Patent application number | Description | Published |
20080205300 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user. | 08-28-2008 |
20080209015 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison. | 08-28-2008 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090141659 | Method and Apparatus for Concurrent Topology Discovery - A method, system and computer-usable medium are disclosed for discovering the topology of a network by using multiple discovery agents operating in parallel. A NodeList containing information about known nodes in a target network is received. The number (‘K’) of discovery agents to be used is determined, where 1<=K<=TotalNumberOfNodes). The nodes are partitioned into node groups, each of which has a group identifier respectively assigning it to a discovery agent ‘M’ where 1<=M<=K. A GraphList is created to hold information about known and discovered nodes. Each entry in the NodeList list is processed by its assigned discovery agent ‘M’, which sends probe messages to the target node to determine the node identifiers of discovered neighboring nodes. If the discovered nodes are not listed in the NodeList, then they are assigned to a node group for processing. If the connections between the target and the discovered neighboring node nodes are not listed in the GraphList, then they are added. Once all node and connection information is collected by the ‘K’ node discovery agents ‘M’ and listed in the GraphList, a network topology is generated. | 06-04-2009 |
20100311443 | METHODS AND APPARATUS FOR ACCESSING COMPUTER NETWORK ACCESSIBLE SERVICE APPLICATIONS VIA A MOBILE TERMINAL - Methods and systems for accessing computer network accessible services, such as internet based service applications, via a mobile terminal of a mobile telecommunication system using a mediation layer between a person's mobile terminal and the IT world. The mobile terminal in response to receiving user inputs interacts with this mediation layer via text messages. The mediation layer turns around and executes the appropriate IT services on behalf of the mobile terminal user. | 12-09-2010 |
20110078290 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION FOR CONFIGURATION CHANGES - At a data center controller, a first server location is determined from a set of available server locations at which to change a server active state for a data center. A time and configuration change for the data center are forecasted. A second server location is determined from the set of available server locations at which to change the server active state based upon the forecasted configuration change for the data center. An available server location is selected at which to change the server active state based upon the first server location, the second server location, and the forecasted time associated with the forecasted configuration change for the data center. | 03-31-2011 |
20110078480 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION - A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations. | 03-31-2011 |
20120272075 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION - A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations. A maximal calculated heat potential value is identified for the set of available server locations. An available server location associated with the identified maximal calculated heat potential value is selected from the set of available server locations. A server located at the selected available server location associated with the identified maximal calculated heat potential value is automatically de-energized. | 10-25-2012 |
20120290687 | APPLICATION OPTIMIZATION IN A NETWORK SYSTEM - A network system includes multiple network resource information handling systems (IHSs) for managing applications and application communications. An IHS operating system initializes an application optimizer to provide application acceleration capability to application optimizers, such as application delivery controllers (ADCs) and wide area network (WAN) optimizer controllers (WOCs) within the network system. Upon receipt of a server application request message (SARM), a network system server responds with a restful application optimizer message (RAOM) that includes protocol, policy, and other application optimizer information that pertains to the requesting SARM. Application optimizers may include clients, ADCs and WOCs that reside within the message communication path between client and server. Application optimizers may store protocol, policy, and other information from RAOM | 11-15-2012 |
20130007369 | Transparent Cache for Mobile Users - A system includes a cache node operative to communicatively connect to a user device, cache data, and send requested cache data to the user device, and a first support cache node operative to communicatively connect to the cache node, cache data, and send requested cache data to the user device via the cache node. | 01-03-2013 |
20130054658 | VIRTUAL FILE DIRECTORY SERVICES FOR MOBILE DEVICES - Establishing virtual file directory services by receiving a notification from a first device in a first zone is that the first device is sharing a resource. Information about the shared resource is stored in an index. The stored information indicates that the resource is available from the device. As the device enters a second zone the stored information is transmitted to the second zone from the first zone. | 02-28-2013 |
20130054691 | FLEXIBLE RULE BASED MULTI-PROTOCOL PEER-TO-PEER CACHING - Flexible rule based multi-protocol peer-to-peer caching in a wireless environment. A request is received from a requestor for a file from one of a plurality of peer-to-peer networks. The peer-to-peer network the request is directed to is determined in response to receiving the request. Using a generic rule structure, the file that is requested from the peer-to-peer network is identified. The generic rule structure is compatible with all of the plurality of peer-to-peer networks. If the file is stored in a cache it is retrieved from the cache and is transmitted to the requestor. | 02-28-2013 |
20130054831 | REDIRECTING FILE TRAFFIC FROM A CORE SERVER TO THE NETWORK EDGE - File traffic redirection from a core server to a network edge. A request for a file from a target system is received from one or more requestors in direct communication with the computer. The request includes a host name of the target system. If the host name is not locally resolvable, requesting a resolution of the host name from a domain name resolution process external to the computer. An Internet protocol address of the target system is received from the domain name resolution process, and all subsequent file requests by any of the one or more requestors for files from the target system are routed directly to the target system without accessing a core network. | 02-28-2013 |
20130117330 | RETAINING CORPORATE MEMORY - There are provided a system, a method and a computer program product for managing corporate memory. A user creates at least one rule that maps an organization scheme of electronic data in the user's individual computer to a semantic and structure of a corporate database. The system automatically transforms the electronic data in the user's individual computer to a format for storing in the corporate database according to the created rule. The system automatically uploads the transformed electronic data into the corporate database. | 05-09-2013 |
20130298175 | CONSTRUCTING A CUSTOMIZED MESSAGE IN A VIDEO-ON-DEMAND SERVICE - A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network. | 11-07-2013 |
20130318300 | Byte Caching with Chunk Sizes Based on Data Type - Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type. | 11-28-2013 |
20140045475 | Techniques for Improving Cache Effectiveness of Caches with Low User Population - Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items. | 02-13-2014 |
20140045476 | Techniques for Improving Cache Effectiveness of Caches with Low User Population - Techniques for improving cache effectiveness in areas with low user population are provided. In one aspect, a computer-based method for managing user traffic in a cellular network using proxy caches is provided. The method includes the following steps. A group of the proxy caches that has correlated user traffic is identified. Cache requests for each of the proxy caches in the group are observed. One or more patterns are found in the cache requests. A prediction is made as to which items will be requested from the proxy caches in the group in the future based on the one or more patterns found in the cache requests. The proxy caches in the group are pre-populated with the items. | 02-13-2014 |
20140057592 | DYNAMIC SERVICE CLASS UPGRADES IN DATA NETWORKS - A method, program product and system for dynamically offering upgraded services in a network. The method comprising the steps of: selecting users for a possible offer of an upgrade to services within the network, based on user activity at user devices accessing the network; obtaining network context data information regarding the user activity and the network; sequentially ordering the selected users based on a likelihood that the users will purchase the upgrade to services; determining the upgrade to services to be offered based on a service prediction availability within the network; and offering the upgrade to services to the selected users for a specific time period. | 02-27-2014 |
20140059190 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function. | 02-27-2014 |
20140059191 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit. | 02-27-2014 |
20140080457 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 03-20-2014 |
20140108626 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140108638 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140126378 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140126379 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140143444 | SAVING BANDWIDTH IN TRANSMISSION OF COMPRESSED DATA - A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content. In one embodiment, the at least one decompressed portion of the content from the traffic is replaced with an index, the index is compressed to form the associated identifier, and the associated identifier is sent to the receiving end of the link. | 05-22-2014 |
20140164321 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140164328 | PROACTIVE DATA OBJECT REPLICATION IN NAMED DATA NETWORKS - The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 06-12-2014 |
20140173074 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140173080 | EFFICIENT NAME MANAGEMENT FOR NAMED DATA NETWORKING IN DATACENTER NETWORKS - The present disclosure relates generally to the field of efficient name management for named data networking in datacenter networks. In various examples, efficient name management for named data networking in datacenter networks may be implemented in the form of systems, methods and/or algorithms. | 06-19-2014 |
20140207903 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140207954 | SYSTEMS, METHODS AND ALGORITHMS FOR LOGICAL MOVEMENT OF DATA OBJECTS - The present disclosure relates generally to the field of logical movement of data objects. In various examples, the logical movement of data objects may reduce or eliminate network hotspots (e.g., avoid formation of hotspots, remove existing hotspots and/or reduce the magnitude of hotspots). In various examples, the logical movement of data objects may be implemented in the form of systems, methods and/or algorithms. | 07-24-2014 |
20140280470 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of systems, methods and/or algorithms. | 09-18-2014 |
20140280768 | MIGRATION OF NETWORK CONNECTION UNDER MOBILITY - The present disclosure relates generally to the field of migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility). In various examples, migration (e.g., seamless migration) of a network connection under mobility (e.g., host mobility) may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140293885 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140297822 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140307635 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140307640 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140364096 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURE - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 12-11-2014 |
20150032979 | SELF-ADJUSTING PHASE CHANGE MEMORY STORAGE MODULE - A dynamic self-adjusting memory storage device and method of operating. The device includes a plurality of adjustable-size phase change memory (PCM) storage sub-modules connected to and communicating over a bus with a control device. One of the plurality of adjustable-size memory storage sub-modules is in a stand-by mode of operation. The control device implements steps to: determine, based on a switching criteria, when the memory storage device needs to be switched to a different operation mode; select one or more adjustable-sized memory storage sub-modules for switching to said different operation mode; copy stored data from a selected actively operating adjustable-size memory storage sub-module to said adjustable-size memory storage sub-module in said stand-by mode; and change the capacity of the selected actively operating adjustable-size memory storage sub-module after the copying. The dynamic self-adjusting memory capacity method is performed without powering down the memory storage device or paying any timing penalty. | 01-29-2015 |