34th week of 2018 patent applcation highlights part 67 |
Patent application number | Title | Published |
20180241754 | Meeting Join for Meeting Device - Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once trust is established between the trusted entity and the meeting domain, such as an enterprise domain, permissions can be assigned to a meeting device, by virtue of the trust relationship with the trusted entity, to enable the meeting device to join the meeting as a participant, thus allowing the meeting device to bypass an initial join process such as a meeting lobby and the like. By virtue of the assigned permissions, the meeting device may take control of the meeting and control the experience for others in the meeting as a meeting organizer or some other permission-centric role. | 2018-08-23 |
20180241755 | Meeting Join for Meeting Device - Various embodiments enable an application on a first device to log into an online meeting in association with a trusted entity, such as a trusted user. Once trust is established between the trusted entity and the meeting domain, such as an enterprise domain, permissions can be assigned to a meeting device, by virtue of the trust relationship with the trusted entity, to enable the meeting device to join the meeting as a participant, thus allowing the meeting device to bypass an initial join process such as a meeting lobby and the like. By virtue of the assigned permissions, the meeting device may take control of the meeting and control the experience for others in the meeting as a meeting organizer or some other permission-centric role. | 2018-08-23 |
20180241756 | VERIFICATION OF CREDENTIAL RESET - Methods and systems are provided for verifying reset of credentials for user accounts. The methods and systems receive a request to change a credential associated with a user account. The user account has account privileges associated with a network service. The methods and systems send a reset notification to a network application maintaining separate credentials associated with the user account to inform a valid owner or user of the account that a credential has been reset. The methods and systems manage availability of at least a restricted subset of the account privileges until a reset verification is received from a valid owner or user. | 2018-08-23 |
20180241757 | SECURITY PROCEDURES FOR THE CELLULAR INTERNET OF THINGS - Various communication systems may benefit from appropriate security measures. For example, the cellular internet of things may benefit from suitable security procedures. A method can include including a first field in a subscriber profile. The first field can be configured to determine a minimum strength for at least one cryptographic algorithm to be used between a user equipment associated with this subscription and a support node. The method can also include transmitting the subscriber profile between a subscriber database and the support node. | 2018-08-23 |
20180241758 | INFORMATION LEAKAGE PREVENTION SYSTEM AND METHOD - Provided is an information leakage prevention technique which does not require a dedicated device for access management on a network, and which offers excellent security policy flexibility. An information leakage prevention system comprises: a client terminal including a client processing unit which performs network control in accordance with an acquired security policy; and a management server including a user database in which information concerning a user of the client terminal is stored, a security policy database in which a security policy defining a network control content for each attribute of the user is stored, and a server processing unit which selects the security policy on the basis of the attribute of the user and a time of delivery of the security policy, and which transmits the selected security policy to the corresponding client terminal. | 2018-08-23 |
20180241759 | BEHAVIOR-BASED AUTHENTICATION - In one embodiment, a method includes receiving an access request for a video service from a client device, authorizing the client device to access the video service when the client device is initiating connection to the video service via a home Internet access point in a home associated with an authorized account for the video service, determining a time restriction for access to at least part of the video service when the client device is initiating connection to the video service via a non-home Internet access point located outside the home, a duration of the time restriction being dependent upon a usage behavior of the client device, and authorizing the client device to access the at least part of the video service subject to the time restriction when the client device is initiating connection to the video service via the non-home Internet access point. | 2018-08-23 |
20180241760 | NETWORK DATA OBFUSCATION - Network data obfuscation is disclosed. For example, an obfuscation driver is initialized in an endpoint device connected to an obfuscation gateway over a secure connection by collaboratively generating a unique machine identifier of the endpoint device. An obfuscated communication session is established between the obfuscation driver and the obfuscation gateway. Obfuscated messages including obfuscation seeds, de-obfuscation instructions and message payloads are exchanged between the obfuscation driver and the obfuscation gateway. Obfuscating and de-obfuscating a given message includes reordering a plurality of message segments of the message based on the de-obfuscation instructions. A de-obfuscated message from the obfuscation driver is forwarded to an application, and a response is obfuscated by the obfuscation gateway before being transmitted to the obfuscation driver. An obfuscation seed exchange occurs between the obfuscation gateway and the obfuscation driver while the application is processing the de-obfuscated message. | 2018-08-23 |
20180241761 | Reporting Behavior Anomalies - A technique includes determining relations among a plurality of entities that are associated with a computer system; and selectively grouping behavior anomalies that are exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities. The technique includes selectively reporting the collections to a security operations center. | 2018-08-23 |
20180241762 | ANOMALY SELECTION USING DISTANCE METRIC-BASED DIVERSITY AND RELEVANCE - In one embodiment, a device in a network receives a notification of a particular anomaly detected by a distributed learning agent in the network that executes a machine learning-based anomaly detector to analyze traffic in the network. The device computes one or more distance scores between the particular anomaly and one or more previously detected anomalies. The device also computes one or more relevance scores for the one or more previously detected anomalies. The device determines a reporting score for the particular anomaly based on the one or more distance scores and on the one or more relevance scores. The device reports the particular anomaly to a user interface based on the determined reporting score. | 2018-08-23 |
20180241763 | METHOD AND SYSTEM FOR NETWORK INTRUSION DETECTION - A method and a system for the detection of an intrusion in a computer network compares network traffic of the computer network at multiple different points in the network. For example, the network traffic generated by the operating system of one node of a network is compared with the network traffic that is factually sent into the network by this node. In an uncompromised network the network traffic monitored at these two different points in the network should be identical. If differences are detected this may indicate an intrusion of the computer network. | 2018-08-23 |
20180241764 | COMPUTER SYSTEM TO IDENTIFY ANOMALIES BASED ON COMPUTER- GENERATED RESULTS - One or more embodiments may include techniques to identify anomalies based on computer-generated results. Moreover, embodiments may include applying scenario rules to data to detect scenario violations and grouping the scenario violations into scenario clusters based on similar behavior performed by entities indicated by similarity metrics. embodiments include determining predictive ability values for each of the scenario clusters, ranking the scenario clusters based on the predictive ability values, and removing scenario clusters having predictive ability values below a threshold. In embodiments combinations of scenario clusters may be generated from the set of scenario clusters and the combinations of scenario clusters may be evaluated for effectiveness. Embodiments include generating scores for entities of the combinations of scenario clusters deemed effective, and provide results indicating whether one or more of the entities committed an anomaly based on the scores for each of the entities. | 2018-08-23 |
20180241765 | Malware Beaconing Detection Methods - A method for detecting malware beaconing in a network, the method includes capturing network traffic over a network connection at a network connected device, representing the network traffic over the network connection as a set of tuples wherein each of the tuples includes at least a source Internet Protocol address, a destination Internet Protocol address, and a destination port, associating timestamps with each of the set of tuples, and analyzing the tuples using the timestamps based on frequency of connections to determine malware beaconing on the network, wherein the analyzing is performed by a computing device. | 2018-08-23 |
20180241766 | TRUSTWORTHY CLOUD-BASED SMART SPACE RATING WITH DISTRIBUTED DATA COLLECTION - A method, apparatus, and system for a smart space rating service ( | 2018-08-23 |
20180241767 | SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND SCORE GENERATION FOR INSURANCE PURPOSES - A system for comprehensive cybersecurity analysis and rating based on heterogeneous data and reconnaissance is provided, comprising a multidimensional time-series data server configured to create a dataset with at least time-series data gathered from passive network reconnaissance of a client; and a cybersecurity scoring engine configured to retrieve the dataset from the multidimensional time-series data server, process the dataset using at least computational graph analysis, and generate an aggregated cybersecurity score based at least on results of processing the dataset. | 2018-08-23 |
20180241768 | SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated. | 2018-08-23 |
20180241769 | CATEGORIZATION SYSTEM - A system for the categorization of interlinked information items, the system comprising: a trust flow module which is configured to receive a seed trust list of one or more first information items, the seed trust list associating the one or more first information items with one or more categories; and a trust flow module configured to: associate a respective trust value with each of the one or more categories for the one or more first information items; and iteratively pass at least part of the or each trust value to one or more further information items to generate, for each of the one or more further information items, at least one accumulated trust value associated with a category of the one or more categories, such that the one or more further information items can be categorized based on the at least one accumulated trust value and associated category. | 2018-08-23 |
20180241770 | COMMUNICATION SYSTEM AND REPEATER - A repeater serving as a relay device determines, when receiving a frame by a port, whether the received frame is a session request or not. When the received frame is a session request, the repeater then determines whether the repeater is in a prohibition state or not. When the repeater is in the prohibition state, the received frame is discarded. When the repeater is not in the prohibition state, the repeater then determines whether the repeater is in a determination state or not, and, when the repeater is in the determination state, the repeater transitions to the prohibition state for a preset prohibition period that to is set by a setting unit, for discarding the received frame. | 2018-08-23 |
20180241771 | Unobtrusive and Dynamic DDoS Mitigation - Some embodiments provide techniques for mitigating against layer 7 distributed denial of service attacks. Some embodiments submit a computational intensive problem, also referred to as a bot detection problem, in response to a user request. Bots that lack sophistication needed to render websites or are configured to not respond to the server response will be unable to provide a solution to the problem and their requests will therefore be denied. If the requesting user is a bot and has the sophisticated to correctly solve the problem, the server will monitor the user request rate. For subsequent requests from that same user, the server can increase the difficulty of the problem when the request rate exceeds different thresholds. In so doing, the problem consumes greater resources of the user, slowing the rate at which the user can submit subsequent requests, and thereby preventing the user from overwhelming the server. | 2018-08-23 |
20180241772 | AUTO CONFIGURATION SERVER AND METHOD - An Auto Configuration Server is coupled via at least one Load Balancer in a broadband network to at least one device, including at least one gateway device, in at least one home network. The Auto configuration Server remotely manages the devices by using the CPE WAN Management Protocol CWMP on top of the Hypertext Transfer Protocol http. | 2018-08-23 |
20180241773 | METHOD AND APPARATUS FOR DETECTING HIDDEN CONTENT OF WEB PAGE - According to an example, a web page is loaded and description information of the web page and layout information of the web page are generated, the description information of the web page is compared with the layout information of the web page, whether all tag nodes comprised in the description information of the web page are comprised in the layout information of the web page is determined, and it is determined at least one tag node, which being comprised in the description information of the web page and not contained in the layout information of the web page, as hidden content. | 2018-08-23 |
20180241774 | DETECTING MAN-IN-THE-BROWSER ATTACKS - Methods and apparatus are described for automatically modifying web page code. Specific implementations relate to the modification of web page code for the purpose of combatting Man-in-the-Browser (MitB) attacks. | 2018-08-23 |
20180241775 | SYSTEMS AND METHODS FOR UTILIZING CLIENT SIDE AUTHENTICATION TO SELECT SERVICES AVAILABLE AT A GIVEN PORT NUMBER - Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. A host computer can change the service(s) available at a given port number on a client by client basis, enabling access to service(s) for trusted clients unavailable to untrusted clients. Preferably, client trust is based on client authentication via a certificate and a valid, signed transport layer security (TLS) handshake (or similar mechanism in other protocol contexts). In some embodiments, an authorization step can be added following authentication. The systems and methods disclosed herein find wide uses in bundling services on ports, as well as protecting access to services from untrusted and/or malicious clients, among others. | 2018-08-23 |
20180241776 | Splicing into an active TLS session without a certificate or private key - An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active TLS session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point. The technique enables an origin to authorize the edge server to inject cached data at certain points in a TLS session, as well as to mathematically and cryptographically revoke any further access to the stream until the origin deems appropriate. | 2018-08-23 |
20180241777 | OPTIMIZING DATA REDUCTION, SECURITY AND ENCRYPTION REQUIREMENTS IN A NETWORK ENVIRONMENT - A specification of a target network environment including target devices is received. The specification includes an identity of each of the target devices and a compression feature requirement, a deduplication feature requirement, and an encryption feature requirement of the target network environment. A performance parameter corresponding to each of the requirements is computed based on the specification. Possible combinations of the target devices and enabled features in the target devices are determined to meet the specification. Each possible combination is compared to a knowledge base to determine a performance reduction for each of the enabled features based upon the performance parameters. A desired combination of the enabled features is determined from the possible combinations for each target device based upon the comparison. The desired combination includes a combination having a performance reduction that does not exceed a threshold value for data reduction in one or more enabled features. | 2018-08-23 |
20180241778 | DEVICE TO PERFORM POLICY VERIFICATION - Aspect may relate to a device that comprises an interface and a processor. The interface may be configured to: obtain a statement from an asserting party exercising an authorization. The processor may be coupled to the interface and the processor may be configured to: implement an evaluator to evaluate the statement from the asserting party with policy verification instructions to determine if the asserting party was authorized to issue the statement. | 2018-08-23 |
20180241779 | QUERY SYSTEM AND METHOD TO DETERMINE AUTHENTICATION CAPABILITIES - A system, apparatus, method, and machine-readable medium are described for determining the authentication capabilities. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client. | 2018-08-23 |
20180241780 | SECURITY INSPECTION OF MASSIVE VIRTUAL HOSTS FOR IMMUTABLE INFRASTRUCTURE AND INFRASTRUCTURE AS CODE - A method and system are provided for performing a security inspection of a set of virtual images. The method includes merging the virtual images into a tree structure having a root and a plurality of leaves such that child leaves and a parent leaf to the child leaves have common ones of the virtual images. The method further includes applying a bisection method against a path in the tree from the root to a given one of the plurality of leaves having a given one of the virtual images in which a security violation has been identified to find a particular one of the virtual images that is a root cause of the security violation. The method also includes performing a corrective action for any of the plurality of images having the security violation. | 2018-08-23 |
20180241781 | SECURITY RULES INCLUDING PATTERN MATCHING FOR IOT DEVICES - The disclosed technology is generally directed to device security in an IoT environment. In one example of the technology, a set of security rules is stored. The set of security rules includes a set of reference signals. Telemetry data is received over time from an external device. A determination is made, based on the received telemetry data, as to whether the set of security rules has been violated. The determination includes behavioral pattern matching between the received telemetry data and at least one reference signal of the set of reference signals. The received telemetry data is selectively authorized as valid based on the determination. | 2018-08-23 |
20180241782 | Methods and Devices for Detecting and Correlating Data Packet Flows in a Lawful Interception System - The following disclosure relates a method and mediation device ( | 2018-08-23 |
20180241783 | APPARATUS AND METHOD FOR COMMUNICATIONS INVOLVING A LEGACY DEVICE - A gateway receives a message from a first terminal to establish a connection between the first terminal and a second terminal. The gateway sends a second message to the second terminal to offer a connection. After receiving the first message from the first terminal, the gateway receives subsequent third messages from the first terminal that identify candidates for assisting in the formation of the connection. The gateway saves information about these candidates. The gateway either uses such information for facilitating the formation of the connection or forwards that information to the second communication terminal after receiving an answer accepting the establishment of a connection from the second terminal and determining whether the second terminal has a WebRTC client. | 2018-08-23 |
20180241784 | P-CSCF RECOVERY AND REREGISTRATION - A method in an IP multimedia subsystem, IMS, of a telecommunications network. The loss of a secure association between a P-CSCF of the IMS and a user equipment, UE, served by the P-CSCF is detected, or a UE is relocated from a further P-CSCF to the first mentioned P-CSCF. The first mentioned P-CSCF sends a reregistration request to the UE; receives a SIP REGISTER message from the UE; and performs P-CSCF registration with the UE including establishing a new secure association with the UE. | 2018-08-23 |
20180241785 | Systems and Methods for Recording and Storing Media Content - In an example, a method for recording media content using a mobile device includes establishing a communication session between a control system and the mobile device over a communication network and receiving, by a mobile device, a trigger signal transmitted by a control system over a communication network. The method also includes, responsive to the trigger signal, recording media content using a camera of the mobile device. The method further includes storing the recorded media content in a memory of the mobile device, terminating the recording, and, after terminating the recording, uploading the stored multimedia from the mobile device to a server. After uploading the media content to the server, the method includes receiving a signal indicating that the multimedia was successfully uploaded. The method still further includes, responsive to the signal, deleting the media content from the memory. | 2018-08-23 |
20180241786 | SYSTEM, METHOD FOR PROCESSING INFORMATION, AND INFORMATION PROCESSING APPARATUS - A system including a first output apparatus and a second output apparatus that are connected to an information processing apparatus via a network and includes a job generating unit that generates a plurality of jobs that instruct the execution of processing to exchange a first image output to the first output apparatus for a second image output to the second output apparatus based on an image exchange instruction received on a screen that receives user operations and a job execution instructing unit that instructs the first output apparatus acid the second output apparatus to execute the processing to exchange the first image for the second image based on the jobs. | 2018-08-23 |
20180241787 | TRANSMISSION DEVICE AND METHOD FOR CONTROLLING SAME - Provided are a transmission device for transmitting a data signal to a reception device and a method for controlling the same. The present method for controlling a transmission device comprises; receiving function module information related to a codec supported by a reception device from the reception device while pairing with the reception device is performed; encoding a data signal on the basis of the received function module information; and transmitting the encoded data signal to the reception device. | 2018-08-23 |
20180241788 | INFORMATION PROCESSING APPARATUS - A streaming data acquisition section acquires streaming data distributed from a server and including an application image, and a streaming data reproduction section reproduces the streaming data. A command input acceptance section accepts a command input to an application inputted by a user. A command transmission section transmits the inputted command. The command is provided to an information processing apparatus of a distributor of the streaming data and is reflected on processing of the application being executed in the information processing apparatus. | 2018-08-23 |
20180241789 | SYSTEM, METHOD AND APPARATUS FOR BINDING COMMUNICATION DEVICES THROUGH COMMON ASSOCIATION - Systems, methods and apparatuses for binding two or more communication devices through their common association with one or more other devices. Information associated with a common device is stored at a first device. The information associated with the common device is also stored at a second device. A message is transmitted from the first device using the stored information as at least part of a broadcast address identifier. The message can then be accepted at the second device as a result of the information being known to the second device. A “binding by association” is thus effected by virtue of each of the first and second devices having been privy to the same information affiliated with the common device. | 2018-08-23 |
20180241790 | TRANSMITTING APPARATUS, RECEIVING APPARATUS, AND CONTROL METHODS THEREOF - A transmitting apparatus is provided. The transmitting apparatus includes: an L1 signaling generator configured to generate L1 signaling including first information and second information; a frame generator configured to generate a frame including a payload including a plurality of sub frames; and a signal processor configured to insert a preamble including the L1 signaling in the frame and transmit the frame. The first information includes information required for decoding a first sub frame among the plurality of sub frames. Therefore, a processing delay in a receiving apparatus is reduced. | 2018-08-23 |
20180241791 | SYSTEM AND METHOD FOR EVENT CONTENT STREAM - A computer-implemented method, computer program product, and computing system for providing a live stream of event content is provided. In an embodiment, a method may include defining an online collaborative space associated with an event. A plurality of event participants may be associated with the event. Content contributions may be received from one or more of the event participants. An event content update may be transmitted to a client event application based on the received content contributions to provide a live stream of event content. | 2018-08-23 |
20180241792 | ELECTRONIC DEVICES FOR CAPTURING MEDIA CONTENT AND TRANSMITTING THE MEDIA CONTENT TO A NETWORK ACCESSIBLE MEDIA REPOSITORY AND METHODS OF OPERATING THE SAME - A client device is operated by obtaining a list of contacts, wherein the list of contacts includes contact information of authorized users, recording media content, defining a selected recipient of the media content, and transmitting the media content and contact information of the selected recipient to a media repository system to enable the media repository system to compare an identification of a user requesting access to the media content from the media repository system with the contact information of the selected recipient and to enable a communication device of the user to access the media content from the media repository system responsive to a determination that the contact information of the selected recipient matches the identification of the user. The media content includes audio, video, and/or image content. | 2018-08-23 |
20180241793 | VIRTUAL SLICER APPLIANCE - The disclosure provides an approach for virtualizing a slicer server. A slicer program running in a virtual machine receives a multicast Internet Protocol (IP) signal, re-encodes the signal to a streaming-friendly format, and pushes the re-encoded signal to a content distribution network that distributes the video signal to clients either live or on demand. In one embodiment, a new virtual machine including the slicer is cloned from a template for each broadcast channel that is created, with the newly-cloned VM being used to process IP signals for the corresponding broadcast channel. In addition, the slicer running in the VM may transmit to the content delivery network a time sequence indicating when content in the re-encoded signal should be streamed for play out, and the time sequence may be based on a time that is synchronized to an external server. | 2018-08-23 |
20180241794 | SHARING A STREAMING VIDEO - A video segment can be shared over a computer network by first receiving the video segment at a receiving computer on the network. The receiving computer assures that the video segment is in a streaming video format, and creates at least one identification tag for the video segment. The receiving computer also stores the video segment, and communicates the identification tag to another computer on the network. Upon subsequent receipt of that identification tag, the receiving computer streams the video segment to a destination computer on the network. | 2018-08-23 |
20180241795 | TECHNIQUES FOR OPTIMIZING ENCODING PARAMETERS FOR DIFFERENT SHOT SEQUENCES - In various embodiments, an encoding optimization application encodes a source video sequence. The encoding optimization application partitions a source video sequence associated with a media title into multiple subsequences that include a first subsequence and a second subsequence. Subsequently, the encoding optimization application generates a first encoded subsequence based on the first subsequence and a first value of an encoding parameter. The encoding optimization application generates a second encoded subsequence based on the second subsequence and a second value for the encoding parameter. Notably, the second value of the encoding parameter is not equal to the first value of the encoding parameter. The encoding optimization application then aggregates the first encoded subsequence and the second encoded subsequence to generate an encoded video sequence. At least a portion of the encoded video sequence is subsequently streamed to an endpoint device during a playback of the media title. | 2018-08-23 |
20180241796 | Systems and Methods for Adaptive Switching between Multiple Content Delivery Networks during Adaptive Bitrate Streaming - Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming. In one embodiment, an adaptive content delivery network switching device includes a processor, a network interface, and a memory connected to the processor, where the memory contains a content delivery network switching application and, the content delivery network switching application directs the processor to receive content from a first content delivery network, determine a minimum performance threshold based on playback variables from the received content, receive new content from a second content delivery network if the minimum performance threshold is not satisfied. | 2018-08-23 |
20180241797 | Estimation of Losses in a Video Stream - A method for estimating a loss of information in a video stream comprising video frames of different frame types, wherein the video stream is transmitted in a sequence of data packets, the method comprising | 2018-08-23 |
20180241798 | SYSTEM AND METHOD FOR PROVIDING REAL-TIME DATA - A system and method for providing real-time data to a Rich Internet Application is disclosed. The graphical and networking features of RIA frameworks in conjunction with at least one real-time data server provides low-latency, real-time data applications in a web browser. In one embodiment, data is produced at a data source, propagated to a server, and collected at the server. A persistent connection is created from a RIA to the server, and the RIA is subscribed to the data, wherein the subscribed data comprises at least some of the data collected at the server, and wherein the server propagates the subscribed data to the RIA through the persistent connection as the data is collected at the server. | 2018-08-23 |
20180241799 | APPLICATION SERVER FOR DELIVERING APPLETS TO CLIENT COMPUTING DEVICES IN A DISTRIBUTED ENVIRONMENT - An applet server accepts requests for applets from client computers. A request specifies the format in which an applet is to be delivered to the requesting client computer. The applet server has a cache used to store applets for distribution to client computers. If the specified form of the requested applet is available in the cache, the applet server transmits the applet to the requesting client. If the applet is not available in the cache, the server will attempt to build the applet from local resources (program code modules and compilers) and transformer programs (verifiers and optimizers). If the applet server is able to build the requested applet, it will transmit the applet to the requesting client computer. If the applet server is unable to build the requested applet, it will pass the request to another applet server on the network for fulfillment of the request. | 2018-08-23 |
20180241800 | EMAIL WEBCLIENT NOTIFICATION QUEUING - Notifications received from an email server can be stored and provided to a webclient upon subsequent communications from the webclient received at an HTTP server. Notifications stored in a database or a storage are retrieved and transmitted to the webclient by backup or alternate HTTP servers when the webclient requests service. An attachment received from a webclient for a message in composition can be saved by an HTTP server in a storage system so that a backup HTTP server can locate the attachment and provide the attachment to a messaging server when the user is ready to send the message. | 2018-08-23 |
20180241801 | PUSH-BASED CACHE INVALIDATION NOTIFICATION - In one embodiments, one or more first computing devices receive updated values for user data associated with a plurality of users; and for each of the user data for which an updated value has been received, determine one or more second systems that each have subscribed to be notified when the value of the user datum is updated and each have a pre-established relationship with the user associated with the user datum; and push notifications to the second systems indicating that the value of the user datum has been updated without providing the updated value for the user datum to the second systems. | 2018-08-23 |
20180241802 | TECHNOLOGIES FOR NETWORK SWITCH BASED LOAD BALANCING - Technologies for network switch based load balancing include a network switch. The network switch is to receive messages, route messages to destination computing devices, receive a request to perform a workload, and receive telemetry data from a plurality of server nodes in communication with the network switch. The telemetry data is indicative of a present load on one or more resources of each server node. The network switch is further to determine channel utilization data for each of the server nodes, select, as a function of the telemetry data and the channel utilization data, one or more of the server nodes to execute the workload, and assign the workload to the selected one or more server nodes. Other embodiments are also described and claimed. | 2018-08-23 |
20180241803 | SYNCHRONIZED RELEASE OF RESOURCES USED IN DEFERENTIAL CLOUD SERVICES - A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server. | 2018-08-23 |
20180241804 | SYNCHRONIZED RELEASE OF RESOURCES USED IN DEFERENTIAL CLOUD SERVICES - A method is provided of using a set of servers to provide deferential services that have a pre-negotiated time for notice to release the servers. The method includes defining a virtual checkpoint frame interval that is constrained to a duration of up to half of the pre-negotiated time for notice to release the servers. The method includes collecting packets and transactions occurring during the interval that are processed by a current server. The method includes, responsive to an end of the interval, (i) writing, to a shared state database, a state of processing of the packets and transactions occurring during the interval, and (ii) releasing the packets and transactions occurring during the interval. The method includes copying the packets and transactions occurring during the interval, and the state, from the current server to another server for subsequent processing, responsive to an indication of an instance loss on the current server. | 2018-08-23 |
20180241805 | PERFORMING A COMPUTERIZED LANGUAGE TEACHING LESSON USING A MAIN COMPUTER AND A MOBILE DEVICE - A main computer runs a primary program performing an ongoing task, the primary program being optimized for performance on a desktop computer. A computerized device remote from the main computer runs an adjunct program which is a modified version of the primary program and is optimized for performance in a hand free mode. Communication means provides communication between the main computer and computerized device, and the main computer and computerized device interact through the communication means so that each influences the operation of the other. | 2018-08-23 |
20180241806 | DEFERENTIAL SUPPORT OF REQUEST DRIVEN CLOUD SERVICES - A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and toad balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service. | 2018-08-23 |
20180241807 | DEFERENTIAL SUPPORT OF REQUEST DRIVEN CLOUD SERVICES - A method includes configuring worker services to operate in a stateless manner and providing support services that enable the worker services to operate in the stateless manner. The support services include (i) a management service for providing notifications of server removal and addition, (ii) a state maintenance service for maintaining state information in a central location, and (iii) a load balancer service for distributing requests among worker services. The method includes altering a number of servers allocated to at least one worker service, responsive to a notification from the management service. A private protocol is used between the worker services and load balancer service (a) to send, from the worker services to the load balancer service, a respective pointer to the state information associated with the requests, and (b) to include the respective pointer in the requests when any of the requests are forwarded to any worker service. | 2018-08-23 |
20180241808 | SELF-EXPANDING SOFTWARE DEFINED COMPUTING CLUSTER - Methods, computing systems and computer program products implement embodiments of the present invention that include initializing multiple computing nodes to execute one or more software applications that provide a computing service, each of the computing nodes having a respective set of configuration data. Examples of the services include storage services, computational services and web service. Subsequent to deploying the multiple computing nodes as a software defined computing (SDC) cluster, an additional computing node is initialized using a given set of configuration data, and the additional computing node is added to the SDC cluster. In some embodiments, the additional node can be initialized and added to the SDC cluster in response to detecting a condition in the SDC cluster. In alternative embodiments, the additional node can be initialized and added to the SDC cluster in response to receiving a request to add an additional service to the SDC cluster. | 2018-08-23 |
20180241809 | LOAD BALANCING IN DISTRIBUTED COMPUTING SYSTEMS - Techniques for facilitating load balancing in distributed computing systems are disclosed herein. In one embodiment, a method includes receiving, at a destination server, a request packet from a load balancer via the computer network requesting a remote direct memory access (“RDMA”) connection between an originating server and one or more other servers selectable by the load balancer. The method can also include configuring, at the destination server, a rule for processing additional packets transmittable to the originating server via the RDMA connection based on the received reply packet. The rule is configured to encapsulate an outgoing packet transmittable to the originating server with an outer header having a destination field containing a network address of the originating server and a source field containing another network address of the destination server. | 2018-08-23 |
20180241810 | Method for Operating a Motor Vehicle and Motor Vehicle - A method is disclosed for operating a motor vehicle having a computing device providing computing power, a communication device for communicating with a vehicle-external cloud provided with a server device, and a control device, wherein the control device performs an availability check indicating the existence of free computing power available from the motor vehicle for executing a computing task provided by a currently-reachable cloud as determined by the motor vehicle's communication device. From within a list of currently-reachable clouds, a target cloud to which the motor vehicle's computing power must be provided is selected either manually by user input or at least partially automatically based on availability parameters. Once a target cloud is selected, a communication link with the target cloud is established and the motor vehicle is logged into the target cloud as a provider of computing power. A motor vehicle for performing the method is also disclosed. | 2018-08-23 |
20180241811 | IDENTIFICATION OF INCOMPATIBLE CO-TENANT PAIRS IN CLOUD COMPUTING - Disclosed is a mechanism for determining incompatible co-tenants in a cloud network. Cloud performance data is received indicating resource usage of tenants operating on a per server basis. Cross-correlation analysis is performed on past resource usage for each tenant pair operating on the server to determine correlated tenant pairs. Time series forecasting of predicted resource usage is performed for each tenant in the correlated tenant pairs. Cross-correlation analysis is then performed on the predicted resource usage for each correlated tenant pair to determine incompatible co-tenant pairs. The determined incompatible co-tenant pairs may be forwarded toward an orchestration system for hardware resource allocation in the cloud network. | 2018-08-23 |
20180241812 | PREDICTIVE AUTOSCALING IN COMPUTING SYSTEMS - Techniques of predictive autoscaling in distributed computing systems are disclosed herein. In one embodiment, a method includes receiving data representing consumption of a computing resource by an application executing on one or more servers in the distributed computing system. The method also includes processing the received data into a time series having multiple resource consumption values by the application with corresponding time stamps and decomposing the time series into a regular component and an irregular component. The method further includes generating a predicted consumption value of the computing resource by the application at a future time point according to the trend, cyclic pattern, or seasonal pattern of the regular component of the time series and causing immediate adjustment of an amount of the computing resource provisioned in the distributed computing system for the application according to the generated predicted consumption value. | 2018-08-23 |
20180241813 | Systems and Methods for an Internet of Things Computing Shell - Novel tools and techniques for an IoT shell are provided. A system includes a plurality of IoT resources including one or more sensors, a data lake comprising a collection of data streams from the one or more sensors, and an IoT device in communication with the plurality of IoT resources and coupled to the one or more sensors. The IoT device may configured to provide an IoT shell interfacing with a system kernel, the IoT shell configured to accept a set of one or more shell commands. The IoT device may further be configured to receive one or more shell commands, and determine at least one of an argument of the shell command, and an attribute of the argument. The IoT device may then perform a shell command of the one or more shell commands on one or more of the plurality of IoT resources. | 2018-08-23 |
20180241814 | A System, a Node, a Method in a Communication Network and a Computer Program and Corresponding Computer Program Product - An object of the present invention is to develop scalable and decentralized cloud platforms. That is achieved by introducing geographical process look-up. In this specification, geographical process lookup implies finding a running software process running a runtime environment associated with a geographical location. This process can also be used to find a runtime environment to deploy a new (software) process. According to embodiments of the present invention geographical process lookup is accomplished by combining geohash and Kademlia's ability to find nodes that are close to each other and by introducing special software agents so called process runtime agents, which are responsible for managing (e.g. deploying/starting) software processes. Geographical process lookup is then achieved according to embodiments by storing references to the process runtime agents in the DHT as key-values, with the key being the agent's geohash string generated from their geographic latitude and longitude coordinates, and the value being other information e.g. how to connect to the agent. | 2018-08-23 |
20180241815 | MECHANISM FOR OVERLAY VIRTUAL NETWORKING - A method and system for virtual networking is provided. The method includes receiving logical service chain data describing a source virtual network ID (VNID) for a source virtual network, a destination VNID for a destination virtual network, and a group of intermediate waypoints. The logical service chain data defines a logical service chain. A set of networked virtual environments (NVE) is selected to support the group of intermediate waypoints and the logical service chain is deployed and mapped to a physical service chain implemented on the set of NVEs. The logical service chain data is transmitted to a network virtual authority (NVA) and a packet forwarding mechanism is introduced when a packet is received from an overlay port or an underlay port. An associated IP address is requested and the first packet is analyzed. | 2018-08-23 |
20180241816 | LOW-POWER AND LOW-LATENCY DEVICE ENUMERATION WITH CARTESIAN ADDRESSING - An enumeration technique is provided that requires no pre-assignment of addresses to slave devices connected through P2P links to a host device. With regard to any P2P link between devices, one device has a master interface and the remaining device has a slave interface. To distinguish between the master and slave interfaces, a master/slave status bit may be used. Each P2P link has a link ID that may be concatenated with the status bit for a corresponding interface (slave or master) to form a node ID. The host device receives a unique concatenated address from each slave device that represents a concatenation of the node ID for the slave and the node ID for any intervening interfaces between the slave device and the host device. The host device then assigns a unique Cartesian address to each slave device. | 2018-08-23 |
20180241817 | SYSTEMS AND METHODS FOR DATA DISTRIBUTION USING A PUBLICATION SUBSCRIBER MODEL WITH A FEDERATION OF TRUSTED DATA DISTRIBUTION NETWORKS - Federation of trusted data distribution systems is accomplished by treating an entire data distribution network as either a publisher or subscriber to a feed in another data distribution network. A first data feed is created in a first data feed management subsystem associated with a first data distribution network. A second data feed related to the first data feed is created in a second data feed management subsystem associated with a second data distribution network. A first data access policy is associated with the second data feed and a publisher for the second data feed is created in the second data distribution network. The identity and authentication of a second subscriber to the second data feed in the second data distribution network is managed by referencing the first data access policy | 2018-08-23 |
20180241818 | ZONE STORAGE - RESILIENT AND EFFICIENT STORAGE TRANSACTIONS - A distributed storage network (DSN) includes a DSN memory and a distributed storage (DS) processing unit. The DS processing unit determines a particular revision of source data for persistence, and generates a protocol message associated with the particular revision of source data. The protocol message is generated based on a balance between durability and persistence associated with the particular revision. The protocol message is transmitted from the DS processing unit to the DSN memory, and indicates to the DSN memory a particular persistence protocol. The DSN memory process data slices corresponding to the particular revision of source data in accordance with the particular persistence protocol. | 2018-08-23 |
20180241819 | SYSTEMS AND METHODS FOR CONTENT ORIGIN ADMINISTRATION - Methods and systems for storing and distributing content include executing storage rules against ingested content to determine in which of a plurality of storage systems to store the ingested content. A metadata collection that includes records corresponding to the stored content is maintained such that the content may be located by querying or otherwise searching the metadata collection. The metadata collection may be analyzed using various criteria to identify content to be migrated between different storage systems. | 2018-08-23 |
20180241820 | SOFTWARE-DEFINED STORAGE APPARATUS, AND SYSTEM AND STORAGE METHOD THEREOF - The disclosure is related to a software-defined storage apparatus, a system and a storage method. The apparatus includes at least one packet-switched unit and multiple storage units. Each storage unit includes a server unit and a storage device. The server unit connects with the packet-switched unit via at least one network connection port, and connects with the storage device via a data transmission port. A plurality of software-defined storage apparatus forms a storage system. The multiple packet-switched units are respectively connected with an external switch. The server units in the different storage units are communicated with each other via a network communication protocol allowing the apparatus or the system to store data in a specific storage mode. The system can thereby achieve network connection redundancy. A data access redundancy can be achieved when the server units in each storage unit is connected to the multiple packet-switched units. | 2018-08-23 |
20180241821 | SYSTEM AND METHOD OF IMPLEMENTING AN OBJECT STORAGE INFRASTRUCTURE FOR CLOUD-BASED SERVICES - A method for storing objects in an object storage system includes the steps of establishing a network connection with a client over an inter-network, receiving an upload request indicating an object to be uploaded by the client, selecting at least two storage nodes on which the object will be stored, receiving the object from the client via the network connection, and streaming the object to each of the selected storage nodes such that the object is stored on each of the selected storage nodes. The method can also include writing an object record associating the object and the selected storage nodes to a shard of an object database and generating a Universally Unique Identifier (UUID). The UUID indicates the shard and the object ID of the object record, such that the object record can be quickly retrieved. Object storage infrastructures are also disclosed. | 2018-08-23 |
20180241822 | VEHICLE RADAR SYSTEM WITH A SHARED RADAR AND COMMUNICATION SYSTEM - A shared radar and communication system for a vehicle includes capabilities for radar detection and communication with vehicles equipped with similar systems. A transmitter transmits a modulated radio signal that is modulated based upon at least one of a first spreading code and a second spreading code. The second spreading code is defined by a first plurality of information bits. A receiver receives radio signals that include the transmitted radio signals transmitted by the transmitter and reflected from objects in an environment. A control unit is configured to select the first plurality of information bits. The selection of the information bits encodes selected information for transmission via the transmitted modulated radio signal to be received by another radar sensing system. | 2018-08-23 |
20180241823 | SYSTEM AND METHOD OF DYNAMIC ESTABLISHMENT OF VIRTUAL PRIVATE NETWORKS USING BORDER GATEWAY PROTOCOL ETHERNET VIRTUAL PRIVATE NETWORKS TECHNOLOGY - A method and apparatus of a network element that dynamically establishes a first virtual private network (VPN) tunnel is described. In an exemplary embodiment, the network element detects data destined for a first private subnet. In response to the detecting, the network element determines that a next hop for the data does not have an established VPN tunnel that allows access to the first private subnet. The network element further establishes the VPN tunnel and sends the data using the VPN tunnel. | 2018-08-23 |
20180241824 | SOFTWARE-DEFINED NETWORKING PROXY GATEWAY - Aspects of the present invention provide an approach for improving communications between a software-defined networking (SDN) controller and a hardware gateway in a SDN. In an embodiment, a SDN proxy gateway is installed. The SDN proxy gateway communicates with the SDN controller on behalf of the hardware gateway. To accomplish this, the SDN proxy gateway processes a communication sent from the SDN controller to the hardware gateway. This communication includes a request from a computing node to establish a network communication channel. The SDN proxy gateway translates these instructions (e.g., the logical network and endpoint information), which are in the native format of the SDN controller, into a standardized hardware gateway protocol. The translated information that the hardware gateway can use to establish the network connection is then pushed to the hardware gateway by the proxy gateway. | 2018-08-23 |
20180241825 | MIGRATING CLIENTS BETWEEN SERVERS - Methods of migrating clients from a first server to a second server are described. The first server sends a message to the second server identifying a set of clients to be migrated, serializes the state of one or more objects associated with the set of clients and transmits the serialized state to the second server. The first server then instructs each client in the set of clients to establish a connection to the second server such that each client is connected in parallel to both the first and second servers with the connection to the first server as a primary connection and the connection to the second server as a secondary connection and when the clients are connected to the second server, the first server instructs the clients to disconnect from the first server and switch the primary connection to be the connection with the second server. | 2018-08-23 |
20180241826 | COMMUNICATION APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - A communication apparatus operating as an access point on a network receives a signal transmitted by a communication apparatus on the network, transfers the signal to another communication apparatus on the network, and transmits, in response to a request signal, a response signal containing function information of the communication apparatus operating as the access point to a transmission source communication apparatus of the request signal on the network, which has transmitted the request signal. The communication apparatus controls transfer so that the transmission source communication apparatus of the request signal receives no response signal from a communication apparatus other than the communication apparatus operating as the access point on the network. | 2018-08-23 |
20180241827 | Methods, Systems and Apparatuses for the Formation and Tracking of Location Sharing Groups - An embodiment of the present invention is directed to methods, systems and apparatuses enabling location sharing group formation and the tracking of group members. Groups may be bound by a geographical area that circumscribes the boundary of a location sharing group. Active members of a location sharing group may become active based on their relative location to the geographical area defining the location sharing group. The geographical area may be static, mobile or change size and shape based on parameters forming the location sharing group. Alerts may be generated informing members of the location sharing group of the entry or exit of members from the location sharing group. Active members of a location sharing group may share location information with other members of the location sharing group. A radius or other shape may identify a geographical area for location sharing between members. | 2018-08-23 |
20180241828 | SYSTEM AND METHOD OF SOCIAL NETWORKING - A system and method of social networking. A first computer determines a location of a first user using a global positioning system (GPS) of the first computer. The first computer receives a location of at least one second user sent from a second computer. The first computer displays on a display screen a digital representation of a compass and at least one user connect button located on the compass based on the location of the second user relative to the location of the first user. The first computer then receives a selection of the user connect button by the first user and generates a chat window to facilitate communication between the first user and the second user. | 2018-08-23 |
20180241829 | SOCIAL MEDIA AND LOCATION-BASED INFORMED ENTERTAINMENT RECOMMENDATIONS - Aspects of the subject disclosure may include, for example, a method comprising: obtaining social media information associated with a user, wherein the social media information comprises historical social media information associated with the user and current social media information associated with the user; selecting, based upon the historical social media information, a selected personality type associated with the use; determining, based upon the selected personality type associated with the user, a candidate entertainment recommendation; determining, based upon the current social media information, whether the candidate entertainment recommendation should be provided to the user; responsive to determining that the candidate entertainment recommendation should not be provided to the user: determining, based upon the selected personality type associated with the user, an alternate entertainment recommendation; and providing to the user the second recommendation. Other embodiments are disclosed. | 2018-08-23 |
20180241830 | SYSTEMS AND METHODS OF DETERMINING A GEOGRAPHIC LOCATION BASED CONVERSION - Systems and methods of determining a geographic location based conversion via a computer network. A data processing system can receive, from a computing device, an indication of interest in an online content item that is associated with a commercial entity having a location. The system can also receive data points that each include time information and location information of a computing device. The system can generate a valid cluster indicating an activity at the location of the commercial entity by evaluating the time information and the location information of two or more data points with a duration threshold and a location threshold. The system can use the valid cluster to identify the indication of interest in the online content item as the location based conversion based on the activity at the location of the commercial entity. | 2018-08-23 |
20180241831 | Method For Continuous, Frame-Specific Click-Stream Recording - A method for tracking a user's movements between network addresses can include, subsequent to a request for a (current) network address from a user, receiving the network address and an identifier for a region associated with the network address. The method can also include locating a record that contains the identifier for the region and a time that immediately precedes the request for the network address from the user. The record may further contain a prior network address. The method can further include generating an entry for a table that includes the identifier for the region, the current network address, and the prior network address. A server computer or a client computer can generate the entry. Improved accountability and improved user profile accuracy can be obtained with the method. A data processing system readable medium can comprise code that includes instructions for carrying out the method. | 2018-08-23 |
20180241832 | INFORMATION PUSHING METHOD AND APPARATUS - A server obtains at least two target base attributes of a target wireless network. The target wireless network is connected to a target terminal. After determining, according to a preset condition-based classification processing procedure, that the at least two target base attributes satisfy a target condition combination, the server obtains a network provider attribute corresponding to the target condition combination and determines a respective network provider attribute corresponding to the target condition combination as a target attribute of a provider providing the target wireless network. Finally, the server pushes target information associated with the target attribute to the target terminal. | 2018-08-23 |
20180241833 | TRANSFER SERVER AND CONTROLLING METHOD - A transfer server according to the present invention is a transfer server guiding an access request from a client terminal to a site that is a redirect destination and includes a reception unit configured to receive an access request for a site providing a support service relating to a device connected to the client terminal, a generation unit configured to generate an address for accessing a site providing a support service requiring in-advance registration in a case where the device is a target for the support service requiring the in-advance registration, and a transmission unit configured to transmit an access response having the generated address set as a redirect destination to the client terminal. | 2018-08-23 |
20180241834 | HEALTHCARE SEMANTIC INTEROPERABILITY PLATFORM - A system and method for efficiently linking local databases having different data formats or standards into a network, wherein a content based router is provided between each of the databases and a network “party line” bus and translates data from the respective database into a common canonical form or format so that all information within the network between the content based routers complies with the common canonical form and are validated according to single standard or mechanism, for example when information first enters the network. Also provided is a tracking or audit mechanism whereby each item of information provided with a unique network identifier when it first enters the network, and is also provided with or associated with a local identifier from each local database that originates or accesses the information item and router identifiers of the content based routers corresponding to those local databases. | 2018-08-23 |
20180241835 | MONITORING HIGHLY DISTRIBUTED COMPUTER SYSTEMS - Aspects described herein pertain to monitoring and/or remediating operational components distributed throughout a distributed computer architecture, but is not so limited. A disclosed system provides monitoring information associated with a plurality of monitored server computers, wherein the monitoring information includes processing data, storage data, control data, and/or error data to quantify an operational state of one or more of the monitored server computers. A disclosed method monitors information associated with a plurality of monitored server computers, wherein the monitoring information includes processing data, storage data, control data, and the error data to quantify an operational state of one or more of the monitored server computers. | 2018-08-23 |
20180241836 | EDGE CACHE SEGMENT PREFETCHING - Devices, computer-readable media, and methods for pre-loading video chunks of a video program at an edge server are disclosed. For example, a processor may receive a manifest file for a video program, determine a bitrate for a first segment of the video program, request a video chunk of the first segment at the first bitrate from an edge server in accordance with the manifest file, and request a subset of a video chunk of a second segment of the video program from the edge server. | 2018-08-23 |
20180241837 | Efficient Pre-Fetching Notifications - A method includes determining available prefetch updates for a user device. Prefetch notifications, which notify the user device of the available prefetch updates, are sent to the user device. At least a portion of the prefetch updates is embedded in one or more of the prefetch notifications. | 2018-08-23 |
20180241838 | DISTRIBUTED CACHE LIVE MIGRATION - A method, an apparatus, and a system for migrating cache are described. A system for migrating cache may include a first host having a first cache and associated with a VM. The system may also include a second host having a second cache. Furthermore, in the system, the first host is adapted to send cache data of the first cache to the second host in response to a notification, said cache data associated with the VM and said notification indicating that the VM is to be migrated from the first host to the second host. Furthermore, the first host is adapted to send write operations associated with the VM to the second host in response to receiving the notification. In the system, the second host is adapted to apply, in response to receiving the notification, read operations associated with cache data of the VM to the first cache if said cache data is not present in the second cache, and to apply write operations associated with cache data of the VM to the second cache. | 2018-08-23 |
20180241839 | CACHING IN WIRELESS COMMUNICATION NETWORKS - A Network Reporting Entity (NRE) and a User Equipment (UE) as well as a respective method therein for use in a wireless communication network for enabling controlling data transfer between the UE and a network cache are provided. The NRE receives, from the UE, a request to start reporting network status and transmits, to the UE, information regarding the status of the network, the information pertaining to whether network condition is in a state where a data transfer is preferred or not, wherein the NRE obtains the information regarding the status of the network from the Network Conditions Information Entity (NCIE). In this manner, the UE is enabled to control the data transfer between the UE and the network cache. | 2018-08-23 |
20180241840 | APPARATUS AND METHODS FOR ENSURING DELIVERY OF GEOGRAPHICALLY RELEVANT CONTENT - Apparatus and methods for ensuring delivery of geographically relevant content to IP-enabled user devices associated with a content distribution network. In one embodiment, the network (or designated content source) determines a geographic context or location of the user device, and uses this information to manage the packaging and delivery of content thereto so as to obey blackout restrictions and/or provide content which is relevant to the geographic context/location. In one variant, the user device comprises a mobile device such as a tablet computer or smartphone, and the content is delievered thereto over either a managed or unmanaged network infrastructure. | 2018-08-23 |
20180241841 | INFORMATION SYSTEM - An information system includes a server and a client that is connected to the server. The server transmits, when receiving a connection request from the client, a response that includes any one of version information of software in the server and version information of a communication protocol in the server, to the client. The client determines whether a communication protocol in the client is compatible with the server based on the response from the server. | 2018-08-23 |
20180241842 | Fabric Support for Quality of Service - There is disclosed in an example, a fabric interface device, having: a fabric interconnect to communicatively couple to a fabric; service level agreement (SLA) input logic to receive an SLA data structure from a controller, the SLA data structure providing an end-to-end SLA for a resource flow provided by a plurality of resources, and comprising QoS metrics for the resources; and SLA output logic to propagate the QoS metrics out to the resources via the fabric interconnect. | 2018-08-23 |
20180241843 | ADJUSTING CLOUD-BASED EXECUTION ENVIRONMENT BY NEURAL NETWORK - Various examples provide for solutions that use an artificial neural network to adjust a cloud-based execution environment for an application based on a set of metrics associated with the cloud-based execution environment, including a Quality-of-Service (QoS) metric and a cost metric. The adjustment may be based on a mapping, determined by the artificial neural network, between the application and a cloud-based infrastructure utilized by the cloud-based execution environment. | 2018-08-23 |
20180241844 | Control Signalling in SDN Architecture Networks - There is provided a software-defined networking, SDN, architecture network, comprising a first network node ( | 2018-08-23 |
20180241845 | SYSTEM FOR GENERATING RESPONSES TO REQUESTS - A server automatically generates a response to a request received from a first user. The server generates response templates for the second user. The server receives the request from the first user, where the request includes request values for request fields. The server selects the second user to respond to the request received from the first user. The server automatically selects one of the response templates for generating the response to the request. The selected one of the response templates is determined to be the response template that most closely matches the request received from the first user. The server automatically generates the response using the selected response template including populating one or more placeholder values with information extracted from the request received from the first user. The server transmits the generated response to the first user. | 2018-08-23 |
20180241846 | AUTOMATED CONFIGURATION SUPPORT SYSTEM - A configuration support system includes a support device having an automated support application, a network device, and a management device coupled to the network device and the support device. The management device creates a configuration session with the network device and, in response, displays a configuration window. The management device also creates a messaging session with the automated support application and, in response, displays a messaging window. The management device may then send, to the automated support application via the messaging session, data generated during the configuration session. The management device may also receive, from the automated support application via the messaging session, an automated support application command directed to the network device and execute, on the network device via the configuration session, the automated support application command. | 2018-08-23 |
20180241847 | Non-Transitory Computer-Readable Recording Mediam for Terminal Device - A terminal device may display a first screen including a first button, send a first request including a search command to a communication device by using a first wireless connection in a case where the first button is selected, display a second screen including a second button in a case where a first response including one or more identification information is received from the communication device by using the first wireless connection, and send a second request including wireless setting information and a connection command to the communication device by using the first wireless connection in a case where the second button is selected. The connection command may be for causing the communication device to establish a second wireless connection by using the wireless setting information. | 2018-08-23 |
20180241848 | HUMAN-READABLE CLOUD STRUCTURES - Examples relate to human-readable cloud structures. Some examples disclosed herein may enable identifying cloud definition data describing a cloud to be deployed. The cloud definition data comprises a set of structural attributes that define a structure of the cloud and a set of non-structural attributes. Some examples may enable generating a first human-readable artifact that describes the structure of the cloud in natural language using the set of structural attributes of the cloud definition data, modifying a portion of the cloud definition data, generating a second human-readable artifact describing the structure of the cloud in natural language using the set of structural attributes of the cloud definition data that includes the modified portion, and determining whether the structure of the cloud in the second human-readable artifact is different from the structure of the cloud in the first human-readable artifact by comparing the first human-readable artifact with the second human-readable artifact. | 2018-08-23 |
20180241849 | ON-DEMAND STARTUP OF OFFLINE SERVERS AND CONNECTION ROUTING - A method and apparatus for providing remote access to an unavailable server is provided. In an embodiment, a proxy server computer receives a request to access data over a network from a client computing device. The proxy server computer identifies a particular server computer that is separate from the client computing device to fulfill the request. The proxy server computer then determines that the particular server computer is unavailable to a client computing device. In response to determining the particular server is unavailable to the client computing device, the proxy server computer maintains a transport layer connection from the client computing device. While maintaining the transport layer connection, the proxy server computer initiates startup of the particular server computer. In response to receiving an indication that the particular server computer is available to the client computing device, the proxy server computer passes the connection from the client computing device to the particular server computer. | 2018-08-23 |
20180241850 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2018-08-23 |
20180241851 | SYSTEM PROVIDING FASTER AND MORE EFFICIENT DATA COMMUNICATION - A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid). The client then downloads the data from these peers in parts and in parallel, thereby speeding up the Web transfer, releasing congestion from the Web by fetching the information from multiple sources, and relieving traffic from Web servers by offloading the data transfers from them to nearby peers. | 2018-08-23 |
20180241852 | MIXED QUALITATIVE, QUANTITATIVE SENSING DATA COMPRESSION OVER A NETWORK TRANSPORT - In one embodiment, a device in a serial network de-multiplexes a stream of traffic in the serial network into a plurality of data streams. A particular one of the data streams is associated with a particular endpoint in the serial network. The device determines that data from the particular data stream associated with the particular endpoint should be reported to an entity external to the serial network based on an event indicated by the data from the particular data stream. The device quantizes the data from the particular data stream. The device applies compression to the quantized data to form a compressed representation of the particular data stream. The applied compression is selected based on a data type associated with the data. The device sends a compressed representation of the particular data stream to the external entity as Internet Protocol (IP) traffic. | 2018-08-23 |
20180241853 | SYSTEMS AND METHODS FOR MALICIOUS CODE DETECTION ACCURACY ASSURANCE - There is provided a method for authenticating an attempt at establishment of a network connection by allowed code, comprising: providing a dataset having previously observed stack trace templates each representing a stack trace pattern prevailing in stack traces recorded by monitoring stacks of clients executing an allowed code during a connection establishment process for establishing network connections related to the allowed code; receiving a new stack trace recorded during a new connection establishment process for a new network connection by a new client; measuring a similarity between the new stack trace and the plurality of stack trace templates to identify a match to a stack trace template; evaluating the matched stack trace template for a predefined rule requirement; and updating a rule-set database with the matched stack trace template to authenticate new network connection establishments associated with stack templates matching the matched stack trace template. | 2018-08-23 |