Patent application number | Description | Published |
20100251338 | Predictive HTTP Authentication Mode Negotiation - A client system and a server system use a Hypertext Transfer Protocol (HTTP) authentication mode preference header to negotiate an HTTP authentication mode. The client system sends an HTTP request to the server system. In response to the HTTP request, the server system sends an HTTP response to the client system. The HTTP response includes an HTTP authentication mode preference header. The HTTP authentication mode preference header indicates whether a preferred HTTP authentication mode is connection-based HTTP authentication or request-based HTTP authentication. In subsequent HTTP requests to the server system, the client system uses the HTTP authentication mode indicated by the HTTP authentication mode preference header. | 09-30-2010 |
20110016220 | Enabling Peer-To-Peer Content Retrieval in HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network. | 01-20-2011 |
20120311104 | ENABLING PEER-TO-PEER CONTENT RETRIEVAL IN HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network. | 12-06-2012 |
20140047077 | ENABLING PEER-TO-PEER CONTENT RETRIEVAL IN HTTP - Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server can indicate in an HTTP request that it is capable of retrieving content from a peer-to-peer network. When the server receives the HTTP request it will recognize the indication that the client is capable of retrieving content from a peer-to-peer network and may send content information instead of sending the requested content. The content information allows the client to retrieve the content from the peer-to-peer network. | 02-13-2014 |
Patent application number | Description | Published |
20080242690 | Methods and Compositions for Promoting Bone and Joint Health - Methods and compositions that can be used to promote bone and joint health through amelioration, stabilization and repair of damage associated with various pathophysiological conditions are disclosed. | 10-02-2008 |
20080248131 | Protein Kinase Modulation by Hops and Acacia Products - Botanical compounds to modulate kinase activity are disclosed. The compounds and methods disclosed also inhibit expression of COX-2, inhibit synthesis o prostaglandins selectively in target cells, and inhibit inflammatory response selectively. The compositions contain at least one fraction isolated or derived from hops or | 10-09-2008 |
20090155382 | Methods and Compositions for Heavy Metal Detoxification - Compositions and methods for enhancing heavy metal detoxification are described. The compositions and methods described provide enhanced activity of key detoxification systems including that the induction of phase II detoxification enzymes, such as glutathione S-transferases (GSTs), and NADPH quinone reductase (NQO1) activity. | 06-18-2009 |
20100069422 | METHODS AND COMPOSITIONS FOR PROMOTING BONE AND JOINT HEALTH - Methods and compositions that can be used to promote bone and joint health through amelioration, stabilization and repair of damage associated with various pathophysiological conditions are disclosed. | 03-18-2010 |
20100137449 | SUBSTITUTED 1,3-CYCLOPENTADIONE MULTI-TARGET PROTEIN KINASE MODULATORS OF CANCER, ANGIOGENESIS AND THE INFLAMMATORY PATHWAYS ASSOCIATED THEREWITH - Compounds and methods for multi-targeted protein kinase modulation for angiogenesis, cancer treatment or the inflammatory pathways associated with those conditions are disclosed. The compounds and methods disclosed are based on substituted 1,3-cyclopentadione compounds. | 06-03-2010 |
20100222262 | SUBSTITUTED 1, 3-CYCLOPENTADIONE ATTENUATED ENDOTHELIAL INFLAMMATION AND ENDOTHELIAL-MONOCYTE INTERACTIONS - Compositions and methods for reducing cardiovascular risk utilizing substituted 1,3-cyclopentadione compounds are described. | 09-02-2010 |
20110021637 | XANTHOHUMOL AND TETRAHYDRO-ISOALPHA ACID BASED PROTEIN KINASE MODULATION CANCER TREATMENT - Compounds and methods for protein kinase modulation for cancer treatment are disclosed. The compounds and methods disclosed are based on xanthohumol or isoxantohumol, or tetrahydro-isoalpha acids commonly found in hops. | 01-27-2011 |
20120189721 | METHODS AND COMPOSITIONS FOR HEAVY METAL DETOXIFICATION - Compositions and methods for enhancing heavy metal detoxification are described. The compositions and methods described provide enhanced activity of key detoxification systems including that the induction of phase II detoxification enzymes, such as glutathione S-transferases (GSTs), and NADPH quinone reductase (NQO1) activity. | 07-26-2012 |
20130337092 | PHYTONUTRIENT COMPOSITIONS AND METHODS OF USE - Phytonutrient based compositions and methods of using the same for preventing, reducing, or treating genetic damage induced by environmental toxins are disclosed. Additionally, said compositions and methods are used to reduce oxidized low density lipoproteins (OxLDL), myeloperoxidase (MPO), and plasminogen activator inhibitor-1 (PAI-1). | 12-19-2013 |
Patent application number | Description | Published |
20120108671 | CIS 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTAN- OYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes. | 05-03-2012 |
20130018105 | CIS, 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTA- NOYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)—3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes. | 01-17-2013 |
20130217781 | CIS 3,4-DIHYDROXY-2-(3-METHYLBUTANOYL)-5-(3-METHYLBUTYL)-4-(4-METHYLPENTAN- OYL)CYCLOPENT-2-EN-1-ONE DERIVATIVES, SUBSTANTIALLY ENANTIOMERICALLY PURE COMPOSITIONS AND METHODS - The present application provides cis 3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one derivatives and substantially enantiomerically pure compositions thereof. These derivatives include (+)-(4S,5R)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, (−)-(4R,5S)-3,4-dihydroxy-2-(3-methylbutanoyl)-5-(3-methylbutyl)-4-(4-methylpentanoyl)cyclopent-2-en-1-one, and salts and crystals thereof. The application further provides methods of using the disclosed compounds and compositions to activate PPARγ, activate GPR120, inhibit inflammation, and treat conditions responsive to PPARγ modulation, conditions responsive to GPR120 modulation, and metabolic disturbances such as diabetes. | 08-22-2013 |
Patent application number | Description | Published |
20140348073 | ALLOCATION OF SHARED RESOURCES FOR VIRTUALIZED NETWORKING - Technology for allocating network adapter resources such as air interface time and queue space amongst multiple virtual network stations or other virtual adapters is disclosed. As one example, the resource allocation may be based on analysis of the relative latency, jitter, or bandwidth considerations for applications communicating via each of the multiple virtual adapters. The resource allocation may also be based on how efficiently each of the virtual adapters utilized previously allocated resources. | 11-27-2014 |
20140359160 | MANAGEMENT OF MULTILEVEL QUEUES FOR SHARED NETWORK ADAPTERS - Technology for managing queuing resources of a shared network adapter is disclosed. The technology includes selectively transferring data from data transmission sources to a queue of the shared network adapter based on status indications from the shared network adapter regarding availability of queuing resources at the shared network adapter. In addition, the technology also includes features for selectively controlling transfer rates of data to the shared network adapter from applications, virtual network stations, other virtual adapters, or other data transmission sources. As one example, this selective control is based on how efficiently data from these data transmission sources are transmitted from the shared network adapter. | 12-04-2014 |
20140379883 | NETWORK MODE CONFLICT RESOLUTION - Technology for managing operational modes of a network adapter is disclosed. The technology includes features for selectively preempting (e.g., canceling, suspending, deferring, pausing, changing to a “no-op” state, changing to a passive state, or otherwise deprioritizing) execution for a current operational mode of the network adapter, executing a requested network control operation, and optionally restoring the preempted operational mode. The operational mode may be selectively preempted based on priority information associated with the current operational mode and the requested network control operation. | 12-25-2014 |
20140379884 | PRIORITIZATION OF NETWORK CONTROL OPERATIONS - Technology for prioritizing and executing network control operations is disclosed. The technology includes prioritizing requested network control operations against other network control operations and executing network control operations based on this prioritization. The prioritization may be based on priority information and classes with which the network control operations are associated. The classes may be based on expected durations of time for executing the network control operations. The technology also includes prioritizing and executing network control operations in a virtualized networking system. | 12-25-2014 |
Patent application number | Description | Published |
20130067065 | DETECTING DEVICE PRESENCE FOR A LAYER 3 CONNECTION USING LAYER 2 DISCOVERY INFORMATION - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 03-14-2013 |
20130067068 | EVENT-DRIVEN DETECTION OF DEVICE PRESENCE FOR LAYER 3 SERVICES USING LAYER 2 DISCOVERY INFORMATION - Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection. | 03-14-2013 |
20130232253 | PEER-TO-PEER DISCOVERY - A wireless device that discovers other wireless devices for the formation of a peer-to-peer connection may perform a scan that is limited in duration and power consumption. The scan nonetheless is highly likely to discover a device, if a discoverable device exists. In addition, the scan may be performed in compliance with parameters of a peer-to-protocol such that the scan may be readily implemented in a wireless device, in some embodiments even as a firmware upgrade on a wireless network interface card. Parameters of the scan may be adjusted to increase the likelihood that, if the scan completes without discovering a device, no discoverable device exists. The scan may be used in an overall process in which discovery ends or the scan is selectively repeated following an unsuccessful scan, without entering a find phase. | 09-05-2013 |
20140126468 | Determination of Packet Retransmission using Time Threshold - Techniques for determination of packet retransmission using a time threshold are described. In at least some embodiments, information for a packet that is received is compared to information for previously received packets. If the information for the packet matches a previously received packet, a receive time for the packet is compared to a timestamp for the previously received packet to determine if the packet is a retransmission of the previously received packet. In at least some embodiments, packet information associated with different senders can be stored, e.g., to enable packet information comparison for purpose of retransmission detection. An amount of packet information that is stored can be limited to a certain number of senders to control the impact of packet information storage on memory resources. | 05-08-2014 |
20140133407 | CONNECTION INFORMATION FOR INTER-DEVICE WIRELESS DATA COMMUNICATION - Techniques for connection information for inter-device wireless data communication are described. In at least some embodiments, a broker device maintains wireless connection information for various wireless devices. The wireless connection information includes wireless channels at which particular wireless devices can be accessed. The broker device can provide the wireless connection information to various other devices to enable wireless communication with the wireless devices. | 05-15-2014 |
20140143629 | Wireless Access Point Mapping - Techniques for wireless access point mapping are described. In at least some embodiments, various characteristics of a wireless access point are detected. Examples of such characteristics include signal strength for wireless signal transmitted by the wireless access point, identifying information for the wireless access point, data error rates for data transmitted by the wireless access point, and so forth. Characteristics of a wireless access point can be detected at multiple different geographic locations to enable a reception range mapping to be generated for the wireless access point, e.g., for an area in which signal reception for the wireless access point is qualitatively acceptable. | 05-22-2014 |
20140289396 | Detecting Device Presence for a Layer 3 Connection Using Layer 2 Discovery Information - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired. | 09-25-2014 |
Patent application number | Description | Published |
20090103481 | MAINTAINING MULTIPLE, SIMULTANEOUS WIRELESS NETWORK CONNECTIONS USING A SINGLE RADIO - A method and apparatus for managing simultaneous virtual connections with multiple wireless networks. A plurality of ports in a hardware driver may be each associated with a corresponding wireless network and maintain a unique MAC state relative to other ports. Each port may have a corresponding virtual NIC that communicates directly with the radio hardware via a hardware virtualization layer that multiplexes communication between the virtual NICs and the radio hardware. Simultaneous virtual connections may be made with one or more infrastructure networks or adhoc networks, and/or the computer may function as an access point for one or more of the networks. | 04-23-2009 |
20090254924 | OPERATING SYSTEM INTERFACES FOR VIRTUAL WIFI AND SOFTAP CAPABLE DRIVERS - Some embodiments of the invention provide an interface between programmed instructions (e.g., an operating system) and a miniport driver configured to communicate with radio hardware on a computer. The interface may include components operable to invoke various wireless connectivity-related functionality implemented by the radio hardware and/or miniport driver. The functionality may, for example, include a capability whereby the computer may maintain simultaneous connections on a plurality of wireless networks using a single radio, and/or a capability whereby the computer may function as an access point for a wireless network. | 10-08-2009 |
20120147268 | DIRECT CONNECTION WITH SIDE CHANNEL CONTROL - A wireless computer that pairs with a remote audio-video presentation device, such as a television. As a result of the pairing, a communication channel is established for the computer to transmit audio-video content for presentation through that device. Additionally, as part of the pairing, the computer and remote device select a side channel for communication of user commands. The wireless computer may display a user interface through which a user may input commands that control the manner in which the remote audio-video device presents the content. As a result, a user may use the wireless computer as a remote control for the audio-video device, controlling both the content presented and the manner in which it is presented. The side channel may use different frequencies than the channel used to communicate audio-video content, and may use very low power at frequencies in the digital TV spectrum. | 06-14-2012 |
20120155643 | SECURE PROTOCOL FOR PEER-TO-PEER NETWORK - A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group. | 06-21-2012 |
20120158839 | WIRELESS NETWORK INTERFACE WITH INFRASTRUCTURE AND DIRECT MODES - An architecture for a computing device to enable the computing device to support peer-to-peer communications using a wireless radio also configured for infrastructure-based communication. The architecture includes a driver for the wireless radio that supports ports for communication in accordance with the peer-to-peer protocol. A port may act as a control port through which action frames that control the formation of a peer-to-peer group may be sent and received. One or more other ports may be used for exchanging data with other devices in the group. Each of these ports may be configured in accordance with its role in the group, such that each port may be configured for operation as a group owner or a client. Additionally, after establishing a group, the control port may be used as a side channel for controlling a device in a group associated with another port. | 06-21-2012 |
20120158981 | FAST JOIN OF PEER TO PEER GROUP WITH POWER SAVING MODE - A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that supports a sleep state for a device controlling the group. When a device is seeking to join a group at a time when the controlling device is in a sleep state, another device that has information about the controlling device may provide information to the joining device that may then be used by the joining device to more quickly, and using less power, synchronize with the controlling device. The information may include information about a channel used by the controlling device or about timing of availability of the controlling device. The information may also reveal whether the group provides a service being sought by the joining device or may otherwise influence whether the joining device will attempt to join a group. | 06-21-2012 |
20120233266 | PEER-TO-PEER GROUP WITH RENEGOTIATION OF GROUP OWNER - A computing device that selectively renegotiates roles of devices in an existing peer-to-peer group. As the group is formed, the device may negotiate with other devices to select a device to control the group. During operation of the group, a device in the group may initiate a renegotiation that may lead to the selection of an alternative device to control the group. Renegotiation may be triggered by a message containing an information element signifying a request for renegotiation. Such a message may be sent either by the controlling device or other device in the group, and may be sent based on a state of the device. The state may relate to a source of power to the device such that a client that is connected to a source of power or a controlling device that is running low on battery power may request a renegotiation. | 09-13-2012 |
20120239755 | ROAMING GROUPS IN A PEER-TO-PEER NETWORK - A computing device that forms a group in accordance with a peer-to-peer protocol in which a device may be identified based on a credential of a user. The credential may be used to determine a unique identifier for the user such that the same identifier is used on any device operated by the same user. Such an identifier may be used in connection with a peer-to-peer protocol that supports persistent peer-to-peer groups. As a result, the unique identifier for the user may be retained by remote devices that have paired with any device operated by a particular user such that those remote devices may automatically establish a connection with any other device operated by the same user that similarly uses the same unique identifier for the user. | 09-20-2012 |
20120290730 | MASS RE-FORMATION OF GROUPS IN A PEER-TO-PEER NETWORK - A system in which wireless devices form a group in accordance with a peer-to-peer protocol and, at a later time, a device may send an invitation request to trigger the devices tore-form the peer-to-peer group. The invitation request may contain an identifier that is associated with a set of a plurality of devices. Those devices may be related such that they perform a function for which a user would want to use those devices together. The group of devices, for example, may be multimedia devices that receive and present streaming multimedia content or may be human interface devices that collectively act as an interface for a work station incorporating a wireless computing device operated by a user. Requesting that remote devices concurrently re-form a group reduces the time and spectral congestion associated with re-forming the group, particularly when the remote devices may periodically enter a low power state. | 11-15-2012 |
20120296986 | AUTO CONNECT IN PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity. | 11-22-2012 |
20120297229 | AUTO-CONNECT IN A PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity. | 11-22-2012 |
20120297306 | AUTO-CONNECT IN A PEER-TO-PEER NETWORK - A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity. | 11-22-2012 |
20120322368 | SIMPLE PEER-TO-PEER NETWORK FORMATION - Wireless devices that support bootstrapping of a peer-to-peer connection. The wireless devices may use an infrastructure mode connection to exchange security information, such as a PIN, used in establishing the peer-to-peer connection. This security information may be encrypted in accordance with a security protocol used by the access point and then may be applied in a security protocol used to establish a peer-to-peer connection. Such a bootstrapping capability supports operating scenarios in which devices that are communicating over an infrastructure network encounter an operation that requires transfer of large amounts of data and automatically transition to a peer-to-peer connection that provides better performance. With these techniques, a computing device may automatically connect to a display device and stream audio/video data to the display. | 12-20-2012 |
Patent application number | Description | Published |
20110276780 | Fast and Low-RAM-Footprint Indexing for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index maintains a hash index in a secondary storage device such as a hard drive, along with a compact index table and look-ahead cache in RAM that operate to reduce the I/O to access the secondary storage device during deduplication operations. Also described is a session cache for maintaining data during a deduplication session, and encoding of a read-only compact index table for efficiency. | 11-10-2011 |
20110276781 | Fast and Low-RAM-Footprint Indexing for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index maintains a hash index in a secondary storage device such as a hard drive, along with a compact index table and look-ahead cache in RAM that operate to reduce the I/O to access the secondary storage device during deduplication operations. Also described is a session cache for maintaining data during a deduplication session, and encoding of a read-only compact index table for efficiency. | 11-10-2011 |
20120166401 | Using Index Partitioning and Reconciliation for Data Deduplication - The subject disclosure is directed towards a data deduplication technology in which a hash index service's index is partitioned into subspace indexes, with less than the entire hash index service's index cached to save memory. The subspace index is accessed to determine whether a data chunk already exists or needs to be indexed and stored. The index may be divided into subspaces based on criteria associated with the data to index, such as file type, data type, time of last usage, and so on. Also described is subspace reconciliation, in which duplicate entries in subspaces are detected so as to remove entries and chunks from the deduplication system. Subspace reconciliation may be performed at off-peak time, when more system resources are available, and may be interrupted if resources are needed. Subspaces to reconcile may be based on similarity, including via similarity of signatures that each compactly represents the subspace's hashes. | 06-28-2012 |
20130064336 | Data Synchronization Policies - Techniques for data synchronization policies are described. In one or more implementations, techniques may be employed to set data synchronization (“sync”) policies for devices in a data sync environment. The sync policies specify parameters for sync operations in the sync environment, such as how frequently data sync operations are performed, what types of data are synced to particular devices, how frequently particular types of data are synced, and so on. In implementations, the sync policies consider the number of devices that are participating in a sync environment and attributes of the devices in specifying parameters for sync operations. Data can be synchronized among devices in the sync environment based on the sync policies. | 03-14-2013 |