Patent application number | Description | Published |
20080205300 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user. | 08-28-2008 |
20080209015 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison. | 08-28-2008 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090141659 | Method and Apparatus for Concurrent Topology Discovery - A method, system and computer-usable medium are disclosed for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (‘K’) of discovery agents to be used is determined, where 1<=K<=TotalNumberOfNodes). The nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent ‘M’ where 1<=M<=K. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent ‘M’, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes. If the discovered nodes are not listed in the NodeList, then they are assigned to a node group for processing. If the connections between the target and the discovered neighboring node nodes are not listed in the GraphList, then they are added. Once all node and connection information is collected by the ‘K’ node discovery agents ‘M’ and listed in the GraphList, a network topology is generated. | 06-04-2009 |
20100311443 | METHODS AND APPARATUS FOR ACCESSING COMPUTER NETWORK ACCESSIBLE SERVICE APPLICATIONS VIA A MOBILE TERMINAL - Methods and systems for accessing computer network accessible services, such as internet based service applications, via a mobile terminal of a mobile telecommunication system using a mediation layer between a person's mobile terminal and the IT world. The mobile terminal in response to receiving user inputs interacts with this mediation layer via text messages. The mediation layer turns around and executes the appropriate IT services on behalf of the mobile terminal user. | 12-09-2010 |
20110078290 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION FOR CONFIGURATION CHANGES - At a data center controller, a first server location is determined from a set of available server locations at which to change a server active state for a data center. A time and configuration change for the data center are forecasted. A second server location is determined from the set of available server locations at which to change the server active state based upon the forecasted configuration change for the data center. An available server location is selected at which to change the server active state based upon the first server location, the second server location, and the forecasted time associated with the forecasted configuration change for the data center. | 03-31-2011 |
20110078480 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION - A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations. | 03-31-2011 |
20120272075 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION - A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations. A maximal calculated heat potential value is identified for the set of available server locations. An available server location associated with the identified maximal calculated heat potential value is selected from the set of available server locations. A server located at the selected available server location associated with the identified maximal calculated heat potential value is automatically de-energized. | 10-25-2012 |
20120290687 | APPLICATION OPTIMIZATION IN A NETWORK SYSTEM - A network system includes multiple network resource information handling systems (IHSs) for managing applications and application communications. An IHS operating system initializes an application optimizer to provide application acceleration capability to application optimizers, such as application delivery controllers (ADCs) and wide area network (WAN) optimizer controllers (WOCs) within the network system. Upon receipt of a server application request message (SARM), a network system server responds with a restful application optimizer message (RAOM) that includes protocol, policy, and other application optimizer information that pertains to the requesting SARM. Application optimizers may include clients, ADCs and WOCs that reside within the message communication path between client and server. Application optimizers may store protocol, policy, and other information from RAOM | 11-15-2012 |
20130007369 | Transparent Cache for Mobile Users - A system includes a cache node operative to communicatively connect to a user device, cache data, and send requested cache data to the user device, and a first support cache node operative to communicatively connect to the cache node, cache data, and send requested cache data to the user device via the cache node. | 01-03-2013 |
20130054658 | VIRTUAL FILE DIRECTORY SERVICES FOR MOBILE DEVICES - Establishing virtual file directory services by receiving a notification from a first device in a first zone is that the first device is sharing a resource. Information about the shared resource is stored in an index. The stored information indicates that the resource is available from the device. As the device enters a second zone the stored information is transmitted to the second zone from the first zone. | 02-28-2013 |
20130054691 | FLEXIBLE RULE BASED MULTI-PROTOCOL PEER-TO-PEER CACHING - Flexible rule based multi-protocol peer-to-peer caching in a wireless environment. A request is received from a requestor for a file from one of a plurality of peer-to-peer networks. The peer-to-peer network the request is directed to is determined in response to receiving the request. Using a generic rule structure, the file that is requested from the peer-to-peer network is identified. The generic rule structure is compatible with all of the plurality of peer-to-peer networks. If the file is stored in a cache it is retrieved from the cache and is transmitted to the requestor. | 02-28-2013 |
20130054831 | REDIRECTING FILE TRAFFIC FROM A CORE SERVER TO THE NETWORK EDGE - File traffic redirection from a core server to a network edge. A request for a file from a target system is received from one or more requestors in direct communication with the computer. The request includes a host name of the target system. If the host name is not locally resolvable, requesting a resolution of the host name from a domain name resolution process external to the computer. An Internet protocol address of the target system is received from the domain name resolution process, and all subsequent file requests by any of the one or more requestors for files from the target system are routed directly to the target system without accessing a core network. | 02-28-2013 |
20130117330 | RETAINING CORPORATE MEMORY - There are provided a system, a method and a computer program product for managing corporate memory. A user creates at least one rule that maps an organization scheme of electronic data in the user's individual computer to a semantic and structure of a corporate database. The system automatically transforms the electronic data in the user's individual computer to a format for storing in the corporate database according to the created rule. The system automatically uploads the transformed electronic data into the corporate database. | 05-09-2013 |
20130298175 | CONSTRUCTING A CUSTOMIZED MESSAGE IN A VIDEO-ON-DEMAND SERVICE - A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network. | 11-07-2013 |
20130318300 | Byte Caching with Chunk Sizes Based on Data Type - Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type. | 11-28-2013 |
20140045475 | Techniques for Improving Cache Effectiveness of Caches with Low User Population - Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items. | 02-13-2014 |
20140045476 | Techniques for Improving Cache Effectiveness of Caches with Low User Population - Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items. | 02-13-2014 |
20140057592 | DYNAMIC SERVICE CLASS UPGRADES IN DATA NETWORKS - A method, program product and system for dynamically offering upgraded services in a network. The method comprising the steps of: selecting users for a possible offer of an upgrade to services within the network, based on user activity at user devices accessing the network; obtaining network context data information regarding the user activity and the network; sequentially ordering the selected users based on a likelihood that the users will purchase the upgrade to services; determining the upgrade to services to be offered based on a service prediction availability within the network; and offering the upgrade to services to the selected users for a specific time period. | 02-27-2014 |
20140059190 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function. | 02-27-2014 |
20140059191 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit. | 02-27-2014 |
20140080457 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 03-20-2014 |
20140108626 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140108638 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140126378 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140126379 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140143444 | SAVING BANDWIDTH IN TRANSMISSION OF COMPRESSED DATA - A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content. In one embodiment, the at least one decompressed portion of the content from the traffic is replaced with an index, the index is compressed to form the associated identifier, and the associated identifier is sent to the receiving end of the link. | 05-22-2014 |
20140164321 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140164328 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140173074 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140173080 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140207903 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140207954 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140280470 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems, methods and/or algorithms. | 09-18-2014 |
20140280768 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140293885 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140297822 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140307635 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140307640 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140364096 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURE - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 12-11-2014 |
20150032979 | SELF-ADJUSTING PHASE CHANGE MEMORY STORAGE MODULE - A dynamic self-adjusting memory storage device and method of operating. The device includes a plurality of adjustable-size phase change memory (PCM) storage sub-modules connected to and communicating over a bus with a control device. One of the plurality of adjustable-size memory storage sub-modules is in a stand-by mode of operation. The control device implements steps to: determine, based on a switching criteria, when the memory storage device needs to be switched to a different operation mode; select one or more adjustable-sized memory storage sub-modules for switching to said different operation mode; copy stored data from a selected actively operating adjustable-size memory storage sub-module to said adjustable-size memory storage sub-module in said stand-by mode; and change the capacity of the selected actively operating adjustable-size memory storage sub-module after the copying. The dynamic self-adjusting memory capacity method is performed without powering down the memory storage device or paying any timing penalty. | 01-29-2015 |
Patent application number | Description | Published |
20080222704 | Method and Apparatus for Computer Network Security - Techniques are provided for computer network security. The techniques include obtaining operational data for at least a first networked application; obtaining enterprise data for at least a second networked application; correlating the operational data with the enterprise data to obtain correlated data; and using the correlated data to improve security of the computer network. | 09-11-2008 |
20080271004 | COMPUTER-IMPLEMENTED METHOD, SYSTEM, AND PROGRAM PRODUCT FOR OPTIMIZING A DISTRIBUTED APPLICATION - A computer-implemented method, system, and program product for optimizing a distributed (software) application are provided. Specifically, a configuration of a target computing environment, in which the distributed application is deployed, is discovered upon deployment of the distributed application. Thereafter, based on a set of rules and the discovered configuration, one or more optimization techniques are applied to optimize the distributed application. In a typical embodiment, the set of rules can be embedded in the distributed application, or they can be accessed from an external source such as a repository. Regardless, the optimization techniques applied can include at least one of the following: (1) identification and replacement of an underperforming component of the distributed application with a new component; (2) generation of interface layers (to allow selection of optimal bindings) between distributed objects of the distributed application; and/or (3) execution of code transformation of the distributed application using program analysis techniques. | 10-30-2008 |
20090031302 | METHOD FOR MINIMIZING RISKS OF CHANGE IN A PHYSICAL SYSTEM CONFIGURATION - Risks of change to a physical configuration are minimized. A request for a change to the physical system included in the physical configuration is detected, and all applications the physical systems that would be affected by the requested change are identified. All the applications and physical systems that would be affected by the requested change are replicated on a virtual system, including applications and the physical system to which the requested change is targeted and applications and physical systems that are dependent on the applications and the physical system to which the requested change is targeted. The requested change is applied to the virtual system. The virtual system is tested to determine whether the applied change produces desired results. If the applied change products the desired results, the requested change is applied to the physical system. | 01-29-2009 |
20090055274 | METHOD AND APPARATUS FOR DISTRIBUTED APPLICATION EXECUTION - This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page. | 02-26-2009 |
20090313329 | Methods, Systems and Computer Program Products for Communication of Information in Electronic Conferences - Methods, systems and computer program products for document sharing in collaborative electronic meetings. Exemplary embodiments include a method for control of documents in a collaborative interaction, the method including establishing an out-of-band channel between a first participant and a second participant in the collaborative interaction, transferring a copy of a document on the out-of-band channel between the first participant and the second participant, transferring a command issued on the document by the first participant on an in-band channel established between the first participant and the second participant, invoking the command by the second participant on the copy of the document by the second participant and displaying the result of invoking the command to the second participant. | 12-17-2009 |
20120005652 | Method and System for Lazy Data Serialization in Computer Communications - A method of transmitting information to a receiving computer systems includes determining in a processing unit of a computer whether a receiving computer system can receive the information without converting a local format of the information into a canonical format of the information, if it is determined that the receiving computer system cannot receive the information without converting the local format into the canonical format, then converting the local format to the canonical format and transmitting the information to the receiving computer system, and if it is determined that the receiving computer system can receive the information without converting the local format into the canonical format, then transmitting the information to the receiving computer system. | 01-05-2012 |
20120304295 | Method and Apparatus for Detecting Computer Fraud - Techniques are provided for detecting computer fraud. The techniques include obtaining a text version of a candidate destination and a graphical rendering of the candidate destination, comparing the text version of the candidate destination and the graphical rendering of the candidate destination with a corresponding text version of a stored destination and a corresponding graphical rendering of the stored destination, and generating a fraud warning if the graphical rendering of the candidate destination is substantially similar to the graphical rendering of the stored destination while the text version of the candidate destination differs substantially from the corresponding text version of the stored destination. | 11-29-2012 |
20130078961 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130078965 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130170472 | MOBILITY MANAGEMENT OF OSI CONNECTIONS BETWEEN CELL TOWERS - A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. A predetermined trigger event is identified. In response to the predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. | 07-04-2013 |
20140071803 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140071833 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140105174 | STATE MIGRATION OF EDGE-OF-NETWORK APPLICATIONS - A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower). | 04-17-2014 |
20140156837 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 06-05-2014 |