35th week of 2015 patent applcation highlights part 68 |
Patent application number | Title | Published |
20150244499 | SPLIT RADIO ARCHITECTURE - The present invention relates to a split signal processing system comprising: multiple antennas for receiving transmitted signals carrying an information-bearing symbol; multiple signal processing modules associated with the respective antennas and being configured to generate respective bit log-likelihood ratio (LLR) sequences, each corresponding to the information-bearing symbol; and a LLR combiner for combining the bit LLR sequences received from the multiple signal processing modules. | 2015-08-27 |
20150244500 | Data Transmissions Over A Voice Channel - A modem for communicating application data over a voice channel comprises an adaptive modulator, a mixer, and a vocoder. The adaptive modulator modulates application data as a function of a source application of the application data and feedback information of the voice channel. The modulated data is inputted to the mixer. The vocoder processes the mixed data for transmission through the voice channel. | 2015-08-27 |
20150244501 | DATA AND EVENT GAP RECONCILIATION ACROSS NETWORKS USING DIFFERENT COMMUNICATION TECHNOLOGIES - Systems and methods automatically detect missing data and attempt to collect the missing data. The missing data may be related to a data reading or may be related to an event. The missing data is detected by comparing a communication received from an endpoint with previously received communications from the endpoint. The communication technology used by the endpoint may be considered in determining how to detect missing data and how to request the missing data from the endpoint. A single headend system may communicate with endpoints that use different communication technologies by adjusting the speed, batch size and the retry process used. | 2015-08-27 |
20150244502 | AUTOMATIC RETRANSMISSION AND ERROR RECOVERY FOR PACKET ORIENTED POINT-TO-MULTIPOINT COMMUNICATION - A method and an apparatus for automatic retransmission and error recovery for packet oriented point to multipoint communication, which integrates adaptive and dynamic responsiveness for parameters for automatic retransmission using wireless communication, are provided. A wireless communication link is divided into a downstream portion and an upstream portion. Parameters are selected for automatic retransmission independently for the downstream portion and the upstream portion of the wireless communication link. A BSC controls the selection of parameters for automatic retransmission for all CPE within a cell. As part of a TDD frame, in which the BSC and the CPE share communication bandwidth using a TDMA technique, the BSC includes its selection of parameters for automatic retransmission to be used by CPE within a control section of the TDD frame. The BSC dynamically and adaptively determines new selected parameters for automatic retransmission, in response to a wireless communication link with each independent CPE. | 2015-08-27 |
20150244503 | METHOD FOR RECEIVING ACK/NACK SIGNAL IN MOBILE COMMUNICATION SYSTEM - A method for transmitting information of resources for use in transmission of ACK/NACK signals in a mobile communication system is disclosed. An example method for receiving ACK/NACK signals in a mobile communication system is also disclosed. When resources for transmission of data and resources for transmission of control information of the data are scheduled through virtual unit resources, the method identifies information of resources for receiving an ACK/NACK signal for transmission data mapped to information of at least one of a virtual unit resource allocated to the transmission data and a virtual unit resource allocated to control information of the transmission data, and receives the ACK/NACK signal for the transmission data through the information of resources for receiving the ACK/NACK signal. | 2015-08-27 |
20150244504 | APPARATUS AND A METHOD FOR DETERMINING INFORMATION ON AN AMPLITUDE ERROR OF A TRANSMIT SIGNAL - An apparatus for determining information on an amplitude error of a transmit signal includes at least one transmit path module, at least one feedback receive path module and at least one error determining module. The transmit path module generates a high frequency transmit signal based on a baseband transmit signal. The feedback receive path module generates a baseband feedback signal based on a high frequency feedback signal derived from the high frequency transmit signal. Further, the error determining module determines an error signal indicating information associated with an amplitude error of the high frequency transmit signal based on the baseband transmit signal and the baseband feedback signal. The error determining module comprises a feedback loop. This feedback loop of the error determining module comprises a feedback loop processing module. The feedback loop processing module generates a feedback loop output signal based on a feedback loop input signal and the baseband transmit signal. | 2015-08-27 |
20150244505 | APPARATUS AND METHODS FOR FULL DUPLEX COMMUNICATION - Apparatus and methods for wireless communications include determining a first echo cancellation metric indicative of a first amount of echo cancellation as a first function of a first transmit power of a first wireless communications device; and providing the first echo cancellation metric to a scheduling entity for scheduling full duplex (FD) or half duplex (HD) communication resources for the first wireless communications device. | 2015-08-27 |
20150244506 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION CONTROL METHOD AND ACCESS POINT - A wireless communication system includes a first access point that forms a first wireless area and a second access point that forms a second wireless area. The first access point controls the scheduling of a terminal located in the first wireless area based on the state of a communication channel between a terminal which is a candidate for scheduling by the second access point and the first access point. | 2015-08-27 |
20150244507 | Reference Signal Mapping - An example method of mapping a set of reference signal samples to subcarriers is disclosed. First and second subsets of samples having contiguous index values are determined. The second subset of samples are mapped to a first subset of subcarriers, such that a first sample of the second subset of samples having a lowest index value of the second subset of samples is mapped to a first subcarrier at a first end of a bandwidth. The first subset of samples are mapped to a second subset of subcarriers of the bandwidth, such that a last sample of the first subset of samples having a highest index value of the first subset of samples is mapped to a last subcarrier at an opposite second end of the bandwidth. A complementary method of demapping subcarriers is also disclosed. | 2015-08-27 |
20150244508 | METHOD AND APPARATUS FOR TRANSMITTING CHANNEL STATE INFORMATION-REFERENCE SIGNALS IN WIRELESS COMMUNICATION SYSTEM - A method of transmitting channel state information (CSI)-reference signals (RS) at a base station in a wireless communication system includes generating a reference signal sequence, and mapping the reference signal sequence to resource elements (REs) included in one or more patterns for 8-port CSI-RS transmission among five patterns for 8-port CSI-RS transmission located in a first region of a PRB pair and three patterns for 8-port CSI-RS transmission located in a second region of the PRB pair. A maximum of two OFDM (orthogonal frequency division multiplexing) symbols is used for a physical downlink control channel in a subframe including the PRB pair. | 2015-08-27 |
20150244509 | APPARATUS AND METHOD OF TRANSMITTING AND RECEIVING REFERENCE SIGNAL IN WIRELESS COMMUNICATION SYSTEM USING MULTIPLE-INPUT AND MULTIPLE-OUTPUT - An apparatus and method is proved that transmits and receives Reference Signals (RSs) in a wireless communication system using Multiple-Input and Multiple-Output (MIMO). A system adapted to the method is provided. The method includes: determining the number of RS transmission to two or more antennas, respectively, as the number of antennas included in respective ports, wherein each port include one or more antennas; creating transmit patterns so that they cyclically differ from each other every the number of RS transmission to transmit the created transmit patterns the number of RS transmission times; and mapping the RSs to one or more antennas according to the created, respective patterns, and transmitting the RSs in order. | 2015-08-27 |
20150244510 | METHOD AND APPARATUS FOR TRANSMITTING ACKNOWLEDGEMENT IN WIRELESS COMMUNICATION SYSTEM - The method for transmitting an acknowledgement for enhanced physical downlink control channel (EPDCCH) by a terminal in a wireless communication system according to one embodiment of the present invention comprises: a step of receiving EPDCCH; and a step of determining a resource for transmitting the acknowledgement based on one or more of the values related to the enhanced control channel element (ECCE) index which is the lowest from among the indices of ECCEs used in the EPDCCH transmission, an antenna port index, and a predetermined value indicated by downlink control information. The transmitting acknowledgement method determines whether to use the predetermined value indicated by the downlink control information when the resource for transmitting the acknowledgement is determined, based on one or more of the transmitted EPDCCH type, the size of an DCI format, information related to the physical resource block (PRB) set of the transmitted EPDCCH, and the type of the signal transmitted on the PDSCH indicated by the EPDCCH. | 2015-08-27 |
20150244511 | DUPLEX SERVICES RESIDING IN A MESSAGING BUS - An example method of integrating a plurality of heterogeneous peer-to-peer communication participants includes retrieving from a first input queue coupled to a duplex service a first message. The first message includes a message identifier and is from a sender. The method also includes applying a first operation on the first message, determining a first output of the first message based on the first operation, and sending the first output of the first message to a target. The method further includes retrieving from a second input queue coupled to the duplex service a second message. The second message includes the message identifier and is from a target. The method also includes applying a second operation on the second message, determining a second output of the second message based on the second operation, and sending the second output of the second message to the sender. | 2015-08-27 |
20150244512 | PHASE TRACKING FOR A SAMPLING CLOCK - Techniques for sampling a data signal are described. An example of an electronic device includes a data bus, a transmitting device coupled to the data bus, and a receiving device coupled to the data bus by a bus interface. The bus interface is to receive a data signal from the transmitting device, wherein the data signal includes a known data pattern. Additionally, the bus interface is to receive a forwarded clock signal from the transmitting device and generate a sampling clock signal based on the forwarded clock signal. Additionally, the bus interface is to sample the known data pattern to obtain phase tracking data and adjust a sampling phase of the sampling clock signal based on the phase tracking data. | 2015-08-27 |
20150244513 | Clock Drift Compensation in a Time Synchronous Channel Hopping Network - Disclosed are various embodiments for compensating for clock drift between nodes in a time synchronous network. A node receives time synchronization information from a parent node in the network. A drift between a clock of the node and a clock of the parent node is determined based upon the time synchronization information. The node identifies a number of time slots of the network since making a last time synchronization based on previous time synchronization information transmitted from the parent node. A compensation interval is calculated that represents a number of the time slots over which the clock of the node deviated, with respect to the parent node, by a predefined compensation value. The node compensates, by the compensation value, one of the time slots according to the compensation interval. | 2015-08-27 |
20150244514 | CLOCK AND DATA RECOVERY DEVICE - A clock and data recovery device is provided which includes a phase detector, a charge pump unit, a loop filter unit, and a voltage controlled oscillator. The phase detector detects a phase of a data clock signal to output a comparison signal. The charge pump unit adjusts the amount of charges to be supplied according to the comparison signal. The loop filter unit accumulates the amount of charges to be supplied to output an adjustment signal. The voltage controlled oscillator generates an output clock signal variable according to the adjustment signal. The phase detector compares phases of the data clock signal and each of modulated clock signals sequentially received to output the comparison signal. The modulated clock signals are signals modulated from the output clock signal to have different phases. | 2015-08-27 |
20150244515 | Communication Method, Communication Device and Magnetic Resonance Tomography System with Communication Device - A communication method for communication between a first and a second communication apparatus, where at least one wanted signal is transmitted from the second communication apparatus to the first communication apparatus is provided. The method includes sending a first carrier signal at a first frequency using the first communication apparatus. The method also includes receiving the first carrier signal using the second communication apparatus and generating a second carrier signal at a second frequency. The method includes changing the second frequency and/or a specified phase angle, and/or modulating the second carrier signal in each case as a function of the wanted signal in order to generate a transmit signal. The transmit signal is sent by the second communication apparatus, and the transmit signal is received and demodulated in order to recover the wanted signal using the first communication apparatus. | 2015-08-27 |
20150244516 | SYSTEM AND METHOD FOR MIXING VOIP STREAMING DATA FOR ENCRYPTED PROCESSING - A method for data privacy in a VoIP system includes: generating a private key for an additive homomorphic encryption scheme; sending the private key to a plurality of client terminals to be used by each of the plurality of client terminals to encrypt a respective VoIP streaming data; receiving an encrypted VoIP streaming data from each of the plurality of client terminals, wherein each of the VoIP streaming data is encrypted using the same private key; performing an encrypted homomorphic addition on the encrypted VoIP streaming data to generate a mixed encrypted VoIP data stream; and sending the mixed encrypted VoIP data stream to the plurality of client terminals to be played back. | 2015-08-27 |
20150244517 | Computer-Implemented System And Method For Providing Secure Data Processing In A Cloud Using Discrete Homomorphic Encryption - A computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption is provided. Plaintext data items are homomorphically encrypted into queries, which are transmitted to a discrete homomorphic encryption server. From the server are received identifiers associated with the queries. The identifiers are transmitted to a computing server in a cloud-computing environment, where at least one of the identifiers is processed. The plaintext data items are encrypted into ciphertext data items and transmitted to a storage server in the environment requested to store the items in a storage. References for storage locations of the ciphertext data items are received and associated with identifiers for the queries encrypted from the same plaintext data item as the ciphertext data items at the locations. The ciphertext data item whose location is identified by the reference associated with the identifier in the processing result is retrieved and decrypted. | 2015-08-27 |
20150244518 | VARIABLE-LENGTH BLOCK CIPHER APPARATUS AND METHOD CAPABLE OF FORMAT PRESERVING ENCRYPTION - A variable-length block cipher apparatus and method capable of format preserving encryption are provided. An encryption device for a variable-length block cipher apparatus includes an encryption key generation unit configured to generate encryption round keys eRK | 2015-08-27 |
20150244519 | Cryptanalysis Method and System - A cryptanalysis method comprising:
| 2015-08-27 |
20150244520 | ONE-TIME-PAD DATA ENCRYPTION WITH MEDIA SERVER - The disclosed invention in essence relates to protection of information in communication channels between a sender and a communication server and a communication server and a receiver, and wherein a Vernam cypher and one time pad personal encryption keys of a sender and a receiver are used for encrypting transmitted data. | 2015-08-27 |
20150244521 | COMMUNICATION ENCRYPTION AND DECRYPTION METHOD, DEVICE AND SYSTEM - An encryption process comprises: extracting a to-be-encrypted first character string from the to-be-transmitted information; converting the first character string into a plurality of first binary numbers for storage; encrypting the stored plurality of first binary numbers according to a preset encryption algorithm to generate a plurality of second binary numbers; converting the plurality of second binary numbers into a to-be-transmitted character string; conducting transmission encoding on the to-be-transmitted character string, and transmitting the encoding result. The decryption process comprises: receiving the to-be-processed information transmitted by a transmitting terminal; conducting transmission decoding on the to-be-processed information to obtain a third character string; converting the third character string into a plurality of third binary numbers for storage; decrypting the stored plurality of third binary numbers according to a preset decryption algorithm to generate a plurality of fourth binary numbers; and converting the plurality of fourth binary numbers into a fourth character string. | 2015-08-27 |
20150244522 | METHOD AND SYSTEM FOR PROVIDING DATA SECURITY - Embodiments herein provide a method for data security. A data passcode used for data encryption in electronic devices is encrypted and secret shares of the encrypted passcode are distributed to multiple entities. Recovery of the passcode and the encrypted data is performed by obtaining the secret shares from the multiple entities to reconstruct the passcode used for data encryption. | 2015-08-27 |
20150244523 | SECURE PROCESSING SYSTEMS AND METHODS - This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain. | 2015-08-27 |
20150244524 | Side-Channel-Protected Masking - The invention provides a method, in a processor, for executing a cryptographic computation. Upon the execution of the computation there is applied a base masking through which intermediate values are incorporated into the computation as masked intermediate values. Upon the execution of the computation a secondary masking is additionally applied, wherein for each intermediate value masked by means of the base masking the one's complement of the masked intermediate value is formed, the masked intermediate value and the one's complement of the masked intermediate value are made available, and randomly the computation is executed either with the masked intermediate value or with the one's complement of the masked intermediate value. | 2015-08-27 |
20150244525 | AUTHENTICATION - A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. | 2015-08-27 |
20150244526 | ENHANCED SECURITY SETUP FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 2015-08-27 |
20150244527 | ENHANCED SECURITY SETUP FOR MEDIA DECRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 2015-08-27 |
20150244528 | AES-GCM BASED ENHANCED SECURITY SETUP FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 2015-08-27 |
20150244529 | ENHANCED SECURITY FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 2015-08-27 |
20150244530 | ENHANCED SECURITY FOR MEDIA DECRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 2015-08-27 |
20150244531 | FUZZY PROTECTION OF VISUAL CONTENT - A method and system for scrambling visual information are, described. An image, preferably in an incompressed format, is divided into a number of patterns having a different aspect ratio. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns are then arranged in a different and new shape for e.g. a rectangle, preferably, fitting the size of manoblocks in a MPEG video, to that of the original shape of the image but having the same number of patterns or same area. The patterns of pixels are then relocated in the new shape and a matrix is again mapped for the new arrangement of patterns. A key is then generated comprising the information of the encrypted and earlier image. The player decrypts the encrypted visual content or image by means of the information provided by the key. | 2015-08-27 |
20150244532 | METHOD AND TERMINAL FOR MESSAGE VERIFICATION - Embodiments of the present invention provide a method and a terminal for message verification, which can enhance timeliness of event message verification. The method includes: receiving an event message sent by a cell broadcast entity; obtaining a public key of a CA according to pre-configured information for determining the public key of the CA and information for determining the public key of the CA and obtained from a network side, or according to information of the CA obtained from the network side; then, obtaining a public key of the cell broadcast entity according to the obtained public key of the CA and an implicit certificate of the cell broadcast entity; verifying a signature of the cell broadcast entity over the event message according to the public key of the cell broadcast entity; and finally, determining legitimacy of the event message according to the verification result. | 2015-08-27 |
20150244533 | SPLITTING CERTIFICATE STATUS RESPONSES EVENLY ACROSS MULTIPLE DISTRIBUTED CERTIFICATE STATUS RESPONDERS - Techniques are disclosed for evenly distributing certificate status validity messages across multiple response servers. A certificate authority (CA) may partition subsets of online certificate status protocol (OCSP) responses to each be handled by OCSP response servers. The partitions are based on serial numbers of the underlying digital certificates of the OCSP responses. For example, to determine which OCSP response server is assigned to distribute a particular OCSP response, a modulo operation may be performed between the last octet value of the underlying certificate serial number and the total number of available OCSP response servers of the CA. The result yields a partition number that may be used to identify the corresponding OCSP response server. | 2015-08-27 |
20150244534 | METHOD AND SYSTEM FOR PROVIDING MOBILE SUBSCRIPTION CONTENT ACCESS - A method for providing mobile subscription content access is disclosed. Initially, subscription contents are stored in a server. The subscription content can be accessed via any terminal coupled to the server by a communication link. In response to an access to any of the subscription contents on an encrypted subscription channel via a terminal, a determination is made as to whether or not a valid receiver is found in the proximity of the terminal. If a valid receiver is found in the proximity of the terminal, an encryption/decryption key is transferred to the valid receiver. With the encryption/decryption key, the subscription contents on an encrypted subscription channel can be accessed via the terminal and the valid receiver. | 2015-08-27 |
20150244535 | POWER OVER ETHERNET SUPERVISION - A method in a power management module for supervision of a Power Sourcing Equipment, PSE, and a power management module adapted to supervise a PSE is provided. The PSE is adapted to provide power on an Ethernet cable. The power management module is connected to an Ethernet physical layer and a power source module within the PSE. The method comprises detecting a change in a power providing mode of the power source module. When the detected change indicates that the power source module has stopped to provide power, the method comprises switching off the Ethernet physical layer. When the detected change indicates that the power source module has started to provide power, the method comprises switching on the Ethernet physical layer. | 2015-08-27 |
20150244536 | Power Sourcing Equipment and Method - A power sourcing equipment including a power supply module, a logic device, a power sourcing equipment (PSE) chip module, a control signal superimposer, and a switch circuit; the power supply module has multiple power supplies, and outputs a power supply alarm signal when at least one of the multiple power supplies is faulty; the logic device acquires, according to the power supply alarm signal, a power supply table corresponding to a power supply fault condition of the power supply module, and a first signal about the power-on or power-off status is sent to the first input end of the control signal superimposer; the control signal superimposer superimposes the first signal, with a second signal of a power-on or power-off status sent by the PSE chip module, and outputs a superimposing result to the switch circuit; and the switch circuit controls the power supply module to the powered device (PD). | 2015-08-27 |
20150244537 | SYSTEM AND METHODS FOR ENABLING POLICY EXCHANGE ACROSS MULTIPLE CARRIERS - Systems and methods that enable a Home network to control and enforce its policies across other networks are disclosed. | 2015-08-27 |
20150244538 | ENHANCING COLLABORATION IN REAL-TIME GROUP CHAT SYSTEM AND METHOD - A method, computer program product, and computer system for maintaining, between a plurality of participating computing devices, a collaboration session that includes a group instant messaging session within an object, wherein the plurality of participating computing devices includes a host computing device and one or more non-host computing devices in the group instant messaging session. A first sub-object of a plurality of sub-objects is generated within the object, wherein the first sub-object is rendered on the host computing device and the one or more non-host computing devices. Permission is assigned to the host computing device to edit content in the first sub-object, wherein the content in the first sub-object is rendered on the host computing device and the one or more non-host computing devices, and wherein the non-host computing devices are precluded from editing the content in the first sub-object. | 2015-08-27 |
20150244539 | CREATING CONNECTIONS AND SHARED SPACES - Methods, computer systems, and computer-storage media are provided for connecting devices. Shared spaces may be created among one or more users and/or devices. Based on various factors including locations, histories among users, time of day, etc., spaces may be created among users such that content may be shared within the shared space. The spaces may be created using multiple technologies such that one user may connect to the space via a first identifier format while a second user may connect to the space via a second identifier format. Once created, content may be shared with one or more users of the space. Depending on privacy and/or security settings of the space, any user may invite other users to join the space. The content may be available to any participant once the space has terminated. | 2015-08-27 |
20150244540 | PROVISIONING NETWORK DEVICES IN ETHERNET-BASED ACCESS NETWORKS - In general, techniques are described for provisioning network devices in an Ethernet-based access network. For example, an access node located in an Ethernet-based access network positioned intermediate to a back office network and a customer network may implement the techniques. The access node comprises a control unit that discovers a demarcation point device that terminates the access network of the service provider network at the customer network. The control unit of the access node implements an Ethernet protocol to provide layer two network connectivity between the service provider network and the customer network, authenticates the demarcation point device based on a unique identifier assigned to the demarcation point device and, after successfully authenticating the demarcation point device, provisions the demarcation point device. | 2015-08-27 |
20150244541 | Enhanced Carrier Sense Multiple Access (CSMA) Protocols - Systems and methods for enhanced carrier sense multiple access (CSMA) protocols are described. In various implementations, these systems and methods may be applicable to Power Line Communications (PLC). For example, a method may include attempting to access a communications channel to transmit a frame after a backoff time proportional to a randomly generated number within a contention window (CW), the CW having an initial value carried over from a previous transmission of a different frame. Additionally or alternatively, some of techniques described herein may facilitate the spreading of the time over which devices attempt to transmit packets, thereby reducing the probability of collisions using, for example, Additive Decrease Multiplicative Increase (ADMI) mechanisms. | 2015-08-27 |
20150244542 | MULTI-BRIDGE LAN AGGREGATION - A method and system for multi-bridge LAN aggregation is disclosed. The method includes aggregating a plurality of LANs coupling a host to a first and a second intermediate network device. The system includes an intermediate network device. The intermediate network device includes a multi-bridge engine. The multi-bridge engine includes a tunnel engine coupled to a bridge interconnect port and a first physical port. | 2015-08-27 |
20150244543 | NETWORK SYSTEM AND COMMUNICATION APPARATUS - A network system that comprises a plurality of communication apparatuses, each of the communication apparatuses being capable of performing a VLAN setting by using a VLAN number set for a connection port, that sets a VLAN number for each of the communication apparatuses, and that performs communication among cars of a train, wherein in a case where a specific type of packet that disables a VLAN setting is a packet of a multicast address, when a distribution target apparatus is connected to a communication apparatus that has received the specific type of packet, the communication apparatus transfers the specific type of packet to the distribution target apparatus and, irrespective of a VLAN number set for another communication apparatus, regards a VLAN different from a VLAN of the communication apparatus as a same network and transfers the specific type of packet to the another communication apparatus. | 2015-08-27 |
20150244544 | CONNECTING A PVLAN SWITCH TO A NON-PVLAN DEVICE - A PVLAN switch for connecting a PVLAN to a non-PVLAN device is configured as a primary VLAN with secondary VLANs, the primary VLAN includes promiscuous ports, each of the secondary VLANs includes a smart PVLAN trunk port, and the smart PVLAN trunk port is included in at least two secondary VLANs where the smart PVLAN trunk port and the promiscuous port connect to non-PVLAN devices. A frame is received on a smart PVLAN trunk port sent from a non-PVLAN device, and includes a destination address and a secondary VLAN ID. The PVLAN switch port ID for the first frame, and a primary VLAN ID for the secondary VLAN ID are identified. If the frame is a non-isolated port, the secondary VLAN ID is modified to be the primary VLAN ID, and the modified frame is sent to another non-PVLAN device connected to the PVLAN switch port. | 2015-08-27 |
20150244545 | TRANSMISSION APPARATUS AND METHOD USING PRE-DISTORTION - The present invention relates to a transmission apparatus and a corresponding transmission method for transmitting data within a multi-carrier transmission system comprising two or more transmission apparatuses that are configured to transmit the same data. To avoid destructive interferences a transmission apparatus ( | 2015-08-27 |
20150244546 | EQUALIZATION METHOD AND EQUALIZER - An equalization method includes carrying out frequency domain conversion of M received signals into a 2M received vector having 2M elements, carrying out channel estimation and noise/interference estimation based on the 2M vector, calculating a 2M channel vector and a (2M)×(2M) noise/interference matrix, selecting a 2M−1 or less channel vector from the calculated 2M channel vector, selecting a (2M−1)×(2M−1) or less noise/interference matrix from the calculated (2M)×(2M) noise/interference matrix, calculating a 2M−1 or less equalization coefficient vector as equalization coefficients based on the selected 2M−1 channel vector and the selected (2M−1)×(2M−1) noise/interference matrix, selecting a 2M−1 or less received vector from the 2M received vector, and equalizing the selected 2M−1 received vector by using the calculated equalization coefficients. | 2015-08-27 |
20150244547 | Circuitry and Method for Multi-Level Signals - Circuitry for converting a multi-level signal into at least one binary signal, having a period T and comprising n signal levels, includes comparing and splitting circuitry configured for comparing a value of the multi-level signal with (n−1) different reference values, and having N sets of (n−1) output terminals for outputting N sets of (n−1) output signals indicating whether the value of the multi-level signal is below or above the (n−1) reference values. The circuitry also includes N sets of (n−1) sample-and-hold circuits having an input and an output and being configured for operating at a clock period N*T, wherein each output terminal is connected to the input of a sample-and-hold circuit. Further, the circuitry includes logical circuitry connected to the outputs of the N sets of (n−1) sample-and-hold circuits for generating at least one binary signal having a period N*T. | 2015-08-27 |
20150244548 | FREQUENCY ADJUSTMENT OF SIGNALS - An apparatus includes a modulator configured to frequency modulate a control signal at a baseband device and an interface configured to transmit the frequency modulated control signal via a cable to a radio-frequency (RF) device. | 2015-08-27 |
20150244549 | CDR VOTER WITH IMPROVED FREQUENCY OFFSET TOLERANCE - An improved clock data recovery circuit is provided which provides lower bit error rates and faster locking times. In an embodiment, the circuit includes a voter having one or more voter inputs. The voter may generate up votes indicative of a recovered clock having a negative phase offset relative to a given voter input, or down votes indicative of the recovered clock having a positive phase offset. The circuit may include a comparator configured to output a phase adjustment signal and a tie signal. The circuit may further include an M-depth shift register and a multiplexer configured to select either the phase adjustment signal or an output from the shift register as a multiplexer output. The circuit may further include a flip-flop that generates a phase adjustment output signal. The shift register may receive the phase adjustment output signal at a data input of the shift register. | 2015-08-27 |
20150244550 | DIGITAL DEMODULATION METHOD AND SYSTEM - A digital demodulation system calculates an I channel value and a Q channel value of a received signal. The digital demodulation system then changes detection levels to obtain non-uniform detection levels. The digital demodulation system then demodulates the received signal bit by bit by using the changed detection levels and the I channel value and the Q channel value. | 2015-08-27 |
20150244551 | Method and System for Down-Converting an Electromagnetic Signal, and Transforms for Same, and Aperture Relationships - Methods, systems, and apparatuses, and combinations and sub-combinations thereof, for down-converting an electromagnetic (EM) signal are described herein. Briefly stated, in embodiments the invention operates by receiving an EM signal and recursively operating on approximate half cycles (½, 1½, 2½, etc.) of the carrier signal. The recursive operations can be performed at a sub-harmonic rate of the carrier signal. The invention accumulates the results of the recursive operations and uses the accumulated results to form a down-converted signal. In an embodiment, the EM signal is down-converted to an intermediate frequency (IF) signal. In another embodiment, the EM signal is down-converted to a baseband information signal. In another embodiment, the EM signal is a frequency modulated (FM) signal, which is down-converted to a non-FM signal, such as a phase modulated (PM) signal or an amplitude modulated (AM) signal. | 2015-08-27 |
20150244552 | RECEIVING APPARATUS AND DEMODULATION METHOD - A receiver simultaneously receives a plurality of signals on a plurality of channels, which have been modulated using frequency shift keying (FSK). A calculation range controller detects a Mark frequency and a Space frequency for each channel, determines for each channel a frequency range for Fourier transform calculation of the plurality of receiving signals, based on the detected Mark frequency and the detected Space frequency and indicates the frequency range to a frequency component detector. The frequency component detector performs Fourier transformation on the determined frequency range for each channel and detects, for each channel, frequency components (FFT signals) of the plurality of receiving signals respectively. The channel shifter allocates the FFT signals output from the frequency component detector to data of channel | 2015-08-27 |
20150244553 | SYSTEM AND METHOD FOR JOINT COMPENSATION OF POWER AMPLIFIER'S DISTORTION - The system and method for joint compensation of power amplifier's distortion provides a linearization scheme for transmitter power amplifiers driven by orthogonal frequency division multiplexing signals. A pre-compensated over-driven amplifier is employed at the transmitter. The over-driven amplifier's distortions are considered as a sparse phenomenon and compressive sensing (CS) algorithms are employed at the receiver to estimate and compensate for these distortions. A bandwidth efficient data aided scheme which does not require reserving subcarriers specifically for CS measurements is utilized. | 2015-08-27 |
20150244554 | MULTIPLE RECEIVERS IN AN OFDM/OFDMA COMMUNICATION SYSTEM - A signal receiver is configured to receive multiple time-domain input signals. A plurality of the input signals among the multiple time-domain input signals is selected and transformed into frequency-domain signals. The frequency-domain signals are shifted in phase by a negative value of a respective reference phase, and the phase-shifted signals are combined into one signal. The combined signal is then multiplied with a stored signal to generate a signal product and transformed into a time-domain signal. Peak detection is performed on the time-domain signal. | 2015-08-27 |
20150244555 | METHOD, DEVICE AND COMPUTER PROGRAM FOR CORRECTING A FREQUENCY SHIFT ON SYMBOLS RECEIVED BY A RECEIVER - The present invention concerns a method for correcting a frequency shift on symbols received by a receiver, each symbol being composed of N samples and of a cyclic prefix of a predetermined number Δ samples, the Δ samples being a copy of Δ samples of the N samples. The receiver: —calculates for each symbol, a correlation between at most the Δ samples of the cyclic prefix and the at most Δ samples among the last samples, —averages the correlations over a number of symbols and determines one smooth frequency shift estimation for each averaged correlation, —calculates an exponential from the smooth frequency shift estimation, —delays the received symbols by a delay, —multiplies the exponential by the delayed received symbols. | 2015-08-27 |
20150244556 | CIRCUITS, SYSTEMS, AND METHODS FOR MANAGING AUTOMATIC GAIN CONTROL IN QUADRATURE SIGNAL PATHS OF A RECEIVER - A system provides closed-loop gain control in a WCDMA mode and open loop control in an EDGE/GSM mode. Gain control is distributed across analog devices and a digital scaler in a wireless receiver. In the WCDMA mode, a loop filter generates an error signal that is forwarded to analog and digital control paths. The analog control path includes a first adder, a programmable hysteresis element, and a lookup table. The analog control signal is responsive to thresholds, which when used in conjunction with a previous gain value determine a new gain value. The digital control path includes a second adder, a programmable delay element, and a converter. A control word is responsive to a difference of the error signal, a calibration value, and the analog control signal. Blocker detection is provided in the WCDMA mode of operation. A controller sets system parameters using a state machine. | 2015-08-27 |
20150244557 | SIGN-IN METHOD AND SYSTEM - Disclosed are a sign-in method and system. The method includes: obtaining, by using a location-based service (LBS) of a mobile terminal, geographical information of a current location of a person who signs in; binding the geographical information of the current location with identity information of the person who signs in and time information, using the geographical information of the current location, the identity information of the person who signs in, and the time information as sign-in information, and sending the sign-in information to a sign-in server; verifying, by the sign-in server, the sent sign-in information; and recording the sign-in information if the verification succeeds. The present disclosure not only can save costs of labor, material, and money, but also can enable several people to sign in simultaneously, thereby greatly improving sign-in efficiency. | 2015-08-27 |
20150244558 | FLOWLET-BASED PROCESSING WITH KEY/VALUE STORE CHECKPOINTING - A data processing task may be implemented in a distributed computing system by the use of a workflow broken into flowlets that are arranged in a directed acyclic graph between data sources and data sinks. Such an arrangement may include various flow control and/or fault tolerance schemes, among other features. Fault tolerance may be implemented using key/value store (KVS) flowlets. | 2015-08-27 |
20150244559 | MIGRATION OF FULL-DISK ENCRYPTED VIRTUALIZED STORAGE BETWEEN BLADE SERVERS - A method, system and computer-readable storage medium with instructions to migrate full-disk encrypted virtual storage between blade servers. A key is obtained to perform an operation on a first blade server. The key is obtained from a virtual security hardware instance and provided to the first blade server via a secure out-of-band communication channel. The key is migrated from the first blade server to a second blade server. The key is used to perform hardware encryption of data stored on the first blade server. The data are migrated to the second blade server without decrypting the data at the first blade server, and the second blade server uses the key to access the data. Other embodiments are described and claimed. | 2015-08-27 |
20150244560 | IPoE Dual-Stack Subscriber for Bridged Residential Gateway Configuration - A network element implements a method to support a plurality of network services between a computing device and the network element over non-channelized media using a single subscriber session. The method includes receiving from a computing device a request for a first network service that includes a Media Access Control (MAC) address of the computing device, retrieving a user record from a database server based on the MAC address of the computing device, determining from the user record whether the computing device supports the first network service and a second network service, and upon determining that the computing device supports the first network service and the second network service, creating a single dual-stack session that combines the first network service and the second network service. The method further includes enabling the computing device to access the first network service and the second network service where the first network service and the second network service are managed by the single dual-stack session. | 2015-08-27 |
20150244561 | REPRESENTING A MACHINE-TO-MACHINE DEVICE MODEL BASED ON ONTOLOGICAL RELATIONSHIPS - In an approach for creating a machine-to-machine device model based on ontological relationship, one or more computer processors determine a plurality of characteristics of one or more machine-to-machine devices within a machine-to-machine communication environment. The one or more computer processors determine one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. The one or more computer processors create a semantic device model, based, at least in part, on the one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. | 2015-08-27 |
20150244562 | DISTRIBUTED ANTENNA SYSTEM TRANSPORT LINK QUALITY MEASUREMENT - The present disclosure relates to transport link quality measurement in a distributed antenna system. A link quality indicator associated with the functional performance of a digital transport link in the distributed antenna system can be determined by a component of the distributed antenna system. An indication of a potential fault condition can be determined based on the link quality indicator before a fault condition associated with the potential fault condition occurs. The indication of the potential fault condition can be presented, for example, via a graphical user interface, a table, or an email alert. | 2015-08-27 |
20150244563 | DIFFERENTIATED SERVICE-BASED GRACEFUL DEGRADATION ERROR - The differentiated service-based graceful degradation layer (DSGDL) allows cloud-based architectures to operate through and recover from periods of limited capability. The DSGDL protects and continues serving higher priority requests with the best possible response even as the underlying cloud-based services deteriorate. The DSGDL offloads lower priority requests to lower-grade secondary capability that can be dynamically provisioned in order to reserve the best capability for maintaining high priority service (e.g., by re-directing lower priority requests to a slightly out-of-date cached dataset, and reserve the primary consistent database for higher priority requests). The DSGDL 1) implements an overlay network over existing cloud services to route and enforce priority requests, and 2) provisions on-demand computing nodes and sites to provide secondary capability for service requests as needed. | 2015-08-27 |
20150244564 | ACTIVE/STANDBY PW REDUNDANCY FOR EPIPES - Various exemplary embodiments relate to a method performed by a backbone network for performing switchover of plurality of pseudo-wires (PWs) connecting a customer edge device to a primary backbone edge bridge (BEB), the method including: designating one of the plurality of PWs as a control PW; associating the remaining PWs with the control PW; associating a virtual backbone MAC (B-MAC) address with the control PW; and advertising, by the primary BEB, the virtual B-MAC address to the backbone network. | 2015-08-27 |
20150244565 | NETWORK CONFIGURATION - A method of configuring a network, the network comprising a plurality of devices capable of operating according to a wireless communications protocol, each device having a device type, each device communicating directly with one or more local devices of a local group, the local devices being those devices of the network with which the device is in direct communications range, the method comprising: storing a device configuration for each device; at a device: detecting that a first local device having a first device type has left the local group, and detecting that a further device having the first device type has entered the local group; determining that the further device is a replacement for the first local device; and applying the stored configuration for the first local device to the further device. | 2015-08-27 |
20150244566 | NETWORK CONFIGURATION VIA ABSTRACTION COMPONENTS AND STANDARD COMMANDS - An apparatus receives a request to establish a networking configuration. The apparatus creates one or more networking abstraction components, wherein the created networking abstraction components represent the networking configuration to be established. The apparatus sends, via the one or more networking abstraction components, one or more standard commands. The apparatus produces, in response to the standard commands, an implementation corresponding to the networking configuration. | 2015-08-27 |
20150244567 | UNIFIED CONFIGURATION FOR CLOUD INTEGRATION - Various embodiments of systems and methods for unified configuration for cloud integration are described herein. In an aspect, the method includes rendering a unified configuration interface within a cloud application for performing cloud integration. The unified configuration interface includes a first widget to configure an external system for integration with the cloud application and a second widget to configure an integration flow (iflow) between the external system and the cloud application. The iflow defines data flow between the configured external system and the cloud application. Subsequent to receiving a confirmation of the selected iflow, integrating the external system with the cloud application to share data in the cloud. | 2015-08-27 |
20150244568 | VIRTUAL DEVICE PROFILE - A system and a method are disclosed for configuring virtual network interface cards (VNICs) of virtual machines, including presenting on a graphic user interface (GUI), by a management server of a host executing a virtual machine (VM), a plurality of attributes of a virtual network interface card (VNIC), assigning, via the GUI, values to the plurality of attributes, storing the values of the plurality of attributes in a profile on the management server, and configuring a second VNIC of the VM using the values in the profile. | 2015-08-27 |
20150244569 | UNIFIED AND PERSISTENT NETWORK CONFIGURATION - A system and a method are disclosed to configure networking components, including in response to a first configuration command, creating a running configuration for a host computer, saving the running configuration in a configuration file stored in a temporary directory, and in response to receiving a second configuration command to make the running configuration persistent, copying the configuration file to a persistent directory. | 2015-08-27 |
20150244570 | METHOD, APPARATUS, AND SYSTEM FOR IMPLEMENTING TUNNELING PROCESSING - The present invention discloses a method, an apparatus, and a system for implementing tunneling processing. The method for implementing tunneling processing includes: determining, by an openflow controller, matching field information, a tunneling protocol type, and a tunneling operation type of a data packet corresponding to tunneling processing; sending, by the openflow controller, first configuration information to an openflow forwarding apparatus; and sending, by the openflow controller, second configuration information to the tunneling protocol processing apparatus, where the second configuration information is used to give an instruction for processing, according to the tunneling operation type and the tunneling protocol type, the data packet matching the matching field information. The method, apparatus, and system for implementing tunneling processing according to the embodiments of the present invention can implement tunneling processing of multiple tunneling protocol types in an openflow network. | 2015-08-27 |
20150244571 | SYSTEMS AND METHODS PROVIDING A MOBILE ZERO CLIENT - The disclosure relates to a portable computing device configured to selectably switch between a wired zero client mode in which the portable computing device operates as a terminal for a host computer via a wired communication channel, a wireless zero client mode in which the portable computing device operates as a terminal for the host computer via a wireless communication channel, and a local mode in which the portable computing device operates independently from the host computer. The portable computing device may include one or more zero client processors that facilitate operation in the wired or wireless zero client mode and one or more local control processors that facilitate operation in the local mode. The portable computing device may include input devices used to receive inputs for the host computer during the wireless or wired zero client modes or for the local control processors during the local mode. | 2015-08-27 |
20150244572 | SYSTEM AND METHOD FOR SUPPORTING RELIABLE CONNECTION (RC) BASED SUBNET ADMINISTRATOR (SA) ACCESS IN AN ENGINEERED SYSTEM FOR MIDDLEWARE AND APPLICATION EXECUTION - A system and method can support subnet management in a network environment, such as an engineered system for middleware and application execution or a middleware machine environment. A subnet manager (SM) can retrieve information for setting up a reliable connection (RC) between a subnet administrator (SA) and a client node in a subnet. Furthermore, the system can set up one or more connection states for a port associated with the SM node to establish the RC connection between the port associated with the SM node and a port associated with said client node. Then, the SM can activate the port associated with said client node. | 2015-08-27 |
20150244573 | NETWORK INTERFACE CARD OFFLOADING - A network interface controller (NIC) executes a set of instructions with respect to received data communications packet and generates output data associated with the execution of the set of instructions. The NIC stores the output data in a location that is accessible to an operating system. | 2015-08-27 |
20150244574 | OFFLOADING TO A NETWORK INTERFACE CARD - A processing device sends a set of executable instructions to a network interface controller (NIC). The processing device accesses a report generated by the NIC after the NIC has executed at least one instruction from the set of executable instructions. | 2015-08-27 |
20150244575 | COMMUNICATIONS SYSTEM, MANAGEMENT APPARATUS, AND COMMUNICATION SETTING METHOD - A first setting information notification unit notifies a management apparatus via a relay apparatus of first setting information. A setting information generation unit generates third setting information from the first setting information and second setting information. For example, the setting information generation unit generates the third setting information by complementing the first setting information with the second setting information that is preliminarily stored in a setting information storage unit. A communication confirmation unit confirms communication based on the third setting information between a first communication apparatus and a second communication apparatus. A second setting information notification unit notifies the relay apparatus, the first communication apparatus, and the second communication apparatus of the third setting information. | 2015-08-27 |
20150244576 | Methods, Systems, and Products for Notifying of Enhancements to Quality of Service and Experience - Methods, systems, and products notify users when changes in a communication network improve quality of service. When a service provider changes a configuration parameter in the communications network, a change to the configuration parameter is compared to a rule. When the change to the configuration parameter results in a perceivable improvement in quality of service, a notification is sent to a user's device. The notification informs the user's device of the improvement in quality of service caused by the change to the configuration parameter. | 2015-08-27 |
20150244577 | METHOD OF QUEUING SIGNALS - Example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to implement a queuing system with an adjustable scalability/reliability level. | 2015-08-27 |
20150244578 | CONTROL OF POWER CONSUMPTION MODES OF COMMUNICATIONS APPARATUS - A network management system (NMS) for a communications network has communications apparatus capable of being operated in different power consumption modes to provide different levels of performance, has a path computation apparatus configured to select paths for the traffic using the communications apparatus, based on information about traffic load in the network and on information about the power consumption modes of the communications apparatus of at least one of the nodes. A power mode controller is also provided for controlling the power consumption modes of the communications apparatus according to information about traffic load and according to information about the paths selected. By combining of path computation and the control of power consumption modes the overall power consumption of the network can be reduced. A slave power mode controller can be provided. | 2015-08-27 |
20150244579 | DYNAMIC EXTENSIBLE APPLICATION SERVER MANAGEMENT - An administrative control interface is provided that controls deployed application server plugins that operate within an application-server plugin framework deployed at a group of application servers. The administrative control interface controls dynamic adjustment of runtime application server plugin configurations that perform request-level management and server-level management of the group of application servers. Request-level application server functionality and server-level application server functionality of at least one of the group of application servers is controlled using at least one of the deployed application server plugins as specified by application-server plugin commands received from the administrative control interface. | 2015-08-27 |
20150244580 | SYSTEM, APPARATUS AND METHOD FOR PROVIDING IMPROVED PERFORMANCE OF AGGREGATED/BONDED NETWORK CONNECTIONS WITH CLOUD PROVISIONING - A network system for improving network communication performance is disclosed. The system includes 1) at least one network bonding/aggregation computer system that includes: (i) at least one client site network component bonding or aggregating one or more diverse network connections; and (ii) at least one network server component configured to interoperate with the client site network component; and 2) a cloud based network manager that includes: a data collection utility, a network performance analysis utility, and a network configuration utility. | 2015-08-27 |
20150244581 | ROLE ASSIGNMENT FOR SERVERS IN A HIGH PERFORMANCE COMPUTING SYSTEM BASED ON MEASURED PERFORMANCE CHARACTERISTICS - Embodiments of the present invention disclose a method, computer program product, and for determining a recommendation relating to a configuration of a plurality of server nodes of a computing system. In one embodiment, in accordance with the present invention, the computer implemented method includes the steps of, for each server node, storing a first performance parameter value, wherein each first performance parameter value is a benchmarked value that corresponds to a measured actual performance parameter of its associated server node, and applying a first configuration rule based, at least in part, on the first performance parameter values of the plurality of server nodes to obtain a first configuration recommendation. In another embodiment, the method further includes the step of presenting the first recommendation to a human user. | 2015-08-27 |
20150244582 | HOST CONNECTIVITY TEMPLATES - A system and a method are disclosed for configuring hosts of virtual machines. The system and method include receiving, by a management server, a network configuration of a first host, wherein the first host is associated with a network identified by a network label, storing the network configuration of the first host in a template record, in response to a request to configure a second host, determining if the second host is to join the network identified by the network label, and configuring the second host using the template record. | 2015-08-27 |
20150244583 | System and Method for Creating Service Chains and Virtual Networks in the Cloud - Embodiments are provided herein for creating virtual networks with service chains, such as n-tier networks, in the cloud. In an embodiment, a network diagram for a virtual network is received from a user via a graphical user interface. The network diagram comprises elements that represent virtual or physical network components. The network components include switches, routers, firewalls, links, service appliances, virtual machines, servers, or other network components. Upon successfully validating the network diagram, via a validation step, the network diagram is compiled into application programming interface (API) calls ready for execution. The executed APIs are used to establish the virtual network on a physical network infrastructure. The virtual network comprises virtual network components corresponding to the elements or the network diagram. | 2015-08-27 |
20150244584 | USER INTERFACE FOR ADDING AND REMOVING ROWS ASSOCIATED WITH VIRTUAL MACHINES - A graphical user interface may be provided. In some embodiments, the graphical user interface may include a plurality of rows. A first row may include a first entry field and a first visual indicator and a second row may include a second entry field and a second visual indicator. The first entry field may be assigned a first profile. A selection of a second profile for the second entry field may be received and a selection of the second visual indicator may be received. A third row may be added in response to the selection of the second visual indicator after the selection of the second profile to be assigned to the second entry field. | 2015-08-27 |
20150244585 | DYNAMIC EXTENSIBLE APPLICATION SERVER MANAGEMENT - An administrative control interface is provided that controls deployed application server plugins that operate within an application-server plugin framework deployed at a group of application servers. The administrative control interface controls dynamic adjustment of runtime application server plugin configurations that perform request-level management and server-level management of the group of application servers. Request-level application server functionality and server-level application server functionality of at least one of the group of application servers is controlled using at least one of the deployed application server plugins as specified by application-server plugin commands received from the administrative control interface. | 2015-08-27 |
20150244586 | Network Provisioning And Deployment - Systems and methods for managing a network are disclosed. One method can comprise storing an identifier associated with one or more of a user device and a first network device. The first network device can be at a first location and can be configured to establish a connection between the user device and a first network. A request to connect can be received from the user device via a second network. The identifier can be provided in response to the request, wherein the identifier facilitates data transmission as if the user device was connected to the first network via the first network device. | 2015-08-27 |
20150244587 | Tailored Interpersonal Communication Platform (ICP) Management - Systems, devices, and process are provided for tailored interpersonal communication platform management. This can include tailoring interpersonal communication methodologies across a selection of network supported interpersonal communication platforms including one-on-one social media, broadcast social media, email, SMS, and VoIP, etc. for a user, and among and between the user and enrollees or participants in one or more of various ICPs. | 2015-08-27 |
20150244588 | METHOD OF SETTING A TRANSMISSION CYCLE FOR INFORMATION ON CONSTRUCTION EQUIPMENT - The present disclosure relates to a method for setting a remote transmission cycle of information of a construction machinery for enabling a user or a provider to directly set the transmission cycle of the information of the construction machinery. To this end, the present disclosure enables the user or provider to set the transmission cycle for each information data packet. Further, the present disclosure previously determines various modes (e.g., a minimum charge mode, a medium charge mode, and a maximum charge mode) in which cycles of information data packets are set for each charge and enables the user or provider to set the transmission cycle by selecting the mode. Therefore, the user or provider can directly set the cycle for each packet or select the charge mode in accordance with a content of desired information and a desired communication cost condition. | 2015-08-27 |
20150244589 | DYNAMICALLY MODIFYING QUALITY OF SERVICE LEVELS FOR RESOURCES RUNNING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically modifying Quality of Service (QoS) levels for resources (e.g., applications, processes, services, etc.) running in a networked computing environment. Specifically, embodiments of the present invention dynamically adjust transport level networking QoS parameters based on associated service level agreements (SLA) term. In a typical embodiment, a set of service level requirements associated with a resource running in the networked computing environment will first be identified (e.g., in a computer data structure). Then, the set of service level requirements will be mapped to a set of QoS parameters associated with a transport layer of the networked computing environment. A current performance of the resource within the transport layer will then be determined. Once the current performance has been determined, it will be further determined whether the current performance meets the set of service level requirements. Based on this determination/comparison, the set of QoS parameters can be adjusted accordingly. | 2015-08-27 |
20150244590 | PACKET PROCESSING METHOD, FORWARDING PLANE DEVICE AND NETWORK DEVICE - Embodiments of the present invention provide a packet processing method, a forwarding plane device and a network device, the method includes: receiving, by a forwarding plane device, a first packet transmitted by a user, where an identity of the user is comprised in the first packet, and a forwarding table is comprised in the forwarding plane device; determining, by the forwarding plane device, an identity of a service according to a corresponding relationship between the identity of the user and the identity of the service as well as the identity of the user in the first packet; generating, by the forwarding plane device, a second packet by encapsulating the first packet with the identity of the service; and transmitting the second packet to a network device, to enable the network device to manage the service according to the identity of the service in the second packet. | 2015-08-27 |
20150244591 | Power Management in Local Premise Networks - A router has a processor, a data repository, wired connection or wireless coupling to individual ones of a plurality of power-using devices in a local premise, the router and the power-using devices drawing power from a primary source, and individual ones of the router and the power-using devices having switchable access to one or more alternative power sources, an Internet access connection, and software executing on the processor from a non-transitory medium. The software provides monitoring power provided by the primary source to the router and to individual ones of the power-using devices, receiving information regarding the primary power source from one or more network-connected servers, determining expected status of the primary power source by the software using the monitoring information and the information received from the Internet, and managing power usage by the router and the power-using devices according to the expected status determined. | 2015-08-27 |
20150244592 | Method, Apparatus And System For Determining Software Performance - A method, apparatus and system for determining software performance. After the software is published, performance parameters of operation systems of running the software and performance parameters of run software are acquired from various user terminals. The performance parameters of the operation system of running the software and the performance parameters of the run software is processed to acquire a performance parameter processing result according to a preset method for processing a performance parameter. Performance of the software is determined according to the performance parameter processing result. | 2015-08-27 |
20150244593 | DATA MANAGEMENT APPARATUS, COMMUNICATION CONTROL APPARATUS, AND SYSTEM INCLUDING DATA MANAGEMENT APPARATUS AND COMMUNICATION CONTROL APPARATUS - A data management apparatus for a data management system including first and second networks interposed by a communication control apparatus includes a reception unit receiving response request data pertaining to an electronic device from an external apparatus and response result data from the communication control apparatus, a transmission unit transmitting the response request data to the communication control apparatus, and a management unit managing a series of response status history data during a period between receiving of the response request data and receiving of the response result data responsive to the response request data based on the response request data and the response result data. The data management apparatus being connected to the first network and managing history data of the response request data. One or more service management apparatuses being connected to the second network and managing a response service corresponding to the response request data. | 2015-08-27 |
20150244594 | Apparatus, System, and Method for Enhanced Monitoring, Searching, and Visualization of Network Data - A system for monitoring and visualization of network data includes a plurality of first devices and a second device coupled to the plurality of first devices over a network. Each first device is associated with corresponding ones of a plurality of ports. Each first device is configured to determine network traffic analysis information associated with a characteristic of network data traversing each of the ports, and to push the network traffic analysis information across a network independent of a solicitation from the network. The second device is configured to generate a map of the network including a visual indicator based on the network traffic analysis information, to receive an update of the network traffic analysis information from at least one of the first devices, and to refresh the visual indicator in real time to reflect the update of the network traffic analysis information. | 2015-08-27 |
20150244595 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR USER SIDE OPTIMIZATION OF ACQUISITION OF VIRTUALIZED RESOURCES - A method includes receiving a request for access to an instance of a computing resource, the request having a performance standard associated therewith, requesting the instance of the computing resource from a computing resource provider, evaluating a performance of the instance of the computing resource provided by the computing resource provider to determine if the performance of the instance of the computing resource complies with the performance standard associated with the request, and providing access to the instance of the computing resource provided by the computing resource provider responsive to a determination that the performance of the instance of the computing resource complies with the performance standard associated with the request. Related systems and computer program products are also disclosed. | 2015-08-27 |
20150244596 | DEPLOYING APPLICATIONS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired. | 2015-08-27 |
20150244597 | MANAGING A HYBRID CLOUD SERVICE - A technique includes providing a service blueprint to manage the lifecycle of at least one hybrid cloud service and orchestrate application programming interfaces across different cloud technologies. | 2015-08-27 |
20150244598 | REMOTE MONITORING OF EVENTS ON A NETWORK USING LOCALIZED SENSORS - A remote sensing system comprising localized sensors and monitoring by one or more servers is described. The sensors capture data from computers and the network, provide that information to the one or more servers, and the one or more servers identify trends and anomalies in the information collected. The one or more servers provide information regarding the trends and anomalies to the computers. Optionally, the one or more servers can push changes to the sensors, such as updates to software code. | 2015-08-27 |