249 | METHOD AND SYSTEM FOR DYNAMICALLY OBSCURING ADDRESSES IN IPV6 - The invention dynamically obscures network and transport layer addresses of packets to achieve anonymity, including authentication privacy, as well as protection against tracking and traffic correlation and certain classes of network attacks by combining both intrusion protection with anonymity, avoiding the use of a separate management unit outside the host for distribution of obscured addresses. The invention enables a host to automatically configure obscured addresses and determine the obscured address of the intended recipient without outside involvement, computing addresses based on a set of parameters, and to operate without re-authentication whenever an address changes. The invention enables encryption of the packet payload to prevent traffic correlation. The technology of the invention can be implemented embedded on a host device or as a connected gateway device and requires negligible configuration and is therefore transparent to hosts. | 2013-08-15 |
20130212250 | USER PRESENCE DATA FOR WEB-BASED DOCUMENT COLLABORATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, include sending a first electronic document to a first client device over a data network from a web server. The first electronic document includes multiple document elements formatted according to a first document schema for a first client application. The document elements include multiple content elements and one or more presence elements. Presence data is received over the data network at the web server from the first client device. The presence data includes an identification of one or more of the content elements of the first electronic document. The presence data also includes an identification of a status of the first electronic document for the first client device. An updated presence element for the first electronic document, which includes a first presence object, is stored. The first presence object includes the presence data received from the first client device and an identification of the first client device and/or a first user associated with the first client device. The first presence object is sent over the data network from the web server to a second client device. | 2013-08-15 |
20130212251 | METHOD AND SYSTEM FOR ACCESS POINT CONGESTION DETECTION AND REDUCTION - A method and system for detecting and reducing data transfer congestion in a wireless access point includes determining a round-trip-time value for an internet control message protocol (ICMP) packet transmitted from a source computing device to a first computing device of a plurality of computing devices via the wireless access point. A data rate for data transmissions from the source computing device is increased to a value no greater than a peak data rate value if the round-trip-time is less than a first threshold value. The data rate is decreased if the round-trip-time value is greater than a second threshold value. Additionally, the peak data rate value may also be decreased if the round-trip-time value is greater than the second threshold value. | 2013-08-15 |
20130212252 | REPRESENTING REMOTELY AVAILABLE USERS THROUGH WORKING ELSEWHERE STATUS - An application provides a “working elsewhere” status for users working at a location other than their regular work location and still available for meetings, communication sessions, etc. The application determines a user location being other than regular work location and the user still being available through user selection, information from user associated application(s), and/or from a presence notification. The application adjusts the user status to a working elsewhere status and makes the new status available to other applications such as calendaring, communication applications, presence service(s), and comparable ones. Meetings may be scheduled, communication sessions facilitated if the working elsewhere status is sufficient/acceptable for other users. | 2013-08-15 |
20130212253 | Calculating A Checksum With Inactive Networking Components In A Computing System - Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data. | 2013-08-15 |
20130212254 | NETWORK ARRANGEMENT OF LOW POWERED MONITORING DEVICES - A network arrangement of low powered monitored devices which are linked together along with a control device in a mesh network configuration. Each of the security devices and the control devices are powered by an on board power source. To maximise the lifetime of the of the power supply the devices are monitored periodically and synchronously, and the devices are only activated during monitoring. | 2013-08-15 |
20130212255 | METHOD AND SYSTEM FOR GENERATING TRANSACTION DATA FROM NETWORK TRAFFIC DATA FOR AN APPLICATION SYSTEM - A method for generating transaction data from network traffic data for an application system which is distributed across a plurality of network connected nodes, comprising: gathering the network traffic data, the network traffic data including syntactic information; storing the network traffic data and the syntactic information in field-sets; deriving semantic information from the network traffic data and the syntactic information with a first module which implements a first semantic model relating to first transactions, and modifying the field-sets to include the semantic information; passing the field-sets to a second module; deriving additional semantic information from the network traffic data, the syntactic information, and the semantic information with the second module which implements a second semantic model relating to second transactions, and further modifying the field-sets to include the additional semantic information; and, outputting the field-sets from the second module to provide the transaction data for the application system. | 2013-08-15 |
20130212256 | SYSTEMS AND METHODS FOR ACCESSING TELESCOPES - A user obtains, views and stores image data of a selected celestial object from a network of available telescopes using a computer-generated user interface. Based on the selected object, information is accessed regarding each telescope from data sources such as databases and/or live data feeds to automatically select telescopes that are suitable for imaging the object, e.g., according to factors such as telescope type, power and configuration, location, weather conditions and altitude. The user may select a particular telescope and imaging time from a schedule of available telescopes and imaging times. At the scheduled time, an image is recorded of the celestial object and communicated to a central data store for access by the user, e.g., via a web site The user may be charged for the service based on factors such as exposure time, scheduling priority, type of telescope and the like. | 2013-08-15 |
20130212257 | COMPUTER PROGRAM AND MONITORING APPARATUS - To analyze the cause if an event occurred to a plurality of monitoring targets. A monitoring computer | 2013-08-15 |
20130212258 | CALCULATING A CHECKSUM WITH INACTIVE NETWORKING COMPONENTS IN A COMPUTING SYSTEM - Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data. | 2013-08-15 |
20130212259 | SERVICE SCRIPTING FRAMEWORK - Receiving and executing at a server a script provided by a client, e.g., in a service request sent by a web services or other service client and/or consumer, is disclosed. In various embodiments, the script is configured to cause the server to do one or more of the following: pre-process at least a portion of the services request; post-process a response data associated with the services request; and replace an operation comprising the service at least in part with a replacement operation defined or identified at least in part in the script. | 2013-08-15 |
20130212260 | SYSTEM AND METHOD FOR AUTOMATIC PRIORITIZATION OF COMMUNICATION SESSIONS - The disclosed techniques apply automatic prioritization to communication sessions conducted by users of a communication network, and present the sessions to an operator in accordance with the priorities. Each session is assigned an initial priority depending on the user who conducts the session (referred to as “target user”). The priority is then adjusted in accordance with a set of rules defined for that target user, and possibly based on activities of the target user as analyzed using the reconstructed communication. The rules typically consider metadata of the session. The sessions are typically held in a queue and presented to an operator in accordance with their respective priorities. | 2013-08-15 |
20130212261 | INFORMATION PROCESSING SYSTEM, PORTABLE INFORMATION TERMINAL, INFORMATION PROCESSING DEVICE, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM - An information processing system comprises an information processing device and a portable information terminal that allow communication therebetween. The portable information terminal includes: an application detection part for detecting a running application; a management part for detecting a cloud service to which the application connects and managing the application and the cloud service; a destination information generation part for generating destination information required for the information processing device to use the cloud service; and a transmission part for sending the destination information to the information processing device. The information processing device includes: a destination setting part for automatically configuring the destination to connect to the cloud service the same as that used by the running application on the portable information terminal in accordance with the destination information; and a data processing part for connecting to the cloud service to send and receive data. | 2013-08-15 |
20130212262 | ENERGY MANAGEMENT APPARATUS - A gateway includes a processor operable to manage energy use at a site. The processor is configured to receive network device data from a long range communication network, wherein the network device data is initiated from at least one of a mobile device or a cloud service to alter an operating condition of a network device located at a site. The processor is also configured to detect an availability of the network device connected to a second network configured as a local network, and format the network device data to a message bus format configured to be output to a communication device configured to access the second network. The processor is further configured to receive response data from the network device formatted to be communicated using the second network, and translate the received response data to another format capable of being output over the long range communication network. | 2013-08-15 |
20130212263 | ENCAPSULATING DATA PACKETS - A network captured traffic distribution device may receive captured data packets including original destination information. The captured data packets may then be encapsulated with, for example, new address information so that they may be transmitted toward a destination intended by the network capture traffic distribution device and not the original destination. Captured data packets may also be reformatted by the network capture traffic distribution device in order to, for example, be compatible with one or more devices communicatively coupled to the network capture traffic distribution device. Optionally, the encapsulated and/or reformatted captured data packets may further be encrypted prior to transmission toward their intended destination. | 2013-08-15 |
20130212264 | Controlling access of clients to service in cluster environment - First, second, and third sets of addresses are created. The first set includes addresses registered in a name server; both the second and third sets include addresses not registered in the name server and that are disjoint. A first address of a first server that has failed and to which access is to be prohibited is moved from the first to the third set., is removed from the first server, assigned to a second server, and removed from the name server. Usage parameter values of the first address are monitored to determine whether at least one is below a value. If so, the first address is removed from the second server and moved from the third to the second set. Upon access to the first server no longer being prohibited, a second address of the second set is assigned to the first server and added to the name server. | 2013-08-15 |
20130212265 | METHOD AND APPARATUS FOR TRAFFIC CLASSIFICATION - A Policy and Charging Rules Function server (PCRF) of a Policy and Charging Control (PCC) Architecture for deciding control rules applicable to user traffic flows to be inspected, in accordance with applicable telecommunication protocols for each traffic flow, by a Policy and Charging Enforcement Function server with Deep Packet inspection capabilities (PCEF-DPI) of the PCC Architecture. The PCRF includes a database having a list of protocols used in the user tialYtc flow s The PCRF includes an interface unit which receives a query from the PCEF-DPI about applicable control rules for an IP Connectivity Access Network (IP-CAN) session established for a user at the PCEF-DPI The PCRF includes a processing unit which sends the applicable control rules for the IP-CAN session and the list of protocols through the interface unit to the PCEF-DPI. A Policy and Charging Enforcement Function, server having Deep Packet Inspection capabilities (PCEF-DPI) of a Policy and Charging Control (PCC) Architecture. A method of a Policy and Charging Rules Function server (PCRF) of a Policy and Charging Control (PCC) Architecture. A method of a Policy and Charging Enforcement Function server having Deep Packet inspection capabilities (PCFF-DPI) of a Policy and Charging Control (PCC) Architecture. | 2013-08-15 |
20130212266 | ROUTING CLIENT REQUESTS - Methods and systems for routing client requests are provided. According to one embodiment, a request handling server obtains a rule set for managing the traffic of a content publisher. A request associated with the content publisher is received at the request handling server. When the received request is a content request, directly servicing the received request or redirecting the received request by the request handling server to another server capable of handling the request based on the rule set. When the received request comprises a Domain Name System (DNS) request, responding to the DNS request, by the request handling server, with a DNS response based on the rule set. | 2013-08-15 |
20130212267 | Dynamically Balancing Resources In A Server Farm - Dynamically balancing resources in a server farm, where the server farm includes servers organized in functional server groups with the servers in each functional server group assigned a same type of data processing task, the servers operatively coupled to data storage through a packet switching fabric, the servers operatively coupled to a system management server, and the balancing of resources includes: monitoring, by a resource balancing module of the system management server, CPU utilization in at least one of the functional server groups; identifying, by the resource balancing module in dependence upon the monitored CPU utilization, an overburdened functional server group, the overburdened functional server group's CPU utilization exceeding a CPU overburden threshold; and increasing, by the resource balancing module, CPU resources of the overburdened functional server group, including moving a transfer server from a source functional server group into the overburdened functional server group. | 2013-08-15 |
20130212268 | Route Control Method and System, and Route Computing Apparatus - A route control method is disclosed in the present document. The method includes: a path computing apparatus acquiring a latency value of each node and a latency value of a link between each node and each adjacent node thereof; and when receiving a route computing request, according to each latency value acquired, the path computing apparatus computing an end-to-end path satisfying a latency requirement of a service corresponding to the route computing request. A path computing apparatus and a route control system are also disclosed in the present document. With the present document, a route control computed by the latency provides a solution for a latency Service Level Agreement (SLA) of operators. | 2013-08-15 |
20130212269 | Data Storage Management - A method of data storage management. A server receives a data upload request from a remote client, the upload request including information identifying the data to be uploaded. The server determines that a duplicate of the data is stored at a data storage device. The server receives proof of possession information derived by the client from the data using additional information known to the server. On the basis of the received information, the server determines whether to allow the client or a user associated with the client to subsequently access the duplicate data stored at the data storage device. | 2013-08-15 |
20130212270 | Resource Access Throttling - Techniques for resource access throttling are described. In implementations, access to a network resource can be controlled based on a variety of factors, such as a type of user requesting access to the network resource. For example, consider a scenario where an online content store is preparing to launch. To prevent resources associated with the online content store from being overwhelmed by the number of requests for access when the store is launched, techniques can be implemented to throttle the number of requests that are granted. For instance, requests for access can be throttled based on different user types. | 2013-08-15 |
20130212271 | Single-Point-of-Access Cyber System - The system and system components of the present invention provide individuals with both a safe and a secure cyber environment. Within this safe and secure cyber environment each individual and each cyber device is properly identified for all cyber interactions with others and for all cyber interactions with the cyber devices of others. The system also provides individuals with privacy for the individual's cyber activities and cyber assets. Further, the system provides for environment-wide interoperable use of any cyber device, cyber programming, and cyber content. | 2013-08-15 |
20130212272 | Service Denial and Termination on a Wireless Network - A method and system are provided for denying an application service request, such as a Multimedia Messaging Service (MMS) request, on wireless and wireline Internet Protocol (IP) Multimedia Subsystem (IMS) networks or Session Initiation Protocol (SIP) networks. In one example, the method includes receiving a request for an application service from a user via a transport network, determining to deny the request, and providing a response corresponding to the denial of the request to the user via the transport network. | 2013-08-15 |
20130212273 | TRUE-OWNERSHIP OF SHARED DATA - A method for managing a data item includes a hub receiving a first access request from a first engine executing on a computing device operated by a first host and sending the first access request to a second engine executing on a first computing device of a second host. The second host owns the data item. The hub receives, from the second engine, the data item and an access rule set by the second host for the first host, and sends the first access rule and the data item to the first engine for storage. The first engine grants the first host access to the data item according to the first access rule. | 2013-08-15 |
20130212274 | User Configuration File for Access Control for Embedded Resources - Multimedia content is featured on user pages of an online social network using embed codes that are generated using a configuration file associated with the source ID for the multimedia content and a content ID for the multimedia content. The configuration file, the source ID and the content ID are stored locally by the online social network so that any changes to the embed codes can be made by changing the configuration file associated with the source and regenerating the embed codes. By managing multimedia content in this manner, greater control can be exercised by the online social network over the multimedia content that are featured on its user pages. | 2013-08-15 |
20130212275 | APPARATUS AND METHOD FOR MATCHING OFFERS AND REQUESTS FOR SHARING OF RESOURCES - A resource assignment capability is presented. A resource specification associated with a plurality of elements is received. The resource specification includes, for each of the elements, a resource request including an indication of a quantity of resources requested by the element and a resource offer including an indication of a quantity of resources offered by the element for use by one or more other elements. A resource assignment, including an indication of an association between the resources requests and the resource offers, is determined using a resource assignment process. The resource assignment process may be a greedy assignment process or a maximum flow resource assignment process. The maximum flow resource assignment process includes constructing a maximum flow resource graph based on the one or more resource specifications and applying a maximum flow process to the maximum flow resource graph to determine thereby the resource assignment. | 2013-08-15 |
20130212276 | COMMAND MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and make a determination as to what commands are typically utilized for similar and/or previous instances of the virtual resource. | 2013-08-15 |
20130212277 | COMPUTING CLUSTER WITH LATENCY CONTROL - A computing cluster operated according to a resource allocation policy based on a predictive model of completion time. The predictive model may be applied in a resource control loop that iteratively updates resources assigned to an executing job. At each iteration, the amount of resources allocated to the job may be updated based on of the predictive model so that the job will be scheduled to complete execution at a target completion time. The target completion time may be derived from a utility function determined for the job. The utility function, in turn, may be derived from a service level agreement with service guarantees and penalties for late completion of a job. Allocating resources in this way may maximize utility for an operator of the computing cluster while minimizing disruption to other jobs that may be concurrently executing. | 2013-08-15 |