37th week of 2008 patent applcation highlights part 61 |
Patent application number | Title | Published |
20080222208 | Methods for managing files according to application - The present invention discloses methods for managing files according to application. A method for accessing files in a digital storage device, the method including the steps of: providing an application having an application identity; and adjusting a storage mode of a file according to the application identity upon the application accessing the file. Preferably, the step of providing includes providing a PID that is an indicator of the application identity. Preferably, the step of adjusting includes adjusting the storage mode according to a storage command associated with an application scenario of the application. Preferably, the step of adjusting is performed using an SAT. Preferably, the step of adjusting is performed using an AST. | 2008-09-11 |
20080222209 | DATABASE MANAGEMENT METHOD AND DATABASE MANAGEMENT APPARATUS - According to an aspect of an embodiment, a method for managing a database for records of transactions, each of the transaction specifying an order of processing, and being associated with a value related to generation of the transaction, said database comprising a plurality of page data containing a plurality of records, each of the records comprising data and information indicative of the value of one of said transactions, the method comprising the steps of: reading out one of said page data containing a target record of request of a transaction associated with the target record from said database; evaluating each value associated with the transactions in the page data; and invaliding the record associated with a value greater than a predetermined value. | 2008-09-11 |
20080222210 | EFFICIENTLY HANDLING INFORMATION ON CHANGES TO A UDDI REGISTRY INCLUDING THOSE RESULTING IN VIRTUAL DELETES - One aspect of the present invention can include a method, a computer program product, an apparatus, and a system for handling Universal Description, Discovery and Integration (UDDI) updates to entities. The aspect can receive at least one update to be applied to a UDDI entity within a UDDI registry. Each received update can be applied to the related UDDI entity. At least one subscriber of the updated entity can be determined. A status indicator for each detected subscriber can be changed to indicate that a subscription to the entity has been deleted, wherein the change to the status indicator negates a need to scan the subscriptions associated with the entity for each received update to the entity. | 2008-09-11 |
20080222211 | Method and Apparatus to Capture and Transmit Dense Diagnostic Data of a File System - A processor selects file system metadata. A processor identifies each unit of data in a file system. The processor determines if the unit of data contains file system metadata. The processor writes a unit of data of metadata to a diagnostic file system, provided it was determined that the unit of data contains file system metadata. The processor then determines if the unit of data contains user data. If the unit of data contains user data, the processor writes a sparse object to the diagnostic file. | 2008-09-11 |
20080222212 | PEER-TO-PEER DATA SYNCHRONIZATION ARCHITECTURE - To enable the peer-to-peer synchronization among multiple devices, each device in the peer network keeps track of the changes it makes to any shared data and also keeps track of its own knowledge of the changes made by other devices. When two or more peer devices communicate, they share with each other their information about any changes made to the shared data by them or by other devices. This allows the devices to synchronize with each other to the extent that each of the devices knows what changes have been made by it or by other devices in the peer network. | 2008-09-11 |
20080222213 | Image processing device - An image processing device which is provided with a communication unit configured to communicate with an information processing device, and a web server unit configured to generate a webpage which can be browsed by a web browser executed in the information processing device and transmit the generated webpage to the information processing device. The web server unit includes an information acquiring unit configured to acquire language information of the web browser, a designating unit configured to insert designation of a character code set corresponding to the language information acquired by the information acquired by the language information acquiring unit in the webpage, and an incorporating unit configured to incorporate language information acquired from the image processing device into a text of the webpage. | 2008-09-11 |
20080222214 | STORAGE SYSTEM AND REMOTE COPY SYSTEM RESTORING DATA USING JOURNAL - This invention provides a storage system including: a control unit; a first storage device for storing data; and a second storage device for storing journals of the data stored in the first storage device, in which: the first storage device has a RAID configuration for recording parity data dispersedly in a plurality of physical storage devices; and the control unit is configured to: create updated parity data based on updated data included in an update instruction; store the updated data and the updated parity data in the first storage device; record a journal including the updated data and the updated parity data in the second storage device; and read sequentially at least one of the journals upon reception of an instruction to restore the data stored in the first storage device to write the updated data and the updated parity data contained in the read journals in the first storage device. | 2008-09-11 |
20080222215 | Method for Deleting Virus Program and Method to Get Back the Data Destroyed by the Virus - The present invention discloses a method of recovering data corrupted by a virus program, comprising: obtaining a devastating behavior operation step that can be performed by the virus program; establishing a reverse behavior operation step corresponding to the devastating behavior operation step; performing the corresponding reverse behavior operation step in response to the devastating behavior operation step that can be performed by the virus program. The present invention further provides a method of removing a virus program, comprising: establishing reverse behavior operation steps corresponding to operation steps of the virus program, executing the reverse behavior operation steps and removing the program to be checked. The method of the present invention employs different reverse behavior operation steps for different virus programs, recovering data corrupted by a virus program, eliminates the defect that existing methods of removing a virus perform a identical processing step for any virus program, enabling the computer removed of the virus program to recover as far as possible to its previous state before infected by the virus program. | 2008-09-11 |
20080222216 | Application migration file scanning and conversion - An application migration planning manager is provided for scanning and reporting compatibility information of stored application files, followed by conversion of selected files from a first application version format to a target application version format. A scanning module scans selected files to determine whether the scanned files are formatted according to application versions that may be incompatible with target application versions. A reporting module reports the compatibility data for the scanned files. If scanned files include multiple versions of a given document or data, the scanned files may be passed to a version extraction module for stripping the files of all but a single version of the given document or data. Each stripped version may be saved as a separate additional file. The version-stripped files and the saved additional files then may be reported back to the reporting module for further processing. Scanned files may be automatically or manually sent to a file converter module where they may be converted to a target application version. | 2008-09-11 |
20080222217 | PARAMETERS PASSING OF DATA STRUCTURES WHERE API AND CORRESPONDING STORED PROCEDURE ARE DIFFERENT VERSIONS/RELEASES - A system and computer program product for passing parameters of data structures where an API and corresponding stored procedures are at different version/release levels is provided. A received data structure is parsed for a version identifier of a caller. The parsed version identifier is compared to a stored procedure version identifier and a determination is made with regards to a data structure compatibility or a data structure incompatibility. If a data structure compatibility is determined, all received data structure elements are parsed. If, however, a data structure incompatibility is determined, only data structure elements known to both the caller and the stored procedures are parsed. | 2008-09-11 |
20080222218 | RISK-MODULATED PROACTIVE DATA MIGRATION FOR MAXIMIZING UTILITY IN STORAGE SYSTEMS - The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted. | 2008-09-11 |
20080222219 | METHOD AND APPARATUS FOR EFFICIENTLY MERGING, STORING AND RETRIEVING INCREMENTAL DATA - In a method and apparatus for retrieving data from a snapshot data storage system, for each epoch, a snapshot including (i) all changed data, and (ii) an index is created. The index includes an entry for each page that has changed during the epoch. For rapidly retrieving the data as of any given time, the method creates a hash table that includes an entry for each data page that has changed since the baseline was created. The hash table entry indicates the epoch in which the data most recently changed and an offset corresponding to the location of the changed data in the corresponding snapshot. The hash table is created by inserting an entry for each page in the most recent index, and then examining the remaining indices for all other snapshots from the most recent to the oldest snapshot and adding any non-duplicate entries into the table. | 2008-09-11 |
20080222220 | JOURNALING DATABASE CHANGES USING MINIMIZED JOURNAL ENTRIES THAT MAY BE OUTPUT IN HUMAN-READABLE FORM - A minimized journaling mechanism stores minimized journal data in a format that allows for display and outputting the journal data in human-readable form. When a change to a record occurs, instead of writing only the changed bytes, all of the bytes in each field that changed are written to the journal, along with all of the bytes in each field selected to be always journaled. A default object is created with default data in all of the fields. When the journal entry needs to be output in human-readable form, the default object is read, and the minimized journal entry is then overlaid on the default object. The result is an object that contains default data in all non-selected fields that were not changed, with the journal data in all fields and that did change and in all fields that were selected to always be journaled. | 2008-09-11 |
20080222221 | Reducing database fragmentation - Reducing database fragmentation is disclosed. One embodiment includes determining whether the building of an index of data that is to be stored in a database has been initiated and determining whether the size of a sub-range of the index exceeds a predetermined size. A block of data storage space is pre-allocated contiguous to a block of data storage space allocated for the sub-range to accommodate subsequent inserts of data into the sub-range, if it is determined that the sub-range exceeds the predetermined size. | 2008-09-11 |
20080222222 | INFORMATION RECORDING APPARATUS AND INFORMATION RECORDING METHOD - An information recording apparatus recording contents on a recording medium and managing the contents by using a content management file includes a control unit that checks a recording state of the recording medium loaded in the information recording apparatus to determine how to set up the content management file to be recorded on the recording medium and recording means for recording the content management file on the recording medium. The control unit determines the file setup of the content management file on the basis of the recording capacity of an area where the contents can be recorded on the recording medium. The recording means records the content management file in accordance with the file setup on the recording medium. | 2008-09-11 |
20080222223 | STORAGE ALLOCATION IN A DISTRIBUTED SEGMENTED FILE SYSTEM - A file system (i) permits storage capacity to be added easily, (ii) can be expanded beyond a given unit, (iii) is easy to administer and manage, (iv) permits data sharing, and (v) is able to perform effectively with very large storage capacity and client loads. State information from a newly added unit is communicated (e.g., automatically and transparently) to central administration and management operations. Configuration and control information from such operations is communicated (e.g., automatically) back down to the newly added units, as well as existing units. In this way, a file system can span both local storage devices (like disk drives) and networked computational devices transparently to clients. Such state and configuration and control information can include globally managed segments as the building blocks of the file system, and a fixed mapping of globally unique file identifiers (e.g., Inode numbers) and/or ranges thereof, to such segments. | 2008-09-11 |
20080222224 | System and Method of Identification of Dangling Pointers - A method and system to identifying the use of dangling pointers in software instrumentation irrespective of the location of the pointer in the memory. The main memory is preferably segmented into three parts defined as a first memory, a version segment and a pointer version segment. By use of the version segment and pointer version stored in the pointer version segment, checksum are made on a pointer version with a version on dereferencing a pointer in the first memory to identify references to a dangling pointer on negative determination. Identified dangling pointer may be reported to the end user. | 2008-09-11 |
20080222225 | AUTONOMIC RETENTION CLASSES - The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items. | 2008-09-11 |
20080222226 | Bandwidth efficient instruction-driven multiplication engine - Multiplication engines and multiplication methods are provided for a digital processor. A multiplication engine includes multipliers, each receiving a first operand and a second operand; a local operand register having locations to hold the first operands for respective multipliers; a first operand bus coupled to the local operand register to supply the first operands from a compute register file to the local operand register; a second operand bus coupled to the plurality of multipliers to supply one or more of the second operands from the compute register file to respective multipliers; and a control unit responsive to a digital processor instruction to supply the first operands from the local operand register to respective multipliers, to supply the second operands from the compute register file to respective multipliers on the second operand bus and to multiply the first operands by the respective second operands in the respective multipliers, wherein one or more of the first operands in the local operand register are reused by the multipliers in two or more multiplication operations. | 2008-09-11 |
20080222227 | Design Structure for a Booth Decoder - A design structure for a Booth decoder is provided. The Booth decoder may comprise three circuits that run in parallel. A first circuit is used to generate a shift control signal output. A second circuit is used to generate a zero control signal output. A third circuit is used to generate an invert control signal output. The first and second circuits receive the three-bit block as an input and generate their respective outputs based on the setting of each of the bits. The third circuit receives only the most significant bit of the three-bit block as its input and generates an invert signal output based on the setting of the most significant bit. In each of these circuits, the number of complex gates and transistors is minimized thereby reducing gate delay and power consumption in generating the control signals for performing a Booth multiplication operation. | 2008-09-11 |
20080222228 | BANK OF CASCADABLE DIGITAL FILTERS, AND RECEPTION CIRCUIT INCLUDING SUCH A BANK OF CASCADED FILTERS - The present invention relates to a bank of digital filters that can be cascade connected. It also relates to a reception circuit comprising such a bank of cascaded filters. With the digital filter being sampled at a given sampling frequency Fs, the bank of cascadable digital filters has: at the input, a frequency transposition circuit ( | 2008-09-11 |
20080222229 | DETERMINATION OF INCREMENTAL VALUE IN SERVER PROCESSED DATA - The accumulated change in values representative of actions taken by a processor, such as the number of email messages processed by an email server, in a given time period is determined. Actions are represented as data points on a plot. Look-ahead intervals are defined for each point. Candidate pairs of points are determined for each look-ahead interval by comparing the first value in the look-ahead interval with other values in the look-ahead interval. A candidate pair comprises the first point and another point having a lesser value. If a candidate pair has a value therebetween, the candidate pair is discarded. If, however, a candidate pair has no value therebetween, the first value of the candidate pair is a peak value for the look-ahead interval. The accumulated change is determined by calculating the sum of the peak values, plus the final value, minus the initial value, for the given time period. | 2008-09-11 |
20080222230 | Multiplier-divider having error offset function - A multiplier-divider capable of offsetting errors includes a plurality of multiplication and division units to perform processes and arrangements so that errors generated by signals passing through the multiplier-divider are offset. As a result impact of the errors is reduced. More than one processing signal can be obtained from the same power supply to reduce loss of external sampling. | 2008-09-11 |
20080222231 | Integration Process and Product for Digital Systems - The present invention relates to a digital system integration process through a virtual server ( | 2008-09-11 |
20080222232 | Method and Apparatus for Widget and Widget-Container Platform Adaptation and Distribution - A method includes receiving a request for a widget-container defined in response to a reference to the widget-container being accessed from a content aggregation point. The widget-container is a procedural software framework configured to be executed within the content aggregation point. The widget-container has a portion configured for receiving a widget. The method includes modifying a portion of the widget-container. The portion of the widget-container is based on a first configuration before the modifying and based on a second configuration substantially compliant with a content rule associated with the content aggregation point after the modifying. | 2008-09-11 |
20080222233 | INFORMATION SHARING SUPPORT SYSTEM, INFORMATION PROCESSING DEVICE, COMPUTER READABLE RECORDING MEDIUM, AND COMPUTER CONTROLLING METHOD - An information sharing support system includes: a first information processing device connected to a projector device for projecting an image on a projection area including an object therein, and to an image pick-up device for picking up an image of the projection area including the object; an inputting unit that inputs an event in a first layer, inputs a second annotation image as a part of a first annotation image associated with the event to a second layer, inputs a third annotation image as the remaining part of the first annotation image to a third layer, and inputs a document to a fourth layer; a transmitting unit that transmits the second annotation image to the projector device; a receiving unit that receives a picked-up image from the image pick-up device; and a second information processing device that allocates the picked-up image to the second layer, and includes a display that displays the third annotation image and the document in an overlapping fashion. | 2008-09-11 |
20080222234 | Deployment and Scaling of Virtual Environments - Distributed data transfer and data replication permits transfers that minimize processing requirements on master transfer nodes by spreading work across the network and automatically synchronizing with virtual machine management modules to perform virtual machine provisioning or update resulting in higher scalability, more dynamism, and allowing greater fault-tolerance by distribution of functionality. Data transfers may occur persistently such that the addition of new nodes or recovering of crashed nodes before or during the data transfer phase will automatically and asynchronously proceed to complete the missed data transfer phase and perform the virtual machine provisioning or update as required. | 2008-09-11 |
20080222235 | System and method of minimizing network bandwidth retrieved from an external network - A system and method are provided of minimizing network bandwidth used from an external network by client peers in a local network. The method can include the operation of organizing a plurality of clients each having media streamlets and a client parent in a structure within the local network. Mapping information propagates through the structure. The mapping information represents local streamlet locations as stored by the plurality of clients. Another operation is retrieving a local streamlet from a client identified in the mapping information as having the local streamlet for the requesting client. | 2008-09-11 |
20080222236 | Method and system for processing data on a plurality of communication devices - A method, apparatus and system for processing data on a plurality of communication devices is provided. Data is received at a master communication device via a master communication network. The data is distributed to a plurality of communication devices in communication with the master communication device. Processing of the data at, at least a subset of the plurality of communication devices is triggered. Distribution of the data may occur via a cascade process wherein the data is first distributed to communication devices which are designated as masters, and the data is further distributed to the remaining communication devices via the masters. | 2008-09-11 |
20080222237 | Web services mashup component wrappers - Various technologies and techniques are disclosed for creating wrappers for use in visual mashup designers. The user selects a web service for which to create a wrapper that will allow the web service to be used as a component in a visual mashup designer. The system programmatically generates communication source code for the wrapper that knows how to send a request to the web service from the wrapper and how to interpret a response from the web service. The system also programmatically generates interaction source code for the wrapper that specifies how the wrapper should interact with the visual mashup designer. The wrapper can be used in the visual mashup designer for creation of web site mashups. The wrapper is operable to respond to visual mashup designer events. | 2008-09-11 |
20080222238 | Extending functionality of web-based applications - A centralized location for discovery and data exchange for web applications. Embodiments of the invention are directed to providing a centralized interface location to send data to and receive data from one or more web applications hosted on application servers different from a server hosting the centralized interface. An application developer for a subscriber having an account with the web application may therefore easily extend the functionality of one or more web applications by communicating with a single interface provided, rather than with separate interfaces for each application. The centralized interface may provide information such as a list of all web applications or functionality to which a particular subscriber has access, and may support any desired extension (e.g., addition of users). | 2008-09-11 |
20080222239 | METHOD FOR DETERMINING AESTHETIC PREFERENCES TO DEFINE A STYLE GUIDE AND TRANSFORMING A PRESENTATION BASED THEREON - A method for determining visual preferences and defining a design based on the ascertained visual preferences. The method includes administering a questionnaire over a computer network, collecting selections made in response to the network and processing the selections into a style-guide. The visual preferences encoded in the style guide can be used to define presentations, customize messages, or be matched to existing images, allowing effective and cost effective development of designs. | 2008-09-11 |
20080222240 | Method and Apparatus for Extended Management of State and Interaction of a Remote Knowledge Worker from a Contact Center - A network system for managing remote agents of a communication center includes a primary server connected to the network the primary server controlling at least one routing point; one or more secondary servers distributed on the network and accessible to the remote agents, the secondary server or servers having data access to agent computing platforms and communication peripherals; and, a software suite distributed in part to the secondary server or servers and distributed in part to one or more agents computing platforms and peripherals, the software suite including protocol for reporting agent status data. The system monitors agents computing platforms and peripherals for activity state through the one or more secondary servers whereupon the one or more secondary servers exchange control messaging and event related data using ISCC protocols with the primary server over the network for intelligent routing purposes. | 2008-09-11 |
20080222241 | Web feed message browsing - The present invention describes a method and a system for facilitating browsing of web feed messages in a network. Web feed message is received by a feed aggregator. The received web feed message is linked to other web feed messages based on a pre-defined criterion. The linked web feed message is sent to a computational device for display. The linked web feed message facilitates browsing of web feed messages in a network. | 2008-09-11 |
20080222242 | Method and System for Improving User Experience While Browsing - The rendering of markup language based files is accelerated by employing an apparatus to capture requests for markup language pages. The requested pages are retrieved and then examined to identify additional links that are contained therein. The markup language page is then modified by adding a trigger or tag into the page. The trigger or tag is basically a mechanism to automate a request for additional markup language information or pages. The trigger or tag, when received by the device requesting the markup language page, will invoke a request to obtain the markup language information or file represented by the tag. The tag can be a browser activated link or a JavaScript. A predictive module is used to review the additional links in the requested pages to identify a predicted next page to be downloaded or requested. This predicted next page or link can be a most likely candidate for what a user viewing the current page would request. | 2008-09-11 |
20080222243 | Client-side method for identifying an optimal server - A client player performs a query to a nameserver against a network map of Internet traffic conditions. The query is made asking for a particular service (e.g., RTSP) via a particular protocol (TCP) in a particular domain. In response, the nameserver returns a set of one or more tokens, with each token defining a machine or, in the preferred embodiment, a group of machines, from which the player should seek to obtain the stream. The player may then optionally perform one or more tests to determine which of a set of servers provides a best quality of service for the stream. That server is then used to retrieve the stream. Periodically, the client player code repeats the query during stream playback to determine whether there is a better source for the stream. If a better source exists, the player performs a switch to the better stream source “on the fly” if appropriate to maintain and/or enhance the quality of service. Preferably, the client player publishes data identifying why it selected a particular server, and such data may be used to augment the network map used for subsequent request routing determinations. | 2008-09-11 |
20080222244 | METHOD AND APPARATUS FOR ACCELERATION BY PREFETCHING ASSOCIATED OBJECTS - Association information is used to build association trees to associate base pages and embedded objects at a proxy. An association tree has a root node containing a URL for a base page, and zero or more leaf nodes each containing a URL for an embedded object. In most cases, an association tree will maintain the invariant that all leaves contain distinct URLs. However, it is also possible to have an association tree in which the same URL appears in multiple nodes. An association tree may optionally contain one or more internal nodes, each of which contains a URL that is an embedded object for some other base page, but which may also be fetched as a base page itself. Given a number of association trees and a base-page URL, a prefetch system finds the root or interior node corresponding to that URL (if any) and traverses the tree from that node, prefetching URLs until the URL of the last leaf node is prefetched. The prefetching starts the process of bringing over the various embedded objects before the user or program would ordinarily fetch them. | 2008-09-11 |
20080222245 | Client-Server Methods for Dynamic Content Configuration for Microbrowsers - A microbrowser such as web-enabled wireless telephones and personal digital assistants allows a user to configure types of objects to be blocked from download including object memory consumption, display area, download time, and restrictions on animated images and executable scripts. Microbrowser state conditions such as battery level and network connection mode are considered when providing said limitations such that more restrictions may be placed during low battery periods to maximize battery life. For example, during low battery conditions or analog connection mode, a user may configure an enhanced microbrowser not to download advertisements, run scripts or animated objects in order to maximize remaining battery life. In another example, a user may configure an enhanced microbrowser to block the download of objects containing audio, or which will occupy more than a certain percentage of the available display area. | 2008-09-11 |
20080222246 | Method and Apparatus for Localized Adaptation of Client Devices Based on Correlation or Learning at Remote Server - Techniques are disclosed for localized adaptation of client devices based on correlation or learning at a remote server. For example, a method for modifying a behavior of a client device in a data collection system, wherein the client device collects data and transmits data to a server, includes the following steps. The client device transmits data to the server. The server uses at least a portion of the data received from the client device to generate information that represents a modification to a behavior of the client device. The server device transmits the generated information to the client device. The client device subsequently alters the behavior of the client device based on the information received from the server. | 2008-09-11 |
20080222247 | Implementing a multi-user communications service - A method of implementing within a communications system an optional communications service involves the participation of a plurality of users of the communications system. The method includes, in response to an action by a first user of the communications system, instigating the preparation of one or more elements of the communication system for providing said optional communications service in relation to one or more other existing users of the communications system. When the first user thereafter accesses the optional communication service, the communications system is already prepared for participation by said one or more other existing users in the optional communication service. | 2008-09-11 |
20080222248 | System and method for message packaging - A system and method for virtual message packaging is described. A virtual package is collection of messages that share common characteristics and may be processed together. In one embodiment, messages are first grouped according to one or more rules at a client and then formed into a virtual package. In another embodiment, one or more messages are received at a server and then formed into a virtual package for later processing. | 2008-09-11 |
20080222249 | TERMINAL CONTROL METHOD AND SERVICE PROVISION SYSTEM USING THE SAME - To realize a service infrastructure capable of being used as a platform for various services to be implemented through a network. In a service provision system, each of a service control server | 2008-09-11 |
20080222250 | PEER-TO-PEER DATA RELAY - Methods and apparatus for relaying data in a peer-to-peer network. In one implementation, a wireless device includes: an antenna; a wireless communication interface connected to said antenna and supporting wireless communication across a wireless connection provided by said antenna; storage supporting storing data; and a controller connected to said wireless interface and to said storage, supporting an application service, a message service, and a relay service for relay messages; wherein said application service provides execution and management of one or more application programs accessible by said controller using application data stored in said storage, said message service provides building messages and processing received messages, and said relay service provides building a new relay message indicating a selected recipient to which the wireless device does not have a direct wireless connection, sending a built new relay message, and sending a received relay message that indicates a recipient other than the wireless device. | 2008-09-11 |
20080222251 | Adaptive framework for the flow of medical device data in the personal health space - A system and method which permits adaptive configuration of a Manager Device in response to an Agent Device in a personal health space. The Manager Device is able to configure itself in response to queries to and from the Agent Device. This configuration can based on the level of complexity of the Agent Device. The Agent Device can vary between a Standard framework and an Advanced framework. The communication between the two devices occurs over a wired or wireless connection. | 2008-09-11 |
20080222252 | Systems, Methods, and Products for Conducting Conferences - Methods, systems, and products are discussed for conducting a conference. The conference is established amongst a host communications device, an intermediate host communications device, and a participant communications device. A command is communicated from the host communications device to the intermediate host communications device that instructs the intermediate host communications device to retrieve an object from memory during the conference. The object is communicated from the intermediate host communications device to the participant communications device. | 2008-09-11 |
20080222253 | SYSTEM AND METHOD OF CREATING AND RATING ITEMS FOR SOCIAL INTERACTIONS - A system and method for providing items to users and, more particularly, a system and method for rating items and placing such items into a queued list. The method includes providing an item from a web browser to a recipient on a preferred list and placing the item into a queued list with respect to other items based on a rating. The system includes a computer infrastructure being operable to provide a rated item from a web browser to a recipient on a preferred list and place the rated item in a queued list with respect to other items. | 2008-09-11 |
20080222254 | Systems and methods for sending customized emails to recipient groups - Systems and methods for allowing a user to send customized electronic mails to recipients, comprising providing a graphical window on a display screen of an electronic device, allowing the user to input a message which is displayed within the graphical window, allowing the user to identify portions of the message as being intended for certain recipient groups, creating an electronic mail for each recipient group based on the portions of the message identified as being intended for that recipient group, and sending the electronic mails. | 2008-09-11 |
20080222255 | Systems and methods for providing high performance and scalable messaging - Systems and methods are disclosed to perform messaging among a plurality of mobile nodes by performing one disk seek to store a predetermined short message; and performing two disk seeks to read and delete the predetermined short message. | 2008-09-11 |
20080222256 | Autocomplete for intergrating diverse methods of electronic communication - Instant messaging, also known as chat, is integrated with electronic mail in a user interface that provides for automatic completion of recipient names or addresses, such as email addresses or chat addresses, as a user types characters of the name or address when addressing a message. The automatic completion feature displays a list of matches, which are names or addresses in, for example, the user's online contact list, that match the characters the user types. The matches list may contain names or addresses for multiple different communication methods. The user may then select one of the names or addresses to compose a message to be sent to the selected name or address. A user interface is then provided for composing a message to be sent to the selected name or address using the communication protocol associated with the selected name or address. | 2008-09-11 |
20080222257 | Systems and methods for sending customized emails to recipient groups - Systems and methods for allowing a user to send customized electronic mails to recipients, comprising providing a graphical window on a display screen of an electronic device, allowing the user to input a message which is displayed within the graphical window, allowing the user to identify portions of the message as being intended for certain recipient groups, creating an electronic mail for each recipient group based on the portions of the message identified as being intended for that recipient group, and sending the electronic mails. | 2008-09-11 |
20080222258 | DIGITAL RIGHTS MANAGEMENT METHOD AND APPARATUS - A digital rights management (DRM) method and apparatus are provided. The DRM method includes generating a rights object request message for requesting a rights object corresponding to content stored in a media player and transmitting the rights object request message; receiving a rights object response message corresponding to the rights object request message from a media server which receives the rights object request message; and obtaining a rights object using the rights object response message. | 2008-09-11 |
20080222259 | EMAIL SUBSTRING CHRONOLOGICAL ORDER - A method and system for placing, displaying and printing email strings in different chronological orders. | 2008-09-11 |
20080222260 | INSTANT MESSAGING WITH CALLER IDENTIFICATION - A method for providing caller identification information to instant messaging communication participants can include identifying an online presence for at least a first instant messaging client and determining caller identification information for a user associated with the first instant messaging client. The caller identification information can be provided to a second instant messaging client. | 2008-09-11 |
20080222261 | SYSTEM AND METHOD OF SUPPORTING CONSTRUCTIVE DISCOURSE ON COMPUTERS AND MOBILE DEVICES - A system and method to allow a user to engage in a collaborative discourse embedded in messaging platforms such as email or instant messaging, and to visualize the structure of that discourse. The system provides the ability to create and modify tree-like structures, which can represent outlines or tables of contents employed in documents. These structures take the place of traditional documents in representing the work product of a knowledge worker. These structures are related to the discourse in that messages may refer to nodes of these structures, and hence be understood to be related. It is the interplay between the creation of a structured message-based discourse and the persistent outline-form knowledge structures that allows message-based correspondence, including the reading and writing of documents, to be performed with increased efficiency and at a higher level of integration. | 2008-09-11 |
20080222262 | Digital Album Service System for Showing Digital Fashion Created by Users and Method for Operating the Same - A system and method provide mobile services of a fashion album directly created by a user. A digital album service system and method provide wireless mobile services, wherein figures of a user's avatar wearing a variety of fashion items are provided in the form of a moving picture to a user connected to an avatar image server through a wired communication network using a personal computer (PC). A relevant image is provided in the form of a still picture and/or a mobile flash to a specific mobile communication terminal selected by the user, thereby allowing the user to view or download the image without restriction of time and space. | 2008-09-11 |
20080222263 | METHOD AND SYSTEM FOR MOBILE EMAIL ADAPTATION - The present invention discloses a method and system for mobile email adaptation, which sets an adaptation server separated from the mail proxy server, while a mobile email server can ask the adaptation server to fulfill the adaptation function for the content of the mail. Therefore, the adaptation function is stripped from the mail proxy server, the burden on the proxy server is decreased, and the possible bottleneck of the system is avoided. And the adaptation is concentrated in the adaptation server of the mobile email server end, instead of being distributed into each proxy server. So it is more convenient for concentrative manage and function upgrade. As a plurality of mobile email servers could access the same adaptation server, the network organization is more convenient and flexible. | 2008-09-11 |
20080222264 | Integrated Two-Way Communications Between Database Client Users and Administrators - Systems, methods and media for two-way communication between database client users and administrators are disclosed. Embodiments may include a method for communicating between database client users and administrators. Embodiments may include receiving a message request to send to one or more recipients, the message request including message content and an indication of the one or more recipients to which the message will be sent. Embodiments may also include determining an Internet Protocol (IP) address associated with each of the one or more recipients based on the message request and transmitting a message to each of the determined IP addresses, where the message includes the received message content. Embodiments may also include receiving a second message from one of the determined IP addresses. Further embodiments may include displaying the second message in a display window. Recipients of messages may include database administrators (DBAs) or database client users. | 2008-09-11 |
20080222265 | System and Method for Allowing a User to Ensure Actions Taken on a Document Are Applied to the Most Recent Electronic Correspondence - A method, apparatus, and computer instructions for indicating most recent documents, such as email messages in a message file. A determination is made as to whether a more recent message in a thread of related messages is present in the message file in response to a first user input selecting a message for processing. A first indication of the more recent message is presented if the more recent message in the thread of related messages is present in the message file. A determination is made as to whether the more recent message in the thread of related messages has been received in the message file in response to a second user input to send the message. A second indication of the more recent message in the thread of related messages is presented if the more recent message in the thread of related messages has been received in the message file. | 2008-09-11 |
20080222266 | REDIRECTING CLIENT CONNECTION REQUESTS AMONG SOCKETS PROVIDING A SAME SERVICE - A method, system, and program for redirecting client connection requests among sockets providing a same service are provided. An application requests multiple sockets from a kernel. In addition, the application generates a socket call option to bind the sockets to a particular port number and passes a list of the sockets to the kernel, where the list indicates that the sockets will all provide access to server systems providing the same service. In response, the kernel sets up the sockets, bound to the same port, and set to reference one another. Then, when a connection request is received for a first socket in the list with a queue that is full, the kernel redirects the connection request to a second socket in the list with available queue space. Thus, rather than drop the connection request from the first socket when it lacks available queue space, the connection request is redirected to another socket providing access to the same service. | 2008-09-11 |
20080222267 | METHOD AND SYSTEM FOR WEB CLUSTER SERVER - A method is provided for balancing the load from clients sending requests to a cluster server for an internet domain. The cluster server has a domain manager for redirecting traffic for the domain. The method includes receiving a request from a client in the domain manager. The domain manager selects a client server for servicing the request, and a message is sent to the client for redirecting the request to the selected client server, without user interaction. The method also includes a cluster server with geographically distributed subordinate clusters. | 2008-09-11 |
20080222268 | WEB SERVER, METHOD OF CONTROLLING OPERATION THEREOF, AND CONTROL PROGRAM - A web page is displayed comparatively quickly. To achieve this, a web page in which a plurality of link destinations have been embedded by items of hot text is displayed on the display screen of a terminal device in response to a web server being accessed by the terminal device. A web page having a high likelihood of being selected next from among the web pages at the link destinations specified by the items of hot text is decided based upon an access log. The web page thus decided is generated ahead of time. If a request for this previously generated web page arrives at the web server, the previously generated web page data is transmitted from the web server to the terminal device. If a request for web page data that has not been generated in advance arrives at the web server, then the web server generates the web page data in accordance with the request and transmits the web page data to the terminal device. | 2008-09-11 |
20080222269 | INFORMATION BROWSER SYSTEM AND METHOD FOR A WIRELESS COMMUNICATION DEVICE - An information browser system and method enables sending of information requests to remote information sources and receiving of requested information from the remote sources on a wireless communication device. Information in any of a plurality of formats, including WML, HTML and WMLScript, is converted into a format in which the information can be displayed or otherwise further processed by the device. Information browsing functions may also be integrated with other communication functions on a mobile communication device. | 2008-09-11 |
20080222270 | Cookie Management Systems and Methods - A cookie management system serves as a central storage location for information and other data on users. A user's machine contains a cookie having a key and the cookie management system associates user information with this key. Upon receiving a request from a user, a web site retrieves the key from the user's machine and queries the cookie management system for the user information. The cookie management system retrieves the data associated with the key and returns the user information to the site. The sites therefore do not need to store information on all users nor do they need to place their own cookies on the user's machine. If sites obtain more data about a user during an interaction, the sites send this data to the cookie management system which updates its database. The user's machine may contain multiple cookies that correspond to different people and the site can prompt the user to select the appropriate one. The cookies may correspond to the same user and specify different amounts or categories of information. The user may supply a password to enable sites to access their data from the cookie management system. | 2008-09-11 |
20080222271 | Age-restricted website service with parental notification - An age-restricted website service accessed only by a proprietary browser software program operated by an authorized child or teenager. When loaded into the user's computer, an icon is loaded onto the desktop and all other browser icons are removed. When activated, the browser program only connects to the service's host computer. The service provides access to an interactive network of web forums, photos, blogs, chats and logs and emails safe for small children. During setup, a signup menu is displayed that includes a plurality of questions completed by the new member requesting information regarding the name of the member, the age of the member, name of the member's parent or guardian, the mailing address of the parent or guardian, the telephone number and email address of the member's parent or guardian. After the menu questionnaire is completed and submitted, the member's parent or guardian is then contacted by U.S. Postal Restricted Receipt service requiring a signature and positive identification. The representative may also send the parent or guardian an email confirming that the account for the new member has been authorized. Once the account has been authorized verbally and via email the chosen user name and temporary password for the new member is mailed to the parent or guardian. The age of the member is limited to 7 to 17 years. Also, the passwords are all members are changed annually. | 2008-09-11 |
20080222272 | SYSTEM AND METHOD FOR SUBSTITUTING DATA IN RESPONSES TO MULTIMEDIA INQUIRIES - The present invention is directed to using a gateway, through which a user uses a communication device such as a computer to access a network, to strip data from communications to the user from the network. The present invention also adds new data to the communication to the user from the network based on the demographics of the user. The demographics of the user may be accessed by or stored on the gateway thus avoiding the security issues of having said demographics being on the network. | 2008-09-11 |
20080222273 | Adaptive rendering of web pages on mobile devices using imaging technology - Described is browsing websites with a small form-factor (e.g., mobile) device that is similar to a desktop browsing experience, without requiring websites to redesign pages for such devices. A server responds to client requests for page content by providing server-rendered image data to the requesting client, along with properties of elements of the page represented in the image data. The client displays a representation of the page based on the image data, and uses the property data to emulate interaction with the page rather than the image that is actually being displayed. The server may provide tiles corresponding to zoomed-in portions of the page, or the client device may generate tiles from the image data. Using the tiles, element properties and a moveable/resize-able zoom rectangle provided to the user, the client device can zoom into the page to facilitate interaction with the elements in that area. | 2008-09-11 |
20080222274 | Method and system for an interactive, web-based environment - A method providing an online environment for a user to interact with a decision tree. The method includes operating a webserver providing a web-based, interactive decision tree, including communication content. The content is distributed by first transmitting a user interface, including the interactive decision tree, to a web browser operated by a user. The decision tree includes user interactive choices. The web server then receives a message from the user indicative of his selection of one or more choices. The web server then modifies the user interface to incorporate the user's selected choices. The server then transmits the modified user interface incorporating the choices to the web browser operated by the user so that he receives an appropriate response to the choices. | 2008-09-11 |
20080222275 | Server System, Server Device and Method Therefor - A server system manages information so that no inconsistency may occur between a plurality of servers. The server system includes a plurality of server devices, which process, using a plurality of pieces of processing data without any overlap. Each server device relays the signal received at first by any server device, so that the signal may be passed through all server devices and may be received at last by the server device having transmitted the signal at first. The server device transmits, when any processing data is to be used, a first signal indicating the use of that processing data, to another server device, and receives the first signal from another server device and relays the same to another server device. When transmission means transmits the first signal so that the first signal is relayed from another server device, the use of the processing data to be used is permitted. | 2008-09-11 |
20080222276 | Control system apparatus and systems based thereon that transfer control apparatus information over IP networks in web page-less transfers - A system for process control comprises a server digital data processor and a client digital data processor that are coupled by a network, such as the Internet or an Intranet. The server digital data processor, which is additionally coupled to a control/sensing device and any associated interface equipment (collectively, referred to as “process control apparatus”), includes a command processor that transfers information between the network and the process control apparatus. The client digital data processor includes an information client (e.g., a so-called Internet web browser) capable of requesting and receiving an applet from the server digital data processor. The information client, further, defines a hardware-independent and operating system-independent virtual machine environment within the client digital data processor. The client digital data processor executes, within that virtual machine environment, an applet for configuring the client digital data processor as a “process controller” that establishes communications over the network with the command processor and that monitors and/or controls the process control apparatus via those communications. | 2008-09-11 |
20080222277 | Method and Apparatus for Configuring and Managing a Robust Overlay Multicast Tree - Provided is a method and apparatus for configuring and managing an overlay multicast data delivery tree in a transmission network having a SM (session manager) and at least one MA (multicast agent). The method includes the steps of at the MA intending to joining a session, obtaining an active neighbor MA list from the SM; detecting information on QoS information of each neighbor MA in the active neighbor MA list, selecting a MA having the most optimized QoS as a parent MA based on the QoS information of each Neighbor MA in the active neighbor MA list, joining an overlay multicast data communication session through the selected parent MA, periodically receiving HB (heart beat) information having information on a path from a root to the MA and determining whether to perform a parent-switching based on me HB information and parent-switching from the current parent MA to a MA having a better QoS when it is determined to perform the parent-switching | 2008-09-11 |
20080222278 | System and method of global electronic job market in the Internet - A system and a method of global electronic job market in the Internet are provided. The method of operating a global electronic job market for jobseekers and employers via the Internet includes registering the jobseekers and the employers; providing information regarding offers of the jobseekers and the employers to the registered employers and jobseekers accordingly; selecting partners in the job market based on the provided information; holding competitions for job vacancies; conducting job contracts between jobseekers and employers; providing additional services of the system of global electronic job market. | 2008-09-11 |
20080222279 | System for creating collective intelligence through multi-linear discussion over an electronic network - A system that assembles diverse individual thoughts into collective intelligence, making possible a structured conversation by a networked community. Participants contribute ideas to a robust conversational framework in modular form. This framework ensures that the conversation remains structured and continues on track. Each idea module competes with its peers through an interactive rating process controlled by the community. The resulting conversation represents collective intelligence arranged into at least two opposing viewpoints. The invention then enables these discussions to translate into real-world action by empowering the community with collaborative tools. | 2008-09-11 |
20080222280 | PSEUDO-AGENT - A pseudo-agent is disclosed herein that bridges this divide. For purposes of the discussion herein, a pseudo-agent is a machine that is installed on a fully capable host machine, such as a Windows or UNIX machine, and that gathers and evaluates content from a management server, takes actions if so instructed, and reports the results of its evaluation upstream. However, unlike an agent in a traditional management system, which inspects and acts on the local machine, the pseudo-agent actually inspects and acts on a remote device, or many remote devices. | 2008-09-11 |
20080222281 | Method and system for tiered distribution in a content delivery network - A tiered distribution service is provided in a content delivery network (CDN) having a set of surrogate origin (namely, “edge”) servers organized into regions and that provide content delivery on behalf of participating content providers, wherein a given content provider operates an origin server. According to the invention, a cache hierarchy is established in the CDN comprising a given edge server region and either (a) a single parent region, or (b) a subset of the edge server regions. In response to a determination that a given object request cannot be serviced in the given edge region, instead of contacting the origin server, the request is provided to either the single parent region or to a given one of the subset of edge server regions for handling, preferably as a function of metadata associated with the given object request. The given object request is then serviced, if possible, by a given CDN server in either the single parent region or the given subset region. The original request is only forwarded on to the origin server if the request cannot be serviced by an intermediate node. | 2008-09-11 |
20080222282 | ANALYZING VIRTUAL PRIVATE NETWORK FAILURES - The specification provides information for determining any impacted customers, virtual private networks, circuits, and devices following a path failure. The specification uses an information-gathering component to find system information and uses the system information in determining any impacted units. A report is created that allows a network management system to process the impacted units. If any of the impacted units are customer devices, then the management system calculates the impact on the customer based on a Service Level Agreement. | 2008-09-11 |
20080222283 | Behavioral Networking Systems And Methods For Facilitating Delivery Of Targeted Content - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user. | 2008-09-11 |
20080222284 | Methods of processing and segmenting web usage information - A massive amount of information is collected when tracking statistics such as web site usage data. To simplify the analysis of such data, it is advantageous to process and segment the web site usage data. One proposed method of segmenting the data is to create a reverse sorted associative container for each different web section of a web site. Page-views, c, sessions, and other web viewing metrics may be used as keys in the reverse sorted associative container and web viewer identifiers are used as values associated with the page-view value keys. After creating the reverse sorted associative containers, each reverse sorted associative container is segmented on a percentile basis. | 2008-09-11 |
20080222285 | Configurable network device user interface - Network devices, systems and methods are described that configure a network device user interface. One method includes receiving input to define user-selectable information from among a list of pre-arranged network information presented on a network device display. The method includes configuring the user-selectable information into a particular grouping and presenting the user-selectable information according to the particular grouping. | 2008-09-11 |
20080222286 | Computer Usage Monitoring - The present invention relates to a method of monitoring worker activity in a work group, the work group comprising workers each using a computer on a computer network their method comprising displaying to a work group supervisor, in consolidated form, a label indicating each worker and information indicating the current activity and/or classification determined for each worker. | 2008-09-11 |
20080222287 | Constructing an Inference Graph for a Network - Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components. | 2008-09-11 |
20080222288 | METHOD AND SYSTEM FOR APPLICATION PROFILING FOR PURPOSES OF DEFINING RESOURCE REQUIREMENTS - Disclosed are a method of and system for profiling a computer program. The method comprises the steps of using a utility application to execute the computer program; and on the basis of said execution of the computer program, identifying specific performance requirements of the computer program. A profile of the computer program is determined from said identified performance requirements; and based on said determined profile, resources for the computer program are selected from a grid of computer services. | 2008-09-11 |
20080222289 | Resource Allocation - In order to satisfy requests for a connection path having a specified capacity between two specified terminations ( | 2008-09-11 |
20080222290 | Access control list generation and validation tool - This invention provides a tool for generating ACLs in an environment where a set of network elements or servers (e.g. web servers, IPTV servers, application servers . . . ) need to be secure. The tool also performs ACL validation to ensure that the filtering rules are correct before they are deployed in a network. The system enables a central view of the security configuration concerning the filtering rules in the network. Furthermore, it allows end-to-end configuration of the ACL rules, from the definition of the flows between the servers to the deployment of the rules on the network elements. | 2008-09-11 |
20080222291 | Content delivery network service provider (CDNSP)-managed content delivery network (CDN) for network service provider (NSP) - A CDN service provider shares its CDN infrastructure with a network to enable a network service provider (NSP) to offer a private-labeled network content delivery network (NCDN or “private CDN”) to participating content providers. The CDNSP preferably provides the hardware, software and services required to build, deploy, operate and manage the CDN for the NCDN customer. Thus, the NCDN customer has access to and can make available to participating content providers one or more of the content delivery services (e.g., HTTP delivery, streaming media delivery, application delivery, and the like) available from the global CDN without having to provide the large capital investment, R&D expense and labor necessary to successfully deploy and operate the network itself. Rather, the global CDN service provider simply operates the private CDN for the network as a managed service. | 2008-09-11 |
20080222292 | Method for Allowing Multiple Authorized Applicants to Share the Same Port - In a method comprising an embodiment of the invention, an original application initially binds to a port, and selects or designates a confidential key, which usefully may be a conventional cookie. The invention also sets a socket option, referred to by way of example, as SO_SECURE_REUSEPORT. The confidential key, together with the port number, is then registered with the operating system of a host associated with the port. In order for another application to subsequently bind to the port, such application must provide the operating system with a key that is identical to the confidential key. In one useful embodiment of the invention, a first application binds a socket to a particular port associated with the host. A specified key is registered with the operating system, and a second application is allowed to bind to the particular port only if the second application can furnish the operating system with a key that matches the specified key. | 2008-09-11 |
20080222293 | Systems and methods for facilitating identification of communication originators - Systems, apparatuses and methods for facilitating identification of the originator of a communication. A communication is received from a sending device. Sending device identification information is requested from a distributed contact database fashioned from the contact databases of the communication devices in a group of communication devices. If the sending device identification information is available at a given communication device, it is received from the communication device. | 2008-09-11 |
20080222294 | Managing Communications Using a Mobile Device - A method and apparatus is provided for managing communications using a mobile device. More specifically, the present invention allows the mobile device to transfer a communication session from one network path to another network path. The user of the mobile device, therefore, has control over “network choice” instead of the network operators or handset providers. In addition, the present invention allows the mobile device to manage an association with one or more wireless network access points. With respect to access point management, the present invention provides a “fast scan” or “short scan” process to reduce the scanning time during active communication sessions to a level that is not detectable by the user. As a result, the present invention is more efficient, reduces power consumption, increases call quality and increases user acceptance of the device. | 2008-09-11 |
20080222295 | Using internet content as a means to establish live social networks by linking internet users to each other who are simultaneously engaged in the same and/or similar content - A system and method that uses internet content and/or content metadata as a means to establish social networks. Examples include linking internet users, searchers, viewers and/or listeners of the same and/or similar internet content to each other via a platform that enables any of the following in n-dimensional environments: social networking, communications, sharing, e-commerce, advertising, search, hosting and registry services, push and pull applications, anonymous communications, and rich presence. | 2008-09-11 |
20080222296 | DISTRIBUTED SERVER ARCHITECTURE - A method and apparatus for synchronizing network element state when a network connection between a plurality of servers is restored after a network failure includes a plurality of objects that exist within the network. Each object exists in a plurality of different versions, in which each said different object version results from modifications to an object made by different servers during the network failure when the servers are unable to communicate with each other but otherwise continue to function. Each object comprises a vector including a separate version number for each server, in which each server increments its version number in the vector when it modifies the object. An automatic conflict resolution mechanism provides, at each server, a most up to date view of all objects across all of said plurality of servers upon restoration of the network connection between said plurality of servers after said network failure. The conflict resolution mechanism reconciles the existence of said plurality of different versions of an object to determine which object version should take precedence over other object versions. Conflict resolution is performed when there are multiple versions of a same object at a server. The conflict resolution mechanism also comprises at least one tie breaking rule that is applied to decide which servers take precedence over other servers when determining which object version should take precedence over other object versions. | 2008-09-11 |
20080222297 | METHOD AND SYSTEM TO EFFICIENTLY MANAGE A NETWORK CONNECTION TO CONNECT A CLIENT AND A RESOURCE - This document discusses, among other things, an example system and methods for connecting a client and a resource. Example embodiments may include receiving a request from a client computer, for a connection to a generically named resource that is associated with multiple resources. In response to the request, example embodiments may further include detecting whether one of the multiple resources is overloaded and determining a number of static connections reserved for the client computer. A static or dynamic connection may be assigned to the resource or a further one of the multiple resources based on the generic resource name, the load on the resource and the number of static connections reserved for the client computer. | 2008-09-11 |
20080222298 | SHARING A SHARED RESOURCE ACROSS LOGICAL PARTITIONS OR SYSTEMS - An apparatus and method for sharing a resource (such as a modem or virtual private network) allow virtualizing the shared resource in a simple and efficient manner that allows both accepting and initiating virtual or physical connections through the shared resource across logical partitions or systems. An L2TP tunnel is established between the server that owns the shared resource and the client that desires to use the shared resource. Messages are defined that allow the client to initiate an outgoing connection through the shared resource, and that allow the client to accept an incoming connection received from the shared resource. Once the connection is made, the client and ultimate destination communicate through the shared resource via point-to-point communications. | 2008-09-11 |
20080222299 | Method for preventing session token theft - The present invention relates to a method for preventing the theft of a session token comprising the steps of: (a) detecting a submission of a first request from the client's browser to a protected site; (b) redirecting said first request to the traffic processor for monitoring said first request; (c) forwarding said first request from said traffic processor to said protected site; (d) receiving the response containing the session token from said protected site by said traffic processor; (e) storing said session token in the session table; (f) providing a token index for indexing said session token stored in said session table; (g) modifying the content of said response by changing said session token to said token index; and (h) forwarding the modified response from said traffic processor to said browser. | 2008-09-11 |
20080222300 | METHOD AND APPARATUS FOR SYNCHRONIZING NOTIFICATION MESSAGES - Various embodiments provide for the splitting of a notification message to a user, where the notification message enables at least one of interactivity and delivery of information associated with a media broadcast service. A first component of the notification message carries media content and is transmitted utilizing a file delivery protocol, such as FLUTE, HTTP, and OMA-PUSH. A second component of the notification message carries any synchronization information associated with the interactivity and the delivery of the information associated with the media broadcast service. The second component of the notification message can be transported in an RTP payload via RTP to allow for accurate synchronization of the notification message with a media stream of the media broadcast service containing the media content. | 2008-09-11 |
20080222301 | Method for data distribution - Stream data is transmitted from a distribution server to a client without any loss of data. The capacity of a reception buffer to be prepared at the client can be made small and the network bandwidth necessary for data redistribution can be narrowed. A relay server interposed between the distribution server and client buffers stream data in an auxiliary storage device. When the relay server or client detects a loss of stream data, a redistribution request is transmitted to the distribution server or another relay server at the preceding stage. | 2008-09-11 |
20080222302 | DEVICES AND METHODS FOR MINIMIZING START UP DELAY IN TRANSMISSION OF STREAMING MEDIA - A method for a client to receive streaming media over a network includes receiving data having the streaming media encoded therein and storing the received data in a de-jitter buffer thereby increasing a fullness of the de-jitter buffer. The method further includes, when the fullness reaches a fill level, initiating play out of the stored data from the de-jitter buffer, and changing the fill level while playing out the stored data. | 2008-09-11 |
20080222303 | LATENCY HIDING MESSAGE PASSING PROTOCOL - A method, system, and article of manufacture that provide latency hiding, high bandwidth message passing protocols used for data communication between nodes of a parallel computer system are disclosed. A source node transmits a request to send message to a receiving node. Prior to receiving a clear to send message, the sending node continues to send deterministically routed (or fully described) data packets to the receiving node, thereby hiding the latency inherent in the request to send—clear to send message exchange. Once the sending node receives the clear to send message, any remaining portion of the message may be sent using partially described packets which may be routed dynamically, thereby maximizing bandwidth. | 2008-09-11 |
20080222304 | APPARATUS AND METHODS FOR PROVIDING TRANSLUCENT PROXIES IN A COMMUNICATIONS NETWORK - The Translucent Proxying of TCP (TPOT) device and methods use TCP-OPTIONS and IP tunneling to guarantee that all IP packets belonging to a specific TCP connection will traverse the proxy which intercepts the first packet of data. This guarantee allows the ad-hoc deployment of TPOT devices anywhere within the communication network, and does not restrict the placement of proxy devices at the edge of the network. Furthermore, no extra signaling support is required for the TPOT device to properly function while the addition of TPOT devices to communication networks significantly improves the throughput of intercepted TCP packets of data. | 2008-09-11 |
20080222305 | NETWORK CACHE-BASED CONTENT ROUTING - Methods and apparatus are described for routing data traffic in a network having a plurality of layers including physical, data link, and network layers. The data traffic is received and one of a plurality of routing options for the data traffic is selected with reference to information outside of the physical, data link, and network layers. The data traffic is then routed according to the selected routing option. | 2008-09-11 |
20080222306 | System and Method for Accessing Multiple Addresses Per Domain Name Using Networked Repository - A system, method, and program product are provided that gather a plurality of IP addresses that each correspond to a common domain name. A list of domain names is provided for gathering corresponding IP addresses. For each of the received domain names, IP addresses are retrieved from a number of DNS tables. The unique IP addresses are identified from the gathered IP addresses retrieved for each of the domain names. The domain names and their associated IP addresses are stored in a domain name repository. | 2008-09-11 |
20080222307 | System and Method for Multiple IP Addresses During Domain Name Resolution - A system, method, and program product are provided that access a network resource by sending, from a client computer system, a first domain name resolution request to a DNS server. The first domain name resolution request includes a first domain name and requests multiple IP addresses. The client computer system receives, from the DNS server, a first multiple IP address response that corresponds to the first domain name resolution request, the first multiple IP address response including a IP addresses that each correspond to the first domain name included in the first domain name resolution request. At the client computer system, one of the plurality of IP addresses is selected by a user. The client computer system sends a request to a server corresponding to the selected IP address. The client computer system then receives responsive data from the server and displays the responsive data on a display screen accessible from the client computer system. | 2008-09-11 |