Patent application number | Description | Published |
20080228873 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 09-18-2008 |
20080259790 | RELIABLE AND RESILIENT END-TO-END CONNECTIVITY FOR HETEROGENEOUS NETWORKS - Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage. | 10-23-2008 |
20080263082 | RECOVERY SEGMENT IDENTIFICATION IN A COMPUTING INFRASTRUCTURE - A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure. | 10-23-2008 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20100005504 | METHOD OF AUTOMATING AND PERSONALIZING SYSTEMS TO SATISFY SECURITYREQUIREMENTS IN AN END-TO-END SERVICE LANDSCAPE - A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance. | 01-07-2010 |
20100005505 | METHOD OF DYNAMICALLY UPDATING NETWORK SECURITY POLICY RULES WHEN NEW NETWORK RESOURCES ARE PROVISIONED IN A SERVICE LANDSCAPE - A computer-implemented method is provided for updating network security policy rules when network resources are provisioned in a service landscape instance. The method includes categorizing network resources in a service landscape instance based on a service landscape model. The method further includes responding to the provisioning of a network resource by automatically generating one or more security policy rules for a newly-provisioned network resource. Additionally, the method includes updating security policy rules of pre-existing network resources in the service landscape instance that are determined to be eligible to communicate with the newly-provisioned network resource so as to include the newly-provisioned network resource as a remote resource based on the service landscape model. | 01-07-2010 |
20100071025 | SECURING LIVE MIGRATION OF A VIRTUAL MACHINE WITHIN A SERVICE LANDSCAPE - In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link. | 03-18-2010 |
20110038256 | RELIABLE AND RESILIENT END-TO-END CONNECTIVITY FOR HETEROGENEOUS NETWORKS - Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. The method yet further can include detecting an outage in the first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage. | 02-17-2011 |
20110125914 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 05-26-2011 |
20120084769 | SEMANTICALLY RICH COMPOSABLE SOFTWARE IMAGE BUNDLES - A composable software bundle is created by retrieving a semantic representation of a set of software modules. A functional representation of a set of operations is retrieved. Each operation in the set of operations is to be performed on the set of software modules during at least one virtual image life-cycle phase in a set of virtual image life-cycle phases. A set of artifacts including a set of executable instructions associated with the set of operations is identified. The semantic representation, the functional representation, and the set of artifacts, are stored in a composable software bundle. | 04-05-2012 |
20120213059 | RELIABLE AND RESILIENT END-TO-END CONNECTIVITY FOR HETEROGENEOUS NETWORKS - Embodiments of the present invention address deficiencies of the art in respect to connectivity management in a heterogeneous network and provide a method, system and computer program product for resilient and reliable end-to-end connectivity in a heterogeneous network. In one embodiment of the invention, a method for resilient and reliable end-to-end connectivity in a heterogeneous network environment can be provided. The method can include creating an instance of an abstracted network resource model (NRM) for a heterogeneous network environment of different network resource nodes. The method further can include binding an application endpoint in the instance of the abstracted NRM with a connectivity endpoint for a first of the different network resource nodes. Finally, the method can include re-binding the application endpoint to a second of the different network resource nodes in response to detecting the outage. | 08-23-2012 |
20130185452 | HYPERTEXT TRANSFER PROTOCOL LIVE STREAMING - Illustrative embodiments disclose receiving a command to play a selected audio visual media on a client device. The client device determines portions of audio visual media from elected audio visual media and a sequence identifying each portion of the portions in a particular order for playing the portions. The portions and the sequence are determined according to a policy for playing each portion on the client device. The client device retrieves the portions to play in sequence and plays at least a partially retrieved first portion of the portions of the selected audio visual media on the client device. The first portion is identified based on the particular order in the sequence. | 07-18-2013 |
20140136479 | MOBILE APPLICATION CACHE BASED ON EXTREME SCALE TECHNOLOGY - Storing data from mobile devices may comprise receiving an asynchronous communication from a mobile device over a wireless network notifying that data was dropped in a synchronizing folder; computing a hash value associated with the data; determining based on the computed hash value, a partition of an object grid comprising a plurality of virtual machines; and storing the data on the partition. | 05-15-2014 |
20140136499 | MOBILE APPLICATION CACHE BASED ON EXTREME SCALE TECHNOLOGY - Storing data from mobile devices may comprise receiving an asynchronous communication from a mobile device over a wireless network notifying that data was dropped in a synchronizing folder; computing a hash value associated with the data; determining based on the computed hash value, a partition of an object grid comprising a plurality of virtual machines; and storing the data on the partition. | 05-15-2014 |
20140156837 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 06-05-2014 |
20140172991 | LOW LATENCY MESSAGING CHAT SERVER - A low latency messaging chat service may provide for receiving from a chat client a connection request via a network; authenticating the chat client by a registration process; allocating to the chat client at least a first topic corresponding to a first message queue and a second topic corresponding to a second message queue, the first topic assigned a first format and the second topic assigned a second format; enabling the chat client to post messages in the first topic; and enabling the chat client to receive messages in the second topic. | 06-19-2014 |
20140173004 | LOW LATENCY MESSAGING CHAT SERVER - A low latency messaging chat service may provide for receiving from a chat client a connection request via a network; authenticating the chat client by a registration process; allocating to the chat client at least a first topic corresponding to a first message queue and a second topic corresponding to a second message queue, the first topic assigned a first format and the second topic assigned a second format; enabling the chat client to post messages in the first topic; and enabling the chat client to receive messages in the second topic. | 06-19-2014 |
20140280743 | TRANSFORMING APPLICATION CACHED TEMPLATE USING PERSONALIZED CONTENT - Mechanisms are provided to implement a customizable mobile application utilizing a local template to personalize data. In one example, a local client application on a mobile device automatically changes the local content by utilizing a locally cached template and REST service supported by a remote application. In another example, the template further supports multiple phases of personalization. | 09-18-2014 |
20140280770 | TRANSFORMING APPLICATION CACHED TEMPLATE USING PERSONALIZED CONTENT - Mechanisms are provided to implement a customizable mobile application utilizing a local template to personalize data. In one example, a local client application on a mobile device automatically changes the local content by utilizing a locally cached template and REST service supported by a remote application. In another example, the template further supports multiple phases of personalization. | 09-18-2014 |
20140281859 | ENHANCED MOBILIZATION OF EXISTING WEB SITES - Mobile enablement of a web site, in one aspect, may comprise separating the web application into a static content and a dynamic content, the dynamic content comprising one or more data sources from which to retrieve data at runtime of the web application; rendering the static content as one or more hypertext markup language pages with one or more links between the hypertext markup language pages converted to local links; changing one or more references to the dynamic content to representational state transfer requests; enabling the representational state transfer requests from the one or more hypertext markup language pages; enabling use by the one or more hypertext markup language pages of at least one HTML5 feature that is accessible on the mobile device; and packaging the one or more hypertext markup language pages as the mobile application. | 09-18-2014 |
20140281863 | ENHANCED MOBILIZATION OF EXISTING WEB SITES - Mobile enablement of a web site, in one aspect, may comprise separating the web application into a static content and a dynamic content, the dynamic content comprising one or more data sources from which to retrieve data at runtime of the web application; rendering the static content as one or more hypertext markup language pages with one or more links between the hypertext markup language pages converted to local links; changing one or more references to the dynamic content to representational state transfer requests; enabling the representational state transfer requests from the one or more hypertext markup language pages; enabling use by the one or more hypertext markup language pages of at least one HTML5 feature that is accessible on the mobile device; and packaging the one or more hypertext markup language pages as the mobile application. | 09-18-2014 |
20140281881 | MOBILE ENABLEMENT OF WEBPAGES - Mechanisms are provided for mobile enablement of webpages (e.g., HTML webpages). In one example, mechanisms are provided for refactoring Java Server Pages “JSP” of a web application into an abstraction layer that partitions the visual presentation elements of HTML pages of the web application into a set of views and a Javascript home page. Further, mechanisms are provided for enabling access to the HTML pages over a mobile device by stacking views one atop another (in one specific example, the views may be rendered only one view at a time as needed; in another specific example any number of views (e.g., all of the views) may be rendered at once). Further, mechanisms are provided for enabling navigation between the views for the HTML pages by providing buttons along with each view. | 09-18-2014 |
20140281883 | MOBILE ENABLEMENT OF EXISTING WEB SITES - Mobile enablement of a web site, in one aspect, may comprise separating the web application into a static content and a dynamic content, the dynamic content comprising one or more data sources from which to retrieve data at runtime of the web application; rendering the static content as one or more hypertext markup language pages with one or more links between the hypertext markup language pages converted to local links; changing one or more references to the dynamic content to representational state transfer requests; enabling the representational state transfer requests from said one or more hypertext markup language pages; and packaging said one or more hypertext markup language pages as the mobile application. | 09-18-2014 |
20140281884 | MOBILIZING A WEB APPLICATION TO TAKE ADVANTAGE OF A NATIVE DEVICE CAPABILITY - Mechanisms are provided to mobilize a web application (e.g., a webpage) to take advantage of a native device capability (e.g., a native device capability of a mobile device). In one example, existing program code in a webpage that performs a first action that uses functionality of desktop software is identified and replaced with replacement program code that performs a second action that uses native device capability of a mobile device. | 09-18-2014 |
20140281904 | MOBILE ENABLEMENT OF EXISTING WEB SITES - Mobile enablement of a web site, in one aspect, may comprise separating the web application into a static content and a dynamic content, the dynamic content comprising one or more data sources from which to retrieve data at runtime of the web application; rendering the static content as one or more hypertext markup language pages with one or more links between the hypertext markup language pages converted to local links; changing one or more references to the dynamic content to representational state transfer requests; enabling the representational state transfer requests from said one or more hypertext markup language pages; and packaging said one or more hypertext markup language pages as the mobile application. | 09-18-2014 |
20140281905 | MOBILIZING A WEB APPLICATION TO TAKE ADVANTAGE OF A NATIVE DEVICE CAPABILITY - Mechanisms are provided to mobilize a web application (e.g., a webpage) to take advantage of a native device capability (e.g., a native device capability of a mobile device). In one example, existing program code in a webpage that performs a first action that uses functionality of desktop software is identified and replaced with replacement program code that performs a second action that uses native device capability of a mobile device. | 09-18-2014 |
20140281906 | MOBILE ENABLEMENT OF WEBPAGES - Mechanisms are provided for mobile enablement of webpages (e.g., HTML webpages). In one example, mechanisms are provided for refactoring Java Server Pages “JSP” of a web application into an abstraction layer that partitions the visual presentation elements of HTML pages of the web application into a set of views and a Javascript home page. Further, mechanisms are provided for enabling access to the HTML pages over a mobile device by stacking views one atop another (in one specific example, the views may be rendered only one view at a time as needed; in another specific example any number of views (e.g., all of the views) may be rendered at once). Further, mechanisms are provided for enabling navigation between the views for the HTML pages by providing buttons along with each view. | 09-18-2014 |
20140297620 | ANALYTICS BASED ON PIPES PROGRAMMING MODEL - A hypertext transfer protocol (HTTP) request that includes embedded scripted code that specifies requested data search, search result data manipulation, and manipulated search result data visualization processing is received at a server. The received embedded scripted code that specifies the requested data search, search result data manipulation, and manipulated search result data visualization processing is executed. Visualized manipulated search results are generated as output of the execution of the received embedded scripted code. The visualized manipulated search results are returned in response to receiving the HTTP request that includes the embedded scripted code. | 10-02-2014 |
20140297679 | ANALYTICS BASED ON PIPES PROGRAMMING MODEL - A hypertext transfer protocol (HTTP) request that includes embedded scripted code that specifies requested data search, search result data manipulation, and manipulated search result data visualization processing is received at a server. The received embedded scripted code that specifies the requested data search, search result data manipulation, and manipulated search result data visualization processing is executed. Visualized manipulated search results are generated as output of the execution of the received embedded scripted code. The visualized manipulated search results are returned in response to receiving the HTTP request that includes the embedded scripted code. | 10-02-2014 |
20150055551 | MOBILE WIRELESS ACCESS POINT NOTIFICATION DELIVERY FOR PERIODICALLY DISCONNECTED MOBILE DEVICES - A mobile wireless access point includes at least one processor, memory and a cellular radio disposed within a housing, as well as a wireless router configured to generate and maintain a wireless hotspot within a geographic distance of the housing and to route data from the wireless hotspot to the Internet over the broadband data connection. Finally, the mobile wireless access point includes a mobile wireless access point notification delivery module executing in the memory of the housing and programmed to respond to a determination that a mobile device formerly connected to the wireless hotspot no longer is connected to the wireless hotspot by queuing in the memory messages received from over the broadband connection that are directed to the mobile device, and by subsequently delivering the queued messages to the mobile device in response to a determination that the mobile device has reconnected to the wireless hotspot. | 02-26-2015 |
20150057022 | MOBILE WIRELESS ACCESS POINT GEOLOCATION SERVICES PROXY FOR MOBILE DEVICES - A method for mobile wireless access point geolocation services proxying for mobile devices is provided. The method includes providing in a wireless access point, a wireless hotspot for different mobile devices and establishing a cellular communications link between the wireless access point and the Internet. The method also includes routing messages between the mobile devices and the cellular communications link through the wireless hotspot. Finally, the method includes responding to a request from one of the mobile devices for geolocation data by obtaining location data for the wireless access point and transmitting the obtained location data to the one of the mobile devices over the wireless hotspot for use by the one of the mobile devices in acquiring location based services from a remote endpoint server over the Internet. | 02-26-2015 |