Patent application number | Description | Published |
20080209505 | Policy-based physical security system for restricting access to computer resources and data flow through network equipment - Embodiments are directed to systems and methods for integration and normalization of physical security data, states and events to and from disparate physical security systems to maintain in real-time rules based policy state information to enforce physical security policies uniformly across network and information technology (IT) systems. Moreover it pertains specifically to such apparatus for providing an integration platform, methods and processes for normalizing data from physical security systems, to maintain physical security states, mapping to network access and either directly affecting the network equipment through standard programming commands or providing interfaces for network equipment and IT applications to query and determine physical security access states thus enforcing rules in real-time based on security systems data and events. | 08-28-2008 |
20080209506 | Physical access control and security monitoring system utilizing a normalized data format - Embodiments disclose a system and method for the integration of data and events to and from physical access control and security monitoring systems that is normalized to standardized definition for enforcement of standardized rules, created through a visual policy editor, affecting persistence, propagation of data and generation of alerts and notifications for physical security, network and IT systems. Data from disparate physical security systems is normalized for visual rule creation by rule object shapes representing normalized security systems, data and processes. A rules-based policy engine enforces security policies and generates actionable events. The overall system provides an integration platform, methods and processes for normalizing data from physical security systems, representation of physical security systems, data and processes for visual creation of rules using defined stencil objects, generating formatted rules, and enforcing these rules in real-time on security systems data and events. | 08-28-2008 |
20150358359 | POLICY-BASED PHYSICAL SECURITY SYSTEM FOR RESTRICTING ACCESS TO COMPUTER RESOURCES AND DATA FLOW THROUGH NETWORK EQUIPMENT - Embodiments are directed to systems and methods for integration and normalization of physical security data, states and events to and from disparate physical security systems to maintain in real-time rules based policy state information to enforce physical security policies uniformly across network and information technology (IT) systems. Moreover it pertains specifically to such apparatus for providing an integration platform, methods and processes for normalizing data from physical security systems, to maintain physical security states, mapping to network access and either directly affecting the network equipment through standard programming commands or providing interfaces for network equipment and IT applications to query and determine physical security access states thus enforcing rules in real-time based on security systems data and events. | 12-10-2015 |
Patent application number | Description | Published |
20100306166 | AUTOMATIC FACT VALIDATION - The disclosed embodiments fulfill searches and determine the validity of a large set of noisy facts and rank the set of facts according to a validity score. Embodiments construct a fact graph by linking together facts that share a common relation structure and entity or instance of an argument. Facts are re-ranked and validated using link analysis processes which propagate weight (validity/authority) through the fact graph. The resulting weights for each fact are potentially combined with other scores (such as from fact extraction algorithms) in order to come up with a final ranking of the facts. | 12-02-2010 |
20110093452 | AUTOMATIC COMPARATIVE ANALYSIS - Web search engines are often presented with user queries that involve comparisons of real-world entities. Thus far, this interaction has typically been captured by users submitting appropriately designed keyword queries for which they are presented a list of relevant documents. Embodiments explicitly allow for a comparative analysis of entities to improve the search experience. | 04-21-2011 |
20110161311 | SEARCH SUGGESTION CLUSTERING AND PRESENTATION - Disclosed are methods and apparatus for clustering and presenting search suggestions. A segment of text is obtained via a search query section of a user interface, the segment of text being a portion of a search query. A set of suggestions is obtained, each suggestion in the set of suggestions being a suggested search query relating to the segment of text. Two or more groups of suggestions are generated, each of the two or more groups of suggestions including a different subset of the set of suggestions. The two or more groups of suggestions are provided such that each of the two or more groups of suggestions is displayed in a separate partition of a search assistance segment of the user interface. | 06-30-2011 |
20110231387 | ENGAGING CONTENT PROVISION - A model is created and from seed trivia facts will create a database of pruned and ranked trivia facts and associated trigger terms. Search, email, or other information provider systems are configured to detect usage of the trigger terms and provide relevant trivia facts in response to the usage. | 09-22-2011 |
20120036148 | SOCIALIZING VIA SEARCH - Implementations of methods, apparatuses, or systems are disclosed to facilitate search related communications. | 02-09-2012 |
20120143875 | METHOD AND SYSTEM FOR DISCOVERING DYNAMIC RELATIONS AMONG ENTITIES - Method, system, and programs for detecting dynamic relationship and discovering dynamic events. Data from a first data source is first received. At least one dynamic relation candidate is identified and each dynamic relation candidate involves multiple entities. The at least one dynamic relation candidate is identified based on temporal properties with respect to the entities exhibited in the data from the first data source. Dynamic relations are then extracted by corroborating the temporal properties of the entities involved in the at least one dynamic relation candidate with that of the same entities exhibited in data from a second data source. Then, a dynamic event that gives rise to the dynamic relations among different entities is detected. | 06-07-2012 |
20120191745 | Synthesized Suggestions for Web-Search Queries - Data-mining software receives a user query as an input and segments the user query into a number of units. The data-mining software then drops terms from a unit using a Conditional Random Field (CRF) model that combines a number of features. At least one of the features is derived from query logs and at least one of the features is derived from web documents. The data-mining software then generates one or more candidate queries by adding terms to the unit. The added terms result from a hybrid method that utilizes query sessions and a web corpus. The data-mining software also scores each candidate query on well-formedness of the candidate query, utility, and relevance to the user query. Then the data-mining software stores the scored candidate queries in a database for subsequent display in a graphical user interface for a search engine. | 07-26-2012 |
20120246097 | Apparatus and Methods for Analyzing and Using Short Messages from Commercial Accounts - Disclosed are methods and apparatus for analyzing and using online short messages from promoting entity accounts (e.g., business or non-profit accounts). In one embodiment, a method of analyzing and using messages sent for a plurality of promoting entity accounts is disclosed. A plurality of models for classifying a plurality of messages based on a plurality of message features are obtained for each message. Each message is sent via a computer network between a selected one of the promoting entity accounts and one or more subscribing users that subscribe to receive messages from such selected promoting entity account, and each model is trained to identify whether a message belongs to a particular class based on a lexicon that was generated for such particular class and a training set of messages that belong to the particular class and message that do not belong to the particular class. A new message is classified based on the models and retaining classification information regarding the new message in a database that is accessible by a user so as to review the classification information on a computer display. | 09-27-2012 |
20120296927 | SYSTEM AND METHOD FOR CONTEXTUALIZING QUERY INSTRUCTIONS USING USER'S RECENT SEARCH HISTORY - Disclosed is a system and method for providing search suggestions to a user based on the user's previously entered search queries. A computing device stores a global set of search suggestions. The computing device receives over a network from a user computer operated by a user one or more alphanumeric characters forming a portion of a search query. The computing device determines a search suggestion to the portion of the search query from the global set of search suggestions based on a search history of the user, the search history of the user comprising a plurality of search queries entered by the user within a predetermined period of time. The computing device transmits to the user computer the search suggestion for display by the user computer. | 11-22-2012 |
20150074146 | METHOD AND SYSTEM FOR DISCOVERING DYNAMIC RELATIONS AMONG ENTITIES - Method, system, and programs for detecting dynamic relationship and discovering dynamic events. Data from a first data source is first received. At least one dynamic relation candidate is identified and each dynamic relation candidate involves multiple entities. The at least one dynamic relation candidate is identified based on temporal properties with respect to the entities exhibited in the data from the first data source. Dynamic relations are then extracted by corroborating the temporal properties of the entities involved in the at least one dynamic relation candidate with that of the same entities exhibited in data from a second data source. Then, a dynamic event that gives rise to the dynamic relations among different entities is detected. | 03-12-2015 |
Patent application number | Description | Published |
20120084607 | FACILITATING LARGE-SCALE TESTING USING VIRTUALIZATION TECHNOLOGY IN A MULTI-TENANT DATABASE ENVIRONMENT - A system and method for testing in a database system. In one embodiment, a method includes receiving an indication of one or more changes to a software application, wherein each change corresponds to a different version of the software application. The method further includes generating one or more virtual machines for a version of the software application in response to the indication, wherein the one or more virtual machines test the version of the software application. | 04-05-2012 |
20130283103 | FACILITATING LARGE-SCALE TESTING USING VIRTUALIZATION TECHNOLOGY IN A MULTI-TENANT DATABASE ENVIRONMENT - A system and method for testing in a database system. In one embodiment, a method includes receiving an indication of one or more changes to a software application, wherein each change corresponds to a different version of the software application. The method further includes generating one or more virtual machines for a version of the software application in response to the indication, wherein the one or more virtual machines test the version of the software application. | 10-24-2013 |
20140052547 | GENERATING PRODUCT PURCHASE PAGES FOR CONTAINERS OF ITEMS - Methods and systems to build containers of uncategorized items are described. In some example embodiments, the methods and systems generate a title for a container of uncategorized items available for purchase within a network-based publication system, associate two or more uncategorized items available for purchase within the network-based publication system to the container based on a comparison of titles of the two or more uncategorized items and the generated title for the container of uncategorized items, and cause a display of a container-based product purchase page within the network-based publication system that presents product description information for at least one of the associated two or more uncategorized items available for purchase within the network-based publication system. | 02-20-2014 |
20140052579 | BUILDING CONTAINERS OF UNCATEGORIZED ITEMS AT MULTIPLE LOCATIONS - Methods and systems to build containers of uncategorized items are described. In some example embodiments, the methods and systems access a search request for items available for purchase via a network-based location, collect information associated with available items having product description information satisfying the search request and located at multiple network-based locations, determine one or more containers that associate items available for purchase based on the collected information, and publish a result for the search request that is based on the determined containers. | 02-20-2014 |
20140052589 | BUILDING CONTAINERS OF UNCATEGORIZED ITEMS - Methods and systems to build containers of uncategorized items are described. In some example embodiments, the methods and systems collect information from titles of items available for purchase within a network-based publication system, generate a title for a container of uncategorized items available for purchase within the network-based publication system that is based on the collected information, and associate two or more uncategorized items available for purchase within the network-based publication system to the container based on a comparison of titles of the two or more uncategorized items and the generated title for the container of uncategorized items. | 02-20-2014 |
20140052719 | PRESENTING INFORMATION FOR CONTAINERS IN SEARCH RESULTS - Methods and systems to build containers of uncategorized items are described. In some example embodiments, the methods and systems access a search query received by a network-based publication system, identify a container of uncategorized items having a title that satisfies the search query, and return a result for the search query that is associated with the identified container. | 02-20-2014 |
Patent application number | Description | Published |
20080243746 | Compact Decision Diagrams - In one embodiment, a method includes determining an initial projected size of a BDD representing data for storage. The projected size corresponds to an initial projected number of decision nodes composing the BDD. The method includes determining an initial node structure for the decision nodes of the BDD according to the initial projected size of the BDD. The initial node structure includes for each decision node a variable identifier (ID), a 1-edge pointer, and a 0-edge pointer each represented by a minimum number of bits accommodating the initial projected number of decision nodes composing the BDD. | 10-02-2008 |
20080243907 | Efficient Indexing Using Compact Decision Diagrams - In one embodiment, a method includes accessing an inverted index of a searchable set of objects including key words. The inverted index includes multiple lists each corresponding to a particular key word and identifying a particular subset of the objects including the particular key word. The method includes generating a binary decision diagram (BDD) for each of one or more of the lists. The BDD corresponds to the particular key word of the list, and each decision node of the BDD represents an object in the searchable set of objects including the particular key word of the list. The method includes storing each of one or more of the lists as its BDD. Storage of the BDD facilitates more efficient storage of the inverted index. | 10-02-2008 |
20090171928 | Ranking Nodes for Session-Based Queries - In one embodiment, a method includes accessing a model of a set of nodes including a session node and multiple linked nodes linked to the session node. The linked nodes include parent nodes and child nodes. A parent node links one or more child nodes to the session node, and a child node has one or more parent nodes linking the child node to the session node. The method includes generating a probability distribution for the set of nodes that distributes probabilities to all linked nodes within a predetermined number of links from the session node. Each child node receives from each of its parent nodes a predetermined fraction of a probability distributed to the parent node, and the parent node uniformly distributes to each of its child nodes the predetermined fraction of the probability distributed to the parent node. | 07-02-2009 |
Patent application number | Description | Published |
20130093787 | METHOD AND APPARATUS FOR GROUPING AND DE-OVERLAPPING ITEMS IN A USER INTERFACE - An approach is provided for grouping and de-overlapping items in a user interface. A display manager determines one or more items for rendering in a user interface. The display manager then causes, at least in part, a determination of one or more rendering locations for one or more representations of the one or more items based, at least in part, on location information associated with the one or more items. The display manager further causes, at least in part, a grouping, a de-overlapping, or a combination thereof of the one or more representations based, at least in part, on an overlapping of the one or more rendering locations. The display manager also causes, at least in part, a rendering of the one or more representations in the user interface based, at least in part, on the grouping, the de-overlapping, or a combination thereof. | 04-18-2013 |
20140043322 | METHOD AND APPARATUS FOR DISPLAYING INTERFACE ELEMENTS - A method, apparatus and computer program product are provided to provide an efficient, aesthetically pleasing display of points of interest in an AR interface that maximizes usability and display efficiency. In this regard, the method, apparatus and computer program product may utilize a mobile terminal to perform pre-processing of interface elements to reduce display clutter and increase efficiency of display processing. Interface elements may be projected onto a cylindrical surface to locate the interface elements relative to the mobile terminal. Three dimensional coordinates for the interface elements may be derived from the cylindrical projection. A perspective grid may provide a user of the device with a frame of reference to interact with the display and interface elements displayed thereon. Display elements may further conform to input operations performed by a user to interact with the AR interface. | 02-13-2014 |
20150049080 | Method and Apparatus for Rendering Items in a User Interface - An approach is provided for rendering items in a user interface. The approach may, for instance, include: a pre-fetching and a caching of item information associated with one or more items for one or more determined categories based on location information associated with the device; a processing of a detected attitude change associated with the device and of an attitude change threshold to determine an intended orientation mode for the device; a modification of one or more representations, of one or more items, that are within a region, of a user interface, associated with a user interface object; a grouping, a de-overlapping, or a combination thereof of the one or more representations based on an overlapping of one or more rendering locations, of the one or more representations, in a three-dimensional model space. | 02-19-2015 |
Patent application number | Description | Published |
20140064148 | Distributed Proxy Addressing Operations - An addressing redirection mechanism is initiated at a switch or a router in a computing network in order to enable the switch to perform one or more distributed proxy addressing operations on behalf of a connected router. An address request transmitted from a first host device to a second host device to obtain addressing information of the second host device is received at the switch, and the switch inspects the address request to identify addressing information for the first host device. The switch is configured to forward the addressing information for the first host device to the router | 03-06-2014 |
20140075047 | Network-Assisted Virtual Machine Mobility - A first addressing message is received at a first switch in a network fabric indicating that a first virtual machine has undergone migration from connection to a first virtual switch at a first server to connection to a second virtual switch at a second server. A route advertisement message is then transmitted from the first switch to at least a second switch in the network fabric. This route advertisement is configured to cause the second switch to transmit a second addressing message to a second virtual machine connected to the first virtual switch. The second addressing message provides the second virtual machine with updated addressing information for the first virtual machine. A third addressing message is also transmitted from the first switch to the first virtual machine to provide the first virtual machine with updated addressing information for the second virtual machine. | 03-13-2014 |
20140105029 | DETECTION OF CABLING ERROR IN COMMUNICATION NETWORK - In one embodiment, a method at a network device includes receiving a link layer advertisement, comparing information in the link layer advertisement with connectivity information stored at the network device, and based on the comparison, determining if there is a cabling error between the network device and a link peer transmitting the link layer advertisement. An apparatus and logic are also disclosed herein. | 04-17-2014 |
20140219079 | PROVISIONING OF A NEW NODE JOINING AN EXISTING CLUSTER IN A DATA CENTER ENVIRONMENT - A method is provided in one example embodiment and includes identifying for a new node added to a communications network a plurality of existing network nodes respectively connected to one of a plurality of ports of the new node and capable of implementing a particular routing protocol; selecting one of the identified existing network nodes to serve as a designated forwarder (“DF”) for the new node; performing a power on auto provisioning (“PoAP”) procedure in connection with the new node; and opening the ports of the new node to which the identified existing network nodes are connected. | 08-07-2014 |
20140294005 | Using a Virtual Internet Protocol Address to Represent Dually Connected Hosts in an Internet Protocol Overlay Network - Techniques are presented herein for distributing address information of host devices in a network. At a first router device, a packet is received from a first host device that is destined for a second host device. The first host device is dually-connected to the first router and a second router device. The second router device is part of a virtual port channel pair with the first router device. A message is sent to the second router device, the message indicating that the first host device is connected to the second router device. The packet is encapsulated with an overlay header and is sent to a third router device that is connected to the second host device. The encapsulated packet contains a Layer 2 address associated with the first host device and a Layer 3 address associated with the first host device. | 10-02-2014 |
20140314079 | Efficient Multicast Delivery to Dually Connected (VPC) Hosts in Overlay Networks - In a mesh-based connected data center network architecture, a mechanism is provided to allow efficient delivery of IP multicast frames within the network. Described approaches avoid replication into VLANs (or SVIs) across the fabric by using the outer encapsulated tree to identify trees on which to replicate the traffic. Replication may be performed at the furthest point from the source (via routing or bridging). Also, multicast traffic may be distributed to dually connected (vPC) hosts on links from various network devices. | 10-23-2014 |
20150046572 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 02-12-2015 |
20150063353 | IMPLEMENTATION OF VIRTUAL EXTENSIBLE LOCAL AREA NETWORK (VXLAN) IN TOP-OF-RACK SWITCHES IN A NETWORK ENVIRONMENT - An example method for implementation of virtual extensible local area network (VXLAN) in top-of-rack (ToR) switches in a network environment is provided and includes receiving a packet encapsulated with a VXLAN header having an unknown virtual tunnel endpoint (VTEP) Internet Protocol (IP) address in a network environment, and installing an entry at an index location of a forwarding table. The index location includes an encoding of the VTEP-IP address as a VTEP index (VTEP-IDX), and the entry maps a VXLAN interface to an IP address associated with a VXLAN network interface (VNI). In specific embodiments, the VTEP-IDX is logN bits, where N is a size of the forwarding table. The forwarding table indicates a destination VTEP IP address when encapsulating the packet, and the source VTEP IP address when decapsulating the packet. | 03-05-2015 |
20150103692 | Host Traffic Driven Network Orchestration within Data Center Fabric - Presented herein are techniques to handle data packets received at a top-of-rack (ToR) switch in an underlay network hosting one or more tenant networks. The underlay network may comprise a plurality of ToR switches each connected to each of a plurality of spine switches. The data packet may be received from a virtual machine in a tenant network, and have a header with a data packet identifier. A mobility domain identifier may be determined that corresponds to the network portion within which the virtual machine can be migrated. The mobility domain may be configured on the ToR switch on a per-port basis based on the virtual machine connected to the ToR switch port. A unique identifier may be formed based on the data packet identifier and mobility domain identifier. Using this unique identifier, provisioning information may be obtained for the tenant network on the ToR switch. | 04-16-2015 |
20150139035 | Dynamic Virtual Port Instantiation for Scalable Multitenant Network - A leaf switch of a switch fabric includes multiple ports to connect with respective ones of multiple servers. Virtual local area networks (VLANs) are configured on the leaf switch. Dynamic creation of virtual ports is enabled on the leaf switch for at least one of the VLANs on an as needed basis. The leaf switch receives from a particular server connected to a corresponding one of the ports a notification message that a virtual machine is hosted on the particular server. Responsive to the notification message, the leaf switch dynamically creates a virtual port that associates the corresponding one of the ports with the at least one of the VLANs. | 05-21-2015 |
20150163192 | Detection of a Misconfigured Duplicate IP Address in a Distributed Data Center Network Fabric - Presented herein are techniques to detect a misconfigured duplicate Internet Protocol (IP) address in a distributed data center network fabric. A network topology is provided that includes a plurality of network elements. A network element receives a configuration message comprising an IP address from a first host associated with the first network element. The IP address is detected to already be in use by a second host associated with a second network element. A request message is provided to the second network element, the request message configured to cause the second network element to attempt to contact the second host. A reply message is received from the second network element. If the reply message indicates that the second host exists at the second network element, an indication of a misconfiguration event is generated. Otherwise, the IP address is associated with the first host. | 06-11-2015 |
20150244673 | Distributed Proxy Addressing Operations - An addressing redirection mechanism is initiated at a first networking device in a computing network in order to enable the first networking device to perform one or more distributed proxy addressing operations on behalf of a connected second networking device. An address request transmitted from a first host device to a second host device to obtain addressing information of the second host device is received at the first networking device, and the first networking device inspects the address request to identify addressing information for the first host device. The first networking device is configured to forward the addressing information for the first host device to the second networking device. | 08-27-2015 |
20150372869 | Distributed Gateways for Overlay Networks - Techniques provided herein enable a set of independent, unconnected devices in a network to support distributed Layer 3 (L3) gateway functionality for an overlay based virtual network by intelligently triggering proxy addressing information updates. | 12-24-2015 |
20160028656 | Extending Virtual Station Interface Discovery Protocol (VDP) and VDP-Like Protocols for Dual-Homed Deployments in Data Center Environments - Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a virtual switch to provision virtual network segmentation resources for a virtual machine managed by the virtual switch. The first switch device provisions the virtual network segmentation resources for the virtual machine. The first switch devices sends to a second switch device a first synchronization message that includes information describing the virtual network segmentation resources. The second switch device is a peer of the first switch device. The first switch device also sends to the second switch device a second synchronization message that includes state information indicating that the first switch device is in an active state for servicing the virtual machine and that the second switch device is to be placed in a dormant state for servicing the virtual machine. | 01-28-2016 |
20160028683 | Using a Virtual Internet Protocol Address to Represent Dually Connected Hosts in an Internet Protocol Overlay Network - Techniques are presented herein for distributing address information of host devices in a network. At a first router device, a packet is received from a first host device that is destined for a second host device. The first host device is dually-connected to the first router and a second router device. The second router device is part of a virtual port channel pair with the first router device. A message is sent to the second router device, the message indicating that the first host device is connected to the second router device. The packet is encapsulated with an overlay header and is sent to a third router device that is connected to the second host device. The encapsulated packet contains a Layer 2 address associated with the first host device and a Layer 3 address associated with the first host device. | 01-28-2016 |