Patent application number | Description | Published |
20100125856 | TECHNIQUES FOR ESTABLISHING VIRTUAL DEVICES - Techniques for establishing virtual devices are presented. A legacy control system is encapsulated as a virtual device. The virtual device is isolated within a host hardware associate with a host OS and access to and from the virtual device is authenticated and controlled by the host OS. Legacy hardware used by the legacy control system is connected to the host hardware, thereby permitting the legacy control system to continue to access the legacy hardware when the virtual device processes. | 05-20-2010 |
20100161789 | TECHNIQUES FOR GAUGING PERFORMANCE OF SERVICES - Techniques for gauging performance of services are provided. A client agent is configured to process on a client. The client agent simulates operations of a transaction as instructed by a server agent. The client agent also gathers metrics for each of the operations as they process on the client and passes the metrics back to the server agent. The server agent analyzes the metrics in accordance with a policy and takes one or more actions in response thereto. | 06-24-2010 |
20100205251 | NETWORK-AWARE COMMUNICATIONS - Apparatus, systems, and methods may operate to detect a device connecting to a network, determine the identity of the network, and publish a status indication to at least one of a list of active contacts or a list of inactive contacts. The list of active contacts may be selected from an original list of contacts, based on the identity of the network and a personal rule set associated with a user of the device. The list of inactive contacts may be included in the original list and not included in the list of active contacts. Additional apparatus, systems, and methods are disclosed. | 08-12-2010 |
20110087723 | CONTROLLED STORAGE UTILIZATION - Apparatus, systems, and methods may operate to maintain a repository of stored executable images including a unique instance of an executable image comprising an operating system and at least a portion of one or more applications, and to provide substantially simultaneous executable access to a plurality of virtual or physical machines to execute portions of the executable image without constructing additional instances of the executable image. Additional apparatus, systems, and methods are disclosed. | 04-14-2011 |
20110321066 | TECHNIQUES FOR ESTABLISHING VIRTUAL DEVICES - Techniques for establishing virtual devices are presented. A legacy control system is encapsulated as a virtual device. The virtual device is isolated within a host hardware associate with a host OS and access to and from the virtual device is authenticated and controlled by the host OS. Legacy hardware used by the legacy control system is connected to the host hardware, thereby permitting the legacy control system to continue to access the legacy hardware when the virtual device processes. | 12-29-2011 |
20120290670 | NETWORK-AWARE COMMUNICATIONS - Apparatus, systems, and methods may operate to detect a device connecting to a network, determine the identity of the network, and publish at least a portion of a list of active contacts to a display, while hiding a list of inactive contacts. | 11-15-2012 |
20130007771 | TECHNIQUES FOR ESTABLISHING VIRTUAL DEVICES - Techniques for establishing virtual devices are presented. A legacy control system is encapsulated as a virtual device. The virtual device is isolated within a host hardware associate with a host OS and access to and from the virtual device is authenticated and controlled by the host OS. Legacy hardware used by the legacy control system is connected to the host hardware, thereby permitting the legacy control system to continue to access the legacy hardware when the virtual device processes. | 01-03-2013 |
20130060835 | TECHNIQUES FOR GAUGING PERFORMANCE OF SERVICES - Techniques for gauging performance of services are provided. A client agent is configured to process on a client and simulates operations of a transaction as instructed by a server agent. The client agent also gathers metrics for each of the operations as they process on the client and passes the metrics back to the server agent. The server agent analyzes the metrics in accordance with a policy and takes one or more actions in response thereto. | 03-07-2013 |